paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
1501.05139
2
1501
2016-06-23T06:34:02
Detecting Overlapping Link Communities by Finding Local Minima of a Cost Function with a Memetic Algorithm. Part 1: Problem and Method
[ "cs.SI", "physics.soc-ph" ]
We propose an algorithm for detecting communities of links in networks which uses local information, is based on a new evaluation function, and allows for pervasive overlaps of communities. The complexity of the clustering task requires the application of a memetic algorithm that combines probabilistic evolutionary strategies with deterministic local searches. In Part 2 we will present results of experiments with with citation networks.
cs.SI
cs
Detecting Overlapping Link Communities by Finding Local Minima of a Cost Function with a Memetic Algorithm Part 1: Problem and Method Frank Havemann∗ Jochen Glaser† Michael Heinz‡ Abstract We propose an algorithm for detecting commu- nities of links in networks which uses local infor- mation, is based on a new evaluation function, and allows for pervasive overlaps of communi- ties. The complexity of the clustering task re- quires the application of a memetic algorithm that combines probabilistic evolutionary strate- gies with deterministic local searches. In Part 2 we will present results of experiments with cita- tion networks. 1 Introduction Communities in networks are commonly defined as cohesive subgraphs which are well separated from the rest of the network. This vague concept of communities is operationalised in a variety of ways (Fortunato 2010). The utility of algo- rithms for the detection of communities in net- works partly depends on their 'conceptual fit', i.e. on the degree to which they match proper- ties of the phenomenon that is represented (Hric, Darst, and Fortunato 2014). Achieving such a conceptual fit may require unusual combinations of ideas from network analysis, as is the case with the question and the algorithm presented in this paper. Consider the following three properties of a network and the task of community detection. First, links between nodes contain better infor- mation about communities than the nodes that are to be clustered. In this case, link clustering appears to be the method of choice. Construct- ∗Institut fur Bibliotheks- und Informationswissen- schaft, Humboldt-Universitat zu Berlin, D 10099 Berlin, Dorotheenstr. 26 (Germany) †Center for Technology and Society, TU Berlin (Ger- ‡Institut fur Bibliotheks- und Informationswissen- many) schaft, Humboldt-Universitat zu Berlin ing communities by clustering links has been proposed by Evans and Lambiotte (2009) and by Ahn, Bagrow, and Lehmann (2010) as a method for the construction of overlapping communities of nodes. In addition, clustering links is likely to be advantageous whenever the information asymmetry described above occurs, i.e. when- ever links rather than nodes have the real-world properties whose similarity shall be reflected by clusters. Second, overlapping communities must be a possible outcome of the algorithm because the real-world phenomenon under investigation is known to have such a structure. For the same reason, pervasive overlaps must be possible, i.e. overlaps that extend to all nodes rather than just the boundary nodes of a community. The con- struction of overlapping communities is by now a well-known and frequently addressed problem of network analysis (Fortunato 2010; Xie, Kelley, and Szymanski 2013; Amelio and Pizzuti 2014). Third, the phenomena to be represented by communities are local in that they emerge from local interactions represented by neighbouring nodes and links in the network. If this is the case, the use of local rather than global in- formation may return better communities and a better community structure of the network (Clauset 2005; Lancichinetti, Fortunato, and Kertesz 2009; Havemann, Heinz, Struck, and Glaser 2011). All three ideas have been developed in net- work analysis. However, as reviews of algo- rithms indicate (Fortunato 2010; Xie et al. 2013; Amelio and Pizzuti 2014), link clustering, per- vasively overlapping communities and use of lo- cal information have not yet been combined all three, possibly because the task for which this is necessary has not yet arisen.1 1The only apparent exception is the work by Lei Pan et al. which, however, compromises in two expects, global 1 There is at least one task for which this com- bination of link-based approach, pervasive over- laps and local approach is necessary, namely the detection of thematic structures (topics) in net- works of papers. In networks of papers and their cited sources, citation links (links between a publication and the sources it cites) are thematically more ho- mogenous than nodes (papers), and thus pro- vide better information for clustering, than the papers themselves. While papers commonly be- long to more than one scientific topic, many ci- tation links can be assumed to be homogenous in that the link between paper and source be- longs to only one topic. If it belongs to more than one topic these topics often are not very distant from each other. Scientific topics are known to overlap perva- sively, which means that their reconstruction as communities of papers must reflect this per- vasive overlap. Topics are also locally emer- gent phenomena in that they represent coincid- ing and mutually referring perspectives of re- searchers (the authors of the papers). In order to reconstruct scientific topics from networks of papers and their cited sources, then, we need an algorithm that clusters links, can construct pervasively overlapping communities, and uses mainly local information. In this paper, we present such an algorithm (in Part 1) and its application to citation networks (in Part 2). We propose a local cost function for the indepen- dent evaluation of each link community by re- lating its external to its total connectivity in the network. The cost function is almost completely based on local information, the only global infor- mation used is the number of links in the whole network. The independent evaluation of each subgraph with a local cost function means that communities can be constructed independently from each other, which enables pervasive over- laps. The cost function we propose for subgraph evaluation is solely based on the network's topol- ogy and not on link similarity. Generally, clus- tering by optimising a (global or local) evalua- tion function needs no measure of similarity of clustered elements but results in clusters the ele- information used in the end and no pervasive overlap be- cause link clusters are disjunct (Pan, Wang, Xie, and Liu 2011; Pan, Wang, and Xie 2012). Furthermore, they differ from our approach because they propose an evalu- ation function for link clustering which is derived within the node clustering approach. ments of which are seen as similar in some sense. In contrast, the approach to link clustering pro- posed by Ahn et al. (2010) is based on link sim- ilarity. The authors estimate the similarity of two links by comparing their sets of neighbour- ing nodes. This is not very appropiate for cita- tion links because we would estimate thematic similarity of thematically nearly homogenous el- ements (citation links) with sets of very inho- mogenous elements (papers, cited sources). In the case of citation networks, it would be bet- ter to measure link similarity by using textual information from citing and cited documents. The local construction of topics, their vary- ing size and pervasive overlaps make it likely that topics form a poly-hierarchy i.e. a hierar- chy where a smaller topic can be a subtopic of two or more larger topics that have no hierar- chical subtopic relation. This poly-hierarchy of topics should be reflected in a poly-hierarchy of communities. Communities without sub-communities can be well separated and very cohesive, too, but inside larger communities there can exist well separated sub-communities which diminish the cohesion of their super-community. Since the cost landscape of link communi- ties has many local minima, purely determin- istic search strategies are not efficient. This is why we designed a memetic search that com- bines an evolutionary algorithm with determin- istic adjustments in the cost landscape. Evolu- tionary algorithms have already been used for identifying communities in networks (Fortunato 2010, p. 106). Some authors have even applied evolutionary algorithms to link clustering but all used global evaluation functions (Pizzuti 2009; Li, Zhang, Wang, Liu, and Zhang 2013; Shi, Cai, Fu, Dong, and Wu 2013). Memetic evolutionary algorithms have also been applied to reconstruct communities but only for node clustering and only with global evaluation functions (Gong, Fu, Jiao, and Du 2011; Pizzuti 2012; Gach and Hao 2012; Ma, Gong, Liu, Cai, and Jiao 2014). 2 Strategy The strategy we apply in response to the three challenges described in the introduction consists of three main steps. We develop an evaluation function for link communities that uses local in- formation. This evaluation function makes it possible to construct each community indepen- 2 dently from all others, which in turn enables per- vasive overlaps because inner links (links all of whose neighbours are community members) of one community can also be inner links of an- other community. We then design an algorithm that constructs local communities. For the first step, we followed a suggestion by Evans and Lambiotte (2009) to obtain link clusters by clustering vertices in a network's line graph. We defined a local cost function Ψ(L) in the line-graph approach which we call ratio node-cut. It can be used to identify link commu- nities by finding local minima in the cost land- scape. Since Ψ(L) evaluates the boundary be- tween a subgraph and the rest of the network, communities can be constructed independently of all other communities. The cost landscape of Ψ(L) is often very rough i.e. has many local minima that may correspond to very similar subgraphs. Therefore, the reso- lution of the algorithm must be defined by set- ting a minimum distance (number of links that differ) between subgraphs corresponding to dif- ferent local minima. We define the range of a community as a distance in which no subgraph exists that has a lower Ψ-value. Since the task of finding communities in large networks is always very complex, heuristics must be applied. This applies even more strongly to link clustering because networks contain many more links than nodes, and particularly to the rough Ψ-landscape. We chose an evolutionary algorithm but accelerate evolution by combin- ing it with a deterministic local search in the cost landscape. This approach is called memetic (Neri, Cotta, and Moscato 2012). Memetic algo- rithms can also find local optima of a local cost function (Vitela and Castanos 2012). In evolutionary algorithms, individuals oc- cupy places in the cost (or fitness) landscape. In our local algorithm, populations are sets of different subgraphs. We start with a random initialisation of the population of some definite size. The genetic operators of crossover, mu- tation, and selection are repeatedly applied to move the population into optima. In memetic algorithms each crossover and each mutation is followed by a local search. In large networks exploring the cost landscape by adding or removing individual links is very time-consuming. We therefore begin the search with a coarse search phase that adds or removes groups of links by adding or removing nodes with all their links, and follow it with fine search phase, namely link-wise memetic evolution or at least a link-wise local search. 3 The cost function: ratio node-cut 3.1 Node-induced and link-induced subgraphs Traditionally, the boundary of a community is drawn between nodes and therefore cuts the links between nodes inside and outside the com- munity. If we consider communities as clusters of links rather than nodes, the perspective must be reversed. While the boundary of a node com- munity cuts links, the boundary of a link com- munity cuts nodes. A node community is a connected subgraph It contains all links defined by a node set C. existing between nodes in C. A link community is a connected link-induced subgraph. It con- tains all nodes attached to links of a given set L. There can be links existing between a link community's nodes which are not in L. Cost functions of a subgraph can be defined by relating a measure of external to a measure of total connectivity. This ratio should be minimal for well separated and cohesive subgraphs i.e. for communities. Node communities can be defined as con- nected subgraphs corresponding to minima in cost landscapes where places correspond to node-induced subgraphs. Correspondingly, link communities can be defined as connected sub- graphs corresponding to minima in cost land- scapes where places correspond to link-induced subgraphs. In the following, we only consider connected unweighted graphs G = (V, E). The number of edges (or links) is m = E, the number of ver- tices (or nodes) is n = V . With ki we denote the degree of node i. The internal degree of node i, denoted by kin i (L), is the number of links at- tached to node i which are in link set L. The external degree of node i is kout i (L). (L) = ki−kin i 3.2 External connectivity We first consider measures of external connec- tivity of a subgraph which are useful for con- structing node or link communities. The sim- plest measure of external connectivity of a node- 3 induced subgraph is the cut size that equals the sum of weights of boundary links i.e. the links connecting the subgraph with the rest of the graph (Fortunato 2010, p. 92). If link weights represent electrical conductance, cut size mea- sures the total conductance of all boundary links. Cut size can be calculated as the sum of external degrees kout (L) of boundary nodes (subgraph members with boundary links). i Applying these considerations to the external connectivity of a link-induced subgraph leads to a simple measure of external connectivity as the sum of kout i /ki of boundary nodes: i kin n(cid:88) i=1 ki σ(L) = kout i (L)kin i (L) . (1) i i kin Only for boundary nodes of L we have kout i > 0. That means, we can restrict the sum in the formula to boundary nodes. In function σ(L) the external degrees kout are weighted with sub- graph membership-grade kin i /ki of the boundary nodes. The function σ(L) can be derived from the total conductance or cut size of link sets in the graph's line graph if the line graph's edges are weighted with 1/ki -- a weighting proposed by Evans and Lambiotte (2009). The derivation can be found in Appendix A. Each term of σ(L) equals the conductance of a boundary node i i.e. the total conductance for currents flowing out of the subgraph through this node. We call σ(L) the node cut of a link- induced subgraph. 3.3 Internal and total connectivity induced subgraphs kin(C) =(cid:80) Now we discuss measures of internal and total connectivity of subgraphs induced by node and by link sets, respectively. In the case of node- i (C) is an appropriate measure of internal connectivity of node set C. Total connectivity of C is then the sum of degrees of all nodes in C: i∈C kin ktotal(C) = kin i (C) + kout i (C) = ki. (2) (cid:88) i∈C (cid:88) i∈C For a link-induced subgraph we can use the sum of internal degrees, weighted with their member- ship, as a measure of internal connectivity: n(cid:88) τ (L) = kin i (L)kin i (L) i=1 ki . (3) 4 The sum is restricted to nodes attached to links in L because other nodes have kin i (L) = 0. To- tal connectivity of L is then given by the sum i (L) = kin(L) = 2L. σ(L) + τ (L) = (cid:80)n i=1 kin The derivation can be found in Appendix A. 3.4 Cost function Relating external to total connectivity leads us to cost functions whose minima correspond to well separated and cohesive subgraphs. On the other hand, we also achieve a size normalisation when we divide external by total connectivity. This is welcome, because the boundary length (measured by external connectivity) tends to in- crease with size (here measured by total con- nectivity kin(L) = 2L) -- at least for not too large subgraphs in not too small networks. If a subgraph occupies more than one half of the network its boundary tends to become shorter with increasing size. A simple size normalisa- tion that accounts for the finite size of the net- work is achieved by adding to the external-total ratio of a subgraph the same ratio of its comple- ment. For small subgraphs in a large network the second ratio is very small. For node-induced subgraphs this normalisation was introduced by Wei and Cheng (1989) and named ratio cut. For link-induced subgraphs we analogously define a cost function ratio node-cut as Ψ(L) = σ(L) kin(L) + σ(E\L) kin(E\L) σ(L) (4) . (5) = kin(L)(1 − kin(L)/2m) The expression on the r.h.s. is obtained because σ(E\L) = σ(L) and kin(E\L) = 2m − kin(L). Ratio node-cut Ψ is not strictly local but the only global information needed here is the to- tal number of links m. In the limit of small subgraphs in large networks we achieve approxi- mately strict locality because we have kin(L) (cid:28) 2m and we therefore obtain Ψ(L) ≈ σ(L) kin(L) , (6) which equals a strictly local cost function for the construction of link communities intro- duced by us earlier (Havemann et al. 2012). Our cost function Ψ(L) rewards separation of link community L but not really its cohesion. Yang and Leskovec (2012) found that evaluat- ing node subgraphs with conductance -- a mea- sure analogue to σ(L)/kin(L) in the world of node communities -- can also lead to communi- ties with low cohesion. That means, using cost function Ψ we empha- size separation and require only a minimal cohe- sion of subgraphs, which is expressed by the de- mand that subgraphs must be connected. Oth- erwise an unconnected subgraph with parts in very different regions of the network could be a community. Function σ(L) vanishes for the empty sub- graph with L = ∅ and for the full graph with L = E. In both cases, the denominator of the cost function also vanishes and we obtain zero divided by zero but it makes sense to define Ψ(E) = Ψ(∅) = 1 because Ψ of one link (1, 2) with vanishing weight w12 approximates 1: (k1 − w12)/k1 + (k2 − w12)/k2 Ψ((1, 2)) = w12 2w12(1 − 2w12/2m) . (7) Our cost function is symmetric: Ψ(L) = Ψ(E\L), i.e. the cost function is the same for a link-induced subgraph and the subgraph in- duced by the complementary link set E\L. 3.5 The cost landscape Each place in the cost landscape represents a link-induced subgraph. Two places in the land- scape have a direct relation if and only if the corresponding subgraphs differ in one link. The height of each place is given by the value of the cost function Ψ(L). The global minimum of the cost function is reached for a division of the set E of all links that produces the two best link communities in terms of separation. As a simple example, we determined the Ψ-landscape of the bow-tie graph (Figure 1, for calculations see Ap- pendix B). We expect a cut through the central node to be the best division in two link commu- nities (the two triangles). Indeed, the landscape has two minima with Ψ = 1/3, which correspond to the two triangles. There are no further local minima. We do not restrict the search for link commu- nities to finding only the global minimum but define a link community as a connected link- induced subgraph which corresponds to any lo- cal minimum in the Ψ-landscape. Since the Ψ- landscape of larger graphs contains many local minima, we need a filter to select the locally best link communities. For this reason, we restrict our search to those minima with a sufficiently large distance to any lower place in the cost land- scape. Thus, we have to define the resolution of the search by defining this minimal distance in the landscape. The appropriate resolution de- pends on the research question about the phe- nomenon represented by the network. The ex- tent to which two communities should differ in content (of links) to consider them as different depends on the question asked about communi- ties. Another place in the cost landscape is reached by adding links to and by removing links from the subgraph corresponding to the starting place. The distance between two places in the cost landscape equals the sum of the number of links we have to add and to exclude. In other words: the distance is the size of the symmetric difference between the two link sets. We define the range of a community as the minimal dis- tance to a subgraph with lower cost. Within a community's range there is no better subgraph. The resolution of a search for communities can be defined as the minimal range of communities that are accepted as valid solutions. Depending on the networks real background, a relative reso- lution can be more appropriate. That means, we demand that any valid community should have a range which is larger than a certain percentage of its size. In order to determine the range of a com- munity we would need to know its whole en- vironment up to the distance to the nearest lower place in the cost landscape. Otherwise, a lower place only determines an upper bound of the community's range. However, searching the whole environment of a subgraph is practically impossible for large networks. A selective search is necessary, which is why we apply evolutionary and deterministic greedy algorithms. If these al- gorithms find an upper bound smaller than the set resolution, we can deselect the community. If they don't, the community is provisionally kept Figure 1: Bow-tie graph 5 ●●0.00.20.40.60.81.00.00.20.40.60.81.0c(0, 1)c(0, 1)●●●●● but can later be replaced by a better community within its minimal range defined by the set res- olution. We assume, however, that later found better solutions differ only in some links. 4 Memetic search Memetic algorithms combine random evolution with deterministic local search. In this section, we describe 1. the local search we apply, called adaptation for short, 2. our implementation of the evolutionary ap- proach, 3. the genetic operators of mutation, cross- over, and selection we employ in the evo- lutionary approach. The memetic algorithm is applied in the search for link communities, which can be done by exploring the cost landscape of a network by adding or removing individual links. For large subgraphs this is very time-consuming. We therefore split the search in a coarse phase, in which we add or remove nodes with all their links to other nodes in the subgraph, and a finer link- wise search, which is applied after communities have been identified by a node-wise search. Af- ter communities with a minimal range defined by the set resolution are found in a node-wise memetic search, they are subjected to a link- wise memetic search or at least a link-wise local search. 4.1 Local search The local search in the cost landscape applies a greedy algorithm for finding local cost minima that correspond to communities. The algorithm starts from the place occupied by the current subgraph and moves to subgraphs with lower Ψ-values. The algorithm is greedy because it always chooses the step that brings the biggest decrease or the smallest increase of Ψ. A step includes or excludes a node with all their links to the nodes already in a subgraph in node-wise local search, and includes or excludes an indi- vidual link in link-wise local search. A valid community can be made invalid and replaced by a better one if the better one is within its minimal range which is set by the res- olution parameter. Therefore, the local search has not to find subgraphs with lower cost in each step but can go a number of steps by 'tunneling' through 'barriers' in the landscape (areas with higher Ψ) before reaching lower values which in- validate the community at the tunnel's entrance. Tunneling makes the algorithm more efficient. The maximum length of a tunnel through a bar- rier of higher Ψ-values is determined by the set resolution. The local search can begin by a series of either inclusions or exclusions of nodes (links). When no further improvement can be achieved, the search switches from inclusion to exclusion or vice versa. Inclusion and exclusion are contin- ued until no further improvement is possible. If the exclusion of nodes fragments a sub- graph, we proceed with the subgraph's main component. In the link-wise local search the greedy algorithm is allowed to go through in- termediary states representing unconnected sub- graphs. At the end of the link-wise local search we determine all components of the subgraph. If the subgraph is unconnected we repeat the pro- cedure for each component until we obtain only connected subgraphs with minimal cost. A greedy algorithm is efficient because the cost reduction for all possible cases of includ- ing a neighbour must be calculated only at the beginning of the local search. In the subsequent steps, we only calculate or recalculate cost re- ductions achieved by adding neighbours of the link (or node) included. Analogously, we pro- ceed when excluding boundary nodes or links (Havemann et al. 2012, Appendix). Otherwise it would be more efficient to include or exclude just the first node (link) which reduces cost. 4.2 Evolution The general implementation of the memetic al- gorithm is described by Algorithm 1.2 The ge- netic operators of crossover, mutation, and selec- tion (described below) are applied to each gener- ation of communities. Subgraphs generated by crossover and mutation are adapted by a local search. If the starting subgraph is not connected we replace it by its main component. Evolution is terminated when no better best community is found for many generations. 2The notation is inspired by a pseudocode given by Merz (2012). 6 4.3 Genetic operators Mutation: We mutate a community with mu- tation variance v < 1 by changing maximally a proportion v of its links or nodes. In node-wise memetic evolutions we randomly exclude bound- ary nodes and then include the same number of neighbouring nodes. In link-wise memetics we experiment with two other mutation operators: we only exclude or include links and concentrate changes around one randomly chosen boundary node. (Details can be found in Appendix of Part 2.) Crossover: From two parent subgraphs we construct two new individuals by taking inter- section and union of the subgraphs as starting points for adaptive local searches. Of course, it has no effect to cross such parents where one of Algorithm 1 Pseudocode of memetic evolution for one adapted seed initialise population P by mutating the adapted seed with high variance several times and adapting mutants while the best community is not too old do mutate the best community with low vari- ance and adapt the mutants if an adapted mutant is new and its cost is lower than highest cost then add it to population P end if cross the best community with some ran- domly chosen communities and adapt the offspring if adapted offspring is new and its cost is lower than highest cost then add it to population P end if select the best communities so that the population size remains constant if there is no better best community for some generations and innovation rate is low then renew the population by mutating the best community with high variance and adapt mutants select the best communities so that the population size remains constant end if end while them is part of the other one. Normally, evolu- tionary algorithms include some randomness in the crossover, which in our case would mean to enlarge the intersection by some nodes or links from the union. In contrast, our crossing pro- cedure is deterministic because the boundary of the union of two good communities should also be not too bad. The same holds for the intersec- tion. Deterministic crossover should be (and is) done only once with the same parents. The only random element of our crossover is the random selection of parents. Selection: From the old population and the results of mutations and crossovers we select the communities with lowest Ψ-values, keeping the population size constant. A new best commu- nity is only included if it is inside the minimal range of the best community of the original pop- ulation. Disregarding the best communities out- side the minimal range assures that we do not lose communities which can have a range above the minimum given by the resolution limit we apply. Deselected communities can be used as seeds for other memetic searches. Renewal: Renewal means to mutate the best community with high variance several times, to adapt the mutants, and to apply a usual selec- tion procedure described above. 5 Concluding remarks In the forthcoming Part 2 of our paper we dis- cuss test results. Acknowledgement This work is part of a project in which we de- velop methods for measuring the diversity of re- search. The project was funded by the German Ministry for Education and Research (BMBF). We would like to thank the members of the project's advisory group3 and also all developers of R.4 We thank Alexander Struck for assisting our work and for discussions about the new cost function. We discussed the issue of link similar- ity in citation networks with Rob Koopman. 3http://141.20.126.172/~div 4http://www.r-project.org 7 Appendix A Connectivity measures In this section we derive the connectivity mea- sures for link sets σ(L) and kin(L) from analogue measures in the line graph. We closely follow the arguments given in our earlier paper (Have- mann, Glaser, Heinz, and Struck 2012). We here use i, j = 1, . . . , n to denote nodes and k, l = 1, . . . , m for links. With C(L) we name the set of nodes attached to links in the subgraph induced by link set L. If a link k be- longs to L its membership µk(L) = 1 and zero otherwise. To construct a network's line graph we first define an auxiliary bipartite graph obtained by putting a node on each link of the original net- work. The affiliation matrix B of the bipartite graph -- also called its incidence matrix -- has a row for each of the n original nodes and a col- umn for each of the m original links. Each link column contains only two non-zero elements, namely the elements in the rows of the nodes i and j connected by the link. We can project the bipartite graph back onto the original net- work with the product BBT which equals its adjacency matrix A (except for the main diago- nal). We obtain the network's line graph by the op- posite projection BTB of the bipartite graph. Evans and Lambiotte (2009) underline, that in all cases of practical intererest the line graph contains the same amount of information as the original network. Knowing BTB we can almost ever calculate BBT and thus also the network's adjacency matrix A. Because each node of the original network is represented as a clique in the line graph Evans and Lambiotte (2009) weighted the edges of the line graph with the inverse degree 1/ki of the node i in the original network. They define the line graph's adjacency matrix as n(cid:88) i=1 Ekl = BikBil ki . (8) Weighting the line graph's edges with the in- verse degrees of nodes in the original network is equivalent to an Euclidean normalisation of the nodes' vectors in the affiliation matrix B of the auxiliary bipartite graph. This becomes clear if we factorise the terms of the sum in equation 8: n(cid:88) i=1 Ekl = Bik√ ki Bil√ ki . (9) m(cid:88) m(cid:88) k=1 m(cid:88) m(cid:88) √ Then we can shortly write E = DTD with Dik = ki and verify the Euclidean normalisation Bik/ of the n row vectors of D (for unweighted net- works for which we have B2 ik = Bik): D2 ik = k=1 k=1 B2 ik ki = 1 ki Bik = 1. (10) On the other hand, the projection of the nor- malised bipartite graph described by affiliation matrix D back on a network of the original nodes is given by DDT. An element of adjacency ma- trix DDT is given by m(cid:88) BikBjk(cid:112)kikj Aij(cid:112)kikj = . (11) DikDjk = k=1 k=1 Thus, Euclidean normalisation of B's row vec- tors is equivalent to weighting each link in the original (unweighted) network with the geomet- ric mean of its nodes' inverse degrees. The weighted graph described by adjacency matrix E is not the line graph of the unweighted net- work described by adjacency matrix A but of the network weighted according to equation 11. It depends on the real relations we model with the network whether this is a realistic weighting. Now we calculate internal connectivity τ (L) as the sum of internal degrees of vertices in the line graph: m(cid:88) m(cid:88) k,l=1 τ (L) = = µk(L)Eklµl(L) n(cid:88) µk(L) k,l=1 i=1 (12) BikBil ki µl(L). In the same way, we can calculate external con- nectivity σ(L) as the sum of external degrees in the line graph: m(cid:88) m(cid:88) k,l=1 µk(L)Ekl(1 − µl(L)). n(cid:88) µk(L) k,l=1 i=1 BikBil ki (1 − µl(L)). (13) σ(L) = = 8 Now we use the relations µk(L)Bik = kin i (L) and (1 − µl(L))Bil = kout i (L), m(cid:88) m(cid:88) k=1 l=1 which directly follow from the definition of the incidence matrix B. Thus, we get τ (L) = (kin i (L))2 ki n(cid:88) n(cid:88) i=1 i=1 n(cid:88) and σ(L) = kin i (L)kout (L) . i ki From this we easily derive total connectivity of a link-induced subgraph as the sum τ (L) + σ(L) = kin i (L) = kin(L). i=1 B Cost-landscape of the bow-tie graph For the bow-tie graph we expect two link com- munities, namely the triangle {1, 2, 3} and its complement {4, 5, 6}, cf. Figure 2 and Evans and Lambiotte (2009). To describe the 2m different possible subgraphs it is advantageous to make use of the spherical topology of any landscape of subgraphs. Indeed, the cost-function land- scape of a graph's subgraphs can be seen as the surface of a globe • with the whole and the empty graph at the poles, • with all possible subgraphs of the same size on each circle of latitude, and • with complementary subgraphs situated at antipodes. The neighbours of a place in the landscape can be reached by adding an element to the set of nodes (for node-induced subgraphs) or of links (for link-induced subgraphs), respectively, or by deleting an element from this set. That means, there are no direct relations between places on the same circle of latitude. Steps (adding or re- moving nodes or links) are moves between neigh- bouring circles of latitude. 9 Figure 2: Bow-tie graph with numbered links We define the north pole as corresponding to the empty subgraph and the south pole as cor- responding to the whole graph. The Ψ-globe of the bow-tie graph has five circles of latitude cor- responding to six subgraphs with one link, 15 with two, 20 with three, 15 with four, and six with five links, respectively. For the empty graph at the north pole σ = 0 and Ψ = 1 (by definition). The six single links as the smallest real subgraphs are located at the highest circle of latitude. The two outer links 1 and 6 have σ = 1· 1/2 + 1· 1/2 = 1 and Ψ = 0.6, the four inner links have σ = 1·1/2+1·3/4 = 5/4 and Ψ = 0.75. There are ten connected and five unconnected subgraphs with two links: • four connected subgraphs with one outer link and one inner link (e.g. link set {1, 2}) resulting in σ = 1 · 1/2 + 1 · 3/4 = 5/4 and Ψ ≈ 0.469, • six connected subgraphs with two inner links (e.g. link set {2, 3}) and σ = 1 · 1/2 + 2 · 2/4 + 1 · 1/2 = 2 and Ψ = 0.75, • four unconnected subgraphs with one outer and one inner link (e.g. link set {1, 4}) and σ = 9/4 and Ψ ≈ 0.844, • one unconnected subgraph with two outer links ({1, 6}) and σ = 2 and Ψ = 0.75. On the equator of the Ψ-globe there are 20 triples of links which can be classified into four types: • the triangle {1, 2, 3} and its complement {4, 5, 6} with σ = 2 · 2/4 = 1 and Ψ = 1/3, • four triples of inner links (e.g. link set {2, 3, 4}) and their unconnected comple- link set {1, 5, 6}) with σ = ments (e.g. 3/2 + 3/4 = 9/4 and Ψ = 0.75, ●●0.00.20.40.60.81.00.00.20.40.60.81.0c(0, 1)c(0, 1)●●●●●123654 • eight subgraphs with one of the two outer links, one of the two attached inner links and one of the two inner links not attached to the outer link (e.g. link set {1, 2, 4}): they all have σ = 1·1/2+2·2/4+1·1/2 = 2 and Ψ = 2/3, • the unconnected triple with one outer and two inner links (set {1, 4, 5}) and its un- connected complement (set {2, 3, 6}) with σ = 3 and Ψ = 1. On the two circles of latitude on the south- ern hemisphere we find the complements of the subgraphs on the northern hemisphere with the same Ψ-values. Next to the equator we find 13 connected and two unconnected subgraphs with four links each: • two unconnected quadruples with one trian- gle and the second outer link (e.g. link set {1, 2, 3, 6}) which have σ = 2 and Ψ = 0.75, • the central star with all four inner links {2, 3, 4, 5} with σ = 4/2 = 2 and Ψ = 0.75, • four subgraphs containing one of the two triangles plus one of the two inner links (e.g. link set {1, 2, 3, 5}) which all have σ = 1 · 3/4 + 1 · 1/2 = 5/4 and Ψ ≈ 0.469, • the four subgraphs with both outer links and two inner links connecting them (e.g. link set {1, 2, 5, 6}) with σ = 2/2 + 4/4 = 2 and Ψ = 0.75, • the four subgraphs with one outer link and three inner links (one of them attached to the outer link, e.g. link set {1, 2, 4, 5}) with σ = 3/2 + 3/4 = 9/4 and Ψ ≈ 0.844. All complements of the six single links contain- ing the five other links are connected and have the same Ψ-values as their single-link comple- ments (cf. above). The full graph at the south pole with σ = 0 and Ψ = 1 is connected. The Ψ-landscape of links has two local minima: the two triangles have a locally and globally mini- mal Ψ = 1/3. There are no other local minima. Thus, we obtain the pair of complementary tri- angles as the only solution. References Ahn, Y., J. Bagrow, and S. Lehmann (2010). Link communities reveal multiscale com- 10 plexity in networks. Nature 466 (7307), 761 -- 764. Amelio, A. and C. Pizzuti (2014). Overlap- ping Community Discovery Methods: A Survey. Social Networks: Analysis and Case Studies, 105. http://arxiv.org/ abs/1411.3935. Clauset, A. (2005). Finding local commu- nity structure in networks. Physical Re- view E 72 (2), 26132. Evans, T. and R. Lambiotte (2009). Line graphs, link partitions, and overlapping communities. Physical Review E 80 (1), 16105. Fortunato, S. (2010). Community detection in graphs. Physics Reports 486 (3-5), 75 -- 174. Gach, O. and J.-K. Hao (2012, January). A memetic algorithm for community detec- tion in complex networks. In C. A. C. Coello, V. Cutello, K. Deb, S. Forrest, G. Nicosia, and M. Pavone (Eds.), Paral- lel Problem Solving from Nature - PPSN XII, Number 7492 in Lecture Notes in Computer Science, pp. 327 -- 336. Springer Berlin Heidelberg. Gong, M., B. Fu, L. Jiao, and H. Du (2011, November). Memetic algorithm for com- munity detection in networks. Physical Re- view E 84 (5), 056101. Havemann, F., J. Glaser, M. Heinz, and A. Struck (2012). Evaluating overlap- ping communities with the conductance of their boundary nodes. arXiv preprint arXiv:1206.3992 . Havemann, F., M. Heinz, A. Struck, and J. Glaser (2011). Identification of Over- lapping Communities and their Hierarchy by Locally Calculating Community- Changing Resolution Levels. Journal of Statistical Mechanics: Theory and Exper- iment 2011, P01023. doi: 10.1088/1742- 5468/2011/01/P01023, Arxiv preprint arXiv:1008.1004. Hric, D., R. K. Darst, and S. Fortunato (2014, December). Community detection in net- works: Structural communities versus ground truth. Physical Review E 90 (6), 062805. Lancichinetti, A., and J. Kertesz (2009). Detecting the overlap- S. Fortunato, tion algorithm. Data & Knowledge Engi- neering 87, 394 -- 404. Vitela, J. E. and O. Castanos (2012, May). A sequential niching memetic algorithm for continuous multimodal function optimiza- tion. Applied Mathematics and Computa- tion 218 (17), 8242 -- 8259. Wei, Y.-C. and C.-K. Cheng (1989, Novem- ber). Towards efficient hierarchical designs by ratio cut partitioning. In IEEE Interna- tional Conference on Computer-Aided De- sign, 1989. ICCAD-89. Digest of Techni- cal Papers, pp. 298 -- 301. Xie, J., S. Kelley, and B. K. Szymanski (2013, August). Overlapping community detection in networks: The state-of-the- art and comparative study. ACM Comput. Surv. 45 (4), 43:1 -- 43:35. Yang, J. and J. Leskovec (2012). Defining and evaluating network communities based on ground-truth. In Proceedings of the ACM SIGKDD Workshop on Mining Data Se- mantics, pp. 3. ACM. ping and hierarchical community struc- ture in complex networks. New Journal of Physics 11, 033015. arXiv:physics.soc- ph/0802.1218. Li, Z., X.-S. Zhang, R.-S. Wang, H. Liu, and S. Zhang (2013, December). Discover- ing link communities in complex networks by an integer programming model and a genetic algorithm. PLoS ONE 8 (12), e83739. Ma, L., M. Gong, J. Liu, Q. Cai, and L. Jiao (2014, June). Multi-level learning based memetic algorithm for community detec- tion. Applied Soft Computing 19, 121 -- 133. Merz, P. (2012, January). Memetic algorithms and fitness landscapes in combinatorial optimization. In F. Neri, C. Cotta, and P. Moscato (Eds.), Handbook of Memetic Algorithms, Number 379 in Studies in Computational Intelligence, pp. 95 -- 119. Springer Berlin Heidelberg. Neri, F., C. Cotta, and P. Moscato (Eds.) (2012). Handbook of Memetic Algorithms, Volume 379 of Studies in Computational Intelligence. Springer, Berlin. Pan, L., C. Wang, and J. Xie (2012). Link communities detection via local ap- proach. In T. Li, H. Nguyen, G. Wang, J. Grzymala-Busse, R. Janicki, A. Has- sanien, and H. Yu (Eds.), Rough Sets and Knowledge Technology, Volume 7414 of Lecture Notes in Computer Science, pp. 282 -- 291. Springer Berlin / Heidelberg. Pan, L., C. Wang, J. Xie, and M. Liu (2011). Detecting link communities based on lo- cal approach. In 2012 IEEE 24th Interna- tional Conference on Tools with Artificial Intelligence, Volume 0, Los Alamitos, CA, USA, pp. 884 -- 886. IEEE Computer Soci- ety. Pizzuti, C. (2009). Overlapped community de- tection in complex networks. In GECCO, Volume 9, pp. 859 -- 866. Pizzuti, C. (2012). Boosting the detection of modular community structure with ge- netic algorithms and local search. In Pro- ceedings of the 27th Annual ACM Sympo- sium on Applied Computing, pp. 226 -- 231. Shi, C., Y. Cai, D. Fu, Y. Dong, and B. Wu (2013, September). A link cluster- ing based overlapping community detec- 11
1706.08602
2
1706
2017-09-18T21:57:19
Second-Order Moment-Closure for Tighter Epidemic Thresholds
[ "cs.SI", "q-bio.PE" ]
In this paper, we study the dynamics of contagious spreading processes taking place in complex contact networks. We specifically present a lower-bound on the decay rate of the number of nodes infected by a susceptible-infected-susceptible (SIS) stochastic spreading process. A precise quantification of this decay rate is crucial for designing efficient strategies to contain epidemic outbreaks. However, existing lower-bounds on the decay rate based on first-order mean-field approximations are often accompanied by a large error resulting in inefficient containment strategies. To overcome this deficiency, we derive a lower-bound based on a second-order moment-closure of the stochastic SIS processes. The proposed second-order bound is theoretically guaranteed to be tighter than existing first-order bounds. We also present various numerical simulations to illustrate how our lower-bound drastically improves the performance of existing first-order lower-bounds in practical scenarios, resulting in more efficient strategies for epidemic containment.
cs.SI
cs
Second-Order Moment-Closure for Tighter Epidemic Thresholds Masaki Ogura1,∗, Victor M. Preciado2 Abstract In this paper, we study the dynamics of contagious spreading processes tak- ing place in complex contact networks. We specifically present a lower-bound on the decay rate of the number of nodes infected by a susceptible-infected- susceptible (SIS) stochastic spreading process. A precise quantification of this decay rate is crucial for designing efficient strategies to contain epidemic out- breaks. However, existing lower-bounds on the decay rate based on first-order mean-field approximations are often accompanied by a large error resulting in inefficient containment strategies. To overcome this deficiency, we derive a lower-bound based on a second-order moment-closure of the stochastic SIS processes. The proposed second-order bound is theoretically guaranteed to be tighter than existing first-order bounds. We also present various numerical simulations to illustrate how our lower-bound drastically improves the per- formance of existing first-order lower-bounds in practical scenarios, resulting in more efficient strategies for epidemic containment. Keywords: Complex networks, spreading processes, stochastic processes, stability. ∗Corresponding author Email addresses: [email protected] (Masaki Ogura), [email protected] (Victor M. Preciado) 1Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma, Nara 630-0192, Japan 2Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA 19104-6314, USA Preprint submitted to Elsevier November 10, 2018 1. Introduction Understanding the dynamics of spreading processes taking place in com- plex networks is one of the central questions in the field of network science, with applications in information propagation in social networks [1], epidemi- ology [2], and cyber-security [3]. Among various quantities characterizing the asymptotic behaviors of spreading processes, the decay rate (see, e.g., [4, 5]) of the spreading size (i.e., the number of nodes affected by the spread) is of fun- damental importance. Besides quantifying the impact of contagious spread- ing processes over networks [6, 7], the decay rate has been used to measure the performance of containment strategies to control epidemic outbreaks [8]. In this direction, the authors in [9] presented an optimization-based approach for distributing a limited amount of resources to efficiently contain spreading processes by maximizing their decay rate towards the disease-free equilib- rium. This framework was later extended to the cases where the underlying network in which the spreading process is taking place is uncertain [10], tem- poral [11, 12], and adaptively changing [13, 14]. Recently, the authors in [15] presented an approach for achieving an optimal resource allocation in order to maximize the decay rate under sparsity constraints. However, finding the decay rate of a spreading process is, in general, a computationally hard problem. Even for the case of the susceptible-infected- susceptible (SIS) model [2], which is one of the simplest models of spread, the exact decay rate is given in terms of the eigenvalues of a matrix whose size grows exponentially fast with respect to the number of nodes in the net- works [4]. In order to avoid this computational difficulty, it is common in the literature [9, 10, 15] to use a lower-bound on the decay rate based on first-order mean-field approximations of the spreading processes. However, this first-order approximation is not necessarily accurate; in other words, its approximation error can be significantly large for several important social and biological networks, as we will demonstrate later in this paper. There- fore, the design of strategies for epidemic containment based on mean-field approximations can result in inefficient control policies. The aim of this paper is to present a tighter lower-bound on the decay rate of the stochastic SIS process based on a second-order moment closure. Specifically, we show that the decay rate is bounded from below by the maxi- mum real eigenvalue of a Metzler matrix whose size grows quadratically with respect to the number of nodes in the network. In order to derive our lower- bound, we describe the stochastic dynamics of the SIS process using a system 2 of stochastic differential equations with Poisson jumps. This approach allows us to conveniently evaluate the dynamics of the first and the second -order moments of random variables relevant for the spreading processes. Further- more, we prove theoretically and illustrate numerically that our lower-bound strictly improves the one based on first-order approximations. We remark that, although improved decay rates for the discrete-time SIS model were presented using second-order analysis in [16], their bounds are applicable only to the special case where the transmission and recovery rates of nodes are homogeneous and, furthermore, satisfy restrictive algebraic con- ditions in terms of nonnegativity of infinitely many matrices. Likewise, the second-order analysis of the continuous-time SIS model by the authors in [17] uses mean-field approximations and, hence, it is not clear how the anal- ysis relates to the dynamics of the original stochastic SIS process. Moreover, their analysis is valid only when a dominant eigenvalue of a certain matrix (i.e., an eigenvalue having the maximum real part) is real. In contrast with these limitations of the results in the literature, our framework applies to the heterogeneous SIS model without any restrictions, and is supported by rigorous proofs instead of approximations. This paper is organized as follows. In Section 2, we state the problem studied in this paper. In Section 3, we present our lower-bound on the decay rate, and show that this bound strictly improves the one based on first- order approximations. The effectiveness of our lower-bound is numerically illustrated in Section 4. 1.1. Mathematical preliminaries blocks is denoted by (cid:76)n We denote the identity and the zero matrices by I and O, respectively. For a vector u, we denote by u\{i} the vector that is obtained after removing the ith element from u. Likewise, for a matrix A, we let Ai,\{j} denote the row vector that is obtained after removing the jth element from the ith row of A. We say that a square matrix A is irreducible if no similarity transformation by a permutation matrix transforms A into a block upper-triangular matrix. The block-diagonal matrix containing matrices A1, . . . , An as its diagonal If the matrices A1, . . . , An have the same number of columns, then the matrix obtained by stacking A1, . . . , An in vertical is denoted by col1≤i≤n Ai. A directed graph is defined as the pair G = (V,E), where V is a finite ordered set of nodes and E ⊂ V ×V is a set of directed edges. By convention, if (v, v(cid:48)) ∈ E, we understand that there is an edge from v pointing towards v(cid:48), i=1 Ai. 3 in which case v is said to be an in-neighbor of v(cid:48). A directed path from v to v(cid:48) in G is an ordered set of nodes (v0, . . . , v(cid:96)) such that v0 = v, v(cid:96) = v(cid:48), and (vk, vk+1) ∈ E for k = 0, . . . , (cid:96) − 1. We say that G is strongly connected if there exists a directed path from v to v(cid:48) for all v, v(cid:48) ∈ V. The adjacency matrix of G is defined as the square matrix, having the same dimension as the number of the nodes, such that its (i, j)th entry equals 1 if the jth node is an in-neighbor of the ith node, and equals 0 otherwise. It is well known that a directed graph is strongly connected if and only if its adjacency matrix is irreducible. A real matrix A (or a vector as its special case) is said to be nonnegative, denoted by A ≥ 0, if all the entries of A are nonnegative. Likewise, if all the entries of A are positive, then A is said to be positive. For another matrix B having the same dimensions as A, the notation A ≤ B implies B − A ≥ 0. If A ≤ B and A (cid:54)= B, we write A (cid:12) B. For a square matrix A, we say that A is Metzler [18] if the off-diagonal entries of A are nonnegative. It is easy to see that eAt ≥ 0 if A is Metzler and t ≥ 0 (see, e.g., [18]). For a Metzler matrix A, the maximum real part of the eigenvalues of A is denoted by λmax(A). In this paper, we use the following basic properties of Metzler matrices: Lemma 1. The following statements hold for a Metzler matrix A: 1. λmax(A) is an eigenvalue of A. Moreover, if A is irreducible, then there exists a positive eigenvector corresponding to the eigenvalue λmax(A). 2. If A ≤ B, then λmax(A) ≤ λmax(B). Furthermore, if A is irreducible and A (cid:54)= B, then λmax(A) < λmax(B). positive constant ρ such that Au (cid:12) ρu, then λmax(A) < ρ. 3. Assume that A is irreducible. If there exist a positive vector u and a Proof. The first claim is part of the Perron-Frobenius theorem for Metzler matrices (see, e.g., [18, Theorems 11 and 17]). The second claim follows from the Perron-Frobenius theory and the monotonicity of the maximum real eigenvalue of nonnegative matrices [19, Section 8.4]. To prove the last statement, let  = ρu−Au and define A(cid:48) = A+(cid:76)(1/u1, . . . , n/un), where n is the length of the vector u. Since A(cid:48)u = Au +  = ρu, A(cid:48) is irreducible, and v is positive, it follows that λmax(A(cid:48)) = ρ from the Perron-Frobenius theorem for irreducible Metzler matrices [18, Theorem 17]. Since A is irreducible and A (cid:12) A(cid:48), the second statement of the lemma shows that λmax(A) < λmax(A(cid:48)) = ρ. 4 2. Problem Statement We start by giving a brief overview of the SIS model [2]. Let G = (V,E) be a strongly connected directed graph with nodes v1, . . . , vn. In the SIS model, at a given (continuous) time t ≥ 0, each node can be in one of two possible states: susceptible or infected. When a node vi is infected, it can randomly transition to the susceptible state with an instantaneous rate δi > 0, called the recovery rate of node vi. On the other hand, if an in-neighbor of node vi is in the infected state, then the in-neighbor can infect node vi with an instantaneous rate βi, where βi > 0 is called the infection rate of node vi. It is easy to see that the SIS model is a continuous-time Markov process and has a unique absorbing state at which all the nodes are susceptible. Since this absorbing state is reachable from any other state, the SIS model reaches this infection-free absorbing state in a finite time with probability one. The aim of this paper is to study the stability of this infection-free absorbing state, defined as follows: Definition 2. Let  > 0 and define the probability pi(t) = Pr(vi is infected at time t). We say that the SIS model is -exponentially mean stable if there exists a constant C > 0 such that, for all nodes vi and t ≥ 0, we have pi(t) ≤ Ce−t for any set of initially infected nodes at time t = 0. Then, we define the decay rate of the SIS model as ρ = sup{ : SIS model is -exponentially stable}. The notion of the decay rate was studied in, e.g., [4] and [5] for the cases of continuous- and discrete-time problem settings, respectively, and is closely related to other important quantities on spreading processes such as epidemic thresholds [4] and mean-time-to-absorption [7]. Specifically, a basic argument from the theory of Markov processes shows that the SIS model is -exponentially mean stable for a sufficiently small  > 0 (with a possibly large C) and, therefore, it always has a positive decay rate. However, exact computation of the decay rate is hard in practice. Even in the homogeneous case, where all nodes share the same infection and recovery rates, the decay rate equals the modulus of the largest real-part of the non-zero eigenvalues of a 2n× 2n matrix representing the infinitesimal generator of the SIS model [4]. An alternative approach for analyzing the decay rate is via upper bounds on the dynamics of the SIS model based on first-order mean-field approxima- tions. An example of such a first-order upper bound is described below. Let 5 nal matrices B =(cid:76)(β1, . . . , βn) and D =(cid:76)(δ1, . . . , δn). Then, we can show us define the vector p(t) = col1≤i≤n pi(t) containing the infection probabilities of the nodes. Also, let A be the adjacency matrix of G and define the diago- [9] the inequality p(t) ≤ e(BA−D)tp(0), which gives the following lower-bound on the decay rate: ρ ≥ ρ1 = −λmax(BA − D). (1) Although this lower-bound is computationally efficient to find, there are sev- eral cases in which we can observe a large gap between this bound and the exact decay rate, as illustrated in the following example: Example 3. Let us consider the SIS model over a romantic and sexual net- work in a high school (Jefferson, n = 288) taken from [20]. For simplicity, we assume a homogeneous transmission rate βi = 0.9/λmax(A) and a (normal- ized) recovery rate δi = 1 for all nodes. In order to approximately compute the true decay rate ρ, we generate 10,000 sample paths of the SIS model over the time interval [0, 100] starting from the initial state at which all nodes are infected. From this computation, we obtain a decay rate of ρ ≈ 0.454. On the other hand, the first-order approximation in (1) equals ρ1 = 0.1, whose relative error from ρ is around 78%. Remark 4. We can in fact show that the strict inequality ρ > ρ1 holds in (1). Let vi be a node having the minimum recovery rate δmin = min1≤i≤n δi > 0 among all nodes, and consider the situation where only the node vi is initially infected. Since pi(t) ≥ e−δit for every t ≥ 0, we have ρ ≥ δi = δmin. (2) Then, let us take an arbitrary positive constant b < min1≤i≤n βi. Since δmin = −λmax(−D) and −D ≤ bA − D, Lemma 1.2 shows − δmin ≤ λmax(bA − D). (3) On the other hand, Since bA − D is irreducible (by the strong connectivity of G) and bA − D (cid:12) BA − D, we also have λmax(bA − D) < λmax(BA − D) = −ρ1 (4) by Lemma 1.2. desired. Inequalities (2) -- (4) prove the strict inequality ρ > ρ1, as 6 3. Main Result As we have demonstrated in Example 3, there may be a large gap between the true decay rate ρ and its first-order approximation ρ1 for the SIS model. The aim of this paper is to fill in this gap by providing a better lower-bound on the decay rate. Specifically, the following theorem presents an improved lower-bound on the decay rate and is the main result of this paper: Theorem 5. Define the n2 × n2 Metzler matrix (cid:20) col1≤i≤n(δiVi) (cid:76)n −D i=1 (cid:0)−Γi + colj(cid:54)=i βjAj,\{i}(cid:1)(cid:21) (cid:76)n i=1(βiAi,\{i}) , A = where Vi ∈ R(n−1)×n is the matrix satisfying Vix = x\{i} for all x ∈ Rn, and j(cid:54)=i γij for γij = δi + δj + aijβi. Define ρ2 = −λmax(A). Then, we Γi = (cid:76) have ρ ≥ ρ2 > ρ1. In order to prove this theorem, we use a representation of the SIS model as a system of stochastic differential equations with Poisson jumps (see, e.g., [13]). For this purpose, we define the variable xi(t) as xi(t) = 1 if node vi is infected at time t, and xi(t) = 0 otherwise. Then, we can see that these variables obey the following stochastic differential equations with Poisson jumps: dxi = −xidNδi + aik(1 − xi)xkdNβi, (5) n(cid:88) k=1 where aik is the (i, k)th entry of the adjacency matrix and Nδi and Nβi denote stochastically independent Poisson counters [21, Chapter 1] with rates δi and βi, respectively. The rest of this section is devoted to the proof of the theorem. We divide the proof into two parts, namely, the proof of ρ ≥ ρ2 (Subsection 3.1) and ρ2 > ρ1 (Subsection 3.2). 3.1. Proof of ρ ≥ ρ2 From the system (5) of stochastic differential equations, we can easily show [13] that the expectation pi = E[xi] obeys the differential equation n(cid:88) (cid:88) k=1 k(cid:54)=i 7 dpi dt = −δiE[xi] + = −δipi + βi aikE[(1 − xi)xk]βi aikqik, (6) where qij(t) = E[(1 − xi(t))xj(t)] is a second-order variable representing the probability that vi is susceptible and vj is infected at time t. Since qii ≡ 0 by definition, in the sequel we do not consider the variable of the form qii. We next derive differential equations to characterize the second- order variables qij. Applying Ito's formula (see, e.g., [21, Chapter 4]) for stochastic differential equations with Poisson jumps to the variable (1−xi)xj, we can show d((1 − xi)xj) = xixjdNδj − (1 − xi)xj aikxkdNβi k=1 − (1 − xi)xjdNδj + (1 − xi)(1 − xj) n(cid:88) k=1 (7) ajkxkdNβj n(cid:88) for any distinct pair (vi, vj) of nodes. To proceed, we define the probabil- ities pij(t) = E[xi(t)xj(t)] and pijk(t) = E[xi(t)xj(t)xk(t)] for nodes vi, vj, and vk. Then, from (7), we can compute the derivative of qij as = δjE[xixj] − βi dqij dt aikE[(1 − xi)xjxk] n(cid:88) k=1 n(cid:88) − δjE[(1−xi)xj] + βj ajkE[(1−xi)(1−xj)xk] k=1 n(cid:88) (cid:80) k(cid:54)=j aik(pjk − pijk) + βj k=1 = δipij − βiaij(pj − pij) − δjqij + βj (cid:80)n k=1 ajk(pjk − pijk) is where the function ij = βi nonnegative because pjk ≥ pijk for all nodes vi, vj, and vk. Using the identity pj − pij = qij and defining the variable γij = δi + δj + aijβi, we obtain ajk(pk − pik) − ij, = −γijqij + δipj + βj dqij dt ajkqik − ij. (8) (cid:88) k(cid:54)=i In order to upper-bound the infection probabilities of the nodes, we define the vector variables qi = colj(cid:54)=i qij and q = col1≤i≤n qi having dimensions n−1 and n(n− 1), respectively. Then, we can rewrite the differential equation (6) as dpi/dt = −δipi + βiAi,\{i}qi. Stacking this differential equation in vertical with respect to i, we obtain = −Dp + dp dt βiAi,\{i} q, (9) (cid:19) (cid:18) n(cid:77) 1=1 8 where D =(cid:76)(δ1, . . . , δn). Also, from (8), it follows that dqij/dt = −γijqij + δipj + βjAj,\{i}qi − ij. Stacking this differential equation with respect to j ∈ {1, . . . , n}\{i}, we see that (cid:18) (cid:19) = −Γiqi + δiVip + dqi dt (βjAj,\{i}) col j(cid:54)=i qi − col j(cid:54)=i ij. By stacking this differential equation with respect to i = 1, . . . , n, we obtain the following differential equation (cid:18) (cid:19) (cid:18) n(cid:77) i=1 dq dt = col 1≤i≤n δiVi p + −Γi + col j(cid:54)=i βjAj,\{i} q − , (cid:19) where  = col1≤i≤n colj(cid:54)=i ij is a vector-valued nonnegative function. This differential equation and (9) show that the variable r = col(p, q) satisfies dr/dt = Ar − col(0, ). We are now at the position to prove the inequality ρ ≥ ρ2. Since A is Metzler and (t) is entry-wise nonnegative for every t ≥ 0, we can obtain 0 eA(t−τ ) col(0, (τ )) dτ ≤ eAtr(0). This inequality clearly implies that the SIS model is ρ2-exponentially mean stable. This completes the proof of the inequality. the upper bound r(t) = eAtr(0) −(cid:82) t 3.2. Proof of ρ2 > ρ1 If ρ2 ≥ δmin, then we trivially have ρ2 > ρ1 because we know δmin > ρ1 from (3) and (4). Let us consider the case of ρ2 < δmin. Let u be a non-zero vector of A corresponding to the eigenvalue −ρ2 = λmax(A), i.e., assume that Au = −ρ2u. We split the matrix A as A = M − N using the matrices (cid:21) (cid:20)O M12 O M22 M = , N = , (cid:21) N21 N22 (cid:20) D O (βjAj,\{i}) −(cid:77) n(cid:77) (cid:77) j(cid:54)=i (δi + δj). i=1 j(cid:54)=i (cid:32) col j(cid:54)=i (cid:33) aijβi , where n(cid:77) i=1 M12 = βiAi,\{i}, M22 = n(cid:77) i=1 N21 = − col 1≤i≤n δiVi, N22 = 9 Then, we have Mu = (N − ρ2I)u and, hence, (N − ρ2I)−1Mu = u, where the inversion of N − ρ2I is allowed by our assumption ρ2 < δmin. Therefore, the matrix (N − ρ2I)−1M has an eigenvalue equal to 1. Since this matrix has the following upper-triangular structure (N − ρ2I)−1M = (cid:20)O ∗ (cid:21) O L for the Metzler matrix L defined by L = (N22 − ρ2I)−1(−N21(D − ρ2I)−1M12 + M22), it follows that L has an eigenvalue equal to 1. This specifically implies that λmax(L) ≥ 1. (10) On the other hand, we can obtain an upper bound on λmax(L) as fol- lows. The irreducible matrix BA − D has a positive eigenvector v corre- sponding to the eigenvalue −ρ1 by Lemma 1.1. Define the positive vec- tor w = col1≤i≤n v\{i}. Then, it is easy to see that M12w = BAv and M22w = col1≤i≤n(BAv)\{i} − col1≤i≤n colj(cid:54)=i βjaijvi. Using these equalities and the eigenvalue equation (BA − D)v = −ρ1v, we can show that w − φ (11) for the nonzero and nonnegative vector φ = col 1≤i≤n col j(cid:54)=i aij(βivj + βjvi) δi + δj − ρ2 . Since L is irreducible (for the proof, see Appendix A), the inequality (11) and Lemma 1.3 show λmax(L) < max1≤i≤n(δi − ρ1)/(δi − ρ2). Since we have already shown (10), there must exist an i such that 1 < (δi − ρ1)/(δi − ρ2). This inequality is equivalent to ρ2 > ρ1 because both of δi − ρ1 and δi − ρ2 are positive. This completes the proof. 10 Lw = (N22 − ρ2I)−1 col + (N22 − ρ2I)−1 col i (cid:0)δiVi(D − ρ2I)−1(D − ρ1I)v(cid:1) (cid:19) ((D − ρ1I)v)\{i} − φ − φ i (cid:18) δj − ρ1 (cid:19) δj − ρ2 δi − ρ1 δi − ρ2 vj = col i col j(cid:54)=i (cid:18) ≤ max 1≤i≤n (a) β = 0.9/λmax(A) (b) β = 0.7/λmax(A) (c) β = 0.5/λmax(A) Figure 1: Relative approximation errors of the decay rate ρ for ER (circles), BA (triangles), and NWS (squares) graphs. Empty markers: first-order bound ρ1, filled markers: second- order bound ρ2. 11 101102103n0.20.30.40.50.60.70.8e2(ER)e1(ER)e2(NWS)e1(NWS)e2(BA)e1(BA)101102103n0.00.10.20.30.40.5e2(ER)e1(ER)e2(NWS)e1(NWS)e2(BA)e1(BA)101102103n0.000.050.100.150.200.250.300.35e2(ER)e1(ER)e2(NWS)e1(NWS)e2(BA)e1(BA) Figure 2: Relative approximation errors of the decay rate ρ for real networks. Empty markers: first-order bound ρ1, filled-markers: second-order bound ρ2. 4. Numerical Simulations In this section, we illustrate the effectiveness of our results with nu- merical simulations. The simulations are performed using Python 3.6 on a 4.2 GHz Intel Core i7 processor. In our simulations, we consider the SIS model over several complex networks with a homogeneous transmission rate βi = β and a recovery rate δi = δ for all nodes. We normalize δ = 1 without loss of generality. We first consider the following three random graphs: 1) Erdos-R´enyi (ER), 2) Barab´asi-Albert (BA), and 3) Newman- Watts-Strogatz (NWS) graphs. For each of the networks and various network sizes, we compute the first-order bound ρ1, our second-order bound ρ2, and an approximation of the true decay rate ρ (by the same procedure used in Exam- ple 3). We present the sample averages of the relative errors e1 = (ρ − ρ1)/ρ and e2 = (ρ − ρ2)/ρ in Fig. 1 (20 realizations of random graphs for each data point) for β = 0.9/λmax(A), 0.7/λmax(A), and 0.5/λmax(A). We can observe that our second-order bound remarkably improves the first-order bound, specifically for the cases of BA and NWS networks. We then consider the SIS model over several real-world networks [22]. Specifically, we compute lower-bounds on the decay rates for 1) a bipar- tite network from participation of women in social events (Davis, n = 32), 2) a social network of the Zachary's Karate club (Karate, n = 34), 3) the connectivity network of states in the USA (USA, n = 49), 4) a network of bottlenose dolphins (Dolphin, n = 62), 5) a network of protein-protein interactions (PDZBase, n = 212), 6) the high-school network described in 12 DavisKarateUSADolphinPDZBaseJeffersonUniversityHamstersterFacebook0.20.30.40.50.60.70.80.9e1e2 Example 3 (Jefferson, n = 288), 7) an email communication network at the University Rovira i Virgili (University, n = 1133), 8) a friendship network on hamsterster.com (Hamsterster, n = 1858), and 9) a friendship network in Facebook (Facebook, n = 2888). We consider the homogeneous case as in the above simulations for random graphs, and use the transmission rate β = 0.9/λmax(A) and the recovery rate δ = 1. We show the relative er- rors e1 and e2 in Fig. 2. These simulations confirm that our second-order lower-bound can remarkably improve the first-order bound. 5. Conclusion In this paper, we have presented an improved lower-bound on the decay rate of the SIS model over complex networks. We have specifically derived a lower-bound on the decay rate in terms of the maximum real eigenvalue of an n2 × n2 Metzler matrix, and have shown that our lower-bound improves existing lower-bound based on mean-field approximations of the SIS model. For deriving our lower-bound, we have used a linear upper-bounding model for the first and second-order moments on the SIS model. In our simulations, we have shown that our lower-bound significantly improves on the first or- der lower-bound, in the cases of both random and realistic networks. This improvement suggests that incorporating second-order moments could allow us to drastically improve the performance of existing strategies for spreading control [8, 9, 10, 11, 15]. Acknowledgments This work was supported in part by the NSF under Grants CAREER- ECCS-1651433 and IIS-1447470. Appendix A. Irreducibility of L Since N22 − ρ2I is a diagonal matrix, it is sufficient to show the irre- ducibility of L(cid:48) = (N22 − ρ2I)L. We can show that the matrix L(cid:48) can be represented as the block matrix [L(cid:48) ij]i,j having the block elements colj(cid:54)=i βjAj,\{i} −(cid:76) δiβj δj − ρ2 Vj(ej ⊗ Aj,\{j}), L(cid:48) ij = j(cid:54)=i aijβi, if i = j, otherwise. 13 Therefore, the irreducibility of L(cid:48) is equivalent to that of the block ma- trix L(cid:48)(cid:48) = [L(cid:48)(cid:48) ij]i,j having the block elements (cid:40) L(cid:48)(cid:48) ij = colj(cid:54)=i Aj,\{i}, Vj(ej ⊗ Aj,\{j}), otherwise. if i = j, To prove the irreducibility of L(cid:48)(cid:48), we notice that L(cid:48)(cid:48) equals the adjacency matrix of the directed graph G(cid:48)(cid:48) = (V(cid:48)(cid:48),E(cid:48)(cid:48)) having the n(n − 1) nodes {v1,2, . . . , v1,n, v2,1, v2,3, . . . , v2,n, . . . , vn,1, . . . , vn,n−1} 1 ∪ E(cid:48)(cid:48) 2 , where E(cid:48)(cid:48) and edges E(cid:48)(cid:48) = E(cid:48)(cid:48) 2 = {(vi,j, vi,k) : (j, k) ∈ E}. Let us show that G(cid:48)(cid:48) is strongly connected. Take two arbitrary nodes vi0,j0 and vi1,j1. Since G is strongly connected, we can ) in G. Then, from find a directed-path of the form (vi0, vk1, . . . , vk(cid:96)1−1, vi1, vk(cid:96)1 the definition of E(cid:48)(cid:48) 1 = {(vi,j, vj,k) : (j, k) ∈ E} and E(cid:48)(cid:48) 1 , we see that the ordered set (vi0,j0, vj0,k1, vk1,k2, . . . , vk(cid:96)−2,k(cid:96)−1, vk(cid:96)−1,i1, vi1,k(cid:96)) is a directed path in (V(cid:48)(cid:48),E(cid:48)(cid:48) 1 ). In order to continue this directed path to vi1,j1, we take another directed path (vk(cid:96), vk(cid:96)+1, . . . , vk(cid:96)(cid:48) , vj1) in G. Then, from the definition of E(cid:48)(cid:48) 2 , we can see that the ordered set (vi1,k(cid:96), . . . , vi1,k(cid:96)(cid:48) , vi1,j1) is a directed path in (V(cid:48)(cid:48),E(cid:48)(cid:48) 2 ). We have thus shown the existence of a directed path from vi0,j0 to vi1,j1 in G(cid:48)(cid:48). This shows the strong connectivity of G(cid:48)(cid:48) because vi0,j0 and vi1,j1 were taken arbitrarily. This proves the irreducibility of L(cid:48)(cid:48) and, therefore, the irreducibility of L, as desired. References [1] K. Lerman, R. Ghosh, Information contagion: An empirical study of the spread of news on Digg and Twitter social networks, in: Fourth International AAAI Conference on Weblogs and Social Media, 2010, pp. 90 -- 97. [2] C. Nowzari, V. M. Preciado, G. J. Pappas, Analysis and control of epidemics: A survey of spreading processes on complex networks, IEEE Control Systems 36 (1) (2016) 26 -- 46. [3] S. Roy, M. Xue, S. K. Das, Security and discoverability of spread dy- namics in cyber-physical networks, IEEE Transactions on Parallel and Distributed Systems 23 (9) (2012) 1694 -- 1707. 14 [4] P. Van Mieghem, J. Omic, R. Kooij, Virus spread in networks, IEEE/ACM Transactions on Networking 17 (1) (2009) 1 -- 14. [5] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, C. Faloutsos, Epi- demic thresholds in real networks, ACM Transactions on Information and System Security 10 (4). [6] A. Lajmanovich, J. A. Yorke, A deterministic model for gonorrhea in a nonhomogeneous population, Mathematical Biosciences 28 (1976) (1976) 221 -- 236. [7] A. Ganesh, L. Massouli´e, D. Towsley, The effect of network topology on the spread of epidemics, in: 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005, pp. 1455 -- 1466. [8] Y. Wan, S. Roy, A. Saberi, Designing spatially heterogeneous strategies for control of virus spread, IET Systems Biology 2 (4) (2008) 184 -- 201. [9] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, G. J. Pap- pas, Optimal resource allocation for network protection against spread- ing processes, IEEE Transactions on Control of Network Systems 1 (1) (2014) 99 -- 108. [10] S. Han, V. M. Preciado, C. Nowzari, G. J. Pappas, Data-driven network resource allocation for controlling spreading processes, IEEE Transac- tions on Network Science and Engineering 2 (4) (2015) 127 -- 138. [11] M. Ogura, V. M. Preciado, Optimal design of switched networks of positive linear systems via geometric programming, IEEE Transactions on Control of Network Systems 4 (2) (2017) 213 -- 222. [12] C. Nowzari, M. Ogura, V. M. Preciado, G. J. Pappas, A general class of spreading processes with non-Markovian dynamics, in: 54th IEEE Conference on Decision and Control, 2015, pp. 5073 -- 5078. [13] M. Ogura, V. M. Preciado, Epidemic processes over adaptive state- dependent networks, Physical Review E 93 (2016) 062316. [14] M. Ogura, V. M. Preciado, Optimal containment of epidemics in tem- in: Temporal Networks Epidemiology, poral and adaptive networks, Springer-Verlag, in press, 2017. 15 [15] J. Abad Torres, S. Roy, Y. Wan, Sparse Resource Allocation for Linear Network Spread Dynamics, IEEE Transactions on Automatic Control 62 (4) (2017) 1714 -- 1728. [16] N. A. Ruhi, C. Thrampoulidis, B. Hassibi, Improved bounds on the epidemic threshold of exact SIS models on complex networks, in: 55th IEEE Conference on Decision and Control, 2016, pp. 3560 -- 3565. [17] E. Cator, P. Van Mieghem, Second-order mean-field susceptible- infected-susceptible epidemic threshold, Physical Review E 85 (5) (2012) 056111. [18] L. Farina, S. Rinaldi, Positive Linear Systems: Theory and Applications, Wiley-Interscience, 2000. [19] R. Horn, C. Johnson, Matrix Analysis, Cambridge University Press, 1990. [20] P. S. Bearman, J. Moody, K. Stovel, Chains of affection: the structure of adolescent romantic and sexual networks, American Journal of Sociology 110 (1) (2004) 44 -- 91. [21] F. B. Hanson, Applied Stochastic Processes and Control for Jump- Diffusions: Modeling, Analysis and Computation, Society for Industrial and Applied Mathematics, 2007. [22] J. Kunegis, KONECT -- the Koblenz network collection, in: Proceedings of the 22nd International Conference on World Wide Web, ACM Press, New York, New York, USA, 2013, pp. 1343 -- 1350. 16
1603.02714
2
1603
2016-04-06T18:38:39
The Rise of Social Botnets: Attacks and Countermeasures
[ "cs.SI" ]
Online social networks (OSNs) are increasingly threatened by social bots which are software-controlled OSN accounts that mimic human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster, which collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation through real experiments on Twitter and also trace-driven simulations. We also propose the corresponding countermeasures and evaluate their effectiveness. Our results can help understand the potentially detrimental effects of social botnets and help OSNs improve their bot(net) detection systems.
cs.SI
cs
The Rise of Social Botnets: Attacks and Countermeasures Jinxue Zhang, Student Member, IEEE, Rui Zhang, Member, IEEE, Yanchao Zhang, Senior Member, IEEE, and Guanhua Yan Abstract-Online social networks (OSNs) are increasingly threatened by social bots which are software-controlled OSN accounts that mimic human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster, which collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation through real experiments on Twitter and also trace-driven simulations. We also propose the corresponding countermeasures and evaluate their effectiveness. Our results can help understand the potentially detrimental effects of social botnets and help OSNs improve their bot(net) detection systems. Index Terms-Social bot, social botnet, spam distribution, digital influence ! two new social botnet attacks on Twitter, one of the most popular OSNs with over 302M monthly active users as of June 2015 and over 500M new tweets daily. Then we propose two defenses on the reported attacks, respectively. Our results help understand the potentially detrimental effects of social botnets and shed the light for Twitter and other OSNs to improve their bot(net) detection systems. More specifically, this paper makes the following contributions. Firstly, we demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution on Twitter. This attack is motivated by that Twitter currently only suspends the accounts that originate spam tweets without punishing those retweeting spam tweets [16]. If the social botnet is organized as a retweet tree in which only the root originates spam tweets and all the others merely retweet spams, all the social bots except the root bot can escape suspension. Given a set of social bots, we formulate the formation of the retweeting tree as a multi-objective optimization problem to minimize the time taken for a spam tweet to reach a maximum number of victim Twitter users at the lowest cost of the botmaster. Since the optimization is NP-hard, we give a heuristic solution and confirm its efficacy with real experiments on Twitter and trace- driven simulations. Secondly, we show that a social botnet can easily manipu- late the digital influence [17], [18] of Twitter users, which has been increasingly used in ad targeting [19], [20], customer- service improvement [21], recruitment [22], and many other applications. This attack stems from the fact that almost all ex- isting digital-influence tools such as Klout, Kred, and Retweet Rank, measure a user's digital influence exclusively based on his2 interactions with others users on Twitter. If social bots col- laborate to manipulate the interactions of target Twitter users, they could effectively manipulate the victims' digital influence. The efficacy of this attack is confirmed by real experiments on Twitter. Finally, we propose two countermeasures to defend against the two reported attacks, respectively. To defend against the 2. No gender implication. 6 1 0 2 r p A 6 ] I S . s c [ 2 v 4 1 7 2 0 . 3 0 6 1 : v i X r a 1 INTRODUCTION O NLINE social networks (OSNs) are increasingly threat- ened by social bots [2] which are software-controlled OSN accounts that mimic human users with malicious intentions. For example, according to a May 2012 article in Bloomberg Businessweek,1 as many as 40% of the accounts on Facebook, Twitter, and other popular OSNs are spammer accounts (or social bots), and about 8% of the messages sent via social networks are spams, approximately twice the volume of six months ago. There have been reports on various attacks, abuses, and manipulations based on social bots [3], such as infiltrating Facebook [4] or Twitter [5], [6], launching spam campaign [7]–[9], and conducting political astroturf [10], [11]. A social botnet refers to a group of social bots under the control of a single botmaster, which collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being detected. For example, social bots on Twitter can follow others and retweet/answer others' tweets. Since a skewed follow- ing/followers (FF) ratio is a typical feature for social bots on Twitter [12], maintaining a balanced FF ratio in the social botnet makes it much easier for individual bots to escape detection. Creating a social botnet is also fairly easy due to the open APIs published by OSN providers. For example, we successfully created a network of 1,000 accounts on Twitter with $57 to purchase 1,000 Twitter accounts instead of manually creating them. Despite various studies [13]–[15] confirming the existence of social botnets, neither have the greater danger from social botnets been unveiled nor have the countermeasures targeted on social botnets been proposed. In this paper, we first report The preliminary version of this paper appeared in IEEE CNS 2013 [1]. J. Zhang and Y. Zhang are with the Department of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ 85287 (e-mail: jxzhang, [email protected]). R. Zhang is with the Department of Electrical Engineering, University of Hawaii, Honolulu, HI 96822 (e-mail: [email protected]). G. Yan is with the Department of Computer Science, Binghamton University, New York, NY 13902 (e-mail: [email protected]). 1. http://www.businessweek.com/articles/2012-05-24/likejacking- spammers-hit-social-media botnet-based spam distribution, we maintain a spam score for each user and update the score whenever the corresponding user retweets a spam. The user is suspended if his spam score exceeds a predefined threshold. To defense against the botnet-based influence manipulation attacks, we propose to find sufficient credible users and only use the interactions originated from these credible users for digital-influence mea- surement. Moreover, based on the measurement in Section §4, we design a new model to compute the influence score which is resilient to the manipulation from a single credible social bot. We confirm the effectiveness of both defenses via detailed simulation studies driven by real-world datasets. The rest of the paper is organized as follows. §2 introduces the construction of a social botnet on Twitter. §3 and §4 show the efficacy and merits of using the social botnet for spam distribution and digital-influence manipulation, respectively. §5 details and evaluates two countermeasures. §6 discusses the related work. §7 concludes this paper. 2 BUILDING A SOCIAL BOTNET ON TWITTER In this paper, we focus on networked social bots in Twitter, so we first outline the Twitter basics to help illustrate our work. The readers familiar with Twitter can safely skip this paragraph without any loss of continuity. Unlike Facebook, the social relationships on Twitter are unidirectional by users following others. If user A follows user B, A is B's follower, and B is A's friend. In most cases, a user does not need prior consent from another user whom he wants to follow. Twitter also allows users to control who can follow them, but this feature is rarely used. In addition, users can choose to unfollow others and block their selected followers. A Twitter user can send text-based posts of up to 140 characters, known as tweets, which can be read by all its followers. Tweets can be public (the default setting) and are visible to anyone with or without a Twitter account, and they can also be protected and are only visible to previously approved Twitter followers. A retweet is a re- posting of someone else's tweet. A user can retweet the tweets of anyone he follows or does not follow, and his retweets can be seen by all his followers. Moreover, a user can reply to a post (tweet or retweet) and ensure that specific users can see his posts by mentioning them via inserting "@username" for every specific user into his posts. Finally, each user has a timeline which shows all the latest tweets, retweets, and replies of his followers. We construct a social botnet on Twitter consisting of a botmaster and a number of social bots which are legitimate Twitter accounts. Twitter accounts can be manually created or purchased at affordable prices. For example, we bought 1,000 Twitter accounts with $57 from some Internet sellers for experimental purposes only. The botmaster is in the form of a Java application, which we developed from scratch based on the OAuth protocol [23] and open Twitter APIs. It could perform all the Twitter operations on behalf of all social bots to make the bots look like legitimate users. 3 SOCIAL BOTNET FOR SPAM DISTRIBUTION 3.1 Why the Social Botnet for Spam Distribution? As the popularity of Twitter rapidly grows, spammers have started to distribute spam tweets which can be broadly defined as unwanted tweets that contains malicious URLs in most 2 cases or occasionally malicious texts [8], [9], [24]. According to a study in 2010 [8], roughly 8% of the URLs in tweets are malicious ones that direct users to scams/malware/phishing sites, and about 0.13% of the spam URLs will be clicked. Given the massive scale of Twitter, understanding how spam tweets are distributed is important for designing effective spam defenses. The simplest method for spam distribution is to let social bots distribute spam tweets independently from each other, which we refer to as the independent method. In particular, the botmaster can instruct every bot to directly post spam tweets which can be seen by all its followers. According to the Twitter rules,3 the accounts considered as spam originators will be permanently suspended. Since there are sophisticated techniques such as [25], [26] detecting malicious URLs, this independent approach may subject almost all social bots to permanent suspension in a short time window. A more advanced method, which we propose and refer to as the botnet method, is to exploit the fact that Twitter currently only suspends the originators of spam tweets without punishing their retweeters. In the simplest case, the botmaster forms a single retweeting tree, where every bot is associated with a unique vertex and is followed by its children bots. Then only the root bot originates spam tweets, and all the others simply retweet the spam tweets from their respective parent. Given the same set of social bots, both methods can distribute spam tweets to the same set of non-bot Twitter users, but only the root bot will be suspended under the botnet method. Obviously, the botnet method is economically beneficial for the botmaster because it involves non-trivial human effort or money to create a large social botnet. We use an experiment on Twitter to validate our conjec- ture for the independent method. Our experiment uses three different social botnets with each containing 100 bots. The experiment proceeds in hours. At the beginning of every hour, every bot in the same botnet almost simultaneously posts a spam tweet comprising two parts. The first part is different from every bot and randomly selected from the list of tweets returned after querying "music," while the second part is an identical malicious URL randomly selected from the Shalla's blacklists (http://www.shallalist.de/) and shortened using the bitly service (http://bitly.com) for use on Twitter. We find that all the bots in the three botnets are suspected in two, five, and six hours. Based on this experiment, we can safely conjecture that the independent method will cause most bots in a larger botnet to be suspended in a short period, thus putting the botmaster at serious economic disadvantage. We use a separate set of experiments to shed light on the advantage of the botnet method. In this experiment, we first use 111 bots to build a full 10-ary tree of depth two, i.e., each node except the leaves has exactly 10 children. The experiment proceeds in hourly rounds repeatedly on these 111 bots. At the beginning of every hour of the first round, the root bot posts a spam tweet, while all its descendants merely retweet the spam tweet after a small random delay. Then we replace the suspended bot by a random bot alive from the same network, re-organize the bot tree, and start the next round. We totally run the experiments for five rounds, in each of which only the root bot is suspended after six hours on average, and all other bots who just retweet the spams (with five times) remain alive. To 3. http://support.twitter.com/articles/18311\# check whether the bots will be suspended by retweeting more spams, we reduce the spamming frequency from one per hour to one per day, and repeat the experiment for ten more rounds, and all the retweeting bots were still alive at the end of the experiment. In addition, we use the similar methodology to test three other different botnets of 2, 40, and 100 bots, respectively, and obtain the similar results. It has been very challenging in the research community to conduct experimental studies about the attacks on online social networks and also the corresponding countermeasures. In the experiments above, we have to control the social bots to post malicious URLs to evaluate Twitter's suspension policy, which may harm benign users. To minimize the negative impact on the legitimate users, we adopted a methodology similar to [4], [9], [27], [28]. Specifically, none of the purchased accounts followed any legitimate user and thus were very unlikely to be followed by legitimate users, which greatly reduced the pos- sibility of the posted spams being viewed by legitimate users. In addition, we deleted every spam tweet immediately after the experiment to further avoid it being clicked by legitimate users. Our experiments clearly show that Twitter has a much more strict policy against posting original spam tweets than retweeting spam tweets. 3.2 Optimal Social Botnet for Spam Distribution §3.1 motivates the benefits of using the social botnet for spam distribution on Twitter. Given a set of social bots, what is the optimal way for spam distribution? We give an affirmative answer to this important question in this section. overlapping non-bot followers. We further let F = (cid:83)n 3.2.1 Problem Setting and Performance Metrics We consider a botnet V of n bots, where each bot i ∈ [1, n] can be followed by other bots and also other Twitter users outside the botnet (called non-bot followers hereafter). Let Fi denote the non-bot followers of bot i. Note that Fi ∩ Fj may be non-empty (∀i (cid:54)= j), meaning that any two bots may have i=1 Fi. How to attract non-bot followers for the bots is related to social engineering [29] and orthogonal to the focus of this paper. Note that it is very easy in practice for a bot to attract many non-bot followers, as shown in [4], [5], [14], [15]. The botmaster distributes spam tweets along one or multi- ple retweeting trees, and the vertices of every retweeting tree corresponds to a disjoint subset of the n bots. In addition, every bot in a retweeting tree is followed by its children. As discussed, the root of every retweeting tree will originate spam tweets, which will appear in the Twitter timeline of its children bots and then be retweeted. The distribution of a particular spam tweet finishes until all the bots on all the retweeting trees either tweet or retweet it once and only once. Given a set V with n bots and F, we propose three metrics to evaluate the efficacy of botnet-based spam distribution. • Coverage: Let C denote the non-bot receivers of a given spam tweet and be called the coverage set. The coverage of spam distribution is then defined as • Delay: We define the delay of spam distribution, de- noted by τ, as the average time for each user in C to see a given spam tweet since it is generated by the root bot. A user may follow multiple bots and thus see the same spam tweet multiple times, in which case only the first time is counted. C F ∈ [0, 1]. • Cost: We use S and S to define the cost of spam distribution, where S denotes the indices of suspended bots after distributing a given spam, and S denotes the set of non-bot followers will be lost due to the suspension of S, i.e., S = C \ ((cid:83) i∈V\S Fi). 3 The above metrics motivates three design objectives. First, we obviously want to maximize the coverage to be one, which happens when all the n bots participate in spam distribution by belonging to one retweeting tree. Second, many malicious URLs in spam tweets are hosted on compromised servers and will be invalidated once detected, and Twitter will remove spam tweets as soon as they are identified. It is thus also im- portant to minimize the delay. Finally, since it incurs non-trivial human effort or money to create bots and attract followers for them, it is critical to minimize the cost as well. 3.2.2 Design Constraints A major design challenge is how to circumvent Twitter's sus- pension rules4 that are evolving in accordance with changing user (mis)behavior. We classify the suspension rules into strict and loose ones. Violators of strict rules will be immediately suspended. The strict rule most relevant to our work is that the users originate spam tweets containing malicious URLs will be suspended. In contrast, a violator of loose rules will initially become suspicious and later be suspended if his violations of related loose rules exceed some unknown threshold Twitter defines and uses internally. Examples of loose rules include repeatedly posting others' tweets as your own or the same tweet, massively following/unfollowing people in a short time period, etc. In addition, the research community have discov- ered many useful loose rules for spam-tweet detection such as those in [25], [30]–[35] which are likely to be or have been adopted by Twitter into their evolving suspension-rule list. As discussed, we use the botnet method for spam distribution in order to largely circumvent this strict rule. In the following, we introduce five design constraints related to some loose rules we consider most relevant. By following these constraints, the social bots can cause much less suspicion to Twitter and thus are much less likely to be suspended. 1. The maximum height of a retweeting tree is K = 10 according to [30]. Hence we claim that any spam tweet will not be retweeted more than 10 times. 2. A bot only retweets the spam tweets posted by its parent bot on the retweeting tree it follows, as retweeting the tweets from non-followed users is known to be effective in detecting spam tweets [33]. 3. Any spam tweet from an arbitrary bot will be retweeted by at most 100r percent of its followers. As r approaches one, the bot will become increasingly suspicious according to community-based spam detection algorithms [24], [36]. Recall that the followers of any bot i ∈ [1, n] comprise other bots and also non-bot users (i.e., Fi). Note that non-bot followers rarely retweet spam tweets in practice, but we require all bot followers to retweet spam tweets. Then bot i can have no more than (cid:100) rFi 4. The retweeting lag at any hop j ∈ [1, K] is a random variable ti which follows a hop-wise statistical distribution according to [30], as it is quite abnormal for a user to immedi- ately retweet a post once seeing it. Here the retweeting lag is 1−r (cid:101) bot followers. 4. http://support.twitter.com/articles/18311# 4 What is the optimal way to form a retweeting tree as in Fig. 1(c) given the cost, coverage, and delay requirements? Recall that the cost is defined by S and S. Since S = c under the budget constraint, we just need to minimize S. To mathematically express the cost and coverage requirements, we let {Vk}K k=1 denote K disjoint subsets of the bot indices {1, . . . , n}, where K = 10 is the maximum height of the retweeting tree (see Constraint 1), Vk denote the bot indices k=1 Vi ⊆ {1, . . . , n}. If the optimal retweeting tree eventually found is of depth k=K∗+1 will all be empty. Recall that Fi K∗ < K, the sets {Vk}K denotes the set of non-bot followers of bot i ∈ [1, n] and that i∈Vk,k∈[M +1,K∗] Fi) i∈Vk,k∈[1,K] Fi ⊆ F and need to maximize C. Since S ⊆ C, we can combine the cost S C and then and coverage requirements into a single metric attempt to minimize it. at level k of the retweeting tree, and (cid:83)K F = (cid:83)n i=1 Fi. Then we have S = C \ ((cid:83) and the coverage set C = (cid:83) and Φk = (cid:83) Fi −(cid:83)k−1 Constraint 4, it takes(cid:80)k It is a little more complicated to derive the delay. As discussed, a non-bot user may follow multiple bots at differ- ent levels, in which case it is considered a follower on the lowest level among those. Let Φk denote the set of non-bot followers at k ∈ [1, K]. It follows that Φ1 = Fi (i ∈ V1) l=1 Φl for k ∈ [1, K]. According to j=1 tj for a spam tweet to reach level-k non-bot followers, where tj denotes the retweeting lag of hop j ∈ [1, K], and t1 = 0. Since there are totally Φk non-bot followers at level k and C non-bot followers across all levels, we can compute the delay as i∈Vk K(cid:88) k(cid:88) k=1 j=1 τ = 1 C tjΦk . Finally, we reduce the three-objective optimization problem to the following single-objective minimization problem. S C + (1 − α)τ min f ({Vk}K s.t. k=1 k=1) = αβ Vi ⊆ {1, . . . , n} K(cid:91) Vi ∩ Vj = φ,∀i (cid:54)= j ∈ [1, K] M(cid:91) (cid:88) Vi ≤ c (cid:100) rFi 1 − r k=1 i∈Vk (1) (cid:101) ≥ Vk+1,∀k ∈ [M − 1, K − 1] We have two remarks here. First, α ∈ [0, 1] is a adjustable weight that reflects the relative importance of coverage and delay, and β is a fixed scaling factor to unify two different objective units. Second, the last constraint is due to the afore- mentioned third design constraint. The above optimization problem can be viewed as a varia- tion of classical set partition problem (SPP), which is NP-hard. In what follows, we introduce a heuristic approximation solu- tion by constructing a collection of disjointed subsets {Vk}K from the botnet set. k=0 3.2.4 Heuristic Solution Our intuition is to use all the budget c and fill the first M hops of the retweeting trees with the bots having the lowest sus- pension cost in terms of the number of lost non-bot followers. Fig. 1. Exemplary retweeting trees with 12 bots, where M = 3 and the botmaster's suspension budget is c = 5. defined as the time elapsed when a bot sees a spam tweet until it retweets it. 5. The social bots within the first M hops will be suspended once Twitter finds that they are involved in (re)tweeting a spam tweet. This constraint is motivated by recent findings [14] that spammer accounts on Twitter tend to be connected and clustered by mutual followings. It is thus reasonable to assume that Twitter either have been utilized or will soon utilize these research findings to suspend the accounts involved in distributing a spam tweet within the first M > 0 hops. After introducing this constraint, we relax the third one by allowing arbitrary topology in the first M hops because all of its bots will be suspended. 3.2.3 Problem Formulation Give the above design objectives and constraints, we now attempt to formulate botnet-based spam distribution as an optimization problem. The major challenge lies in the infea- sibility of simultaneously achieving the maximum coverage, the minimum delay, and the minimum cost. Fig. 1 shows an example with 12 bots and M = 3, and we assume that every bot has the same number of non-bot followers. In one extreme shown in Fig. 1(a), we can minimize the delay τ by letting every bot be a root bot, but the cost is obviously the maximum possible because all the bots will be suspended. In the other extreme shown in Fig. 1(b), we can form a single retweeting tree with exactly three bots within the first three hops, in which case we can achieve the minimum possible cost, but the achievable delay will always be larger than that in the first case no matter how the retweeting tree beyond three hops is formed. In addition, we assume for the second case that the retweeting tree can include all the 12 bots, leading to the same coverage of one as in the first case. If there are too many bots, however, some of them may not be able to be incorporated into the retweeting tree due to the first and third design constraints, and the resulting coverage will be smaller than that of the first case. To deal with the above challenge, assume that the botmaster has a suspension budget c ∈ [M, n] bots, referring to the maximum number of suspended bots it can tolerate. Note that the more bots in the first M hops, the more non-bot followers in F closer to the root bot which can receive a given spam tweet in shorter time, and thus the smaller the delay. Under the budget constraint, the minimum delay can hence be achieved only when there are exactly c bots within the first M hops, as shown in Fig. 1(c) with c = 5. M = 3(a)(b)(c)c = 5 5 (a) α = 0.4 (b) α = 0.65 (c) α = 0.9 Fig. 2. Performance comparison of independent and botnet methods in spam distribution at different αs in terms of the single objective f. subsets, each corresponding to one of the first M levels. A heuristic observation here is that we need to maximize VM, as the more non-bot followers of the social bots in the Mth level, the more social bots in level M + 1 and subsequent levels, and also the lower average delay according to the last constraint in (1). Given the budget S = c, we obtain VMmax = c − M + 1 when the retweeting forest has a single tree whose first M − 1 levels form a straight line, as shown in Fig. 1(b). The bots in the Mth level is then determined by using MAXCOVER to choose the c − M + 1 bots from S with the maximum number of non- bot followers. To determine the level for each of the remaining M −1 bots, we sort the remaining M − 1 bots in S in the descending order according to the number of their non-bot followers and assign them to the corresponding level, e.g., the bot with the highest number of non-bot followers will be assigned to the first level. Note that it is possible that after we maximizing the number of bots at the Mth level, the remaining bots are less than the allowed on the Mth level, so the (M + 1)-th is not full. To further reduce the average delay in such cases, we move the exceeding bots in the Mth level to the first level. set {1, . . . , n}, we can then build the final retweeting forest (tree). Specifically, the number of retweeting trees is equal to the cardinality of V1, which is one if the (M + 1)-th level is full or greater than one otherwise. We then randomly choose one social bot from V1 to be the root of the retweeting tree with more than one level, which is followed by the bots from the second to Mth level determined by V2 to VM , respectively. Finally, we build the level from k = M + 1 to K by select- ing certain number of social bots from Vk according the last constraint in Eq. (1). After determining {Vi}K i=1 from the social-bot 3.3 Trace-driven Evaluation We conduct trace-driven simulations to compare the perfor- mance of spam distribution using the independent and botnet methods, as well as evaluating the tradeoffs among the multi- ple goals in the botnet method. The evaluation for independent bots is straightforward. In particular, given the bot set V with V = n, we place all the bots in the first level which will be suspended completely. We then have C = S = n, and τ = 0. The single objective in Problem (1) is thus f = α. To evaluate the botnet method, we set up the simulations according to existing measurement data and heuristics. We set (a) #lost legitimate followers (b) Average delay τ (hours) Fig. 3. Performance comparison of independent and botnet methods in spam distribution in terms of separate objective. We then recursively place the bots with the highest number of non-bot followers from level M + 1 to the last level, in order to reduce the average latency as well as cost. To begin with, our approximation is built on the solutions to the traditional maximum coverage problem (or MAXCOVER) and the minimum coverage problem (MINCOVER), which is to select k sets from a collection of subsets of a ground set so that the their union is maximized [37] or minimized, respectively. MAXCOVER and MINCOVER problems are both NP-hard and have greedy approximation algorithms by iteratively selecting the maximum or minimum subset after extracting the selected elements, respectively. Our solution consists of the following two steps. First, given the budget c for S and that all the followers in S will be lost because of the suspension, we minimize the objective S by using MINCOVER to choose c bots as S with the minimum total number of non-bot followers. In doing so, we can determine the union of the bot set for the first M level. The bot subset in each level will be determined later. Here we just assume that S has been divided into the M groups, each corresponding to the bots in one of the first M levels. Second, we construct {Vk}K k=M +1 to greedily increase the coverage C and at the same time lower the average delay T . Specifically, assuming that we have known VM , to determine VM +1, we first set the (cid:100) rFi 1−r (cid:101) according to the last constraint in (1) and then use MAXCOVER to choose a subset of VM +1 bots from the remaining bot set with the maximum number of non-bot followers. We repeat this greedy selection for every level k = M + 2, . . . , K. The remaining problem is how to partition S into M cardinality of VM +1 be equal to (cid:80) i∈Vk 0204060801000.40.50.60.70.80.911.11.21.31.4Sf n=100, botnetn=300, botnetn=500, botnetn=*, independent0204060801000.580.60.620.640.660.680.70.720.74Sf n=100, botnetn=300, botnetn=500, botnetn=*, independent0204060801000.20.30.40.50.60.70.80.91Sf n=100, botnetn=300, botnetn=500, botnetn=*, independent02040608010000.20.40.60.81SCost n=100, botnetn=300, botnetn=500, botnetn=*, independent02040608010000.511.522.5SDelay n=100, botnetn=300, botnetn=500, botnetn=*, independent K = 10, and t1 = 0, ti = 0.5i hour for i = 2, . . . K according to [30]. To build {Fi}n i=1, we generate Fi according to the Gaussian distribution with µ = 32 as the average number of followers in the dataset of [30]. We also set the variance to σ2 = 5, generate a legitimate follower set F with F = 6000,5 and randomly choose Fi followers from the set F for each bot i. In addition, according to [14], the average path length of the spammer community is 2.60, so we set M = 3 to suspend the bots in the first three hops of F. Finally, we set β to one and the retweeting ratio r = 0.2. Due to space constraints, we focus on on the impact of α, c, and n and do not report the impact of F, σ2, r, M, or β in this paper. Fig. 2 compares the independent and botnet methods using the objective function f with different weights α. As stated before, f is simply equal to α for the independent case because τ = 0 and S = C. For the botnet method, the objective f is S the weighted sum of C and the delay τ. When α is small, τ S has higher impact on f than C will dominate f. Specifically, we can see from Fig. 2(a) that when α = 0.4, the independent method outperforms the botnet method with smaller f. However, as shown in Fig. 2(b), when α increases to 0.65, the botnet method can achieve lower f than the independent method does. This trend is more obvious for the same reason in Fig. 2(c) where α = 0.9. S C , while when α is large, Figs. 3 compare the two methods in terms of separate objectives including the number of lost legitimate followers and the average delay under different budget S = c. We can see that both methods have the same coverage C, which is equal to F, as well as the maximum value of C. In addition, we can see from Fig. 3(b) that the delay of the independent method is zero, while that of botnet method could be on the order of hours. Finally, Fig. 3(a) shows that the botnet method has significant advantage than the independent method in terms of S, the number of lost legitimate followers, as S is always equal to F for the independent scheme. Finally, the botnet size n also has some impact on separate S C decreases objectives in the botnet case. Fig. 3(a) shows that as n increases. The reason is that the larger n, the more bots with less non-bot followers will be assigned to the first M S levels, resulting in smaller S and thus larger C . In addition, Fig. 3(b) shows that the larger n, the higher the average delay τ, which is also expected. In summary, from the view point of the botmaster, these evaluations show that the botnet scheme is more flexible than the independent method when considering multiple objectives of the spam distribution at the same time. 4 SOCIAL BOTNET FOR DIGITAL-INFLUENCE MANIP- ULATION In this section, we first briefly introduce digital influence and then experimentally show the efficacy of using the social botnet to manipulate digital influence. 4.1 Rise of Digital Influence Digital influence is one of the hottest trends in social media and is defined as "the ability to cause effect, change behavior, and drive measurable outcomes online" in [38]. The huge 6 commercial potential of digital influence is in line with the increasingly recognized importance of word-of-mouth mar- keting on social networks. There are also growing business cases in which various companies successfully promoted their services/products by reaching out to most influential social- network users in their respective context [38]. The future of digital influence also relies on effective tools to measure it. As reported in [38], there are over 20 popular digital-influence software vendors such as Klout [39] , Kred [40], Retweet Rank [41], PeerIndex [42], TwitterGrade [43] and Twitalyzer [44]. Every vendor has its proprietary method to compute an influence score for a given user based on his activities within his affiliated social network such as Twitter, Facebook, Google+, and LinkedIn, and higher scores represent greater influence. As shown in Table 1, Klout, Kred, and PeerIndex use normalized scores with different average values and scales, while RetweetRank, TweetGrader, and Twitalyzer represent digital-influence scores using percentile. The typical business model of digital-influence vendors is based around connecting businesses with individuals of high influence. Companies have paid to contact individuals with high influence scores in hopes that free merchandise and other perks will influence them to spread positive publicity for them. For example, in 2011 Chevy offered 139 3-day test drives of its 2012 Sonic model to selected participants with the Klout score of at least 35 [19]. As another example, it has been reported that some recruiters have used the digital- influence scores to select qualified candidates [22]. In addition, customer service providers like Genesys prioritize customer complaints according to their digital-influence scores to avoid the amplification of complaints by influential users in OSNs [21]. Klout announced a growth of 2,000 new partners over a one year period in May 2012. 4.2 Botnet-based Digital-influence Manipulation Given the great potential of digital influence, whether it can be maliciously manipulated is an important research issue. For example, assume that malicious users could collude to significantly increase their influence scores. A company using the digital-influence service may consider them most influen- tial and choose them as the targets of important marketing campaigns by mistake, thus having potentially huge financial loss, while malicious users can potentially benefit, e.g., by getting free sample products. In addition, malicious users may attract more legitimate followers who tend to follow most influential users and thus become more influential. As the first work of its kind, we now explore the feasibility of using the botnet to manipulate digital influence. Our stud- ies involve three most popular digital-influence vendors for Twitter users: Klout, Kred, and Retweet Rank. For clarity, we summarize their key features as follows. • Klout: The Klout score of a Twitter user is on the scale of 1 to 100 and updated daily based on how frequently he or she is retweeted and mentioned in the last 90 days. The average Klout score is close to 20, and the score of the 90th percentile is over 50.6 • Kred: The Kred score of a Twitter user is on the scale of 1 to 1,000 and updated in real time according to how 5. For the Gaussian distribution with µ = 32 and σ2 = 5, the probability for generating a negative Fi is negligible. 6. http://therealtimereport.com/2012/04/11/ how-good-is-your-klout-score/ Vendor Klout Kred PeerIndex Retweet Rank Tweet Grader Twitalyzer Start 2008 2011 2009 2008 2010 2009 #users (M) Update daily 620+ Scale 0-100 - 50+ 3.5 10+ 1 hourly daily hourly daily daily 0-1000 0-100 0-100 0-100 0-100 7 Target OSNs Twitter, Facebook, LinkedIn, Google+, Insta- gram, Foursquare Twitter, LinkedIn, Facebook, Quora Twitter, Facebook Twitter Twitter Twitter Digital-influence score Average 90-percentile 20 500 19 50 50 50 TABLE 1 50 656 42 90 90 90 Six popular digital-influence software vendors. The data was collected at October, 2014. frequently he or she is retweeted, replied, mentioned, and followed on Twitter in the last 1,000 days.7 • Retweet Rank: It ranks the users based on how many times they each have been retweeted recently and how many followers/friends they each have.8 Retweet ranks are updated on an hourly basis, and a retweet rank of x means that the corresponding user is the xth most influential on Twitter. A retweet rank can also be translated into a percentile score ranging from 1 to 100, indicating how the user score relative to other Twitter users. Given a social botnet of n bots, we want to investigate whether it is feasible to generate an arbitrary influence score di for every bot i ∈ [1, n] under each of the above three tools. Since every bot is usually indistinguishable from a legitimate user, our investigation can also shed light on the feasibility of using the botnet to manipulate the influence score of an arbitrary Twitter user. Since every digital-influence vendor (including the above three) usually keeps confidential its de- tailed algorithm for computing influence scores, our studies are purely based on real Twitter experiments. According to [38], we conjecture that the following three factors play the important role in determining a user's digital-influence score. • Actions. Both the number and the type of actions have large impacts on a user's digital-influence score. Intu- itively, the more actions the user can attract, the higher his digital-influence score. Moreover, different types of actions may have different impacts. For example, retweeting or replying should be more indicative than following because the latter has been shown to be more vulnerable to fake [14]. • Audiences. Given a target user u, we define all the users who have retweeted or replied u's tweets, or mentioned or followed u as u's audiences. We conjecture that the larger the audience size, the higher the digital-influence scores. The intuition is that the target user is more influential if each of his 100 tweets is retweeted by a different user than all 100 tweets are retweeted by the same one user. We also conjecture that the higher the digital-influence scores his audience have, the higher the target user's digital-influence score. • Popularity of tweets. The digital-influence score of a tar- get user is determined by the popularity of his tweets. We want to explore how the distribution of the tweet popularity determines the overall influence of the target user. Based on these three factors, we then present how to or- chestrate the social botnets to manipulate the digital-influence scores. 4.2.1 Impact of Different Actions Since almost all digital-influence tools measure a Twitter users digital influence as his ability to drive others to actions, our first experiment aims to evaluate the social botnet's impact with following, retweeting, and mentioning. We do not consider replying, as replying is treated by Twitter as a special type of mentioning and is thus expected to have the same effect as mentioning. The first set of experiments involves n = 1, 000 social bots, each of which has no interaction with any other Twitter account and hence is not scored by Klout, Kred, or Retweet Rank. Note that Klout assigns an influence score of 10 to new users, while Kred and Retweet Rank both assign a zero score to new users. We randomly choose three disjoint groups, each containing 10 social bots and performing a unique action. For every social bot in the following group, we add 10 randomly chosen social bots as followers each day of the first 10 days and then 100 followers each day of the next 10 days. Likewise, every social bot in the retweeting (or mentioning) group is retweeted (or mentioned) by randomly chosen social bots 10, 100 and 1000 times each day in the first, second, and the last 10 days, respectively. Since different vendors have different schedules for score updating, we report the social bots' influence scores observed at every midnight. In addition, since the three vendors have different score scales, we normalize different influence scores with re- spect to the corresponding maximum scores to facilitate direct comparison. In particular, we show x/100 and y/1000 for a Klout score x and a Kred score y, respectively, and report the percentile score for Tweet Rank. Figs. 6(a)∼6(b) show the impact of following and retweet- ing9 actions on Klout, Kred, and Retweet Rank influence scores, where every data point is the average across the same group. We can see from Fig. 6(a) that the Klout influence score is not affected by the number of followers, while both Kred and Retweet Rank influence scores increase as the number of followers increases. This indicates that a social botnet can easily boost the Kred and Retweet Rank influence scores of its mem- bers by purposely following each other. Moreover, we can see from Fig. 6(b) that all three types of influence scores increase as the number that a user is retweeted increases. On the one hand, this makes much sense, as the higher the frequency in which a user is retweeted, the higher influence of that user has in its local neighborhood. On the other hand, this also renders the influence score measurement system vulnerable to 7. http://kred.com/rules 8. http://www.retweetrank.com/view/about 9. Mentioning action has similar result with retweeting [1]. We omitted here due to space constraints. 8 (a) Klout Scores (b) Kred and Retweet Rank Scores (a) Klout Scores (b) Kred and Retweet Rank Scores Fig. 4. Manipulation by social botnets with different audience sizes. Fig. 5. Manipulation by acting on different number of tweets. social bots would yield the same result as 100 incoming actions from a single social bot. To verify which of the two conjectures is correct, we build three social botnets with 1, 10, and 100 bots, respectively. For each social botnet, we set 10 target users and retweet 100 tweets of each target each day for seven days. In other words, each bot in the three social botnets retweets 100, 10, and 1 times per day, respectively. Fig 4 shows the digital-influence scores of the 30 targets. As we can see, the audience size has no impact on both Kred and Retweet Rank scores but has large impact on the Klout scores. Specifically, the larger the audience size, the higher the Klout scores, and vice versa. Moreover, the Klout scores experience a sharp increase in the first day and then increase much slower in the following days. As a result, a single social bot can manipulate a target user's Kred and Retweet Rank scores with a large number of actions, while both large audience sizes and significant actions are necessary to obtain high Klout scores. We also conclude that Klout is more resilient to the social botnet than Kred and Retweet Rank are. 4.2.3 Impact of Tweet Popularity From the first set of experiments, we can see that the retweeting is the most effective way to manipulate a target user's digital- influence score. Given the same audience, the attacker can either retweet a single tweet of the target user to make this tweet very popular or retweet many of target user tweets so that each tweet will be less popular. We would like to answer which strategy will yield higher digital-influence score, i.e., whether tweet popularity has any impact on the digital- influence scores? To answer this question, we build a social botnet with 100 bots. We then select two groups with each containing 10 target users for manipulation. For the first group, each target first publishes a tweet, which is then retweeted by all the 100 social bots; while for the second group, each target user publishes 100 tweets, each of which is retweeted by one social bot. We repeat this process daily and measure the digital-influence scores of the 20 targets. As we can see from Fig 5, the tweet popularity has no impact on both Klout and Kred scores and limited impact on the Retweet Rank score. In particular, adopting the second strategy will lead to a slightly higher Retweet Rank score of the target user. 4.2.4 Speed of Digital-influence Manipulation Our last experiment targets evaluating how fast influence scores can be manipulated. Same with the last set of experi- ments, we choose the retweeting as the action due to its effec- tiveness. For this purpose, we randomly select another three (a) Impact of following (b) Impact of retweeting Fig. 6. Manipulating digital influence by following and retweeting. social botnets, as colluding social bots can fake arbitrarily high retweeting frequency for any target user. We can also see from Figs. 6(a) and 6(b) that none of our experiments has been able to escalate a user's influence score to an extremely high value, and we conjecture that there are two reasons for such difficulty. First, the audience size is limited, as we only have 1,000 social bots for experiment. We will show in the next set of experiments that the audience size has a large impact on the digital-influence scores. Second, it is likely that all the vendors have set up rules such that it is extremely difficult to achieve almost full digital-influence scores [39]–[41]. Nevertheless, at the end of the experiments, Table 1 shows that all the digital-influence scores being manipulated have exceeded the 90-th percentile. 4.2.2 Impact of Different Audience Sizes In this set of experiments, we measure the impact of different audience sizes on digital-influence scores. Recall that we define a user u's audiences as the set of users who have retweeted, mentioned, or followed u. We then try to answer the following questions. First, for two users with different audience sizes but the same numbers of actions, will the one with more audiences have a higher digital-influence score than the other? Second, it there an upper limit for a single social bot to manipulate the influence score of a target user? There could be two alternative answers to each of the two questions. On the one hand, if the digital-influence scores are related to both the number of incoming actions and the audience size, a single user should have limited power to manipulate the target user's influence score, and we thus need a large social botnet to manipulate the target user's influence score to some extremely high value. On the other hand, if the digital-influence scores may not relate to the audience size, then 100 incoming actions from 100 different Number of retweetings0100200300400500600700Scores00.10.20.30.40.50.60.70.80.91100 social bots10 social bots1 social botNumber of retweetings0100200300400500600700Scores00.10.20.30.40.50.60.70.80.91100 bots, Retweet Rank10 bots, Retweet Rank1 bot, Retweet Rank100 bots, Kred10 bots, Kred1 bot, Kred010020030040050060070000.10.20.30.40.50.60.70.80.91Number of retweetingsScores 100 tweetsSingle tweetNumber of retweetings0100200300400500600700Scores00.10.20.30.40.50.60.70.80.911 tweet, Retweet Rank100 tweets, Retweet Rank1 tweet, Kred100 tweets, Kred020040060080000.20.40.60.81The number of followersScores retweetrankKredKlout010002000300040005000600000.20.40.60.81The number of retweetingsScores retweetrankKredKlout 9 user's outgoing interactions, as it is difficult for bots to attract incoming interactions from legitimate users. 5 DEFENSES In this section, we propose two countermeasures for the two attacks above, respectively. 5.1 Defense against Botnet-based Spam Distribution Recall that in social botnet-based spam distribution, the at- tacker exploits retweeting trees to distribute spams (i.e., tweets with malicious URLs) such that only the bots on the first M (e.g., M = 1 in Twitter currently) levels of retweeting trees will be suspended. To defend against this attack, we propose to track each user's history of participating in spam distribution and sus- pend a user if his accumulated suspicious behaviors exceed some threshold. Specifically, for each user v we maintain a spam score sv, which is updated every time user v retweets a spam. Once sv exceeds a predefined threshold, user v is labeled as a spammer and suspended. We now discuss how sv is updated. Our intuition is that the closer the user to the spam source, the more likely he is a member of the social botnet. The reason is that social botnet usually prefers shorter retweeting path for fast spam dissemination, while a spam tweet traversing a long retweeting path, i.e., sequentially retweeted by many accounts, incurs large delay and gives more time for Twitter to detect them. To reflect this idea, whenever a user retweets a spam, we update his spam score as sv = sv + γd , (2) where d is the number of retweeting hops between the spam source to v, and γ ≤ 1 is the attenuation factor of distance. Note that d = 0 if user v is the source of a spam. In this way, any user who has retweeted spams is punished by having his spam score increased. Once a user's spam score exceeds certain predetermined threshold, the user is suspended. Note that Twitter currently suspends a user whenever he has published one spam tweet. To mimic the current Twitter policy, we can set the threshold as one. 5.1.1 Evaluation Similar to Section 3.3, we built a Twitter subnet composed of 6000 legitimate users and 400 social bots. Each social bot has Fi legitimate followers, where Fi is drawn from Gaussian distribution with µ = 32 and δ2 = 5, and each social bot follows all other social bots. We assume that the attacker builds the optimal retweeting tree according to Section 3.2.4. We adopt similar parameters as in Section 3.3 by setting M = 3, α = 0.2, c = 10, and K = 10. To model the spam campaign, we conduct the experiment in multiple rounds. In each round, we randomly select one social bot to publish a spam tweet and other social bots that have not been suspended to retweet the spam tweet according to the retweeting forest. We assume that the legitimate users retweet the spam occasionally with probability β. At the end of each round, we update the spam scores for each bot and legitimate user according to Eq. (2). If sv ≥ 1 for some user v, we remove v from the simulated network. We then start the next round by randomly selecting a bot as the new source and continue the spam distribution. To reduce the randomness, (a) 80-th Percentile (b) 90-th Percentile Fig. 7. Under different retweeting speeds, the number of days needed to manipulate digital influence scores from nothing into 80-th and 90-th percentiles. (a) True Positive rate (b) False Positive rate Fig. 8. The true and false positive rates with different γs. different groups of social bots, each containing 10 target bots. Every bot in the first, second, and third groups is retweeted 10, 100, and 1,000 times every day by random bots until the scores reach the 90th percentile, which corresponds to 50, 656, and 90 in Klout, Kred, and Retweet Rank, respectively. Fig. 7 further shows the impact of retweeting frequency on the change of influence scores, where every data point represents the average across the same bot group. In particular, we can see that the number of days needed to increase the group average influence score from the initial value to 80-th or 90-th percentile is approximately inversely proportional to the retweeting frequency. In addition, we can see that for all three vendors, it is possible by retweeting 1000 times per day to reach the 80-th percentile and the 90-th percentile with only one and two days, respectively. 4.2.5 Remarks We have two remarks to make. First, at the end of the experiments, no account was sus- pended by Twitter, as none of the accounts had conducted illegitimate activities such as spamming and aggressively fol- lowing and unfollowing which could trigger suspension by Twitter. In addition, both the spam distribution and the digital influence manipulation attacks show that social botnet has significant advantage over isolated bots. In particular, even though the attacker can disseminate spams to the same le- gitimate recipients using isolated bots, those isolated bots will be quickly suspended under Twitter's current policy or its variation and thus incurs significant cost for the attacker. Moreover, it is extremely difficult for the attacker to boost a single bot's digital influence score solely by letting the target bot tweet or retweet other legitimate users' tweets, as long as the digital influence score is not entirely determined by 101102103100101102The number of retweetings per dayThe number of days used KredKloutretweetrank101102103100101102The number of retweetings per dayThe number of days used KredKloutretweetrankRound0246810True Positive Rate00.20.40.60.81.=0.9.=0.8.=0.7.=0.6.=0.5Round0246810False Positive Rate#10-400.20.40.60.811.21.4.=0.9.=0.8.=0.7.=0.6.=0.5 10 (a) True positive rate (Recall) (b) False positive rate (c) Precision (d) Overall performance Fig. 9. Performance Comparison. we repeat each experiment 100 times and report the average results. We evaluate the proposed defense in comparison with three other baseline defenses as follows. • Defense I. The original defense that suspends the users in the first M levels from the spam source, which is considered by the attacker to launch the optimal spam distribution as discussed in Section 3.2. • Defense II. Any user who retweets δ spams is sus- pended, regardless of its distance to the spam source, where δ is a system parameter. • Defense III. Assume that user v has retweeted a spam tweet t within M hops from the source and that t has been retweeted by nt users in total. The spam score for v is updated as sv = sv + 1/ log(1 + nt) . Defense III extends Defense I and II by taking the popularity of individual spam tweet into account. The intuition is that the more users retweet a spam tweet, the more deceiving the spam tweet, and the less likely that any individual user who retweets it is a bot. We also use the system parameter δ as the suspending threshold for this defense scheme. • Defense IV. The proposed defense. We use four metrics to compare the proposed defense with the three baseline defenses. Let Nbots and Nlegit be the numbers of social bots and legitimate users, respectively. Also let Sbots and Slegit be the numbers of suspended social bots and legitimate users, respectively. We define the following four metrics. • • True positive rate (TPR): the ratio of the suspended bots over the total bots, which can be computed as Sbots/Nbots. This metric is also referred to as recall. False positive rate (FPR): the ratio of suspended legit- imate users over all the legitimate users, which can be computed as Slegit/Nlegit. • Precision: the ratio of suspended bots over all sus- pended users, which can be computed as Sbots/(Slegit + Sbots). • Overall performance: TPR − P · FPR where P is the penalty parameter for FPR. and incurs severer consequences than a social bot evading detection. Fig. 8 shows the true positive and false positive rates with different γs which are the attenuation factors of distance. As we can see, the proposed defense could quickly detect all the social bots when γ is large. Specifically, when γ = 0.9, all the social bots can be detected and suspended in the second round. Moreover, as expected, the ratio of true suspension at the same round will decrease as γ decreases. Finally, there is an anticipated tradeoff between false and true positive rates for different γs. The larger γ, the higher true positive rate but also the higher false positive rate, and vice versa. In the following experiments, we set γ = 0.7 by default. Fig. 9 compares the proposed defense with the three base- lines under different βs, i.e., the probability of a legitimate user retweeting a spam tweet. We can make five observations here. First, Fig. 9(a) shows that β has no impact on the TPR, but Fig. 9(b) shows that the larger β, the higher FPR for all four defenses, which is consistent with the definition of β. Second, Fig. 9(a) shows that Defense II has the highest TPR = 100% in every round. The reason is that when δ = 1.0 all the social bots will be suspended after the first round. Defense IV has the second highest TPR and needs about five rounds to approach 100%. Defense I and III both have lower TPR because they only examine the users in the first M = 3 levels instead of the whole network. Third, Fig. 9(b) shows that the FPR of the proposed defense is lower than those of Defenses I and II but slightly higher than that of Defense III. This is because Defense I and II have much less restrict conditions for suspending users than Defense IV. Fourth, Fig. 9(c) shows that Defenses IV and III have the precision close to 100% after the first and sixth rounds, respectively, as they both incur low false positives and sufficiently high true positives. Defense III has 0% of precision before the sixth round because it did not suspend any social bot in the first five rounds. In contrast, both Defense I and II have relatively low precision because they misclassified many normal users as bots. Finally, Fig. 9(d) shows that the proposed defense has better overall performance than all three baselines with penalty factor P varying from 10 to 10000. The reason is that Defense IV has much lower FPR than Defense I and II and higher TPR than Defense III. In summary, the proposed defense outperforms all three baselines as it can effectively detect social bots while being friendly to legitimate users. We adopted overall performance here because FPR has much larger impact than TPR from the service provider's point of view, as suspending a legitimate user damages its reputation 5.2 Defense against Digital-influence Manipulation As discussed in Section 4, all the digital-influence software vendors consider the number of actions and/or the audience 0246810Round00.20.40.60.81True Positive RateDefense II, -=0.01Defense II, -=0.1Defense IV, -=0.01Defense IV, -=0.1Defense I, -=0.01Defense I, -=0.1Defense III, -=0.01Defense III, -=0.10246810Round10-5100False Positive RateDefense II, -=0.1Defense II, -=0.01Defense I, -=0.1Defense I, -=0.01Defense IV, -=0.1Defense IV, -=0.01Defense III, -=0.1Defense III, -=0.010246810Round00.20.40.60.81PrecisionDefense IV, -=0.1Defense III, -=0.1Defense I, -=0.1Defense II, -=0.1101001000100000.00.20.40.60.81.0Overall PerformanceP Defense I Defense II Defense III Defense IV 11 (a) Top-10-percent accuracy (b) Social-bot influence ranking (a) Top-10-percent accuracy (b) Social-bot influence ranking Fig. 10. The performance under the random attack. Fig. 11. The performance under the seed-targeting attack. Four action networks for evaluation, where 'F' and 'I' refer to following and TABLE 2 interaction, respectively. Area Tucson (TS) Philadelphia (PI) Chicago (CI) Los Angeles (LA) #Users 28,161 144,033 318,632 300,148 #F-edges 830,926 5,462,013 14,737,526 18,333,774 #I-edges (#Weights) 162,333 (669,006) 1,434,375 (4,972,689) 3,631,469 (12,010,986) 4,391,542 (14,048,838) size as the major factors in evaluating a user's digital-influence, which makes them vulnerable to the social botnet. To address this vulnerability, we propose a new digital-influence measure- ment scheme inspired by [45]. The key idea is to find sufficient credible users and only use the actions from them to compute digital-influence scores for other users. Specifically, given a social network with user set V and all the actions (including following, retweeting, mentioning, and replying) among the users, we first find a subset V ∗ ⊆ V of users that are credible. We then define the digital-influence score of each user v based on the actions from the credible user set V ∗. Specifically, assume that user v has received aj actions from each user j ∈ V ∗. The digital influence score for v is then given by as (cid:88) j∈V ∗ score(v) = where f (aj) = (cid:40) aj 1 + λ · exp(− 1 aj f (aj) if aj = 0, 1, else, ) (3) (4) and λ is a system parameter that represents the maximum impact of actions from a single user on one's score. In practice, we can set λ = 1 such that a single user could contribute the score by at most 2. It is easy to see that the above score definition takes both the number of actions and the audience size into account, which captures the key ideas behind Klout, Kred, Retweet Rank scores as well our findings in Section 4.2. The challenge is then how to find the credible user set V ∗. To tackle this challenge, we observe that although the actions among the social bots and from the social bots to the legiti- mate users are unpredictable, legitimate users usually carefully choose whom to interact, so there are much fewer actions from legitimate users to social bots. Based on this observation, we first find a small number of trusted users, which could either be the verified users maintained by Twitter or manually verified. We then assign each trusted user some initial credits and distribute the credits along the action edges in multiple rounds. In each round, every user with credits keeps one unit of credit for himself and distributes the remaining credits to his neighbors along the action edges. The credit distribution process terminates when no user has extra credits to distribute. Since legitimate users are more likely to receive credits than social bots during the process, every user who has received at least one unit of credit is considered credible. More specifically, we first construct an action graph for credit distribution. Given the user set V and all their actions during the period T , we build a weighted and directed action graph G = (V, E), where each user corresponds to a vertex in V , and there is an arc eij from user i to user j an edge with the weight wij if user i has retweeted, replied, or mentioned user j for wij times during the period T . We do not consider the following action because it has been reported that normal users could carelessly follow back whoever has followed them [14], [15]. We then design a credit distribution scheme on G = (V, E), which consists of seeds selection, initial credit assignment, iterative credit distribution, and termination. To initiate credit distribution, we first select a seed set S from V which are trusted users such as the verified users maintained by Twitter or manually verified, and partition the whole graph into a tree of multiple levels, in which the seed users occupy the first level, their one-hop outgoing neighbors occupy the second level, and so on. A node is assigned to the highest level if its incoming neighbors appear at different levels. We then assign each seed s with the amount of credits proportional to the sum s∈S wo(s), where Ctotal is the total amount of initial credits, and wo(s) is the sum of weights of the seed s's all outgoing edges. We then distribute the credit from the seed users along the tree level by level. Specifically, if a user v at the nth level has c(v) units of credit, he holds one unit of credit for himself and distributes the remaining c(v) − 1 units of credit to its outgoing neighbors at the (n + 1)th level, where the amount of credits received by neighbor v(cid:48) is proportional to the edge weight evv(cid:48). In other u∈O(v)wvu units of credits. The credits could only be distributed from one level to the immediate higher level and are rounded to the closest integer. The credit distribution terminates if none of the nodes has any extra credit to distribute to its outgoing neighbors. of weights of its outgoing edges, i.e., wo(s)Ctotal/(cid:80) words, neighbor v(cid:48) receives wvv(cid:48)(c(v) − 1)/(cid:80) The choice of Ctotal represents the tradeoff between true and false positive rates. On the one hand, with a larger Ctotal, we could discover more credible users and compute digital-influence scores for more legitimate users at the cost of more social bots obtaining credits and being labelled as credible users. On the other hand, a smaller Ctotal will result in fewer credible users being discovered as well as fewer social bots being labelled as credible users. As in [46], we set Ctotal = O((cid:112)V ) to strike a good balance between true and Attack strength#10-5246810Accuracy (%)5060708090100PICITSLAAttack strength#10-5246810Social-bot Ranking (Percentile)020406080100KredTSPICILAAttack strength#10-5246810Accuracy (%)5060708090100PICITSLAAttack strength#10-5246810Social-bot Ranking (Percentile)020406080100KredCIPITSLA false positive rates. The idea is that at the end of credit distribu- tion, approximately Ctotal users will each hold one unit of credit and be labelled as credible. If we set Ctotal = O((cid:112)V ) and the interaction graph is well-connected, with high probability there exists at least one arc from some credible users to each of the V users while the credit distribution will terminate in O(log V ) levels with decreasing credits per arc such that each attack arc from legitimate users to social bots is expected to receive only O(1) of credits [46]. 5.2.1 Evaluation We follow the approach taken by [47]–[49] to evaluate the performance of the digital-influence measurement scheme. Specifically, we first use the Twitter geo-search API [50] to collect the users in a specific metropolitan area and then crawl the latest 600 tweets of each user to extract the interactions such as retweets, replies, and mentions. We create four datasets from the four representative area in U.S. as shown in Table 2. For each dataset, we build one ground-truth network com- posed of both legitimate users and social botnets. Specifically, we first build one legitimate action subgraph from the interac- tions among the legitimate users in the that area, where each vertex corresponds with one legitimate user, and an edge from one user to another corresponds to interaction from the former to the latter. We further create a completely-connected social botnet with the same number of social bots as the legitimate users. We then construct a ground-truth network by connecting the legitimate action subgraph and the social botnet with a number of attack edges from legitimate action subgraph to the social botnet. Here we assume that there is no edge from the social botnet to the legitimate action subgraph, which is clearly in favor of the social bots, as the social bots would only lose credits through such edges. The attack edges are constructed in the following way. Assuming that there are total g edges in the legitimate action subgraph, we create ωg attack edges with unit weight, where ω is the ratio representing attack strength. As in [49], we vary the ω from 10−5 to 10−4 of the total edges in each legitimate subgraph. We use ground-truth networks to conduct the credit distribution and find the credible user subset V ∗. As in [48], we consider two types of attacks. In the random attack, we randomly choose ωg legitimate users and connect each of them to one randomly chosen social bot with an attack edge. In this case, the attacker is unaware of which users are seed. In the seed-targeting attack, we create ωg attack edges between the social botnet and ωg users randomly chosen from 100ωg legitimate users with shortest distances to the seeds. This type of attack mimics the case that the attacker tries to acquire positions close to the seed users to gain more credits during credit distribution. For both attacks, we assume that the social botnet can arbitrarily distribute received credits internally. For example, suppose that the social botnet receives Cbots credits after the credit distribution, they distribute these credits to Cbots social bots each with one credit, such that all Cbots bots become credible users. We evaluate the performance of the proposed digital- influence measurement scheme using the following metrics. • Top-K-percent accuracy. Let U1 be the list of legitimate users ranked by their total numbers of incoming inter- actions. Also let U2 be the list of legitimate users ranked by their digital influence scores obtained by applying the proposed digital-influence measurement scheme to 12 (a) Random Attack (b) Seed-targeting Attack Fig. 12. The impact of K on the top-K-percent accuracy. U1(K) the ground-truth network. Further let U1(K) and U2(K) be the top-K-percent users in U1 and U2, respectively. U1(K)∩U2(K) The top-K-percent accuracy is defined as . The more accurate of the proposed scheme, the higher the ratio of common users in these two top-K lists, and vice versa. Social-bot influence ranking. Let bot b be the bot with the highest digital influence score output by the proposed digital-influence measurement scheme. Social-bot influ- ence ranking is defined as b's rank in percentile in U1. The lower the bot's percentile, the higher resilience to the social botnet, and vice versa. • Fig. 10 and Fig. 11 show the top-10-percent accuracy and the social-bot influence ranking under two types of attacks with attack strength varying from 10−5 to 10−4. In general, we see similar trend in all scenarios for all the four datasets, meaning that the results are consistent across different datasets. Moreover, in all cases, the accuracy is always larger than 70%, meaning that the proposed digital-influence measure- ment scheme can discover 70% of top-10% influential users under the social botnet attack. We can also see in Fig. 10(a) and Fig. 11(a) that the the accuracy is insensitive to the change of attack strength. The reason is that the top influential users attract actions from many legitimate users, who have higher chances to acquire the credits and become credible users in the presence of attack edges. In contrast, as shown in in Fig. 10(b) and Fig. 11(b), the social-bot influence ranking increases as the attack strength increases under both types of attacks. This is expected, because as attack strength increases, more social bots will acquire credits to become credible users and affect target bots' influence scores. We can also see from Figs. 10(b) and 11(b) that the social-bot influence ranking is below top 40% and top 20% under the random attack and seed-targeting attack, respectively. Fig. 10(b) and Fig. 11(b) also compare the proposed defense with the existing influence measurement vendor Kred.10 As we can see, the bot's influence score could always rank at the first position because we assumed that there are infinite actions between any two bots in the botnet. In contrast, the proposed scheme could effectively defend against the manipulation from social botnets. Fig. 12 shows the impact of K on the top-K-percent accu- racy, which generally increases until to 100% when K increases from 10 to 100. Overall, the accuracy is higher than 70% in the 10. we choose Kred because only Kred has publish its influence score model on http://kred.com/rules. TopK (%)020406080100Accuracy (%)707580859095100LACIPITSTopK (%)020406080100Accuracy (%)707580859095100LACIPITS figures, and K = 10 in previous experiments is representative among the worst cases. In summary, experiment results show that the proposed digital-influence measurement scheme is resilient to the social botnet attack. 6 RELATED WORK In this section, we discuss the prior work tightly related to our work in this paper. The social botnet has received attention only recently. Fer- rara et al. summarized the research on social bots in [2]. Boshmaf et al. showed that a social botnet is very effective in connecting to many random or targeted Facebook users (i.e., large-scale infiltration) [4]. The work in [6], [28] shows how the spammers become smarter to embed themselves into Twitter. Messias et al. used two sicalbots to manipulate the Klout and Twitalyzer scores by following and tweeting actions [27]. Our preliminary work [1] was independently done from [27] and shows how social bots could cooperate to manipulate the influence scores of Klout, Kred, and Retweet Rank. There is a rich literature on spam detection in OSNs. The first line of work such as [12], [25], [31]–[36], [51], [52] considers independent spam bots and comes up with different methods to characterize and detect them. For example, Song et al. found that the distance between the sender and receiver of a message is larger for spammers than legitimate users [33]. Zhang et al. found that automated spammers usually show some temporal pattern which can be used for detection [35]. Another features and the corresponding machine learning effort can be found in [12], [25], [31], [32], [34], [36], [51], [52]. Some of these results such as [33] have been incorporated into our design constraints in § 3.2.2. The second line of work such as [7]–[9], [14], [15], [24] focuses on characterizing and detecting organized spam cam- paigns launched by an army of spam bots. We discover a new method for effective spam campaign in this paper, and whether the results in [7]–[9], [14], [15], [24] can be directly or adapted to detect our method is certainly challenging and worthy of further investigation. Moreover, spam bots are evolving towards more intelligence. Yang et al. found that instead of separate communities, spam bots embedded themselves into the network by building small-world-like networks between them and also maintaining tight links with external legitimate users [14]. Meanwhile, Ghosh et al. discovered the similarly rich connections between spam bots and the legitimate users [15]. Our work is consistent with this trending and explore the new attacks by using the spam bots' growing intelligence. There are effective solutions such as [46]–[48], [53]–[55] to detecting Sybil accounts in distributed systems under the control of a single attacker. These solutions commonly assume that the link between two accounts corresponds to a real social relationship difficult to establish and impossible to forge. Moreover, all of these system assume that the connection is undirected. In this paper, we designed the defense scheme for directed and weighted Twitter network by using the similar observation that the amount of interactions from a legitimate user to a social bot is usually far less than that in the reverse direction in § 5.2. We also found that using the interaction network yields better defense performance than the following networks. Although § 5.2 has illustrate an example by using the trustworthiness of interactions to defend against the specific 13 digital-influence manipulation attack, we can use the same observation but different methods to identify the social botnets and then eliminate them from the microblogging system. Also related is the research on computing the digital influ- ence score [17], [18], [56]. For example, Cha et al., compared three influence ranking lists in Twitter by counting the num- ber of retweets, mentions and followers and found that the influenced defined by the number of followers is very different with the other two metrics [17]. Bakshy et al. [56] proposed to measure user influence based on his ability to post the tweets that generates a cascade of retweets. This line of research does not consider the impact of the social botnet. 7 CONCLUSION In this paper, we firmly validated the efficacy and merits of botnet-based spam distribution and digital-influence manip- ulation on Twitter through thorough experiments and trace- driven simulations. We also propose the countermeasures cor- responding to these two attacks and demonstrate their effec- tiveness. REFERENCES [1] J. Zhang, R. Zhang, Y. Zhang, and G. Yan, "On the impact of social botnets for spam distribution and digital-influence manipulation," in CNS'13, Washington D.C., Oct. 2013, pp. 46–54. [2] E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, "The rise of social bots," Communications of the ACM, 2015, in press. [3] E. Ferrara, "Manipulation and abuse on social media," SIGWEB Newsl., no. Spring, pp. 4:1–4:9, Apr. 2015. [4] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "The social- bot network: when bots socialize for fame and money," in ACSAC'11, Orlando, FL, Dec. 2011, pp. 93–102. [5] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks," in WWW'09, Madrid, Spain, Apr. 2009, pp. 551–560. [6] C. Freitas, F. Benevenuto, S. Ghosh, and A. Veloso, "Reverse engineer- ing socialbot infiltration strategies in twitter," in ASONAM'15, Paris, France, 2015, pp. 25–32. [7] H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Zhao, "Detecting and characterizing social spam campaigns," in IMC'10, Melbourne, Australia, Nov. 2010, pp. 35–47. [8] C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: the under- ground on 140 characters or less," in CCS'10, Chicago, IL, Oct. 2010. [9] K. Thomas, C. Grier, V. Paxson, and D. Song, "Suspended accounts in retrospect:an analysis of twitter spam," in IMC'11, Berlin, Germany, Nov. 2011, pp. 243–258. [10] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, A. Flammini, and F. Menczer, "Detecting and tracking political abuse in social media," in ICWSM'11, Barcelona, Spain, July 2011, pp. 297–304. [11] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, S. Patil, A. Flam- mini, and F. Menczer, "Truthy: mapping the spread of astroturf in microblog streams," in WWW'11, Hyderabad, India, Mar. 2011. [12] A. H. Wang, "Don't follow me - spam detection in twitter," in SECRYPT'10, Athens, Greece, Jul. 2010, pp. 142–151. [13] S. Ghosh, G. Korlam, and N. Ganguly, "Spammers' networks within online social networks: a case-study on twitter," in WWW'11, Hyder- abad, India, Mar. 2011, pp. 41–42. [14] C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu, "Analyzing spammers' social networks for fun and profit – a case study of cyber criminal ecosystem on twitter," in WWW'12, Lyon, France, Apr. 2012. [15] S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, K. Gautam, F. Ben- evenuto, N. Ganguly, and K. Gummadi, "Understanding and com- bating link farming in the twitter social network," in WWW'12, Lyon, France, Apr. 2012, pp. 61–70. [16] "The twitter rules," https://support.twitter.com/articles/18311-the- twitter-rules. [17] M. Cha, H. Haddadi, F. Benevenuto, and K. Gummadi, "Measuring user influence in twitter: The million follower fallacy," in ICWSM'10, Washington, D.C., May 2010, pp. 10–17. [18] J. Weng, E.-P. Lim, J. Jiang, and Q. He, "TwitterRank: finding topic- sensitive influential twitterers," in WSDM'10, New York, NY, Feb. 2010, pp. 261–270. [55] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: a near- optimal social network defense against sybil attacks," IEEE/ACM Transactions on Networking, vol. 18, pp. 885–898, June 2010. [56] E. Bakshy, J. Hofman, W. Mason, and D. Watts, "Everyone's an influencer: quantifying influence on twitter," in WSDM'11, Hong Kong, China, Feb. 2011, pp. 65–74. 14 [19] S. Williams, "Chevy gives 3-day sonic drives to those with big klout," http://adage.com/article/news/chevy-tests-sonics-high- klout-scores/231220/, Nov. 2011. [20] "Klout perks: A healthy two years," http://corp.klout.com/blog/ 2012/06/klout-perks-a-healthy-two-years/. [21] A. Knapp, "A high klout score can lead to better customer service," http://www.forbes.com/sites/alexknapp/2012/06/12/a- high-klout-score-can-lead-to-better-customer-service/, Jun. 2012. [22] V. Hernandez, "Measuring influence online: A q&a with klout's ceo," http://www.cnn.com/2012/02/23/tech/social-media/klout- joe-fernandez/index.html?hpt=hp bn6, Feb. 2012. [23] "Oauth open authentication system," http://oauth.net/. [24] Z. Chu, I. Widjaja, and H. Wang, "Detecting social spam campaigns on twitter," in ACNS'12, Singapore, June 2012, pp. 455–472. [25] K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, "Design and evaluation of a real-time url spam filtering service," in IEEE S&P'11, Okland, CA, May 2011, pp. 447–462. [26] R. Mac, "Twitter acquires web security firm dasient," http://www.forbes.com/sites/ryanmac/2012/01/24/twitter- acquires-web-security-firm-dasient/, Jan. 2012. [27] J. Messias, L. Schmidt, R. Oliveira, and F. Benevenuto, "You followed my bot! transforming robots into influential users in twitter," First Monday, vol. 18, no. 7, Nov. 2013. [28] C. Yang, J. Zhang, and G. Gu, "A taste of tweets: Reverse engineering twitter spammers," in ACSAC'14, New Orleans, LA, Dec. 2014. [29] Z. Coburn and G. Marra, "Realboy: Believable twitter bots," http://ca.olin.edu/2008/realboy/index.html, 2008. [30] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter, a social network or a news media?" in WWW'10, Raleigh, NC, 2010. [31] K. Lee, J. Caverlee, and S. Webb, "Uncovering social spammers: social honeypots + machine learning," in SIGIR'10, Geneva, Switzerland, Dec. 2010, pp. 435–442. [32] G. Stringhini, C. Kruegel, and G. Vigna, "Detecting spammers on social networks," in ACSAC'10, Austin, TX, 2010, pp. 1–9. [33] J. Song, S. Lee, and J. Kim, "Spam filtering in twitter using sender- receiver relationship," in RAID'11, Menlo Park, CA, Sep. 2011. [34] C. Yang, R. Harkreader, and G. Gu, "Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers," in RAID'11, Menlo Park, CA, Sep. 2011, pp. 318–337. [35] C. Zhang and V. Paxson, "Detecting and analyzing automated activity on twitter," in PAM'11, Atlanta, GA, Mar. 2011, pp. 102–111. [36] H. Gao et al., "Towards online spam filtering in social networks," in NDSS'12, San Diego, CA, Feb. 2012, pp. 1–16. [37] F. Chierichetti, R. Kumar, and A. Tomkins, "Max-cover in map- reduce," in WWW'10, Raleigh, NC, Apr. 2010, pp. 231–240. [38] B. Solis, "The rise of digital influence," Altimeter Group, Research Report, Mar. 2012. [39] "Klout," http://klout.com/. [40] "Kred," http://kred.com/. [41] "Retweet rank," http://www.retweetrank.com/. [42] "Peerindex," http://www.peerindex.com/. [43] "Twitter grader," http://twitter.grader.com/. [44] "Twitalyzer," http://twitalyzer.com/. [45] Z. Gyongyi, H. Garcia-Molina, and J. Pedersen, "Combating web spam with trustrank," in VLDB'04, Toronto, Canada, 2004. [46] N. Tran, M. Bonan, J. Li, and L. Subramanian, "Sybil-resilient online content voting," in NSDI'09, Boston, MA, Apr. 2009, pp. 15–28. [47] H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "SybilGuard: defending against sybil attacks via social networks," in SIGCOMM'06, Pisa, Italy, Sep. 2006, pp. 267–278. [48] Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection of fake accounts in large scale social online services," in NSDI'12, San Jose, CA, Apr. 2012, pp. 1–15. [49] J. Zhang, R. Zhang, J. Sun, Y. Zhang, and C. Zhang, "TrueTop: A sybil-resilient system for user influence measurement on twitter," IEEE/ACM Transactions on Networking, vol. PP, no. 99, pp. 1–1, 2015. [50] "REST API v1.1 resources," https://dev.twitter.com/docs/api/1.1/, 2013, twitter. [51] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, "Detecting spammers on twitter," in CEAS'10, Redmond, WA, Jul. 2010. [52] S. Lee and J. Kim, "WARNINGBIRD: Detecting suspicious urls in twitter stream," in NDSS'12, San Diego, CA, Feb. 2012, pp. 1–13. [53] B. Viswanath, M. Mondal, A. Clement, P. Druschel, K. Gummadi, A. Mislove, and A. Post, "Exploring the design space of social network-based sybil defenses," in COMSNETS'12, Bangalore, India, Jan. 2012, pp. 1–8. [54] B. Viswanath, A. Post, K. Gummadi, and A. Mislove, "An analysis of social network-based sybil defenses," in SIGCOMM'10, New Delhi, India, Aug. 2010, pp. 363–374.
1902.04506
1
1902
2019-02-12T17:15:17
RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter
[ "cs.SI", "cs.AI", "cs.CR", "cs.CY" ]
Within OSNs, many of our supposedly online friends may instead be fake accounts called social bots, part of large groups that purposely re-share targeted content. Here, we study retweeting behaviors on Twitter, with the ultimate goal of detecting retweeting social bots. We collect a dataset of 10M retweets. We design a novel visualization that we leverage to highlight benign and malicious patterns of retweeting activity. In this way, we uncover a 'normal' retweeting pattern that is peculiar of human-operated accounts, and 3 suspicious patterns related to bot activities. Then, we propose a bot detection technique that stems from the previous exploration of retweeting behaviors. Our technique, called Retweet-Buster (RTbust), leverages unsupervised feature extraction and clustering. An LSTM autoencoder converts the retweet time series into compact and informative latent feature vectors, which are then clustered with a hierarchical density-based algorithm. Accounts belonging to large clusters characterized by malicious retweeting patterns are labeled as bots. RTbust obtains excellent detection results, with F1 = 0.87, whereas competitors achieve F1 < 0.76. Finally, we apply RTbust to a large dataset of retweets, uncovering 2 previously unknown active botnets with hundreds of accounts.
cs.SI
cs
RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter Michele Mazza IIT-CNR, Italy [email protected] Stefano Cresci∗ IIT-CNR, Italy [email protected] Marco Avvenuti University of Pisa, Italy [email protected] Walter Quattrociocchi Ca' Foscari University of Venice, Italy [email protected] Maurizio Tesconi IIT-CNR, Italy [email protected] 9 1 0 2 b e F 2 1 ] I S . s c [ 1 v 6 0 5 4 0 . 2 0 9 1 : v i X r a ABSTRACT Within OSNs, many of our supposedly online friends may instead be fake accounts called social bots, part of large groups that purposely re-share targeted content. Here, we study retweeting behaviors on Twitter, with the ultimate goal of detecting retweeting social bots. We collect a dataset of 10M retweets. We design a novel visualiza- tion that we leverage to highlight benign and malicious patterns of retweeting activity. In this way, we uncover a "normal" retweet- ing pattern that is peculiar of human-operated accounts, and 3 suspicious patterns related to bot activities. Then, we propose a bot detection technique that stems from the previous exploration of retweeting behaviors. Our technique, called Retweet-Buster (RTbust), leverages unsupervised feature extraction and cluster- ing. An LSTM autoencoder converts the retweet time series into compact and informative latent feature vectors, which are then clustered with a hierarchical density-based algorithm. Accounts belonging to large clusters characterized by malicious retweeting patterns are labeled as bots. RTbust obtains excellent detection results, with F1 = 0.87, whereas competitors achieve F1 ≤ 0.76. Finally, we apply RTbust to a large dataset of retweets, uncovering 2 previously unknown active botnets with hundreds of accounts. KEYWORDS Social bots, retweet patterns, OSN security, Twitter ACM Reference Format: Michele Mazza, Stefano Cresci, Marco Avvenuti, Walter Quattrociocchi, and Maurizio Tesconi. 2019. RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter. In Proceedings of ACM Web Science Conference 2019 (WebSci 2019). ACM, New York, NY, USA, 10 pages. 1 INTRODUCTION In 2016 the Oxford dictionary elected "Post-Truth" as the word of the year and in 2017 Collins dictionary did the same for "Fake News". In 2017 the World Economic Forum raised a warning on the ∗This is the corresponding author. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM. potential distortion effect of social media on user perceptions of reality1. Recent studies, targeting Facebook, showed the tendency of the users to interact with information adhering to their preferred narrative [3, 14] and to ignore dissenting information [49]. Confir- mation bias seems to account for user decisions about consuming and spreading content and at the same time, aggregation of favored information within those communities reinforces selective expo- sure and group polarization [39, 43]. As we interact with our peers, we are exposed to the effects of echo chambers, which may result in polarization and hate speech [15]. In this scenario the role of bots is not clear, both for the difficulties in quantifying their impact as well as for the accuracy of detection algorithms. However, any of our supposedly online friends may instead be fake, automated accounts (social bots), and a part of large coordinated groups that purposely (re-)share targeted content [17]. Along this challenge, in this work we propose a new method for the detection of groups of bots, ac- counting for their statistical traces induced by their coordinated behavior on Twitter. Specifically, we focus on re-sharing (i.e., retweeting) patterns with the ultimate goal of detecting retweeting social bots. Indeed, by artificially boosting retweet counts, these bots may affect users' popularity or influence, thus "reshaping political debates [4, 41]. They can defraud businesses and ruin reputations"2. Moreover, large retweet counts indicate influential users, and can be monetized. Thus, there are strong economic and sociopolitical incentives for malicious bots to tamper with retweets [19, 42]. Hence, fast and accurate removal of these bots might be crucial for ensuring the healthiness of our online social ecosystems. Both researchers and OSN administrators have recently been very active towards the detection of social bots, and many different techniques have been proposed to this end. Unfortunately, the same also applies to malicious bot developers. In fact, as soon as new detection techniques are deployed, bot developers tweak the charac- teristics of their accounts, thus allowing them to evade detection [9]. This "never-ending clash" led to the current situation where so- cial bots are so sophisticatedly engineered as to mimic legitimate accounts, becoming almost indistinguishable from them [44]. A straightforward consequence of this situation is that standard ma- chine learning classification approaches, where each account is analyzed individually, are no longer profitable. Instead, the scien- tific frontier of bot detection now focuses on groups of suspicious accounts as a whole. Analyzing groups has the advantage that, 1http://reports.weforum.org/global-risks-2017/acknowledgements/ 2https://www.nytimes.com/interactive/2018/01/27/technology/social-media-bots.html WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA M. Mazza et al. no matter how sophisticated a single bot can be, a large enough group of them will still leave traces of automation, since they do share a common goal (e.g., increasing someone's popularity) [9]. For the same reasons, unsupervised approaches are preferred over supervised ones [47]. The possibility to exploit more data for the analysis, opened up by the approaches that target groups rather than individual ac- counts, is however counterbalanced by the difficulties in collecting and processing that much data. For instance, the behavior-based technique described in [8, 10] requires collecting and comparing data of the Twitter timelines of all analyzed accounts. Similarly, graph-based techniques such as [27, 48] require building and ana- lyzing the social graph of a large group of accounts. The amount of data and computational power needed to complete these analyses, inevitably limits the large-scale applicability of these techniques. In short, the next generation of bot detection techniques should strike the balance between accuracy and data/algorithmic efficiency. Contributions. We propose a novel technique for the detection of retweeting social bots, called Retweet-Buster (RTbust), hav- ing all the desirable features previously discussed. Our technique only requires the timestamps of retweets (and of the retweeted tweets) for each analyzed account, thus avoiding the need for full user timelines or social graphs. Then, it compares the temporal patterns of retweeting activity of large groups of users. Leveraging previous findings in the field, RTbust looks for groups of accounts with distinctive and synchronized patterns. Evaluation results on a large dataset of retweets demonstrate excellent bot detection per- formances, with F1 = 0.87, whereas competitors achieve F1 ≤ 0.76. Summarizing, our detailed contributions are as follows. • We analyze retweeting behaviors of a large set of users by introducing a simple -- yet effective -- visualization, which we then leverage to highlight benign and malicious patterns of retweeting activity. • We design a group-analysis technique that is capable of detecting accounts having the same retweeting patterns. Ac- counts belonging to a large group characterized by the same malicious patterns are labeled as bots. • We compare detection results of our technique with those obtained by baselines and other state-of-the-art techniques, demonstrating the effectiveness of our approach. • By applying our technique to a large dataset of retweets, we uncover 2 previously unknown active botnets. 2 RELATED WORK IN BOT DETECTION The vast majority of previous attempts at bot detection are based on supervised machine learning [9]. The first challenge in developing a supervised detector is related to the availability of a ground truth (i.e., labeled) dataset, to be used in the learning phase of the classifier. In most cases, a real ground truth is lacking and the labels are simply given by human operators that manually analyze the data. Critical issues arise since there is no "standard" definition of what a social bot is [35, 47]. Moreover, humans have been proven to largely fail at spotting sophisticated bots, with only ≃ 24% bots correctly labeled as such [9]. As anticipated, these criticalities support the development of unsupervised techniques. Regarding features to exploit for the detection, 3 classes have been mainly considered: (i) profile features [13, 29, 46]; (ii) features extracted from the posts, such as posting behavior and content of posted messages [6, 31, 37]; and (iii) features derived from the social or interaction graph of the accounts [27, 28, 32, 48]. The classes of features exploited by the detection technique have a strong impact on both the performances of the detector as well as its efficiency [7]. For instance, in Twitter it has been demonstrated that those features that mostly contribute towards the predictive power of bot detectors (e.g., measures of centrality in the social graph), are also the most costly ones. The difficulties in detecting sophisticated bots with supervised approaches that are based on the analysis of individual accounts, recently gave rise to a new research trend that aims to analyze groups of accounts as a whole [9]. This new approach to bot de- tection is proving particularly effective at detecting coordinated and synchronized bots, such as those targeted in our work. For instance, the technique discussed in [8, 10] associates each account to a sequence of characters that encodes its behavioral information. Such sequences are then compared between one another to find anomalous similarities among sequences of a subgroup of accounts. The similarity is computed by measuring the longest common sub- sequence shared by all the accounts of the group. Accounts that share a suspiciously long subsequence are then labeled as bots. In- stead, the family of systems described in [27, 32, 33] build a bipartite graph of accounts and their interactions with content (e.g., retweets to some other tweets) or with other accounts (e.g., becoming fol- lowers of other accounts). Then, they aim to detect anomalously dense blocks in the graph, which might be representative of coor- dinated and synchronized attacks. A possible drawback of group approaches is that they exacerbate challenges related to data and algorithmic costs, since they typically involve a large number of comparisons between all accounts in a given group [10, 45]. Lastly, a trailblazing direction of research involves the applica- tion of adversarial machine learning to bot detection. Until now, bot detection has mostly followed a reactive schema, where coun- termeasures are taken only after having witnessed evidence of bot mischiefs [44]. Instead, in [44] is proposed an adversarial framework enabling proactive analyses. The framework has been later instanti- ated in [11] by using evolutionary algorithms to test current detec- tion techniques against a wider range of unseen, sophisticated bots. Another preliminary work in adversarial bot detection is described in [22]. Among the positive outcomes of adversarial approaches to bot detection, is a more rapid understanding of the drawbacks of current detectors and the opportunity to gain insights into new features for achieving more robust and more reliable detectors. 3 DATA COLLECTION AND ANNOTATION Our dataset for this study is composed of all Italian retweets shared in a 2 weeks time span -- specifically, between 17 and 30 June, 2018 (inclusive). Overall, our dataset comprises 9,989,819 retweets, shared by 1,446,250 distinct users. Thus, on average, each user in our dataset retweeted 7 times per day, in line with recent statistics reporting between 2 and 50 daily retweets for legitimate users [18]. However, our dataset also includes many "extreme" users, as visible in Figure 1 showing the distribution of retweets per day per user, RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA Figure 1: Daily retweets per user. Figure 2: Total retweets per tweet. Figure 3: Hourly volume of retweets across the 2 considered weeks. which features a typical heavy-tailed shape. The 9,989,819 retweets are related to 1,691,865 distinct original tweets, which are also included in the dataset. Figure 2 shows the distribution of retweets per original tweet, while Figure 3 shows the hourly volume of retweets across the 2 considered weeks. For each tweet, retweet, and user in our dataset we have access to all Twitter metadata fields, as provided by Twitter APIs. To collect this dataset, we resorted to Twitter Premium Search API3 with the following query parameters4: lang:IT and is:retweet. Here, the exploitation of the Premium Search API is important since it allowed us to build a complete dataset of retweets. In fact, the Standard Search API5 used in the majority of previous works, does not guarantee completeness, meaning that not all tweets matching the query criteria are returned. Notably, although our dataset for this study is limited to tweets in the Italian language, both the data collection approach and the analytical process described in the remainder of the paper, are totally language independent. The language of collected tweets can be easily changed with the lang: parameter, and our analyses only exploit timestamps. After data collection, we performed data filtering and annotation. A manual inspection of those users exhibiting the largest number of retweets per day quickly revealed their automated nature. However, it turned out that all such accounts, despite being bots, were not malicious ones. Their automated nature was manifest, they did not try to disguise as human-operated accounts, and they were not acting coordinatedly nor trying to inflate the popularity of some specific content. The presence of this kind of bots is well known [20]. They do not pose a threat to OSNs and, in fact, some of them are even benign [2, 40]. Thus, we excluded such accounts from future analyses, since they are not the target of our work. Similarly, we also excluded accounts featuring a very small number of retweets. Operationally, we set our filtering thresholds by leveraging statistics in [18] -- that is, we retained only those users with a mean number of retweets per day ≥ 2 and ≤ 50. In this way, we ended up with 63,762 distinct users exhibiting human-like retweeting behaviors. The goal of our next analyses is to tell apart the sophisticated human-like bots from the real human-operated accounts. Although our detection technique is unsupervised and hence it does not require a labeled ground truth, we nonetheless carried out manual annotation of a small subset of our dataset. This is useful 3https://developer.twitter.com/en/docs/tweets/search/api-reference/premium-search.html 4https://developer.twitter.com/en/docs/tweets/search/overview/premium#AvailableOperators 5https://developer.twitter.com/en/docs/tweets/search/api-reference/get-search-tweets.html in order to evaluate the extent to which our technique is capable of correctly spotting the bots. We thus annotated ≃ 1, 000 accounts from our dataset, following the latest annotation guidelines for datasets containing social bots [9]. We ended up with an almost balanced annotated dataset, comprising 51% bots and 49% legitimate (i.e., human-operated) accounts. 4 PATTERNS OF RETWEETING ACTIVITY Here, we investigate the temporal dynamics of retweeting activity of all the 63,762 accounts in our dataset. By also leveraging class labels of the annotated accounts, we aim at highlighting retweeting behaviors that are indicative of normal versus suspicious activity. To ease the exploration of a user's retweeting activity, we pro- pose a compact -- yet informative -- scatterplot visualization called ReTweet-Tweet (RTT). Given a user and the list of all his retweets, RTT plots the timestamp of each retweet (x axis) against the times- tamp of the corresponding original tweet (y axis). By the definition of RTT, points laying in different areas of the plot imply different retweeting behaviors. Figure 4a shows the semantics of this visu- alization, by means of a visual explanation of the most common behaviors caught by the RTT plot. In detail, no point can ever ap- pear above the main diagonal of the plot, since that would break causality (i.e., it would correspond to a retweet that anticipates the original tweet, which is clearly impossible). Points laying near to the main diagonal represent retweets occurring rapidly after the publication time of the original tweet. Conversely, points that lay far from the diagonal imply a large temporal distance between a tweet and its retweet (i.e., retweets of very old tweets), which is an uncommon behavior. Normal behaviors -- droplet pattern. Figure 4b shows the typical RTT plot of a "normal", legitimate user. As shown, the vast majority of points concentrates slightly below the main diagonal. This is the expected behavior on the past-paced Twitter OSN, since retweets typically occur with short delay (e.g., between 1 and 10 minutes) from the original tweets [21]. Occasionally, legitimate users retweet a sequence of tweets with increasing delays. In RTT plots, this retweeting behavior creates a few vertically-stacked points that we refer to as droplets. We found this pattern to be frequent among legitimate users. In fact, the droplet pattern occurs each time a user retweets a Twitter feed (e.g., search results) or a user timeline. Since feeds and timelines are rendered -- both in the Web application and via APIs -- in reverse chronological order, 10010110210310410510610-1100101102103retweets per dayusers100101102103104105106100101102103104105retweetstweets020406017 Jun18192021222324252627282930 Juntimeretweets/hour (thousands) WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA M. Mazza et al. (a) Semantics of RTT plots. (b) Droplet pattern. (c) Straight line pattern. (d) Triangular pattern. (e) Waterfall pattern. (f) An extreme waterfall pattern. Figure 4: RTT plots depicting a normal tweeting behavior (blue colored) and many suspicious ones (red colored). The insets of RTT plots show the empirical probability density function (PDF) and a rug plot of retweet delays. retweeting a sequence of such tweets results in increasing retweet delays, just because tweets retweeted last are actually the oldest ones. Apart from these observations, no other clear pattern emerges in the RTT plot of Figure 4b. The possible presence of distinctive patterns in RTT plots is particularly relevant since it implies some form of regularity in a user's retweeting activity. In turn, striking regularities are typically caused by automated actions -- that is, they are representative of bot behaviors, as previous literature already highlighted [6, 10, 32]. Suspicious behaviors -- straight line pattern. The RTT plot in Figure 4c shows different retweeting behaviors. Almost all points in the plot are laying precisely above the main diagonal, meaning that the user almost always retweets in a matter of a few seconds from the original tweets. The user's activity is also clearly split into different sessions, separated by small gaps denoting inactivity. Suspicious behaviors -- triangular pattern. Figure 4d shows yet another suspicious pattern. This time the activity sessions are very regular, with always roughly the same length and the same inac- tivity time that separates subsequent sessions. Moreover, sessions seem to create a peculiar triangular pattern below the diagonal of the RTT plot. This means that, within a given session, the user retweets past tweets only up to a fixed point in time that roughly corresponds to the starting time of the session. Suspicious behaviors -- waterfall pattern. Finally, Figure 4e shows the behavior of a user whose retweets go way back in time. In figure, this is represented by points forming solid vertical lines. These lines are significantly longer than those representing droplets in Figure 4b and are probably caused by systematic retweeting of a Twitter feed or timeline in reverse chronological order. Since many vertical lines are present in the RTT plots showing this retweeting behavior, we call this a waterfall pattern. Apart from the vertical lines, mild signs of retweeting sessions are also visible in the plot. Although the presence of the waterfall pattern shown in Figure 4e is already indicative of automated behaviors, for some users this behavior is truly extreme, as shown in Figure 4f. As highlighted by the previous analyses, the RTT plot is useful for studying the retweeting behavior of a given user. It is a valuable tool per se, that can empower human analysts for getting insights into the behaviors of Twitter accounts. Moving forward, in the next section we build on the results of these analyses by designing a fully automatic technique for spotting malicious retweeting bots. 5 INTRODUCING RETWEET-BUSTER As highlighted in the previous sections, unsupervised group-based approaches currently represent the most promising research di- rection for social bot detection [9, 47]. Thus, in this section we propose an unsupervised technique that leverages the temporal distribution of the retweets of large groups of users, in order to detect malicious retweeting bots. Since we aim to design an unsu- pervised technique, we can not simply learn a detector for spotting the suspicious patterns identified in Section 4. Instead, our goal is to develop a technique that is capable of spotting such suspi- cious patterns, as well as possible other patterns that might exist in a dataset describing temporal retweeting activities. In other words, the technique should be able to automatically identify meaningful patterns from the data, rather than be able to recognize only those patterns that we manually labeled as suspicious. RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA ri,0 ri,1 · · · 0 0 Ri = 3 0 4 0 6 9 · · · · · · ri,n 20 3 -3 4 -1 6 9 · · · 20 Figure 6: Excerpt of a retweet time series compressed with RLE. Observations affected by RLE are orange-colored. series by compressing the many consecutive zeros that represent no retweeting activity. Since we only need to compress zeros, we do not need to use the typical RLE <value, length> tuples. In fact, just the length will suffice. We have however to make a distinction between RLE lengths and the t(x) − tREF observations that repre- sent retweets. Since by definition, ri, j observations that represent retweets are always positive, one straightforward way to make such distinction is to substitute consecutive zeros with the opposite of RLE lengths. Figure 6 graphically summarizes this data preparation and compression step. As a result of this step, we have one single compact time series for each user. Furthermore, such time series efficiently encodes multiple information, such as inactivity periods as well as tweets and retweets timestamps. Unsupervised feature extraction. So far, we obtained a com- pact representation of the temporal retweeting behaviors of our users. Now, we need to turn this representation into a limited num- ber of highly-informative features. Specifically, we have 3 goals for this step: (i) obtain features for a subsequent machine learning task (i.e., density-based clustering) in an unsupervised way; (ii) obtain fixed-length feature vectors, whereas user time series have variable length; (iii) maximize the amount of information in our features, while minimizing the number of features. Basically, all our goals can be achieved with a well thought out application of dimensionality reduction techniques to our run- length-encoded time series. Specifically, we take a feature projec- tion approach, where we aim to transform our compressed time series into lower-dimensional feature vectors. Feature projection can be achieved via a large number of different techniques. Here, we propose a solution based on variational autoencoders, a particular type of deep neural networks, because of their favorable charac- teristics [30]. In Section 6 we also show comparisons with other dimensionality reduction and feature projection techniques (e.g., PCA, TICA). Variational autoencoders (VAEs) are an unsupervised learning technique that leverages neural networks for learning a probabilis- tic representation (i.e., learning features) of the input. As shown in Figure 5, a VAE is composed of 2 main modules: an encoder network and a decoder network. The encoder takes the original input and learns a compressed knowledge representation. Dually, the decoder takes the compressed representation and tries to reconstruct the original input at its best. During the (unsupervised) training phase of the network, the encoder learns to create a meaningful and infor- mative compressed representation of the input, so that the decoder can accurately reconstruct it. Notably, if the input dimensions are largely independent of one another, the compression performed by Figure 5: Main logical components of RTbust. Thus, building on these considerations, we propose a retweeting bot detection technique, called Retweet-Buster (RTbust), based on automatic unsupervised feature extraction. Then, in order to implement a group-analysis technique, such automatically-learned features are passed to a density-based clustering algorithm. The rationale for clustering stems from previous research in human and bot behaviors, in that humans have been proven to exhibit much more behavioral heterogeneity than automated accounts [6, 12]. As a consequence, we expect that the heterogeneous humans will not be sufficiently "dense" to be clustered. In fact, they will act pretty much like a background noise in the features space. Conversely, groups of coordinated and synchronized bots will be organized in much denser groups in the features space, thus resulting in nice density-based clusters. In detail, our proposed RTbust technique is organized in 3 main steps, as also shown in Figure 5: (i) time series data preparation and compression; (ii) unsupervised feature extraction; and (iii) user clustering. Data preparation and compression. Let tREF be a reference timestamp set at the start of the analysis time window. In our case tREF corresponds to 17 June, 2018 at 00:00:00. Then, t(x) denotes the publication timestamp of tweet ID = x. The raw data exploited to carry out bot detection with RTbust is the same used in the RTT plots of Section 4, that is tweet and retweet timestamps. In RTbust such timestamps are organized as a retweet time series Ri = {ri,0, ri,1, . . . , ri,n} for each user ui, where, (cid:40)t(x) − tREF ri, j = 0 if ui retweeted tweet ID = x at time tj if ui did not retweet at time tj The temporal granularity of our time series is that of seconds, which is the same granularity as Twitter timestamps. That is, we have one ri, j observation per second per user. Hence, our time series have a very fine temporal grain. However, overall they are very sparse because users retweet, on average, only once in a few minutes. At this step, we want to maximize the informativeness of our time series, while minimizing the amount of data to store and pro- cess. To beat this trade off, we employ a modified version of the run-length encoding (RLE) compression scheme. RLE is a simple and widely-used lossless sequence compression scheme that en- codes consecutive equal data values with one single <value, length> tuple. In our case, we use RLE to reduce the sparsity in our time WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA M. Mazza et al. the encoder results in a loss of valuable information and the sub- sequent reconstruction becomes a very difficult task. However, if some sort of structure (i.e., patterns) exists in the input data, such as the peculiar patterns that we uncovered in Section 4, that structure can be learned by the encoder and consequently leveraged when converting the input into its compressed representation. In other words, this encoding learns latent features of the input data, which is precisely what we require from this unsupervised feature extrac- tion step. Because deep neural networks are capable of learning nonlinear relationships, this encoding can be thought of as a more powerful generalization of PCA [36]. In our work, the decoder is only used for training the VAE, since we are not really interested in reconstructing our time series. Instead, once trained, the encoder becomes our unsupervised feature extractor. The dimension of the latent feature vector generated by the encoder is a parameter of the VAE, with which we extensively experiment in the next section. The lower the dimension, the more compressed is the representation of the input. However, a low-dimensional representation mitigates possible issues during the subsequent clustering step, caused by the curse of dimensionality [16]. Regarding the deep learning architecture used for implementing the VAE, we relied on a long short-term memory (LSTM) network. LSTMs are well-known and widely used recurrent neural networks. Because of their memory states, they are well-suited for performing tasks on time series, which are often characterized by temporal correlations and by lags of unknown duration between relevant events [24]. Specifically, LSTMs have been proven very accurate at extracting patterns in input space, where input data spans over long sequences. Furthermore, they are also suitable for dealing with sequences of variable length, such as our time series, while still being able to produce fixed-lengths data representations. User clustering. Now that our users are represented by their latent feature vectors computed by the LSTM encoder, we can apply density-based clustering in order to check for common retweet- ing behaviors. If large clusters of users are found, then we might have detected a coordinated and synchronized group of accounts, possibly constituting a retweeting botnet. We base our clustering step on a recent efficient algorithm that combines density- and hierarchical-based clustering: HDBSCAN [5]. Among the advan- tages of this algorithm is its effectiveness in finding clusters with variable degrees of density, a much desirable feature when dealing with noisy real-world data. In addition, HDBSCAN also proved about twice as fast as its predecessor DBSCAN. Regarding algo- rithm parameters, HDBSCAN removed the need to specify a global density threshold (the ϵ parameter in DBSCAN) by employing an optimization strategy for finding the best cluster stability [5]. The only mandatory parameter to set is the minimum cardinality of the clusters found by HDBSCAN. We experiment with this parameter in the next section. Concluding, after running our density-based clusering step, we label as bots all those accounts that end up clus- tered. Conversely, we label as legitimate all those account that are treated as noise (i.e., that are not clustered) by HDBSCAN. 6 EXPERIMENTS AND RESULTS Here we present results obtained while searching for the best set of parameters of RTbust, as well as overall bot detection results. feature RT users entropy RT days entropy RT rate daily mean RTs RT days 1 2 3 4 5 the distribution of description Shannon entropy of retweeted users Shannon entropy of the distribution of the publication days of retweeted tweets number of retweets per time unit daily mean of the number of retweets number of distinct days during which the user retweeted at least once minimum of the inter-retweet times mean of the inter-retweet times standard deviation of the inter-retweet times minimum IRT mean IRT stdev IRT minimum RT delay minimum of the retweet delays 6 7 8 9 10 mean RT delay 11 stdev RT delay 12 RT sessions Table 1: List of handcrafted features computed for each user. mean of the retweet delays standard deviation of the retweet delays number of detected retweeting sessions Evaluation methodology. In all the experiments described in this section we analyze all 63,762 accounts of our dataset. Then, we evaluate the effectiveness of different techniques, possibly executed with different configurations of parameters, in correctly classifying the ≃ 1, 000 annotated accounts. Thus, the bot detection task is framed as a binary classification task, with the 2 classes being: bot (positive class) and human (negative class). For presenting evalu- ation results we rely on 5 standard, well-known metrics used for evaluating binary machine learning classifiers, specifically: pre- cision, recall, accuracy, F1-Score (F1), and Matthews correlation coefficient (MCC) [38]. Comparisons. While evaluating the bot detection results of RT- bust, we also perform extensive comparisons with other baselines and state-of-the-art techniques for social bot detection. In Section 5 we grounded the unsupervised feature extraction step of RTbust on a variational autoencoder. However, a number of other techniques could be used to achieve the same goal. Thus, for the sake of experimentation we implemented 2 more versions of RTbust that are based respectively on principal component analysis (PCA) and time independent component analysis (TICA) for feature extraction [26]. PCA is a well-known linear statistical technique for dimensionality reduction. By choosing an appropriate number of principal components found by PCA, it is possible to greatly reduce the dimensionality of a problem, while minimizing the loss of information. Similarly, TICA is another dimensionality reduction technique that is particularly suitable for dealing with time series. While PCA finds high-variance linear combinations of the input dimensions, TICA aims to find high-autocorrelation linear combinations. Thus, when using PCA and TICA for feature extraction, the features resulting from PCA are likely to convey different information with respect to those obtained from TICA. As typically done for many machine learning tasks, we also experiment with a small set of handcrafted features. These features take into account characteristics of the retweet time series of the users (e.g., inter-retweet times, retweeting delays and sessions), as well as other characteristics not available from retweet time series, but that might still contribute to bot detection (e.g., the distribution RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA of clusters, all 3 implementations show the same qualitative behav- ior. When considering a very limited number of features, HDBSCAN finds a large number of clusters. Increasing the number of features results in fewer clusters, up to a point (size of latent feature vector = 10) where the number of clusters stops decreasing. Regarding bot detection performance, Figure 7 shows a very different behavior between the VAE implementation of RTbust, with respect to the PCA and TICA ones. Features extracted by PCA and TICA seem to provide significantly less information for bot detection with re- spect to those extracted by the VAE, as demonstrated by a lower F1. Moreover, increasing the number of considered PCA and TICA features seems of no help, since the F1 remains almost the same for each latent feature vector size. Instead, the VAE implementation shows a behavior that is consistent with the results obtained for the number of clusters. The F1 rapidly increases when considering a larger number of features, up to a point (size of latent feature vector = 8) where it reaches and maintains its maximum (apart from a few fluctuations). Overall, these results demonstrate that the VAE is much more powerful than PCA and TICA for the unsupervised fea- ture extraction from our retweet time series. Furthermore, as little as 8 VAE features seem to be enough for stabilizing the clustering and achieving good bot detection results. We repeated this experiment by also varying the minimum clus- ter cardinality (i.e., the only HDBSCAN parameter). We omit de- tailed results due to space limitations, however we report finding the best results with clusters larger than 10 accounts, a threshold that is both intuitive (i.e., it is not very meaningful to look for minuscule botnets) and operationally effective. Quantitative evaluation of bot detection. Next, we present detailed bot detection results for all the considered techniques. For the VAE, PCA and TICA implementations of RTbust, we use only 8 features, leveraging results of our previous experiment. Table 2 shows retweeter bot detection results. The best detection performances (F1 = 0.87) are achieved by the proposed RTbust technique using the VAE for unsupervised feature extraction. In fact, it beats all other competitors in each evaluation metric, with the only exception of the recall metric. All other implementations of RTbust achieve worse results, with F1 ≤ 0.67. As anticipated, this is a strong point in favor of the VAE for extracting informa- tive features from our retweet time series. The second best overall results are obtained by the Social fingerprinting, achieving an en- couraging F1 = 0.76. Instead, the other state-of-the-art techniques obtain much worse results, with Botometer's F1 = 0.43 and Holo- Scope's F1 = 0.01. Interestingly, the majority of evaluated tech- niques achieve their worst results in the precision metric, meaning that many legitimate accounts are misclassified as bots. This results is in contrast with previous results in bot detection [9]. However, previous works mainly experimented with supervised techniques, while here we mainly explore unsupervised ones. Thus, combined results of our study and previous ones might suggest that super- vised approaches to social bot detection are more prone to type II errors (false negatives), while unsupervised approaches are more prone to type I errors (false positives). In Figure 8, we use t-SNE [34] for plotting our annotated accounts in a bi-dimensional space, where each account is colored according to the RTbust (VAE) cluster it belongs to, and 2 different symbols represent bots and legitimate accounts according to our ground Figure 7: Dependence of clustering stability and bot detec- tion performances on the number of features extracted by PCA, TICA and the VAE. Best results are obtained with the VAE, starting from 8 features (dashed vertical line). of retweeted accounts). Table 1 lists the 12 handcrafted features. Notably, some of them -- such as inter-retweet times -- have been largely used in previous retweeter bot detection systems [25, 45]. In our subsequent experiments, these handcrafted features are tested in RTbust in place of those automatically extracted by PCA, TICA, and the VAE. Regarding comparisons with other state-of-the-art bot detection techniques, we experiment with the supervised version of the Social fingerprinting technique proposed in [8, 10] and with the unsuper- vised HoloScope technique proposed in [32]. Both techniques are designed to detect synchronized and coordinated groups of bots, and have been briefly described in Section 2. In addition, we also experiment with the Botometer system [13]. Botometer is a publicly- available service6 to evaluate the similarity of a Twitter account with the known characteristics of social bots. It leverages an off- the-shelf supervised machine learning classifier that exploits more than 1,000 features of the accounts under investigation. Similarly to the majority of existing systems, Botometer performs account- by-account analyses, rather than group analyses. Finally, as a simple comparison baseline we also try classifying as bots all those accounts whose retweet rate (i.e., retweets per unit of time) is higher than a fixed threshold. We set this threshold as the third quartile of the distribution of retweet rates for our 63,762 accounts. This comparison helps understand if simply looking at the number of retweets is enough for gaining insights into the nature (bot/legitimate) of an account. Parameters configuration. The most important parameter of RTbust is the dimension of the latent feature vectors generated by the VAE. It affects both the quality of the subsequent clustering step, which in turn affects bot detection performances, as well as the time/computation needed to complete it. The same also applies to the number of projected dimensions obtained with PCA or TICA. Thus, we designed an experiment to evaluate the performances of RTbust, implemented with VAE, PCA, and TICA for feature extraction, in relation to the number of considered latent features. Figure 7 shows results for this experiment, in terms of the overall F1 obtained for the classification of bots and humans, and of the to- tal number of clusters found by HDBSCAN. Regarding the number 6https://botometer.iuni.iu.edu 0.000.250.500.751.0005001000150020002500826101418222630343842465054586264size of latent feature vectorF1number of clustersVAEPCATICA WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA M. Mazza et al. technique baseline retweet rate comparisons Botometer [13] HoloScope [32] Social fingerprinting [8, 10] our contributions RTbust (handcrafted features) RTbust (PCA) RTbust (TICA) RTbust (VAE) type -- features precision recall accuracy F 1 MCC evaluation metrics 1 0.3534 0.3585 0.3440 0.3559 −0.3124 supervised unsupervised supervised > 1, 000 -- -- 0.6951 0.2857 0.6562 0.3098 0.0049 0.8978 0.5830 0.4908 0.7114 0.4286 0.2051 0.0096 −0.0410 0.7582 0.4536 unsupervised unsupervised unsupervised unsupervised 12 8 8 8 0.5284 0.5111 0.5228 0.9304 0.7707 0.9512 0.9512 0.8146 0.5364 0.5154 0.5364 0.8755 0.6270 0.6649 0.6747 0.8687 0.0767 0.0446 0.1168 0.7572 Table 2: Retweeter bot detection results of RTbust and comparison with a baseline and other state-of-the-art techniques. Best results in each evaluation metric are shown in bold. Figure 8: Visual exploration of RTbust (VAE) bot detection results, and comparison with t-SNE. (a) Cars botnet. (b) Singer botnet. Figure 9: RTT plots of the 2 botnets discovered with RTbust. truth. Since in RTbust each clustered account is labeled as bot while unclustered ones are labeled as humans, by comparing colors and symbols of the accounts in figure, it is possible to visually assess the quality of bot classification. Furthermore, Figure 8 also allows a comparison between our clustering and that resulting from t-SNE. Regarding bot detection, we can see few clustered legitimate accounts. Similarly, only a minority of bots are grey- colored (i.e., unclustered). Concerning the comparison between t- SNE and RTbust, the 2 algorithms produce rather different clusters. For instance, multiple RTbust clusters collapse in a single t-SNE cluster and vice versa. However, the overall distinction between bots and humans seem to hold for both RTbust and t-SNE. The majority of legitimate accounts are both grey-colored and spread across the central region of Figure 8. In other words, they do not belong to any cluster neither for t-SNE nor for RTbust. Dually, the majority of bots appear as colored and positioned near other bots. Thus, both t-SNE and RTbust seem to recognize bot similarities although organizing the bots differently, despite the very different inner functioning of the 2 techniques. Given the usefulness and widespread application of t-SNE, these similarities support results of RTbust (VAE). Qualitative evaluation of bot detection. Given the good re- sults achieved by RTbust (VAE) at spotting the annotated bots in Figure 10: A subset of accounts from the singer botnet. our dataset, we now analyze also those non-annotated accounts that have been labeled as bots by the same technique. This manual and qualitative validation might serve as an additional evaluation of the outcomes of RTbust. In particular, RTbust found 2 notable clusters of non-annotated accounts. The smallest of such clusters counts 44 accounts. A man- ual inspection of these accounts revealed that they actually belong RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA to a small botnet with some peculiar characteristics. First and fore- most, they almost only retweet 3 accounts (@peugeotitalia, @cit- roenitalia and @motorionline). Thus, this botnet has a specific focus on cars. Moreover, they only post retweets or images, no account of the botnet has a real profile picture, and they are loosely syn- chronized, meaning that they tend to retweet the same tweets but at different moments in time. In order to get further insights into their behavior, we produced a combined RTT visualization of all the accounts of the botnet, as shown in Figure 9a. Each point in figure is a retweet made by one of the botnet's account and colors represent different bots. Interestingly, clear patterns emerge in some portions of the RTT plot, as seen in the inset of Figure 9a. Such patterns testify the synchronized retweeting activity of the botnet. The other notable cluster of bot accounts found by RTbust is composed of almost 300 accounts that almost exclusively retweet 2 accounts (@Valerio_Scanu and @ArmataScanu). Similarly to the previous smaller botnet, also this larger one seems to retweet with a specific focus -- that is, publicizing tweets related to the Italian pop singer Valerio Scanu7. Figure 9b shows the RTT plot of this botnet, which exhibits a mixture of the triangular and waterfall patterns that we described in Section 4. Figure 10 also displays the appearance of the profiles of some of these accounts. As seen, some accounts of the botnet are tightly synchronized, while the botnet as a whole is loosely synchronized. This qualitative evaluation revealed that, not only did RTbust achieve good results on the annotated accounts, but it also allowed to discover 2 previously unknown active retweeting botnets. 7 DISCUSSION Visualizing suspicious behaviors. In this work we provided sev- eral contributions. The first of such contributions is the develop- ment of the RTT visualization. In figures 4 and 9 we showed that RTT plots represent a useful tool for analyzing the retweeting be- havior of an account, or of a group of accounts. Human analysts can gain valuable insights into the behaviors of suspicious accounts by leveraging RTT plots. The possibility to leverage RTT plots might be particularly valuable in future data annotation tasks, consider- ing the current difficulties faced by human annotators in correctly labeling social bots [9]. Another favorable application scenario is related to the banning of bots from OSNs. Indeed, despite the recent advances in machine learning-based detectors, manual verification of accounts to assess their degree of automation is still carried out by OSN administrators [17]. To this end, RTT plots might contribute to speed-up the process and to reduce possible human mistakes. Notably, a few previous works also proposed some simple vi- sualizations with the goal of highlighting suspicious behaviors in OSNs [19, 27, 28]. However, previous visualizations for spotting sus- picious behaviors require much more data than that needed by RTT plots. For example, the visualizations used in [27] are based on the full social graph of considered accounts. Similarly, the visualizations proposed in [19] require building retweet threads/cascades, which in turn require friend/followers information of each retweeter. Con- versely, with RTT plots we can spot suspicious retweeting behaviors with as little information as retweet-tweet timestamps. 7https://en.wikipedia.org/wiki/Valerio_Scanu Generalizability and robustness. Our second, and largest, contribution is the development of the Retweet-Buster (RTbust) bot detection technique. RTbust is an unsupervised technique that is capable of automatically spotting meaningful patterns in retweet data. Because of this feature, RTbust is potentially capable of de- tecting retweeting bots exhibiting a behavior that has not been witnessed before. We believe this to be an important feature, con- sidering that we still lack a "standard" and "well-agreed" definition of what a social bot is [35, 47] -- and consequently, of its expected behaviors [1]. Hence, the capability to spot a broad set of differ- ent behaviors, surely comes in handy. Moreover, it has been now largely demonstrated that social bots do evolve to escape detection techniques [9, 44]. Thus, the generalizability of RTbust and its robustness to evasion is a much desirable feature because it allows us to better withstand the next evolution of social bots. Explainability. Model and decision explainability has now be- come one of the major practical and ethical concerns around AI [23]. To this regard, one of the possible drawbacks of RTbust lies in the difficulty to "explain" the reasons for labeling an account as bot or legitimate. This is largely due to the difficulty in interpreting the latent features used for clustering, which in turn depend on the adoption of the "black-box" variational autoencoder for unsuper- vised feature extraction. This issue is not peculiar of our technique, but it is rather a well-known limitation of all deep learning tech- niques [23]. Here, to mitigate this issue we again propose to resort to RTT plots. As demonstrated in Figure 9, our visualization can be profitably used also after the application of RTbust, with the goal of understanding the characteristics of those accounts that have been labeled as bots. 8 CONCLUSIONS In this work, we investigated patterns of retweeting activity on Twitter, with the specific goal of detecting malicious retweeting bots. To this end, our work provides several contributions. Firstly, we proposed a novel visualization technique called ReTweet- Tweet (RTT). As thoroughly shown, RTT plots are an effective and efficient mean to gain valuable insights into the retweeting behav- iors of Twitter accounts. By leveraging RTT plots we analyzed the "normal" retweeting behavior of legitimate users, and we uncovered 3 suspicious behaviors that are caused by automated retweeting -- and thus, that are representative of bot activities. Furthermore, we discussed how RTT plots can empower human analysts when manually annotating a dataset comprising social bots, as well as OSN administrators looking for evidence of automation when de- ciding about banning accounts from social platforms. Finally, we highlighted that RTT plots can also be used to explain decisions of black-box bot detectors, thus contributing towards explainable and interpretable AI. Next, we designed an unsupervised group-analysis technique, called Retweet-Buster (RTbust), for detecting retweeting social bots. The core of RTbust is an LSTM variational autoencoder that we trained to extract a minimum number of highly informative latent features from the retweet time series of each account. The decision about an account (whether it is bot or legitimate) is based on the outcome of a hierarchical density-based clustering algorithm. In detail, accounts belonging to large clusters are labeled as bots, WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA M. Mazza et al. while unclustered accounts are labeled as legitimate. We compared different implementations of RTbust with baselines and state-of- the-art social bot detection techniques. RTbust outperformed all competitors achieving F1 = 0.87, in contrast with F1 ≤ 0.76 of other techniques. By applying RTbust to a large dataset of retweets, we also discovered 2 previously unknown active botnets comprising hundreds of accounts. For future work we plan to improve the decisions taken by RT- bust. In fact, here we adopted a rather naive solution revolving around accounts being clustered or not. However, we can augment the final decision step of RTbust by considering additional infor- mation, such as the hierarchy of clusters produced by the clustering algorithm and other internal and external clustering validation mea- sures. In this way, we could prune some clusters or some accounts belonging to a cluster, thus improving precision. Similarly, we could expand some clusters by adding borderline accounts, thus possibly also improving recall, which currently is the bottleneck of RTbust. Other than improving RTbust, we also plan to apply it in the wild for discovering and analyzing active botnets. REFERENCES [1] Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Man- sour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Sandy Pentland. 2014. Twitter: who gets caught? observed trends in social micro- blogging spam. In ACM WebSci. [2] Marco Avvenuti, Salvatore Bellomo, Stefano Cresci, Mariantonietta Noemi La Polla, and Maurizio Tesconi. 2017. Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing. In ACM WWW Companion. [3] Alessandro Bessi, Mauro Coletto, George Alexandru Davidescu, Antonio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2015. Science vs conspiracy: Collec- tive narratives in the age of misinformation. PloS one 10, 2 (2015). [4] Alexandre Bovet and Hernán A Makse. 2019. Influence of fake news in Twitter during the 2016 US presidential election. Nature communications 10, 1 (2019). [5] Ricardo JGB Campello, Davoud Moulavi, and Jörg Sander. 2013. Density-based clustering based on hierarchical density estimates. In PAKDD. [6] Nikan Chavoshi, Hossein Hamooni, and Abdullah Mueen. 2016. DeBot: Twitter Bot Detection via Warped Correlation. In IEEE ICDM. [7] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2015. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems 80 (2015). [8] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2016. DNA-inspired online behavioral modeling and its appli- cation to spambot detection. IEEE Intelligent Systems 31, 5 (2016). [9] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The Paradigm-Shift of Social Spambots: Evidence, Theo- ries, and Tools for the Arms Race. In ACM WWW Companion. [10] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2018. Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE TDSC 15, 4 (2018). [11] Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, and Stefano Tognazzi. 2019. On the capability of evolved spambots to evade detection via genetic engineering. Online Social Networks and Media 9 (2019). [12] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. Exploiting digital DNA for the analysis of similarities in Twitter behaviours. In IEEE DSAA. [13] Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. BotOrNot: A System to Evaluate Social Bots. In ACM WWW Companion. [14] Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli, H Eugene Stanley, and Walter Quattrociocchi. 2016. The spreading of misinformation online. PNAS 113, 3 (2016). [15] Michela Del Vicario, Gianna Vivaldo, Alessandro Bessi, Fabiana Zollo, Anto- nio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2016. Echo chambers: Emotional contagion and group polarization on facebook. Scientific reports 6 (2016). [16] Pedro Domingos. 2012. A few useful things to know about machine learning. Commun. ACM 55, 10 (2012). [17] Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016). [18] Syeda Nadia Firdaus, Chen Ding, and Alireza Sadeghian. 2018. Retweet: A popular information diffusion mechanism -- A survey paper. Online Social Networks and Media 6 (2018). [19] Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Christos Faloutsos, and Athena Vakali. 2015. Retweeting activity on twitter: Signs of deception. In PAKDD. [20] Zafar Gilani, Ekaterina Kochmar, and Jon Crowcroft. 2017. Classification of twitter accounts into automated agents and human users. In IEEE/ACM ASONAM. [21] Manuel Gomez-Rodriguez, Krishna P Gummadi, and Bernhard Schoelkopf. 2014. Quantifying Information Overload in Social Media and Its Impact on Social Contagions. In AAAI ICWSM. [22] Christian Grimme, Dennis Assenmacher, and Lena Adam. 2018. Changing Per- spectives: Is It Sufficient to Detect Social Bots?. In SCSM. [23] Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. 2018. A survey of methods for explaining black box models. ACM CSUR 51, 5 (2018). [24] Tian Guo, Zhao Xu, Xin Yao, Haifeng Chen, Karl Aberer, and Koichi Funaya. 2016. Robust online time series prediction with recurrent neural networks. In IEEE DSAA. [25] Sonu Gupta, Ponnurangam Kumaraguru, and Tanmoy Chakraborty. 2019. Mal- ReG: Detecting and Analyzing Malicious Retweeter Groups. In ACM CoDS- COMAD. [26] Carlos X Hernández, Hannah K Wayment-Steele, Mohammad M Sultan, Brooke E Husic, and Vijay S Pande. 2018. Variational encoding of complex dynamics. Physical Review E 97, 6 (2018). [27] Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2016. Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach. ACM TKDD 10, 4 (2016). [28] Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2016. Inferring lockstep behavior from connectivity pattern in large graphs. KAIS 48, 2 (2016). [29] Christian Kater and Robert Jäschke. 2016. You shall not pass: detecting malicious users at registration time. In ACM WebSci Workshops. [30] Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. In [31] Sangho Lee and Jong Kim. 2014. Early filtering of ephemeral malicious accounts on Twitter. Computer Communications 54 (2014). [32] Shenghua Liu, Bryan Hooi, and Christos Faloutsos. 2017. HoloScope: Topology- and-Spike Aware Fraud Detection. In ACM CIKM. [33] Shenghua Liu, Bryan Hooi, and Christos Faloutsos. 2018. A Contrast Metric for Fraud Detection in Rich Graphs. IEEE TKDE (2018). [34] Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research (2008). [35] Gregory Maus. 2017. A Typology of Socialbots (Abbrev.). In ACM WebSci. [36] Qinxue Meng, Daniel Catchpoole, David Skillicom, and Paul J Kennedy. 2017. Relational autoencoder for feature extraction. In IEEE IJCNN. [37] Zachary Miller, Brian Dickinson, William Deitrick, Wei Hu, and Alex Hai Wang. Information 2014. Twitter spammer detection using data stream clustering. Sciences 260 (2014). [38] David Martin Ward Powers. 2011. Evaluation: from Precision, Recall and F- Measure to ROC, informedness, markedness and correlation. International Journal of Machine Learning Technologies 2, 1 (2011). [39] Walter Quattrociocchi. 2017. Inside the echo chamber. Scientific American 316, 4 IEEE ICML. (2017). [40] Saiph Savage, Andres Monroy-Hernandez, and Tobias Höllerer. 2016. Botivist: Calling volunteers to action using online bots. In ACM CSCW. [41] Massimo Stella, Emilio Ferrara, and Manlio De Domenico. 2018. Bots increase exposure to negative and inflammatory content in online social systems. PNAS 115, 49 (2018). [42] L Steward, Ahmer Arif, and Kate Starbird. 2018. Examining Trolls and Polarization with a Retweet Network. In ACM WSDM Workshops. [43] Cass R Sunstein. 2002. The law of group polarization. Journal of political philoso- phy 10, 2 (2002). [44] Stefano Tognazzi, Stefano Cresci, Marinella Petrocchi, and Angelo Spognardi. 2018. From Reaction to Proaction: Unexplored Ways to the Detection of Evolving Spambots. In ACM WWW Companion. [45] Nguyen Vo, Kyumin Lee, Cheng Cao, Thanh Tran, and Hongkyu Choi. 2017. Revealing and detecting malicious retweeter groups. In IEEE/ACM ASONAM. [46] Chao Yang, Robert Harkreader, and Guofei Gu. 2013. Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE TIFS 8, 8 (2013). [47] Kai-Cheng Yang, Onur Varol, Clayton A Davis, Emilio Ferrara, Alessandro Flam- mini, and Filippo Menczer. 2019. Arming the public with AI to counter social bots. Human Behavior and Emerging Technologies (2019). [48] Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y Zhao, and Yafei Dai. 2014. Uncovering social network sybils in the wild. ACM TKDD 8, 1 (2014). [49] Fabiana Zollo, Alessandro Bessi, Michela Del Vicario, Antonio Scala, Guido Caldarelli, Louis Shekhtman, Shlomo Havlin, and Walter Quattrociocchi. 2017. Debunking in a world of tribes. PloS one 12, 7 (2017).
1504.03033
2
1504
2015-10-30T15:06:05
On the stability of the PWP method
[ "cs.SI", "physics.soc-ph" ]
The PWP method was introduced by Diaz in 2009 as a technique for measuring indirect influences in complex networks. It depends on a matrix D, provided by the user, called the matrix of direct influences, and on a positive real parameter which is part of the method itself. We study changes in the method's predictions as D and the parameter vary.
cs.SI
cs
On the stability of the PWP method Rafael D´ıaz and Angelica Vargas Abstract The PWP method was introduced by D´ıaz in 2009 as a technique for measuring indirect influences in complex networks. It depends on a matrix D, provided by the user, called the matrix of direct influences, and on a positive real parameter λ which is part of the method itself. We study changes in the method's predictions as D and λ vary. 1 Introduction One of the main problems in network theory is to define a ranking on the vertices of a network reflecting the importance that each vertex plays in the network. Thus, for the case of weighted directed networks, one is looking for maps wdigraphs −→ rankings on vertices sending a weighted directed graph to a ranking on its set of vertices. Asking for a lin- ear order on vertices is clearly too much since there could be vertices playing equally important roles in the network. A ranking on a set X is a pre-order defined by a map r : X −→ R such that x ≤ y if and only if r(x) ≤ r(y). Clearly, different maps r may give rise to the same pre-order, i.e. to the same ranking. Finding a suitable map as above is not an easy task, and it is probably a problem with no universal solution. A first approach to this problem is via the total degree map G : wdigraphs −→ rankings on vertices which orders vertices according to their total degree, i.e. the sum of weights of edges reaching or leaving a given vertex. With this ordering strongly connected vertices are deemed as having greater importance for the network. We work with networks of influences. As it often happens in mathematics, it is better to leave some terms undefined and let examples tell us the intended meaning. So, allow 1 us to review a few of examples of networks of influences. Author Citation Networks. Vertices in these networks are authors of scientific publications. An author j has exerted an influence on author i, if there is at least one publication of i citing a publication of j. The matrix of direct influences is given by Dij = ♯ publications of i citing a publication of j ♯ publications of i . The PWP method is designed to study indirect influences in networks of this sort. Business Providers Networks. Vertices are businesses in a group or economic sector. A business j influences business i if j provides products (or services) to i. The matrix of direct influences is given by Dij = amount spend by bussines i buying products from bussines j budget of bussines i . International Trade Network. Vertices are countries. A country j exerts an influence on the economy of country i if there is trade between i and j. Thus the network itself is undirected, but the weight on edges do take direction into account. The matrix of direct influences is given by Dij = Ii,j + Ei,j Ci , is the total amount that i imports from j, Ei,j where Ii,j is the total amount that i exports to j, and Ci counts the total amount of international trade of country i (total of imports plus total of exports.) This example have been studied by D´ıaz and G´omez [6]. Process-Matter Networks. In these networks we have two types of vertices: black vertices for processes and white vertices for matter. The network represents a production system consisting of sev- eral processes. Each process takes some materials as input, and produces other materials as output, which may in turn be the inputs of other processes, and so on ... A matter vertex m influences a process vertex p if m is one of the inputs that p needs to operate; 2 Figure 1: A Process-Matter Network. a process vertex p influences a matter vertex m, if m is one of the outputs that p produces. Clearly these type of networks can be use to model a host of phenomena: chemical networks, metabolic networks, business organization systems, etc. The choice of weights for a process-matter network depend on the intended application, but they will always have the form: (cid:18) 0 M P 0 (cid:19) where indices for the first block of columns represent processes, indices in the second block of columns represent materials, the matrix P represents the influences of processes on materials, and the matrix N represents the influences of materials on processes. It is often useful to study influences among processes themselves, and also influences among materials themselves. This can be readily achieved by using, respectively, the product matrices M P and P M. In words, a process p influences a process q if an output of p is used by q as input, and similarly a material m influences a material n is there is at least one process that uses m as input and produces n as output. Figure 1 shows an example of a process-matter network. Figure 2 displays the associated networks of influences among processes them- selves, and among materials themselves. With these examples in mind we go back to our main problem. From the viewpoint of networks of influences, we say that the total degree map G defines a ranking of vertices based on their direct importance. Although of interest, ranking by total direct degree fails to acknowledge that some direct influences may be short lived (if exerted over an isolated vertex) or may be enhanced (if exerted over a highly connected vertex.) Thus 3 2 3 4 5 6 1 5 2 7 8 3 6 9 1 4 10 Figure 2: Left: Associated Processes Network. Right: Associated Matter Network. although G should not be overlooked, it should not be regarded as the unique or final answer. A deeper approach to our problem should take indirect influences into account; how- ever there are many alternative ways for doing so. To proceed forward we look for a map R : wdigraphs −→ rankings on vertices of the form: wdigraphs T−→ wdigraphs R−→ rankings on vertices where the map T transforms a network of direct influences into a network of indirect influences, and L is any ranking method computed from direct influences. To be able to pick a particular map T among the many possibilities some choices must be made. The PWP method for counting indirect influences [5] was founded over the following principles: 1. Indirect influences arise from the concatenation of direct influences. 2. Indirect influences do not arise in any other way. 3. The weight of a concatenation of direct influences is proportional to the product of the weight of the direct influences that it comprehends, suitable modified to be compatible with our next principles. 4. As a rule, the longer a concatenation of direct influences, the lesser the indirect influence exerted by it. 5. Stochastic direct influences should generate stochastic indirect influences. 4 6. Robust convergency properties are expected. 7. The map should be equivariant under to conjugation. The PWP method is defined via the mapping wdigraphs T−→ wdigraphs, which can be described in simpler terms as a map Mn(R) T−→ Mn(R), from real square matrices of size n to itself, since we can identify (simple) weighted di- rected graphs with their adjacency matrices once a linear order has been fixed on their vertices. The map T depends on a real parameter λ > 0, and is given on D ∈ Mn(R) by T(D, λ) = eλD + eλ + = eλD − I eλ − 1 k! . k=1 Dk λk = P∞ P∞ λk k! k=1 The map T satisfies our six requirements. Properties 1, 2, and 3 hold since the entries of matrix Dk count weighted-paths of length k, i.e. concatenations of k direct influences. The dividing factor 1 k! implies property 4. Property 5 justifies the inclusion of the nor- malizing factor eλ k!. Property 7 can be easily verified. +. Property 6 is insured by the factors 1 There is a number of other good choices for the map T, for example: the Katz index [9], the MICMAC of Godet [8], the PageRank of Google [1, 2, 10], the Heat Kernel of Chung [4], and the communicability method of Estrada and Hatano [7]. These well-tested methods fail to satisfy some of the above requirements for the following reasons: • The Katz index (1953) when suitable extended for weighted networks and normal- ized, satisfies most of our requirements; however its convergency properties are not 1 k! are included in the as strong as desired, this is the main reason why the factors PWP method. • MICMAC (70's) considers paths of a fixed length k, thus it fails to satisfy 1. • PageRank (1999) computes indirect influences by first transforming the matrix of direct influences into a Markovian matrix D; in this process influences are created using a mechanism different to concatenation. Thus PageRank fails to satisfy 2. 5 • Heat Kernel (2007) comes pretty close to satisfying our principles. However, it introduces indirect self-influences not coming from the matrix D, thus it fails to satisfy property 2. This is the main reason why the PWP method uses the function ex +, instead of the exponential map ex. • Communicability (2007) corresponds (after normalization) to the λ = 1 case in the heat kernel method; so the same arguments as above apply. Note that in both cases, starting with vanishing direct influences one obtains non-vanishing indirect influences. In contrast, in the absence of direct influences, the PWP method yields vanishing indirect influences, as also does the Katz index. Pre-composing any ranking based on the matrix of direct influences with the PWP map one obtains a new ranking that takes indirect influences into account. We consider three ranking methods: • The ranking by total degree G, which after composition with the PWP map we call ranking by importance. • The ranking by outgoing degree F, which after composition with the PWP map we call ranking by indirect influence. • The ranking by incoming degree E, which after composition with the PWP map we call ranking by indirect dependence. The orderings by incoming, outgoing, and total degrees may be thought, respectively, as maps E, F, G : Mn(R) −→ rankings on [n] where for a matrix D the place of a vertex in the respective orders is proportional to the values of the maps Ei = n Xj=1 Dij, Fi = n Xj=1 Dji, and Gi = n Xj=i (Dij + Dji). Pre-composing these maps with the PWP map we obtain, respectively, maps E, F, I : Mn(R) −→ rankings on [n] where for a matrix of direct influences D the place of a vertex in the respective orders is proportional to the values of the maps Ei = n Xj=1 Tij, Fi = n Xj=1 Tji, and Ii = n Xj=i (Tij + Tji), 6 defined in terms of the PWP matrix of indirect influences T = TD. Since there is only a finite number of rankings on a finite set, the maps E, F and I can be continuous only if they are constant. Our main interest in this work is to study the regions of continuity of these maps, i.e. the regions where they are constant maps. Note that the rankings imposed by E, F and I on the set of vertices depend ultimately on D and λ. We consider continuity with respect to D and λ separately, as they play quite different roles: discontinuity with respect to D is taken as a manifestation of data sensitivity, in itself a positive phenomena, whereas discontinuity with respect to λ is taken as a sign of the care required in the choice of λ in the applications. The main question is whether or not changing λ will let the PWP method to impose a more or less arbitrary ranking among the vertices. Our results, although partial, indicate that the opposite is the case: even if several rankings may result as λ varies, they are seldom arbitrary, and evolve following a rigid pattern. 2 Data Sensitivity of the PWP Method In this section we analyze the continuity of the map I : Mn(R) −→ rankings on [n] obtained from the ordering by total degree after an application of the PWP map T (D, λ). We set λ = 1 and consider discontinuities of the map I with respect to matrix D of direct influences. Note that the matrix D is provided by the user, and we are going to test the sensitivity of the method to small changes in the matrix D. As expected, small changes in D can lead to quite different rankings on [n], stressing the need for a judicious choice of data. Let L6 be the linear graph with 6 nodes, see Figure 4, and let L6(ǫ) be a perturbation of it obtained by adding a new edge of weight ǫ as shown in Figure 3. For ǫ = 0 we recover the graph L6, further studied in Section 3, and as ǫ grows the new edge becomes more relevant and modifies the ranking by importance of the vertices. Constructed numerically, Table 2 shows how the ranking of vertices by importance changes as ǫ varies. Already for ǫ = 0.01 we see that a change occurs, for example, the pairs of vertices {3, 4}, {2, 5} and {1, 6} have the same importance for ǫ = 0, but for ǫ = 0.01 all of them have different importance. Further changes in ranking were located at ǫ = 0.28, 0.69, 2.1, 2.8, 7, and 23.9. Note that the vertex 4 is on the leading position up to ǫ = 2.8, where the vertex 2 becomes the most important one. Note also that 7 1 2 3 4 5 6 2 1 3 6  4 5 Figure 3: Left: Graph L6(ǫ). Right: Graph C6(ǫ). vertex 3 begins at the leading position, and for ǫ ≥ 7 becomes the less important ver- tex. After we reach 23.9 our numerical experiments showed no further changes in ranking. This fairly simple example, already shows the high data sensitivity of the ranking of vertices by importance based on the PWP method. ǫ 0 0.01 0.28 0.69 2.1 2.8 7 23.9 Order by Importance 3, 4 > 2, 5 > 1, 6 4 > 3 > 2 > 5 > 1 > 6 4 > 2 > 3 > 5 > 1 > 6 4 > 2 > 5 > 3 > 1 > 6 4 > 2 > 5 > 1 > 3 > 6 2 > 4 > 5 > 1 > 3 > 6 2 > 4 > 5 > 1 > 6 > 3 2 > 4 > 1 > 5 > 6 > 3 Let us consider a second example, the circuit graph C6(ǫ) with 6 nodes extended by a new edge of weight ǫ as shown in Figure 3. For ǫ = 0 all vertices, as will be shown in Section 4, are equally important. But as soon as ǫ reaches 0.0001 we find the ranking 3, 6 > 1, 2 > 4, 5, which, according to our numerical calculations, remains stable for higher values of ǫ. This example displays both behaviours a highly sensitive one at the beginning, followed by a fairly stable one for higher values of ǫ. We close this section with a remark on the impact that a change of scale, at data-level, have on the applications of the PWP method, i.e. we let our matrix of direct influences D be replaced by a new matrix of direct influences cD, with c ∈ R+. We have that: T (cD, λ) = 1 eλ + ∞ Xk=1 (cD)k λk k! = 1 eλ + ∞ Xk=1 Dk (cλ)k k! = ecλ + eλ + T (D, cλ). 8 As ecλ is a positive real number, it does not affect the rankings by dependence, influence + eλ + or importance. Therefore in the applications of the PWP method rescaling data by a factor amounts to rescaling λ by the same factor, and thus stability with respect to data rescaling is a particular case of stability with respect to changes in λ. 3 Stability on Linear Graphs In this section we begin our study of the stability of the PWP method with respect to changes in the parameter λ > 0. Recall that whereas the matrix of direct influences D comes directly from the user's knowledge and experience, the parameter λ comes from the PWP method itself. So, it is important to have a good control of the dependence of the PWP method on the choice of λ. We consider the linear directed graph Ln with n vertices. Before considering the general case we deal with three simple but illustrative examples, namely, the graphs L2, L3, and L6 shown in Figure 4. 1 2 1 2 3 1 2 3 4 5 6 Figure 4: Linear graphs L2, L3 and L6. For L2, it is easy to check that for all values of λ both vertices 1 and 2 have the same importance given by λ eλ − 1 = ∞ Xn=0 Bn λn n! , where Bn are the Bernoulli numbers [5]. Thus as λ goes to infinity the importance of both vertices goes to zero, meaning that the network becomes less connected, each vertex becomes more isolated, and thus its importance for the network decreases. See Figure 5. Regarding influences, vertex 1 has influence eλ−1 while vertex 2 has influence 0. Thus vertex 1 is always on top of vertex 2 in the order of influences, however as λ goes to infinity both influences tend to be equal to zero. Therefore for the graph L2 the PWP method is fully stable both in importance and in influence. λ 9 0.35 0.30 0.25 0.20 0.15 0.10 0.05 2 0.8 0.7 0.6 0.5 1,3 0.90 2,5 3,4 1,6 0.85 0.80 4 6 8 10 12 14 1.8 2.0 2.2 2.4 3.3 3.4 3.5 3.6 Figure 5: Curves of importance for the graphs L2, L3, and L6. Let us now consider the case of the linear graph L3 with three vertices. Regarding importance, one can show that there is symmetry around the center of mass of the graph, as we will show below happens for all linear graphs Ln. Thus vertices 1 and 3 have the same importance, and therefore we only need to consider vertices 1 and 2. Here something interesting happens, as shown in Figure 5, for small values of λ vertex 2 is the most important, but as λ grows vertex 1 overcomes vertex 2 in importance. The matrix of indirect influences T for L3 is given by: T = 1 eλ +   0 0 0 λ 0 0 λ2 2 λ 0   And thus the importance of vertex 1 and 2 are given, respectively, by: I1(λ) = 2λ + λ2 2eλ + and I2(λ) = 2λ eλ + . I1(λ) < I2(λ) for 0 < λ < 2, and I2(λ) < I1(λ) for 2 < λ. Thus I1(2) = I2(2), Therefore, for the graph L3 the three possible rankings of its vertices by importance, after taking symmetry into account, actually occur, see Figure 5. Influences in turn are fully stable as we have that F1(λ) = λ + λ2 2 eλ + > λ eλ + = F2(λ). Let us consider the graph L6 with six vertices. The matrix of indirect influences is given by eλ +T =   0 λ λ2 2! λ3 3! λ4 4! λ5 5! 0 0 λ λ2 2! λ3 3! λ4 4! 0 0 0 λ λ2 2! λ3 3! 10 0 0 0 0 0 0 0 0 0 0 0 0 λ 0 0 λ2 2! λ 0   By symmetry it is enough to consider the vertices 1, 2 and 3, with importance given by eλ +I1(λ) = λ + λ2 2 + λ3 3! + λ4 4! + λ5 5! , eλ +I2(λ) = 2λ + λ2 2 + λ3 3! + λ4 4! , eλ +I3(λ) = 2λ + 2 λ2 2 + λ3 3! . Figure 5 shows the evolution of I3(λ) as λ varies. For λ small we have the ranking 1 < 2 < 3 in importance. Thus, initially vertex 1 is the less important one, and as λ grows it first overcomes vertex 2 and then overcomes vertex 3 reaching the top position. Later on vertex 2 overcomes vertex 3, the ranking 3 < 2 < 1 is achieved, and it remains stable for large values of λ. Indirect influences in turn are given by eλ +F1(λ) = λ + λ2 2 + λ3 3! + λ4 4! + λ5 5! , eλ +F2(λ) = λ + λ2 2 + λ3 3! + λ4 4! , eλ +F3(λ) = λ + λ2 2 + λ3 3! , and thus the ranking 1 > 2 > 3 is stable for all values of λ. Note however that the three values for importance approach 0 as λ goes to infinity. Thus, although the comparative values change in order, the overall values converge to zero. Next, we consider the linear graph Ln with n vertices. The matrix D of direct influ- ences and the matrix T of indirect influences are given, respectively, by Dij =   1 0 if i = j + 1, otherwise, eλ +Tij =   λi−j (i−j)! if i > j, 0 otherwise. Proposition 1. The importance of the vertex j in the graph Ln is given by eλ +Ij(λ) = j−1 Xi=1 λj−i (j − i)! + n Xi=j+1 λi−j (i − j)! , or equivalently: 1. For j = 1, n, we have that eλ +I1(λ) = eλ +In(λ) = λ + · · · + λn−1 (n−1)! . 2. For 1 < j ≤ n+1 2 , we have that eλ +Ij(λ) = 2λ + 2λ2 2 + · · · + 2 λj−1 (j − 1)! + λj j! + · · · + λn−j (n − j)! , 3. For n+1 2 ≤ j < n, we have that eλ +Ij(λ) = 2λ + · · · + 2 λn−j (n − j)! + λn−j+1 (n − j + 1)! + · · · + λj−1 (j − 1)! . 11 4. The importance Ij(λ) → 0, as λ → ∞. Proof. The first identity follows directly from the definitions. The other three identities follow from the first after specialization and simple changes of variables. Part 4 follows from the previous formulae. Next result gives us the symmetry in importance around the center of mass for the the graphs Ln. Proposition 2. The importance of vertices in the linear graph Ln is invariant under the change j −→ n + 1 − j, i.e. we have for j ∈ [n] that Ij(λ) = In+1−j(λ). Proof. We already know from Proposition 1 that I1(λ) = In(λ). Assume 1 < j ≤ n+1 2 , thus we have that n > n + 1 − j ≥ n+1 2 , and thus Proposition 1 implies that: eλ +In+1−j(λ) = 2λ + · · · + 2λn−(n−j+1) (n − (n − j + 1))! + λn−(n−j+1)+1 (n − (n − j + 1) + 1)! + · · · + λn−j+1−1 (n − j)! = 2λ + · · · + 2λj−1 (j − 1)! + λj j! + · · · + λn−j (n − j)! = eλ +Ij(λ). By symmetry we only need to consider vertices to the left of the center of mass: namely for n = 2k or n = 2k −1 we only need to consider vertices j such that 1 ≤ j ≤ k. Consider the maps of importance Ij : (0, ∞) −→ R and the corresponding curves { (λ, Ij(λ)) λ > 0 } ⊆ R2. Our next result shows that the order in importance for large λ is the reverse of the order in importance for small λ. Lemma 3. For n = 2k or n = 2k − 1 we have that: 1. If λ is small enough, then Ii(λ) < Ij(λ) for 1 ≤ i < j ≤ k. 2. If λ is large enough, then Ii(λ) > Ij(λ) for 1 ≤ i < j ≤ k. 12 Proof. According to Proposition 1, for the smallest potency of λ at which Ii(λ) and Ij(λ) differ are, respectively, of the form λi i! and 2 λi i! . These terms control the behaviour of Ii(λ) and Ij(λ) for small λ, and thus Ii(λ) < Ij(λ) since i < j. For large λ, we look for the largest powers in λ in Ii(λ) and Ij(λ) which are given, respectively, by λn−i (n − i)! and λn−j . (n − j)! Since i < j, we have that Ii(λ) > Ij(λ) for large λ. Next we make a rather plausible statement which we have been able to verify numer- ically in many instances. Conjecture 4. Consider the linear graph Ln, with n = 2k or n = 2k − 1, and let 1 ≤ i < j ≤ k. The curves of importance Ii(λ) and Ij(λ) intersect each other in a unique point λ = cij ∈ (0, ∞). These intersection points occur in the order cil < cjm for i < l ≤ k and j < m ≤ k. The meaning of Conjecture 4 is that the curve I1(λ) begins at the bottom and crosses all other curves, first I2(λ), then I3(λ) and so on, until it reaches the top; next the curve I2(λ) raises from the bottom to the second highest position, just below I1(λ), crossing the curves I3(λ), I4(λ), etc, in exactly that order. After all crossings have taken place the reverse order to the original one has been achieved, i.e. I1(λ) > I2(λ) > ..., and this order remains stable up to infinity. The numerical evidence for Conjecture 4 is quite solid. Figure 6 suggests that it holds for the linear graph L11 . Next result allow us to locate the crossing points of consecutive curves of importance. Theorem 5. Let Ln be the linear graph with n = 2k or n = 2k − 1, and 1 ≤ i < k − 1. The curves of importance Ii(λ) and Ii+1(λ) intersect each other in a unique point λ = ci,i+1 ∈ (0, ∞) given by ci,i+1 = (cid:16) (n − i)! i! (cid:17) 1 n−2i . Thus for n = 2k and n = 2k − 1 we, respectively, have that ci,i+1 = (cid:16) (2k − i)! i! (cid:17) 1 2(k−i) and 13 ci,i+1 = (cid:16) (2k − i − 1)! i! (cid:17) 1 2(k−i)−1 . 1.15 1.10 1.05 1.00 0.95 0.90 0.85 5.2 5.4 5.6 5.8 6.0 6.2 Figure 6: Curves of Importance for L11. Proof. The crossing point ci,i+1 is defined by the equation 2λ + 2λ + 2λ2 2 2λ2 2 + · · · + 2 λi−1 (i − 1)! + λi i! + · · · + + · · · + 2 λi i! + λi+1 (i + 1)! + · · · + λn−i (n − i)! = λn−i−1 (n − i − 1)! , which after cancelling terms is equivalent to the equation with a unique solution given by λn−i (n − i)! = λi i! , ci,i+1 = (cid:16) (n − i)! i! (cid:17) 1 n−2i . Corollary 6. Let Ln be the linear graph with n = 2k or n = 2k−1, and let 1 ≤ i < k−1. 1. For n = 2k, k ≥ 2, the crossing points c1,2 and ck−1,k are given by c1,2 = (2k − 1)! 1 2k−2 and ck−1,k = (k(k + 1)) 1 2 . 2. For n = 2k − 1, k ≥ 2, the crossing points c1,2 and ck−1,k are given by c1,2 = (2k − 2)! 1 2k−3 and ck−1,k = k. The following result may be regarded as further evidence in favor of Conjecture 4. Theorem 7. The intersection points ci,i+1 of the curves Ii(λ) and Ii+1(λ) occur in the order c1,2 < c2,3 < · · · · · · < ck−2,k−1 < ck−1,k. 14 Proof. We use a simple fact for positive integers: if c < a − 1, then ac < (a − 1)(c + 1). Choose i such that 2(i + 1) ≤ n, i.e. such that n − 2i − 2 ≥ 0 or equivalently We have the following chain of equivalent inequalities i + 1 < n − i − 1. ci,i+1 < ci+1,i+2, 1 n−2i (cid:16) (n − i)! i! (cid:17) < (cid:16)(n − i − 1)! (i + 1)! (cid:17) 1 n−2i−2 , (n − i)!n−2i−2(i + 1)!n−2i < (n − i − 1)!n−2ii!n−2i−2, (n − i)n−2i−2(i + 1)n−2i−2(i + 1)!2 < (n − i − 1)!2, (n − i)n−2i−2(i + 1)n−2i−2 < (n − i − 1)2 · · · (i + 2)2, ((n − i)(i + 1))n−2i−2 < (n − i − 1)2 · · · (i + 2)2 Using the fact mentioned at the beggining , it is clear that in order to show the latter inequality it is enough to check that (n − i)(i + 1) < (n − i − 1)(i + 2), which holds since i + 1 < n − i − 1. Example 8. Set n = 12 and i = 3. In this case the inequality ((n − i)(i + 1))n−2i−2 < (n − i − 1)2 · · · (i + 2)2 simply says that (9.4)4 < (8.7.6.5)2, or equivalently (9.4)(9.4)(9.4)(9.4) < (8.5)(7.6)(7.6)(8.5). Note that if Conjecture 4 holds, then there are exactly k(k − 1) 2 crossing points among the curves of importance Ij(λ), and thus that same number of different orderings by importance on the vertices of Ln as λ varies, where n = 2k or n = 2k − 1. Indeed vertex 1 begins as the less important and have to surpass k − 1 vertices to reach the top. Then vertex 2 have to surpass k − 2 vertices to reach the 15 second position, etc. Thus the number of crossing is the sum of the first k − 1 natural numbers, yielding the desired result. Although the number of reachable orderings grows to infinity, it is nevertheless a negligible quantity, for large n, relative to the number of all possible orderings as Lim k→∞ k(k − 1) 2k! = 0. Therefore even though it is possible to reach many different orderings by choosing an appropriated λ, a random ordering will not be reachable. According to Conjecture 4, for the linear graph Ln with n = 2k or n = 2k − 1, the first change in the ordering of vertices by importance occurs at c1,2, while the last change occurs at ck−1,k. The interval of stability (0, c1,2) is dominated by the direct influences, while the interval of stability (ck−1,k, ∞) is dominated by long indirect influences, yielding the reverse ordering. All reordering happens in the interval [c1,2, ck−1,k]. Finally, we consider the ranking of the vertices of Ln by influence, and in this case we find full stability. Proposition 9. For any λ > 0, the ordering by indirect influences on the vertices of the linear graph Ln is given by 1 > 2 > · · · > n. Proof. It follows since Fn = 0 and for 1 ≤ i < n we have that: Fi(λ) = λ + λ2 2 + · · · + λi−1 (i − 1)! + λi i! + · · · + λn−i (n − i)! . Note however that while the ordering is completely stable, all influences approach 0 as λ goes to infinity. 4 Stability on Circuits In the previous section we saw that linear chains of direct influences tend to have a desta- bilizing effect on the applications of the PWP method with respect to changes in λ, to the point of allowing complete reversal in ordering for small and large values of λ. In this section we are going to see that, in contrast, the presence of circuits have a stabilizing effect with respect to changes in λ. 16 Consider the circuit on the Zn group of integers module n given by 0 −→ 1 −→ · · · −→ n − 1 −→ 0. For i, j, ∈ Zn and k ∈ [n], the matrices of direct and indirect influences are given by Dij =   1 0 if i = j + 1, otherwise, and eλ +Tj+k,j = ∞ Xl=0 λk+ln (k + ln)! . Note that Tj+k,j(λ) does not depend on j, thus we can use the simpler notation Tk(λ). Next result shows the full stability of the PWP for circuits: stability in the rankings by importance, in influence, and even in the relative strength of indirect influences for small values of λ. Theorem 10. For i, j ∈ Zn we have that: 1. All vertices in Zn have equal importance, that is Ii(λ) = Ij(λ). 2. All vertices in Zn have equal influences, that is Fi(λ) = Fj(λ). 3. For λ ∈ (0, 2) indirect influences are ordered as follows: T1(λ) > · · · > Tn(λ). Proof. Properties 1 and 2 follow from the identities Fj(λ) = T1(λ) + · · · + Tn(λ) and Ij(λ) = 2Fj(λ). Property 3 is shown as follows. Recall that for k ∈ [n − 1] we have Tk(λ) = ∞ Xl=0 λk+ln (k + ln)! , thus the inequality Tk(λ) > Tk+1(λ) holds for each summand in the respective series expansions if and only if λk+ln λk+1+ln or equivalently (k + ln)! > (k + 1 + ln)! , Thus for λ < 2, we have that λ < k + 1 + ln. λ < 2 = 1 + 1 ≤ k + 1 ≤ k + 1 + ln, and we obtain the desired inequality. Thus we see that the presence of circuits in a complex network have a stabilizing effect in the applications of the PWP method with respect to changes in λ. 17 5 Stability on R-Diagonalizable Networks Assume that our matrix of direct influences D is diagonalizable in R, i.e. there is an invertible matrix A ∈ Mn(R) such that D = AEA−1 where E is a diagonal matrix whose entries Eii give the eigenvalues of D. This condition holds, for example, if the eigen- values of A are all real and distinct, a generic condition among matrices with only real eigenvalues. The PWP map is equivariant with respect to conjugation, thus we have that T(D, λ) = AT(E, λ)A−1. The matrix T(E, λ) is rather simple to compute, indeed it is a diagonal matrix with entries T(E, λ)ii = eEii + eλ + . Theorem 11. For a R-diagonalizable network there can be only a finite number of changes in the ranking of the vertices of the network by importance or by influence. Proof. We must show that only a finite number of crossing points may occur, both for the curves of importance and the curves of indirect influences. Since D is a diagonalizable matrix in R it has n real eigenvalues (counted with multiplicity). Assume it has m dif- ferent eigenvalues which we write in increasing order d1 < . . . < dm. The key observation is that the entries of the matrix are all of the form eλ +T(D, λ) = eλ +AT(E, λ)A−1 a1ed1λ + + · · · + amedmλ + , and the functions of influence and therefore the functions of importance eλ +Fj(λ) are also of the same form. Therefore, finding the crossing points for the curves of importance or influence boils down to finding solutions to equations of the form eλ +Ij(λ), a1ed1λ + + · · · + amedmλ + = 0. Some of the resulting equations may be trivial, i.e. all the coefficients ai may be zero, meaning that some of the importance or influences functions are identically equal, which actually reduces the scope of possibilities for crossing points. We are going to show that as soon as one of these equations is non-trivial there can only be a finite number of + = ex − 1, the equation above is equivalent to a equation of the form solutions. Since ex a1ed1λ + · · · + amedmλ = a (E) 18 with a = a1 + . . . + am. Without lost of generality we assume that am 6= 0. If it is the only non-vanishing coefficient, then (E) reduces to amedmλ = am which is either trivial if dm = 0, or has no solution at all. If another coefficient besides am is non-zero, we may assume without lost of generality that a1 6= 0. We show that if (E) has infinitely many solutions they must be contained in a bounded interval around 0. Assume that dm > 0, otherwise all the eigenvalues di must be negative, and then as t → 0 we have that a1ed1λ + · · · + amedmλ → 0, and therefore (E) has no solutions for large λ if a 6= 0. If a = 0, then (E) is equivalent to a2e(d2 −d1)λ + · · · + ame(dm−d1)λ = −a1, and we are back in the case where the last coefficient dm − d1 is positive. Dividing (E) by edmλ and letting λ go to infinity we find that am = 0, a contra- diction, and thus no large λ can be a solution of (E). So, if (E) have infinitely many solutions they must be contained in an interval around 0, and these solutions must have an accumulation point. Let us show that this point of accumulation can not be 0. We argue by contradiction. Assume that (E) has infinitely many solutions tl with tl → 0 as l → ∞. Then the derivative of the left-hand side of (E) will have infinitely many zeroes accumulating at 0, and thus the second derivative will also have infinitely many zeroes accumulating at 0, and so on ... Therefore the coefficients a1, . . . , am must be such that the identities 1 + · · · + amdk hold for k ∈ N>0. Dividing the equation above by dk that am = 0, a contradiction. a1dk m = 0, m and letting k go to infinity we find Finally, assume that our infinitely many solutions tl of (E) have an accumulation point c 6= 0. Set tl = c + sl, then the points sl give infinitely many solutions to the equation (a1ed1c)ed1λ + · · · + (amedmc)edmλ = a accumulating at 0. Therefore we must have that a1ed1c = · · · = amedmc = 0, and so a1 = · · · = am = 0. 19 Remark 12. If we allow complex eigenvalues, then besides exponential functions, trigono- metric functions may appear in the calculation of the matrix of indirect influences. Trigonometric functions can have infinitely many crossing points. Thus for a diagonalizable network only a finite number of changes in ordering either by importance or influence can occur, and thus for such networks there exists λd ∈ (0, ∞) where the first change in order occurs, and a λi ∈ (0, ∞) where the last change in order occurs. Thus the PWP method for λ in the interval (0, λd) is dominated by the direct influences, and the PWP method for λ in the interval (λi, ∞) is dominated by the indirect influences. All reordering happens in the interval [λd, λi]. 6 Conclusion In this work we have considered the stability of the PWP method for ranking vertices in a complex network by importance and indirect influences. We have found that the PWP method is quite sensitive with respect to data, a fact that we regard as being positive. Stability with respect to the parameter λ seems to involve, at least, two opposite forces. On the one hand, long directed path increases instability, to the extreme of allowing full order reversal, and other hand the presence of circuits tends to stabilize the applications of the method, again to the extreme of allowing full uniformization both in importance and influence. Must networks, of course, include both directed paths and circuits, and the stability of the PWP method with respect to changes in λ will involve a subtle balance between these opposite forces. We have shown that for a network diagonalizable in R only a finite number of changes in ranking may occur, both in importance and in influence. In contrast, the presence of complex eigenvalues opens the door for infinitely many changes in order. The next challenge, left for future research, is to study the stability of the PWP method for randomly generated networks. Acknowledgements We thank Jorge Catumba for many helpful comments and suggestions. Numerical com- putations in this work were done using the Scilab module "Indirect Influences for Graphs" developed by Jorge Catumba [3]. References [1] S. Brin, L. Page, R. Motwani, T. Winograd, The Anatomy of a Large-Scale Hyper- textual Web Search Engine, Comp. Netw. ISDN Sys. 30 (1998) 107-117. 20 [2] S. Brin, L. Page, R. Motwani, T. Winograd, The PageRank citation ranking: Bring- ing order to the Web, Technical Report, Stanford Digital Library Technologies Project (1998). [3] J. Catumba, Indirect Influences for Graphs, http:atoms.scilab.org/toolboxes/indinf. [4] F. Chung, The heat kernel as the pagerank of a graph, Proc. Natl. Acad. Sci. U.S.A. 104 (2007) 19735-19740. [5] R. D´ıaz, Indirect Influences, Adv. Stud. Contemp. Math. 23 (2013) 29-41. [6] R. D´ıaz, L. G´omez, Indirect Influences in International Trade, Netw. Heterog. Media 10 (2015) 149-165. [7] E. Estrada, N. Hatano, Communicability in complex networks, Phys. Rev. E 77 (2008) 036111. [8] M. Godet, De l'Anticipation `a l'Action, Dunod, Par´ıs 1992. [9] L. Katz, A new status index derived from sociometric analysis, Psychmetrika 18 (1953) 39-43. [10] A. Langville, C. Meyer, Deeper Inside PageRank, Internet Math. 1 (2004) 335-400. [email protected], Departamento de Matem´aticas, Universidad Javeriana, Bogot´a, Colombia [email protected] Escuela de Ciencias Exactas e Ingener´ıas, Universidad Sergio Arboleda, Bogot´a, Colombia 21
1506.02449
2
1506
2015-06-09T13:45:27
Empirical comparison of network sampling techniques
[ "cs.SI", "physics.soc-ph" ]
In the past few years, the storage and analysis of large-scale and fast evolving networks present a great challenge. Therefore, a number of different techniques have been proposed for sampling large networks. In general, network exploration techniques approximate the original networks more accurately than random node and link selection. Yet, link selection with additional subgraph induction step outperforms most other techniques. In this paper, we apply subgraph induction also to random walk and forest-fire sampling. We analyze different real-world networks and the changes of their properties introduced by sampling. We compare several sampling techniques based on the match between the original networks and their sampled variants. The results reveal that the techniques with subgraph induction underestimate the degree and clustering distribution, while overestimate average degree and density of the original networks. Techniques without subgraph induction step exhibit exactly the opposite behavior. Hence, the performance of the sampling techniques from random selection category compared to network exploration sampling does not differ significantly, while clear differences exist between the techniques with subgraph induction step and the ones without it.
cs.SI
cs
Empirical comparison of network sampling techniques Neli Blagus, Lovro Subelj, Marko Bajec University of Ljubljana, Faculty of Computer and Information Science, Ljubljana, Slovenia Abstract In the past few years, the storage and analysis of large-scale and fast evolving networks present a great challenge. Therefore, a number of different techniques have been proposed for sampling large networks. In general, network exploration techniques approximate the original networks more accurately than random node and link selection. Yet, link selection with additional subgraph induction step outperforms most other techniques. In this paper, we apply subgraph induction also to random walk and forest-fire sampling. We analyze different real-world networks and the changes of their properties introduced by sampling. We compare several sampling techniques based on the match between the original networks and their sampled variants. The results reveal that the techniques with subgraph induction underestimate the degree and clustering distribution, while overestimate average degree and density of the original networks. Techniques without subgraph induction step exhibit exactly the opposite behavior. Hence, the performance of the sampling techniques from random selection category compared to network exploration sampling does not differ significantly, while clear differences exist between the techniques with subgraph induction step and the ones without it. Keywords: subgraph induction, sampling accuracy complex networks, network sampling, comparison of sampling techniques, 1. Introduction Real-world networks are often very large and fast evolving. Therefore, not only their storage poses a problem, but their analysis and understanding present a great challenge. In the past few years, a number of different techniques have been proposed for sampling large networks to allow for their faster and more efficient analysis. However, some information about the network is lost through sampling, thus it is of key importance to understand the changes in the network structure introduced by sampling. Several studies on network sampling analyze the match between the original net- works and their sampled variants [1, 2, 3], while only few of them focus on comparing the performance of different sampling techniques [4, 5, 6]. In general, network exploration techniques like random walk and forest-fire sampling approximate the original networks Email addresses: [email protected] (Neli Blagus), [email protected] (Lovro Subelj), [email protected] (Marko Bajec) Preprint submitted to Journal of Physics A: Mathematical and Theoretical October 24, 2018 more accurately than random node and link selection [4]. However, Ahmed et al. [7] pro- posed link selection with additional subgraph induction step, where the sampled network consists of randomly selected links (i.e. random link selection) and any additional links between their endpoints (i.e. subgraph induction). In this way, not only the performance of random link selection is improved, the proposed technique also outperforms several other sampling techniques. In this paper, we apply subgraph induction also to random walk and forest-fire sam- pling. We consider ten real-world networks and analyze the changes of their properties introduced by sampling. We compare eight sampling techniques based on the match between the original and sampled networks. The results reveal that techniques with sub- graph induction step tend to underestimate the degree and clustering distribution, while other techniques tend to overestimate both properties. Moreover, the techniques with subgraph induction overestimate the average degree and density of the original networks, in contrast, techniques without subgraph induction underestimate them. It appears that the performance of the sampling techniques from random selection category compared to network exploration sampling does not differ significantly, while clear differences exist between the techniques with subgraph induction step and the ones without subgraph induction. The rest of the paper is structured as follows. In Section 2, we first present the background on network sampling and expose the sampling techniques used in the study. The results of the empirical analysis are reported and formally discussed in Section 3, while Section 4 concludes the paper and suggests directions for further research. 2. Network sampling Let the network be represented by a simple undirected graph G = (V, E), where V denotes the set of nodes (n = V ) and E is the set of links (m = E). The goal of network sampling is to create a sampled network G(cid:48) = (V (cid:48), E(cid:48)), where V (cid:48) ⊂ V , E(cid:48) ⊂ E and n(cid:48) = V (cid:48) << n, m(cid:48) = E(cid:48) << m. The sample G(cid:48) is obtained in two steps. In the first step, nodes or links are sampled using a particular strategy like random selection and network exploration sampling. In the second step, the sampled nodes and links are retrieved from the original network. The sampled network is called a subgraph of the original network, if it consists of sampled nodes or sampled links only. Otherwise, if sampled nodes and all their mutual links are included in the sample or the sample consists of sampled links and any additional links among their endpoints, the sampled network is called an induced subgraph of the original network (i.e., subgraph induction). However, the previous studies have shown that the size n(cid:48) of the sample affects the performance of network sampling. Expectedly, larger samples approximate the original networks more accurately [6]. Still, the sample size of 10 − 30% of the original network achieves the balance between small sample and accurate approximation [4, 8, 6]. The changes of network properties introduced by sampling depend also on the adopted sampling technique, since different techniques are suitable for matching different sets of network properties. Thus, sampling techniques can be roughly divided into two cat- egories: random selection and network exploration techniques. In the first category, nodes or links are included in the sample uniformly at random or proportional to some particular characteristic like degree. In the second category, the sample is constructed 2 (a) RNS (b) RND (c) RLS (d) RLI Figure 1: Random selection techniques applied to a small toy network. Highlighted nodes and links represent the samples obtained by different techniques. (a) In random node selection, the sample consists of nodes selected uniformly at random and all their mutual links. (b) In random node selection by degree, the nodes are selected to the sample with probability proportional to their degree, while all their mutual links are included in the sample. (c) In random link selection, links are selected to the sample uniformly at random. (d) In random link selection with subgraph induction, the sample consists of randomly selected links (solid lines) and also any additional links between their endpoints (dashed lines). by retrieving a neighborhood of a randomly selected seed node using different strategies like breadth-first search, random walk and forest-fire. 2.1. Random selection For the purpose of this study, we consider four techniques from the random selection category. We first adopt random node selection [4] (RNS), where the sample consists of nodes selected uniformly at random and all their mutual links (Fig. 1(a)). RNS accu- rately approximates the degree mixing [5] and preserves the relationship of transitivity and density between the original and sampled networks [6]. Moreover, it shows better performance on larger samples than on smaller [6]. Yet, RNS overestimates the degree and betweenness centrality exponent and fails to match the clustering coefficient [5], degree distribution [9] and the average path length [10] of the original network. Furthermore, we adopt random node selection by degree [4] (RND), which improves the performance of RNS. Here, the nodes are selected randomly with probability propor- tional to their degrees and all their mutual links are included in the sample (Fig. 1(b)). RND matches in-degree and out-degree distributions and also spectral properties of the original network better than RNS [4]. Besides, it constructs samples with larger weakly connected component [6]. Nevertheless, despite a fully connected original network, both RNS and RND can construct a disconnected sampled network. Next, we adopt random link selection [4] (RLS), where the sample consists of links selected uniformly at random (Fig. 1(c)). RLS matches well degree mixing [5] and the distribution of sizes of weakly connected components [4]. It constructs sparse samples and accurately approximates the average path length of the original network [11]. Yet, RLS fails to match most of other network properties [4]. Like RNS, RLS overestimates the degree and betweenness centrality exponent and underestimates the clustering coef- ficient [5]. We last adopt random link selection with subgraph induction [7] (RLI), which im- proves the performance of RLS. Here, the sample consists of links selected uniformly at random and any additional links between their endpoints (Fig. 1(d)). RLI outperforms several other techniques in matching the degree, path length and clustering coefficient distribution of the original networks [7]. It selects nodes with higher degree more likely 3 (a) RWS (b) RWI (c) FFS (d) FFI Figure 2: Network exploration techniques applied to a small toy network. Highlighted nodes and links represent the samples obtained by different techniques. (a) In random walk sampling, the sample consists of links, retrieved from a simulation of a random walker on the network starting at a randomly selected seed node. (b) In random walk sampling with subgraph induction, the sample consists of links selected with random walk sampling (solid lines) and also any additional links between their endpoints (dashed lines). (c) In forest-fire sampling, the broad neighborhood of a randomly selected seed node is retrieved using partial breadth-first search, where only a fraction of links is included in the sample on each step. (d) In forest-fire sampling with subgraph induction, the sample consists of links selected with forest-fire sampling (solid lines) and also any additional links between their endpoints (dashed lines). than other random selection techniques, which increases the connectivity of the sample. Moreover, RLI is suitable for sampling large networks that can not fit into the main mem- ory and can also be implemented as a technique for sampling streaming networks [11]. 2.2. Network exploration We consider four sampling techniques from the network exploration category (note that in the literature, this category of sampling techniques is also called topology based sampling [7], traversal based sampling [12] or link-trace sampling [13]). First, we adopt random walk sampling [4] (RWS), where the random walk is simulated on the network, starting at a randomly selected seed node (Fig. 2(a)). The sample consists of links, which are visited by a random walker and represents a connected subgraph of the original net- work. RWS outperforms random selection techniques in matching the transitivity [13], clustering coefficient distribution and spectral properties and also shows good perfor- mance on smaller samples [4]. Yet, RWS is biased towards selecting nodes with high degree [14] and fails to match the degree distribution [15]. Next, we adopt forest-fire sampling [4] (FFS). Here, a broad neighborhood of a ran- domly selected seed node is retrieved from partial breadth-first search (Fig. 2(c)). The number of links sampled on each step is selected from a geometric distribution with mean p/(1− p), where p is set to 0.7 [4]. Thus, on average 2.33 links are included in the sample on each step. FFS matches well spectral properties [4] and together with RWS shows the best overall performance among several techniques [4]. However, FFS fails to match the path length and clustering coefficient of the original networks [11]. Moreover, we apply subgraph induction step to random walk and forest-fire sampling, which we term random walk sampling with subgraph induction (RWI) and forest-fire sampling with subgraph induction (FFI). Here, the sample consists of links, sampled with random walk (Fig. 2(b)) or forest-fire sampling (Fig. 2(d)), while any additional links among the endpoints of sampled links are also included in the sample. To the best of our knowledge, RWI has not been analysed in any of the previous studies. On the other hand, FFI shows worse performance than RLI in matching the path length, 4 degree and clustering distributions [11]. Still, the performance of FFI has not yet been compared to a larger set of sampling techniques. 3. Analysis and discussion In the following sections, we present the adopted framework for comparison of sam- pling techniques (Section 3.1), report the results of the empirical analysis and formally discuss the findings (Section 3.2). 3.1. Statistical comparison Sampling techniques are compared through four network properties (see Section 3.2) on ten real-world networks (see Table 1). For each property, we compute externally stu- dentized residuals of the properties of sampled networks that measure the consistency of each sampling technique with the rest. We expose statistically significant inconsistencies between the techniques with two-tailed Student t−test [16] and calculate the residuals as introduced below (see also [17]). Let xij denote some property value of j−th network for i−th sampling technique. Externally studentized residual xij is calculated as xij − µij 1 − 1 σij (cid:113) xij = N , (1) where N is the number of sampling techniques (N = 8 in our case), µij is the mean value and σij is the standard deviation of the considered property. The mean value and standard deviation are computed for all sampling techniques, excluding the observed one . (2) (3) (cid:88) (cid:88) k(cid:54)=i xkj , (N − 1) k(cid:54)=i (xkj − µij)2 (N − 2) µij = σ2 ij = Assuming that the errors in x are independent and normally distributed, the resid- uals x have Student t−distribution with N − 2 degrees of freedom. Statistically signifi- cant inconsistencies between the sampling techniques are revealed by two-tailed Student t−test [16] at P−value of 0.05, rejecting the null hypothesis that the values of the con- sidered property are consistent across the sampling techniques. 3.2. Empirical analysis The empirical analysis is performed on ten social and information networks. Their main characteristics are presented in Table 1. Due to a large number of networks con- sidered, the detailed description is omitted. Networks are considered to be undirected, although some of them are directed. For each network, we perform 100 realizations of each sampling technique, where we consider sample sizes of 15% of the original networks as suggested in [4, 6]. For each run of the network exploration techniques, the sample was constructed from a new randomly selected seed node. 5 Table 1: Real-world networks considered in the study. Network Description Nodes Links Average degree Clustering coefficient ca-hep ca-astro cit-hep brightkite slashdot flickr ca-dblp nd.edu youtube road-tx High E. Phys. collaboration [19] Astro Phys. collaboration [19] High E. Phys. citation [20] Brightkite friendship [21] Slashdot friendship [22] Flickr images metadata [23] DBLP collaboration [24] Web graph of nd.edu [25] Youtube friendship [26] Texas road network [22] 12,008 18,772 27,240 58,228 82,168 105,938 317,080 325,729 1,134,890 1,379,917 237,010 396,160 342,437 214,078 948,464 2,316,948 1,049,866 1,497,134 2,987,624 1,921,660 39.5 42.2 25.1 7.4 23.1 43.7 6.6 9.1 5.2 5.5 0.660 0.318 0.120 0.111 0.024 0.402 0.306 0.097 0.006 0.060 Density 3.3 × 10−3 2.2 × 10−3 9.2 × 10−4 1.3 × 10−4 2.8 × 10−4 4.1 × 10−4 2.1 × 10−5 2.8 × 10−5 4.5 × 10−6 3.9 × 10−6 We analyze different properties of the original and sampled networks, including degree distribution (probability distribution of degrees of all nodes), distribution of clustering coefficient (probability distribution of the proportions of connected neighbors of each node [18]), average degree (average number of neighbors of nodes over the whole network), and density (the ratio of existing links to all possible links). We compare sampling techniques based on the match between the original and sampled networks; Section 3.2.1 reports the results for degree and clustering distributions, while in Section 3.2.2 we analyze the average degree and density. 3.2.1. Degree and clustering coefficient distributions We first analyze the performance of sampling techniques based on the match of the degree and clustering coefficient distributions between the original and sampled networks. To compare the distributions of properties, we use Kolmogorov-Smirnov D−statistics, which is commonly used in similar studies [4, 11, 6]. Kolmogorov-Smirnov test checks the null hypothesis that the distributions of property of the original network and its sampled variant are the same, while the D−statistics measures the distance between the observed distributions. Based on the values of Kolmogorov-Smirnov D−statistics, we compare the adopted sampling techniques (see Section 3.1). The comparison of sampling techniques based on the degree distribution is shown in Fig. 3. We observe that in most cases, the difference between the techniques with subgraph induction step (i.e., RNS, RND, RLI, RWI, FFI) and those without subgraph induction (i.e., RLS, RWS, FFS) is clear. The first group of techniques approximates the degree distribution of the original networks more accurately. In addition, the techniques with subgraph induction step improve the performance of the corresponding techniques without subgraph induction in the case of RLS and FFS. Since the subgraph induction increases the degrees of the nodes in the sample [7], this clearly contributes to better match the degree distribution between the original and sampled networks. RNS and RND show comparable accuracy to network exploration techniques with subgraph induction, even though they construct disconnected samples. The latter in- dicates that the connectivity of the sample does not affect the match of the degree distribution. On the other hand, among the techniques without subgraph induction, RWS shows the best performance, which could be explained by its bias towards selecting high degree nodes and exploring densely connected parts of the network [4]. In contrast, the samples constructed by FFS are sparse, a large fraction of the nodes in the samples 6 has low degree, while the number of nodes with higher degree is underestimated [7]. Accordingly, FFS is the least accurate among all techniques. Moreover, we compare the sampling techniques based on the clustering coefficient distribution. The results are presented in Fig. 4. The techniques show more comparable accuracy than in the case of the degree distribution. In general, the techniques with subgraph induction underestimates the clustering distribution, while others overestimate it. FFS and RWS prove as the best performing techniques. This indicates that in the case of matching the clustering distribution of the original networks, including all the links among sampled nodes is not the best choice. However, RNS shows the worst performance, which could be explained by its tendency to construct samples with a large number of low clustered nodes [7]. In summary, the sampling techniques with subgraph induction step underestimate the degree and clustering coefficient distributions of the original networks. On the other hand, the techniques without subgraph induction, overestimates both properties. The best overall performance is provided by RWI, which shows the most stable accuracy for matching both distributions on all considered networks. However, it appears that the properties of the original networks have relevant effect on the accuracy of the sampling techniques. For example, the techniques with subgraph induction match the degree distribution of the networks with larger average degree more accurately than when the average degree is lower and the techniques without subgraph induction also perform well. We aim to study that kind of relations in future work, since they should be observed in an even larger set of real-world networks to obtain statistically significant results. 3.2.2. Average degree and density In the second part of the analysis, we study the performance of sampling techniques based on the match of the average degree and density between the original and sampled networks. We compare the properties between networks based on the actual values of properties. Furthermore, we modify Eq. (1) and (3) and use the true value of considered property of the original networks instead of the mean values µij (see Section 3.1) to compare the sampling techniques. Fig. 5 shows the comparison of sampling techniques based on the average degree. We observe that the techniques with subgraph induction tend to overestimate the average degree, while others underestimate it. Among the techniques with induction step, only RNS underestimate the average degree. The samples constructed with RNS consist of a large fraction of low-degree nodes [7] and have a low average degree particularly in the smaller samples [5]. Therefore, RNS underestimates the average degree of the networks, especially compared to the techniques, which are biased in selecting nodes with higher degree (i.e., RND). Lastly, we analyze the density of the networks. Fig. 6 shows the comparison of the sampling techniques based on the density. In general, all techniques overestimate the density, yet the techniques without subgraph induction step approximate the density more accurately than the techniques with subgraph induction. Additionally, techniques without subgraph induction improve the performance of the corresponding techniques with subgraph induction. In the previous study [27], we proved the power-law relation- ship between the size and density of real-world networks and their sampled variants. The results show that the network density decreases with its size. However, the tech- niques with subgraph induction do follow the latter relationship, while the techniques 7 without induction construct sparser samples than expected. Therefore, the accuracy of the sampling techniques based on the density is relative and depends on whether the samples should accurately match the density of the original networks or the relationship between the size and density of the original networks and their sampled variants should be preserved. In addition to all above, we analyze the performance of the techniques with partial subgraph induction, where we include a different portion of mutual links between the sampled nodes in the sample (i.e., we randomly select 10% − 90% links from all possible links). The results are not described, since the techniques with partial subgraph induction did not improve the performance of the techniques with subgraph induction and they did not perform worse than techniques without subgraph induction. In summary, the sampling techniques with subgraph induction step tend to overes- timate the average degree and the density of the original networks. In contrast, the techniques without subgraph induction underestimate the average degree and approxi- mate the density of the original networks more accurately than other techniques. Yet, the accuracy of sampling techniques does not depend only on the characteristics of the adopted technique, but also on the characteristics of the original networks. However, from exploration sampling techniques, the best performance is provided by RWI, while the best overall performance is provided by RNS, which shows very stable accuracy in matching considered properties. 4. Conclusion In this paper, we analyze different real-world networks and study the changes of their properties introduced by network sampling. We consider eight sampling techniques with and without subgraph induction step and compare them based on the match of properties between the original networks and their sampled variants. The results reveal that the techniques with subgraph induction underestimate the de- gree and clustering distribution, while they overestimate the average degree and density of the original networks. On the other hand, the techniques without subgraph induc- tion step exhibit opposite behavior, since they overestimate the degree and clustering distribution and underestimate the average degree and density. The techniques without subgraph induction approximate the density most accurately. However, from the ran- dom selection category, random node selection shows the best overall performance, while from the network exploration category, the most stable accuracy is provided by random walk sampling with subgraph induction. Still, it appears that the performance of the sampling techniques from random selection category compared to network exploration sampling does not differ significantly, while clear differences exist between the techniques with subgraph induction step and the ones without subgraph induction. Following this, a suitable classification of network sampling techniques would be a class of techniques with subgraph induction and a class without it. Some of the results suggest that the characteristics of the original networks affect the accuracy of the network sampling. Thus, our future work will mainly focus on analyzing relations between network properties and accuracy of the sampling techniques on a larger set of real-world networks. Besides, a prominent direction for further study is the analysis of the time and space efficiency of sampling techniques, since, for example, fitting even 8 a sampled network in the main memory becomes challenging with significant growth of real-world networks in the past few years. Acknowledgment This work has been supported in part by the Slovenian Research Agency ARRS within the Research Program No. P2-0359, by the Slovenian Ministry of Education, Science and Sport Grant No. 430-168/2013/91, and by the European Union, European Social Fund. References References [1] C. Hubler, H. P. Kriegel, K. Borgwardt, Z. Ghahramani, Metropolis algorithms for representative subgraph sampling, in: Proceedings of the 8th International Conference on Data Mining, IEEE, 2008, pp. 283 -- 292. [2] H. Sethu, X. Chu, A new algorithm for extracting a small representative subgraph from a very large graph, e-print arXiv:1207.4825. [3] N. Blagus, L. Subelj, G. Weiss, M. Bajec, Sampling promotes community structure in social and information networks, Physica A 432 (2015) 206 -- 215. [4] J. Leskovec, C. Faloutsos, Sampling from large graphs, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2006, pp. 631 -- 636. [5] S. H. Lee, P. J. Kim, H. Jeong, Statistical properties of sampled networks, Phys. Rev. E 73 (1) (2006) 016102. [6] N. Blagus, L. Subelj, M. Bajec, Assessing the effectiveness of real-world network simplification, Physica A 413 (2014) 134 -- 146. [7] N. Ahmed, J. Neville, R. R. Kompella, Network sampling via edge-based node selection with graph induction, Tech. rep., Purdue University (2011). [8] C. Doerr, N. Blenn, Metric convergence in social network sampling, in: Proceedings of the 5th ACM workshop on HotPlanet, ACM, 2013, pp. 45 -- 50. [9] M. P. H. Stumpf, C. Wiuf, R. M. May, Subnets of scale-free networks are not scale-free: sampling properties of networks, P. Natl. Acad. Sci. USA 102 (12) (2005) 4221 -- 4224. [10] N. K. Ahmed, J. Neville, R. Kompella, Reconsidering the foundations of network sampling, in: Proceedings of the 2nd Workshop on Information in Networks, 2010. [11] N. K. Ahmed, J. Neville, R. Kompella, Network sampling: from static to streaming graphs, e-print arXiv:11211.3412. [12] P. Hu, W. C. Lau, A survey and taxonomy of graph sampling, e-print arXiv:1308.5865. [13] A. S. Maiya, T. Y. Berger-Wolf, Benefits of bias: towards better characterization of network sam- pling, in: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2011, pp. 105 -- 113. [14] L. Lov´asz, Random walks on graphs: A survey, Combinatorics: Paul Erdos is eighty 2 (1) (1993) 1 -- 46. [15] M. Kurant, A. Markopoulou, P. Thiran, On the bias of BFS, in: Proceedings of the 22nd Interna- tional Teletraffic Congress, IEEE, 2010, pp. 1 -- 8. [16] R. D. Cook, S. Weisberg, Residuals and influence in regression, New York: Chapman and Hall, 1982. [17] L. Subelj, D. Fiala, M. Bajec, Network-based statistical comparison of citation topology of biblio- graphic databases, Sci. Rep. 4 (2014) 6496. [18] D. J. Watts, S. H. Strogatz, Collective dynamics of "small-world" networks, Nature 393 (6684) (1998) 440 -- 442. [19] J. Leskovec, J. Kleinberg, C. Faloutsos, Graph evolution: Densification and shrinking diameters, ACM Trans. Knowl. Discov. Data 1 (1) (2007) 1 -- 40. [20] KDD Cup '03, http://www.cs.cornell.edu/projects/kddcup/ (2013). [21] E. Cho, S. A. Myers, J. Leskovec, Friendship and mobility: user movement in location-based social networks, in: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2011, pp. 1082 -- 1090. 9 [22] J. Leskovec, K. J. Lang, A. Dasgupta, M. W. Mahoney, Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters, Internet Math. 6 (1) (2009) 29 -- 123. [23] J. McAuley, J. Leskovec, Learning to discover social circles in ego networks, in: Advances in Neural Information Processing Systems 25, 2012, pp. 548 -- 556. [24] J. Yang, J. Leskovec, Community-affiliation graph model for overlapping network community de- tection, in: Proceedings of the 12th International Conference on Data Mining, IEEE, 2012, pp. 1170 -- 1175. [25] R. Albert, H. Jeong, A.-L. Barab´asi, Internet: Diameter of the world-wide web, Nature 401 (6749) (1999) 130 -- 131. [26] J. Yang, J. Leskovec, Defining and evaluating network communities based on ground-truth, Knowl- edge and Information Systems 42 (1) (2015) 181 -- 213. [27] N. Blagus, L. Subelj, M. Bajec, Self-similar scaling of density in complex real-world networks, Physica A 391 (8) (2012) 2794 -- 2802. 10 (a) Degree distribution (b) Degree distribution Figure 3: Statistical comparison of the degree distribution of the original networks and their sam- pled variants obtained by different sampling techniques. We show externally studentized residuals that measure the consistency of each sampling technique with the rest and expose statistically significant in- consistencies between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded region corresponds to 95% confidence intervals). Merely for complete understanding, we present average externally studentized residuals over all networks (see (b); the star marker indicate the residuals for the original networks, while error bars display standard deviations). Notice that techniques with subgrah induction step (full markers) approximate the degree distribution more accurately than the techniques without subgraph induction (empty markers). 11 (a) Clustering coefficient distribution (b) Clustering coefficient distribution Figure 4: Statistical comparison of the clustering coefficient distribution of the original networks and their sampled variants obtained by different sampling techniques. We show externally studentized residuals that measure the consistency of each sampling technique with the rest and expose statistically significant inconsistencies between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded region corresponds to 95% confidence intervals). Merely for complete understanding, we present average externally studentized residuals over all networks (see (b); the star marker indicate the residuals for the original networks, while error bars display standard deviations). Notice that techniques with subgrah induction step (full markers) improve the performance of the corresponding techniques without subgraph induction (empty markers). 12 (a) Average degree (b) Average degree Figure 5: Statistical comparison of the average degree of the original networks and their sampled variants obtained by different sampling techniques. We show externally studentized residuals that measure the consistency of each sampling technique with the rest and expose statistically significant inconsistencies between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded region corre- sponds to 95% confidence intervals). Merely for complete understanding, we present average externally studentized residuals over all networks (see (b); the star marker indicates the residuals for the original networks, while error bars display standard deviations). Notice that techniques with subgrah induc- tion step (full markers) tend to overestimate the average degree, while the techniques without subgraph induction (empty markers) underestimate it. 13 (a) Density (b) Density Figure 6: Statistical comparison of the density of the original networks and their sampled variants ob- tained by different sampling techniques. We show externally studentized residuals that measure the consistency of each sampling technique with the rest and expose statistically significant inconsistencies between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded region corre- sponds to 95% confidence intervals). Merely for complete understanding, we present average externally studentized residuals over all networks (see (b); the star marker indicates the residuals for the original networks, while error bars display standard deviations). Notice that the techniques without subgraph induction step (empty markers) approximate the density more accurately than the corresponding tech- niques with subgraph induction (full markers). 14
1504.06827
1
1504
2015-04-26T14:15:36
Nowcasting Disaster Damage
[ "cs.SI", "physics.soc-ph" ]
Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy's path and hurricane-related social media activity. We show that real and perceived threats -- together with the physical disaster effects -- are directly observable through the intensity and composition of Twitter's message stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Our findings suggest that massive online social networks can be used for rapid assessment ("nowcasting") of damage caused by a large-scale disaster.
cs.SI
cs
Nowcasting Disaster Damage Yury Kryvasheyeu a,b, Haohui Chen a,b, Nick Obradovich c,d, Esteban Moro e, Pascal Van Hentenryck a,f, James Fowler c,g, and Manuel Cebrian a,h,* a National Information and Communications Technology Australia, Melbourne, Victoria 3003, Australia; b Faculty of Information Technology, Monash University, Melbourne, Victoria 3145, Australia; c Department of Political Science, University of California at San Diego, La Jolla, California 92093, USA; d Center for Marine Biodiversity and Conservation, Scripps Institution of Oceanography, La Jolla, California 92093, USA; e Department of Mathematics & GISC, Universidad Carlos III de Madrid, Madrid, Leganés 28911, Spain; f Research School of Computer Science, Australian National University, Canberra, ACT 0200, Australia; g Division of Medical Genetics, University of California at San Diego, La Jolla, CA 92093; h Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California 92093, USA a *Corresponding author: MC, [email protected] Could social media data aid in disaster response and damage assess- ment? Countries face both an increasing frequency and intensity of natu- ral disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribu- tion of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy’s path and hurricane- related social media activity. We show that real and perceived threats – together with the physical disaster effects – are directly observable through the intensity and composition of Twitter’s message stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Our findings sug- gest that massive online social networks can be used for rapid assess- ment (“nowcasting”) of damage caused by a large-scale disaster. social media disaster management damage assessment Introduction Natural disasters are costly. They’re costly in terms of property, in terms of political stability, and in terms of lives lost [1-3]. Unfortunately – due to climate change – natural disasters like hurricanes, floods, and tornadoes are also likely to become more common, more intense, and subsequently more costly in the future [4-7]. Developing rapid response tools to aid in adapting to these coming changes is critical [8]. As society faces this need, the use of social media on platforms like Facebook and Twitter is on the rise. Unlike traditional media, these platforms enable data collection on an unprecedented scale, documenting public reaction to events unfolding in both virtual and physical worlds. This makes social media platforms attractive large-scale laboratories for social science research [9-11]. Opportuni- ties provided by social media are utilized in various do- mains including the economic [12], political, [13-16] and social [14, 17-21] sciences, as well as in public health [22, 23]. Because of their potential, the use of massive online social networks in disaster management has attracted sig- nificant public and research interest [24-26]. In particular, the micro-blogging platform Twitter has been especially useful during emergency events [27-29]. Twitter allows its users to share short 140-character messages and follow public messages from any other registered user. Such openness leads to a network topology characterized by a high number of accounts an average user follows, placing Twitter somewhere in-between a purely social and a pure- ly informational network [30]. The information network properties of Twitter facilitate and accelerate the global spread of information; its social network properties ease access to geographically and personally relevant infor- mation, and the message length limit encourages informa- tive exchange. These factors combine to make Twitter especially well suited for a fast-paced emergency envi- ronment. Existing research on Twitter in emergency context studies its role in gathering and disseminating news [31, 32], the way it contributes to situational awareness [33, 34], practical aspects of classifying disaster messages, detecting events, and identifying messages from crisis regions [35-39]. Other research utilizes Twitter’s network properties to devise sensor techniques for early awareness [40], to gauge the dynamics of societal response [41], and to crowdsource relief efforts [42]. More recently researchers have begun using social media platforms to derive information about disaster events themselves. For instance, the number of photo- graphs uploaded to Flickr was shown to correlate strongly with physical variables that characterize natural disasters (atmospheric pressure during Hurricane Sandy) [43]. Alt- hough it is unclear what causes the link – external infor- mation, network effects, or direct observer effects – the correlation suggests that digital traces of a disaster can help measure its strength or impact. Based on a similar concept, other studies verify the link between the spatio- temporal distribution of tweets and the physical extent of floods [44] and the link between the prevalence of disas- ter-related tweets and a distribution of Hurricane Sandy damage predicted from modeling [45]. Here, we present a hierarchical multiscale analysis of disaster-related Twitter activity. We start at the national level and progressively employ finer spatial resolution of counties, and zip code tabulation areas. First, we examine how geographical and socio-cultural differences across the United States manifest through Twitter activity during a large-scale natural disaster – Hurricane Sandy. We in- vestigate the response of cities to the hurricane and identi- fy general features of disaster-related behavior on the community level. Second, we study the distribution of geo-located messages at the state level within the two most affected states (New Jersey and New York) and – for the first time – analyze the relationship between Twit- ter activity and the ex-post assessment of damage inflicted by the hurricane. Context of the study, data and methods Hurricane Sandy was the largest hurricane of the 2012 season and one of the costliest disasters in the history of the United States. Sandy was a late season hurricane that formed on 22 October 2012 southwest of Jamaica, peaked in strength as a Category 3 hurricane over Cuba, passed the Bahamas, and continued to grow in size while moving northeast along the United States coast. The hurricane made its landfall on the continental United States at 12:00 UTC on 29 October 2012 near Brigantine, New Jersey with winds reaching 70 knots and the storm surge as high as 3.85 meters. According to the National Hurricane Cen- ter [46], Sandy caused 147 direct fatalities and is respon- sible for damage in excess of $50 billion, including 650 thousand destroyed or damaged buildings and over 8.5 million people left without power – some of them for weeks. Both broadcast and online media extensively covered Hurricane Sandy, generating a large dataset of Twitter messages that became the basis for this study. The raw data comprises two distinct sets of messages. The first consists of messages with the hashtag “#sandy” posted between 15 October and 12 November 2012. This period precedes the formation of the hurricane and extends be- yond its dissipation. The data includes the text of the mes- sages and a range of additional information, such as mes- sage identifiers, user identifiers, followee counts, re-tweet statuses, self-reported or automatically detected location, timestamps, and sentiment scores. The second dataset has a similar structure and was collected within the same timeframe; however, instead of a hashtag, it includes all messages that contain one or more instances of specific keywords, considered to be relevant to the event and its consequences (“sandy”, “hurricane”, “storm”, “super- storm”, “flooding”, “blackout”, “gas”, “power”, “weath- er”, “climate”, etc. – see supplementary Table S1 for the full list). We obtained both datasets through the analytics company Topsy Labs [47], and reconstructed relationship graphs (list of followees for each user) using Twitter’s API. Sentiment scores in raw data are measured by a pro- prietary algorithm from Topsy, which we additionally verify with free alternatives – Linguistic Inquiry and Word Count [48] and SentiStrength [49]. In total we have 52.55 million messages from 13.75 million unique users. Since we are interested in a spatiotemporal analysis of Twitter activity, we focus exclusively on messages and users with known location. Only a fraction of the messag- es (about 1.2% for the hashtag dataset and 1.5% for the keywords dataset) are geo-tagged by Twitter. To expand the data, we include messages from users whose profile- listed address returns a match against the US Census Bu- reau Topologically Integrated Geographic Encoding and Referencing (TIGER) database. The resulting subset of geo-coded messages contains 9.7 million tweets from 2.2 million unique accounts. We perform the analysis on the national and state lev- els. On the national level, we use cities as a natural – in terms of spatial extent and population size – basis for ag- gregation and comparison. Cities are important due to their dominant [50, 51] and increasing [52, 53] socio- economic role in all aspects of human life [54-56], both in the real world and online. Additionally, similarities or differences in the way cities react to a major natural disas- ter like Sandy are of interest to social scientists and cli- mate adaptation policymakers alike [8, 57]. Our analysis covers the 50 most populous urban areas according to the 2010 US Census. On the state level we use a progressive- ly finer granularity of counties, and finally zip code tabu- lation areas (ZCTA) to analyze the local distributions of Twitter activity and hurricane damage. On every level, we aggregate messages that have latitude and longitude fall- ing within the boundaries of a respective region of interest (metropolitan area, county or ZCTA). The boundaries and population estimates of all administrative areas are deter- mined by the 2010 US Census. Finally, for every city, we determine the shortest distance to the path of the hurri- cane [58], as an indication of the proximity to the disaster. After aggregating the tweets by location, we use timestamps for temporal analysis. We allocate messages into non-overlapping bins of either 1- or 24-hour duration. Comparison metrics include the total number of active users, number of messages posted, classification of these messages into original and re-tweeted messages (includ- ing identification of the source as local or external to a particular community), and sentiment. Since the number of tweets originating from different urban or zip code areas varies greatly, we compare characteristics as nor- malized by the total count of distinct users for each area, active at any time between the start and end of the data collection period. Results Dynamics of Twitter activity across regions and hurricane- related topics The messages studied here cover a range of keywords, with varying relevance to Hurricane Sandy. Because of this, we deal with three dimensions in our analysis – spa- tial, temporal and topical. Figure 1 illustrates some of the characteristic features of Twitter activity. The pattern demonstrated by key- words strongly related to the hurricane (“sandy”, “storm”, “hurricane”, “frankenstorm”, etc.) is shown in Figure 1A – the number of messages slowly increases with a strong peak on the hurricane’s landfall day, followed by a gradu- al decline in the tweet activity level. Geographically, the trend is similar almost everywhere, but the magnitude of the normalized response changes depending on the prox- imity to the hurricane. An alternative way to summarize the activity is shown in the Figure 1B, where the normalized activity is pre- sented as a two-dimensional heatmap. We rank cities by their proximity to the hurricane and words by their mes- sage count. At the peak of the disaster, event-related key- words rank higher and activity increases with proximity. Consequently, we see that the upper left corner of our city/topic matrix shows a high level of activity. In sum- mary, as the disaster approaches and peaks in intensity, so does the normalized local Twitter response. Additionally, the content of the message stream changes and keywords most associated with the event dominate the agenda. Figure 1 Example of spatiotemporal evolution of Twitter activity across keywords. Panel A shows the geographical and topical variation of normalized activity (the number of daily messages divided by the number of local users active at any stage of the entire observation period). The horizontal axis is an offset in hours with respect to the landfall time of the hurricane (00:00 UTC on October 30, 2012). Activity on the hurricane-related words like “sandy” increases and reaches its peak in the day of landfall, and then gradually falls off. Qualitatively similar trends are observed everywhere, with distance to the path of the hurricane affecting the strength of the response (compare magnitudes of activity peaks between New York, Chicago and Miami). Different temporal patterns are exhibited by different keywords: “gas”-related discus- sion peaks with delay corresponding to the post-hurricane fuel shortages, and activity on “storm” has a secondary spike due to November “Nor’easter” storm. Panel B summarizes activity depending on both variables – topic and location. The color corresponds to the level of nor- malized activity (blue is low and red is high). In columns, places are ranked according to their proximity to the path of the hurricane (closest on the left, farthest on the right). In rows, words are ranked according to the total number of messages posted on the topic. Evolution of the event brings disaster-related words to the top of the agenda, with North East showing highest level of activity. Figure 2 Characteristic features of Twitter activity across locations (labeled by color according to hurricane proximity – blue is further and red closer to disaster). In all panels a primary plot shows results for messages with keyword “sandy”, and an inset for keyword “weather”, to con- trast behavior between event-related and neutral words. A primary feature is the sharp decline of normalized activity as the distance between a location and the path of the hurricane increases (Panel A). After the distance exceeds 1200-1500 km its effect on the strength of response disappears. This trend may be caused by a combination of factors, with direct observation of disaster effects and perception of risk both in- creasing the tweet activity of the East Coast cities. Anxiety, anticipation, and risk perception evidently contribute to the magnitude of re- sponse, since many of the communities falling into the decreasing trend were not directly hit or were affected only marginally; while New Orleans for example shows significant tweeting level that reflects its historic experiences with damaging hurricanes, like Katrina. The re-tweet rate (Panel B) is inversely related to activity, with affected areas producing more original content. Popularity of the content created in the disaster area is also higher and therefore increases with activity as well (Panel C). None of the features discussed above are present for neutral words (see the insets in all panels). When we aggregate our data over the period between 20 October and 12 November 2012, we find that tweet activity declines with increasing distance from the hurri- cane path up to 1500 km and is nearly constant for all places further away. These features are summarized in Figure 2A and supplementary Figure S1 (for all key- words). This relationship between proximity and activity level is a dominant feature, accompanied by two other relationships. The first one is an inverse relationship be- tween content creation and consumption. The areas di- rectly hit by – or close to – the disaster show a lower ratio of re-tweets (more original content) in the stream of mes- sages generated, as can be seen in Figure 2B and Figure S2. The second relationship is between the activity and global popularity (count of messages that get re-tweeted, normalized by the local user count) of local content (Fig- ure 2C and Figure S3), with content from affected areas attracting attention elsewhere. The activity-popularity (and to a lesser degree activity-originality) relationship is very strong for the event-related keywords, but virtually absent for neutral or more general keywords. We illustrate this in Figure 2 by the inset plots for keyword “weather” – a general word that is used frequently and is not neces- sarily associated with extreme weather events, even when such events take place. Direct relationship between online activity and prox- imity to the hurricane naturally raises the question of fac- tors that stimulate such an activity. Is it extensive media coverage, or perception of risk, or witnessing hurricane’s meteorological effects (winds, precipitation, storm surge) and damage (power and fuel shortages, flooding, loss of personal property, casualties)? The latter, especially the extent to which quantifiable properties of online activity – recorded during and shortly after disaster – reflect the severity of disaster-related damage, is especially interest- ing from the disaster management point of view. Real- time analysis of online activity as a predictor of damage would be a valuable tool in optimizing allocation of lim- ited emergency and recovery resources, and may com- plement other predictive models used in the joint assess- ment and recovery of damaged infrastructures [59]. Therefore, we investigate if the damage to property across the most severely hurricane-affected regions correlates with the recorded Twitter activity. Damage Since the hurricane damage was mostly confined to several states, we perform damage analysis at finer spatial granularity by looking at counties and ZCTAs. We exam- ine both aggregation levels to determine the limits of spa- tial resolution achievable in such a “nowcasting” tech- nique. Two primary sources of data contribute to our esti- mate of damage. The first is data on FEMA Household Assistance grants to homeowners and renters [60]. These grants are provided to relieve the hardship of households exposed to disaster and to enable bringing the original property back to a habitable condition. The second source is data on insurance claims associated with Hurricane Sandy [61, 62], including National Flood Insurance, resi- dential, commercial, vehicle and marine insurance claims. We use these indicators as both are expressed in monetary terms and are reported by individuals, rather than admin- istrative entities like municipalities. A more holistic index of community hardship could be developed, like the one in [63] taking into account other metrics: the number of people served at shelters, effects of power loss (using the number of days schools were closed as a proxy), gas shortages (through the number of calls to State Emergen- cy Hotline from gas stations) and FEMA Public Assis- tance grants to help with municipal infrastructure. Alt- hough such methodology gives a broader picture of the hardship on the ground, the metrics involved do not have a standard way of measurement and do not share a com- mon unit to be integrated together, which leaves certain freedom to assign arbitrary weights to each contributing factor. To avoid this ambiguity, we only include the data reported by individuals and measured directly as mone- tary loss. We analyze the damage estimates, aggregated within either counties or zip code tabulation areas, against Twit- ter activity in the same boundaries. The data available on damage allows us to look at several aspects, including the total damage claimed, the total damage covered by FEMA and insurance, the number of applications and successful applications, and severity categories based on the cost. We look at the relationship between normalized quantities – per-capita Twitter message count and per-capita damage – to avoid correlations artificially induced by population counts (more populous areas produce higher message counts and experience higher damage). To estimate whether activity quantitatively reflects the severity of the disaster, we test the independence of two distributions: activity versus damage. We consider activity on the core set of messages strongly associated with the hurricane (see supplementary Table S2 for the rankings and Table S3 for the results across all keywords). The estimate of damage is a snapshot from November 2014, while activity varies significantly over the data col- lection period. Both in the interest of capturing predictive capacity and in a practical attempt to determine the best analysis window to get the strongest predictive effect, we calculate the correlations on a daily basis between the 22nd of October and the 12th of November. In addition to examining the activity-to-damage correlation, we also check the sentiment-to-damage correlation. Previous stud- ies [40] suggest that a drop of the average sentiment in an area may indicate an emergency, and we aim to verify whether the sentiment also serves as a quantitative predic- tor of damage. The correlation coefficient dynamics is presented in Figure 3. Because we discard inactive areas – ZCTAs with no messages posted during an analysis period – the length of vectors subject to an independence test varies over time, and we choose to ignore correlation coeffi- cients earlier than October 22 and later than November 11. Within this period, we consistently have more than 200 active ZCTAs, see Figure 3A. Figure 3B shows that the rank correlation coefficients are moderately positive, indicating a weak correlation. The correlation is present for several days before the landfall, which might reflect a-priori knowledge of local hurricane vulnerability based on historical experience within particular areas and obvious risk factors like prox- imity to the shoreline. This positive correlation decreases on the day of landfall across all correlation measures. Despite the highest total count of messages, the peak of the disaster has the weakest damage-predictive power. However, in the following two days, the activity-to- damage correlation steadily increases. From the third day onwards, it fluctuates around a moderate level (0.25 Ken- dall τ and 0.35 Spearman’s ρ). We examined these trends both combining all data as well as for different keywords separately, without much of a difference in pattern or magnitude of coefficients. Arguably, this trend – a drop on the day of the hurri- cane followed by a steady increase in the relationship between activity and damage – could be explained by the universally high tweet activity on the day of hurricane landfall, fuelled not only by the severity of the storm, but also by widespread coverage of the hurricane in all forms of the media. In places that were spared significant con- sequences of the hurricane, the interest of the public quickly diminishes. But in affected areas, the topic persis- tently remains at the top of the agenda and makes post- event activity an indicator of the damage caused by the hurricane. Figure 3 The predictive capacity of Hurricane Sandy’s digital traces. The horizontal axis is an offset in hours with respect to the landfall time of the hurricane (00:00 UTC on October 30, 2012). Panel A shows the number of messages as a function of time (labeled on the secondary y- axis on the right) and the number of “active” – with at least one message posted – zipcode tabulation areas (labeled on the primary y-axis on the left). Panel B shows evolution of the rank correlation coefficients between the normalized per-capita activity (number of the original mes- sages divided by the population of a corresponding ZTCA) and per-capita damage (comprised of FEMA Individual Assistance grants and Sandy-related insurance claims). Additionally, the dashed trend shows Kendall rank correlations between average sentiment and per-capita damage. The correlation rises from pre-landfall to post-landfall stage of the hurricane, with a drop on the landfall day. We conclude that the post-disaster stage, or persistent activity on the topic in the immediate aftermath of an event, is a good predictor of damage inflicted locally. Strength of the average sentiment of tweets does not seem to be a good predictor, at least at this level of spatial granularity (ZCTA resolu- tion). Figure 4 Spatial distributions and mutual correlations between Hurricane Sandy damage, Twitter activity, and average sentiment of tweets. Correlations between per capita Twitter activity and damage are illustrated on ZCTA-level (Panel A) and county level (Panel B). In this nor- malized form both variables follow a quasi log-normal distribution (see the histograms along the axes of scatter plot in Panel A). There is a moderately strong positive correlation between post-landfall activity and damage, with rank coefficients approximately equal at either level of resolution (see inset tables in scatter plots in panels A and B for exact statistics and P-values). ZCTA analysis covers only the state of New Jersey and spatial distribution shows that both activity and damage reach highest levels along the coast and in a densely populated metropol- itan area around New York City. There is no correlation between sentiment and damage at the level of ZCTA granularity (Kendall-tau rank coefficient is -2.52 10-3). County-level analysis in Panel B shows that the strength of the activity-to-damage correlation holds, and there is also weakly negative correlation between sentiment and damage. Focusing on the period where the relationship between activity and damage is the strongest – between October 31 and November 12 – we measure rank correlation coeffi- cients for all ZCTAs in New Jersey and for selected coun- ties in New Jersey and New York. Results are summa- rized in Figure 4 and Figure S4. ZCTA-based distribu- tions of per-capita activity and per-capita damage are ap- proximately log-normal, with histograms shown in Figure 4A. The Kendall rank correlation reaches 0.32, the Spearman rank correlation 0.46, and the Pearson correla- tion coefficient approaches 0.5. Analysis on the basis of counties (Figure 4B) reveals similar results: Kendall τ = 0.34, Spearman ρ = 0.5 and Pearson ρ = 0.47 for 34 counties across New Jersey and New York. All measures are statistically significant with P-values below 0.05 and indicate a moderate positive correlation between damage and tweet activity. Spatial distributions confirm the rela- tionship, with pronounced concentration of both damage and normalized activity along the coastline of New Jer- sey. Alternative normalization (by Twitter user count in- stead of actual population) does not alter the strength of the correlation – see supplementary Table S4. Following Guan and Chen [45], we also analyze the relationship between Twitter activity and damage esti- mates produced by the FEMA Modeling Task Force (based on the Hazus-MH model of hurricane wind and storm surge damage to housing and infrastructure). This approach results in correlations of similar strength (Ken- dall τ = 0.34, Spearman ρ = 0.51 and Pearson ρ = 0.41). Comparison of the alternative damage estimates and their negligible effect on the strength of the observed activity- damage correlation is summarized in the supplementary tables S5 and S6. Our previous study [40] suggested that the negative average sentiment may indicate an emergency situation, based on the fact that the sentiment experiences a drop for a sustained period of time before and after the landfall of Hurricane Sandy. Here, we re-examine the sentiment- damage relationship and find that daily ranking correla- tion coefficients oscillate around zero for the entire ob- servation period (see Figure 3B). Within the most favora- ble prediction window (October 31 to November 12) Kendall τ = -0.029 (P = 0.31), suggesting independence of the underlying distributions, or that analysis at ZCTA- resolution is under-powered. Change of spatial resolution from ZCTAs to counties results in a more definitive rela- tionship with τ = -0.19 (P = 0.11), and normalization by Twitter user count yields more significant results yet – τ = -0.23 (P = 0.06) – confirming our previous findings and making sentiment weakly predictive of damage (see supplementary Table S7 for the summary of results). Discussion and conclusions We found that Twitter activity during a large-scale natural disaster – in this instance Hurricane Sandy – is related to the proximity of the region to the path of the hurricane. Activity drops as the distance from the hurri- cane increases and, after a distance of approximately 1200 – 1500 km, the influence of proximity disappears. Addi- tionally, the areas close to the disaster have a lower frac- tion of re-tweets (more original content) and generate more interest by producing content popular elsewhere – the findings confirmed by other studies [37]. In the first study of its kind based on the actual ex-post damage assessments, we demonstrated that the per-capita number of Twitter messages corresponds directly to disas- ter-inflicted monetary damage. The correlation is espe- cially pronounced for persistent post-disaster activity and is weakest at the peak of the disaster. We established that per-capita activity and per-capita damage both have ap- proximately log-normal distribution and Pearson correla- tion coefficient between the two can reach 0.5 for a care- fully selected observation period in the aftermath of the landfall. This makes social media a viable platform for preliminary rapid damage assessment in the chaotic time immediately after disaster. Our results suggest that, dur- ing a disaster, officials should pay attention to the normal- ized activity levels, rates of original content creation, and rates of content rebroadcast to identify in real time the hardest hit areas. Immediately after a disaster they should focus on persistence in activity levels to assess which areas are likely to need the most assistance. The role of proximity as the primary factor that ex- plains activity suggests that individuals realistically assess danger based on personal experiences [64], and their level of interest is moderated accordingly. The cutoff in the activity-to-distance relationship is on the same order of magnitude as the footprint of a large atmospheric system, indicating that once people feel safe where they are, the level of engagement is uniform and most likely depends on the intensity of media coverage. Activity within the zone of the disaster sharply rises with proximity to its epicenter, probably due to a combination of factors in- cluding heightened anxiety, sense of direct relevance, and observation of the associated effects (wind and precipita- tion, physical damage). Our findings echo other studies, like the correlation of the number of Flickr photos tagged “#sandy” with atmospheric pressure over New Jersey, emphasizing that online activity is increasing with the intensity of the event [43]. What is striking however, with all the different factors that motivate people to tweet, is that a simple normalized measure of this activity – per- capita number of messages – serves as an efficient as- sessment tool for the physical damage caused by the dis- aster. Damage forecasts issued by FEMA’s Modeling Task Force rely on the sophisticated multi-hazard modeling. Although these forecasts are timely (generated before or immediately after a disaster), their verification with aerial imagery and physical site inspections is resource and time-consuming. Social media nowcasting provides addi- tional low-cost tool in the arsenal of authorities to expe- dite the allocation of relief funds. In the long term, the technique can be used to check the integrity of damage assessment process itself, especially in light of protracted settlement timeframes and allegations of irregularities that recently prompted a blanket review of all insurance claims by FEMA [65]. It can be used to inform stochastic optimization algorithms for the joint assessment and re- pair of complex infrastructures such as power systems [59]. The correlation we observed is not definitive in its strength, and care should be taken in the attempt to devise practical applications, however we believe there is poten- tial to fine-tune the method. More robust estimates of damage through other data sources – for instance an in- Knutson TR, et al. (2010) Tropical cyclones and climate change. Nature Geosci 3(3):157- Klomp J & Valckx K (2014) Natural disasters and economic growth: A meta-analysis. Global Cole S, Healy A, & Werker E (2012) Do voters demand responsive governments? Evidence Elsner J, Elsner S, & Jagger T (2014) The increasing efficiency of tornado days in the United Patz JA, Frumkin H, Holloway T, Vimont DJ, & Haines A (2014) Climate change: Challenges clusion of municipal losses and non-monetary indicators like power losses and emergency shelters statistics [63] - may reinforce the relationship. Composite metrics that combine per-capita activity with other properties of Twit- ter message stream, e.g. fraction of disaster related tweets [45] and sentiment (provided that activity is high and the volume of data is sufficient for sentiment to be predic- tive), may prove even more sensitive to damage. More broadly, our study suggests that the distribution of per- capita online activity on a specific topic has potential to describe and quantify other natural, economic or cultural phenomena. References 1. Environmental Change 26(0):183-195. 2. from Indian disaster relief. Journal of Development Economics 97(2):167-181. 3. and opportunities for global health. JAMA 312(15):1565-1580. 4. 163. 5. Webster PJ, Holland GJ, Curry JA, & Chang H-R (2005) Changes in Tropical Cyclone Number, Duration, and Intensity in a Warming Environment. Science 309(5742):1844-1846. 6. States. Clim Dyn:1-9. 7. Mendelsohn R, Emanuel K, Chonabayashi S, & Bakkensen L (2012) The impact of climate change on global tropical cyclone damage. Nature Clim. Change 2(3):205-209. 8. Morss RE, Wilhelmi OV, Meehl GA, & Dilling L (2011) Improving Societal Outcomes of Extreme Weather in a Changing Climate: An Integrated Perspective. Annual Review of Environment and Resources 36(1):1-25. 9. Watts DJ (2007) A twenty-first century science. Nature 445(7127):489-489. 10. Lazer D, et al. (2009) Life in the network: the coming age of computational social science. Science 323(5915):721-723. 11. The virtual lab (2013). Proceedings of the sixth ACM international conference on Web search and data mining. Rome, Italy: ACM. pp. 1-2. 12. Llorente A, Cebrian M, & Moro E (2014) Social media fingerprints of unemployment. arXiv preprint arXiv:1411.3140. 13. Bond RM, et al. (2012) A 61-million-person experiment in social influence and political mobilization. Nature 489(7415):295-298. 14. Conover MD, et al. (2013) The geospatial characteristics of a social movement communication network. PLoS ONE 8(3):e55957. 15. Conover MD, Ferrara E, Menczer F, & Flammini A (2013) The digital evolution of Occupy Wall Street. PLoS ONE 8(5):e64679. 16. O'Connor B, Balasubramanyan R, Routledge BR, & Smith NA (2010) From tweets to polls: Linking text sentiment to public opinion time series. ICWSM 11:122-129. 17. Hodas NO & Lerman K (2014) The Simple Rules of Social Contagion. Sci. Rep. 4. 18. Toole JL, Cha M, & González MC (2012) Modeling the adoption of innovations in the presence of geographic and media influences. PloS one 7(1):e29528. 19. Golder SA & Macy MW (2011) Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures. Science 333(6051):1878-1881. 20. Friendship Paradox Redux: Your Friends Are More Interesting Than You (2013). Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media (ICWSM). pp. 225-233. 21. Garcia-Herranz M, Moro E, Cebrian M, Christakis NA, & Fowler JH (2014) Using Friends as Sensors to Detect Global-Scale Contagious Outbreaks. PLoS ONE 9(4):e92413. 22. Chew C & Eysenbach G (2010) Pandemics in the Age of Twitter: Content Analysis of Tweets during the 2009 H1N1 Outbreak. PLoS ONE 5(11):e14118. 23. Chunara R, Andrews JR, & Brownstein JS (2012) Social and News Media Enable Estimation of Epidemiological Patterns Early in the 2010 Haitian Cholera Outbreak. The American Journal of Tropical Medicine and Hygiene 86(1):39-45. 24. Wang D, Lin Y-R, & Bagrow JP (2012) Social Networks in Emergency Response. Encyclopedia of Social Network Analysis and Mining). 25. Watts D, Cebrian M, & Elliot M (2013) Dynamics of Social Media. Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps, (The National Academies Press), pp 22-33. 26. Van Hentenryck P (2013) Computational disaster management. Proceedings of the Twenty- Third international joint conference on Artificial Intelligence, (AAAI Press), pp 12-18. 27. Hughes AL & Palen L (2009) Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management 6(3):248-260. 28. Freeman M (2011) Fire, wind and water: Social networks in natural disasters. Journal of Cases on Information Technology (JCIT) 13(2):69-79. 29. Skinner J (2013) Natural disasters and Twitter: Thinking from both sides of the tweet. First Monday; Volume 18, Number 9 - 2 September 2013. 30. Myers SA, Sharma A, Gupta P, & Lin J (2014) Information network or social network?: the structure of the twitter follow graph. Proceedings of the companion publication of the 23rd international conference on World wide web companion, (International World Wide Web Conferences Steering Committee), pp 493-498. 31. Guy M, Earle P, Ostrum C, Gruchalla K, & Horvath S (2010) Integration and dissemination of citizen reported and seismically derived earthquake information via social network technologies. Advances in intelligent data analysis IX, (Springer), pp 42-53. 32. Li J & Rao H (2010) Twitter as a rapid response news service: An exploration in the context of the 2008 China Earthquake. The Electronic Journal of Information Systems in Developing Countries 42(4):1-22. 33. Vieweg S, Hughes AL, Starbird K, & Palen L (2010) Microblogging during two natural hazards events: what twitter may contribute to situational awareness. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (ACM), pp 1079-1088. 34. Power R, Robinson B, Colton J, & Cameron M (2014) Emergency Situation Awareness: Twitter Case Studies. Information Systems for Crisis Response and Management in Mediterranean Acknowledgements Authors would like to thank Colleen O’Dea (NJ Spotlight, www.njspotlight.com) for helpful suggestions and advice on obtaining the data for Hurricane Sandy damage, Federal Emergency Management Agency, New Jersey State Department of Banking and Insurance, and New York State De- partment of Financial Services. Yury Kryvasheyeu, Haohui Chen, Pascal Van Hentenryck and Manuel Cebrian acknowledge the support of the Australian Government represented by the Department of Broadband, Communications and Digital Economy and the Australian Research Council through the ICT Centre of Excellence program. This research was also supported by the Army Research Laboratory under Cooperative Agreement Numbers W911NF-09-2- 0053 and W911NF-11-1-0363, the National Science Foundation under grant 0905645, and DARPA/Lockheed Martin Guard Dog Programme under PO 4100149822. Information Systems Imran M, Elbassuoni SM, Castillo C, Diaz F, & Meier P (2013) Extracting information nuggets Countries, Lecture Notes in Business Information Processing, eds Hanachi C, Bénaben F, & Charoy F (Springer International Publishing), Vol 196, pp 218-231. 35. Earle PS, Bowden DC, & Guy M (2012) Twitter earthquake detection: earthquake monitoring in a social world. Annals of Geophysics 54(6):708-715. 36. Sakaki T, Okazaki M, & Matsuo Y (2010) Earthquake shakes Twitter users: real-time event detection by social sensors. Proceedings of the 19th international conference on World wide web:851-860. 37. Kumar S, Hu X, & Liu H (2014) A behavior analytics approach to identifying tweets from crisis regions. Proceedings of the 25th ACM conference on Hypertext and social media, (ACM), pp 255-260. 38. from disaster-related messages in social media. Proc. of ISCRAM, Baden-Baden, Germany. 39. Classifying text messages for the Haiti earthquake (2011). Proceedings of the 8th International Conference on for Crisis Response and Management (ISCRAM2011). 40. Kryvasheyeu Y, Chen H, Moro E, Van Hentenryck P, & Cebrian M (2015) Performance of Social Network Sensors during Hurricane Sandy. PLoS ONE 10(2):e0117288. 41. Wang Q & Taylor JE (2014) Quantifying Human Mobility Perturbation and Resilience in Hurricane Sandy. PLOS ONE 9(11):e112608. 42. Harnessing the crowdsourcing power of social media for disaster relief (2011). DTIC Document. 43. Preis T, Moat HS, Bishop SR, Treleaven P, & Stanley HE (2013) Quantifying the Digital Traces of Hurricane Sandy on Flickr. Sci. Rep. 3:3141. 44. Herfort B, de Albuquerque JP, Schelhorn S-J, & Zipf A (2013) Does the spatiotemporal distribution of tweets match the spatiotemporal distribution of flood phenomena? A study about the River Elbe Flood in June 2013. 45. Guan X & Chen C (2014) Using social media data to understand and assess disasters. Natural Hazards:1-14. 46. Tropical Cyclone Report. Hurricane Sandy (AL182012) 22 – 29 October 2012 (2013). National Hurricane Center. 47. Topsy Labs (2012), Topsy website. Available: http://www.topsylabs.com, Accessed 2012 November 20 48. Pennebaker J, Francis M, & Booth R (2001) Linguistic inquiry and word count. LIWC2001 (Mahwah, NJ: Erlbaum Publishers). 49. Thelwall M, Buckley K, Paltoglou G, Cai D, & Kappas A (2010) Sentiment strength detection in short informal text. Journal of the American Society for Information Science and Technology 61(12):2544-2558. 50. Bettencourt L & West G (2010) A unified theory of urban living. Nature 467(7318):912-913. 51. Bettencourt LM, Lobo J, Helbing D, Kühnert C, & West GB (2007) Growth, innovation, scaling, and the pace of life in cities. Proceedings of the National Academy of Sciences 104(17):7301-7306. 52. Becker GS, Glaeser EL, & Murphy KM (1999) Population and economic growth. American Economic Review:145-149. 53. Crane P & Kinzig A (2005) Nature in the Metropolis. Science 308(5726):1225. 54. Jacobs J (1969) The economy of cities (Random House). 55. Chapin FS (1974) Human activity patterns in the city: Things people do in time and in space (Wiley New York). 56. Scott AJ (1997) The cultural economy of cities. International journal of urban and regional research 21(2):323-339. 57. Harrington JR & Gelfand MJ (2014) Tightness–looseness across the 50 united states. Proceedings of the National Academy of Sciences 111(22):7990-7995. 58. National Hurricane Center (2013), NHC GIS Archive - Tropical Cyclone Best Track (AL182012). http://www.nhc.noaa.gov/gis/archive_besttrack_results.php?id=al18& year=2012&name=Hurricane SANDY, Accessed 2013 February 12 59. Joint Assessment and Restoration of Power Systems (2012). ECAI. pp. 792-797. 60. Federal Emergency Management Agency (2014), Archived Housing Assistance Program Data. Available: http://www.fema.gov/media-library/assets/documents/30714?id=6963 61. Open Public Records Act data request #C91085 (2014). Department of Banking & Insurance, State of New Jersey 62. Freedom of Information Law request #2014-001128-NYC (2014). Department of Financial Services, New York State. 63. Halpin S (2013) The Impact of Superstorm Sandy on New Jersey Towns and Households. Rutgers-Newark: School of Public Affairs 111. 64. Howe P, Boudet H, Leiserowitz A, & Maibach E (2014) Mapping the shadow of experience of extreme weather events. Climatic Change 127(2):381-389. 65. New York Times, FEMA to Review All Flood Damage Claims From Hurricane Sandy. Available: http://www.nytimes.com/2015/03/13/nyregion/fema-to-review-hurricane-sandy-flood- claims-amid-scandal-over-altered-reports.html?_r=0, Accessed 12 March 2015 Available: Nowcasting Disaster Damage: Supplementary Information. Yury Kryvasheyeu a,b, Haohui Chen a,b, Nick Obradovich c,d, Esteban Moro e, Pascal Van Hentenryck a,f, James Fowler c,g, and Manuel Cebrian a,h,* a National Information and Communications Technology Australia, Melbourne, Victoria 3003, Australia; b Faculty of Information Technology, Monash University, Melbourne, Victoria 3145, Australia; c Department of Political Science, University of California at San Diego, La Jolla, California 92093, USA; d Center for Marine Biodiversity and Conservation, Scripps Institution of Oceanography, La Jolla, California 92093, USA; e Department of Mathematics & GISC, Universidad Carlos III de Madrid, Madrid, Leganés 28911, Spain; f Research School of Computer Science, Australian National University, Canberra, ACT 0200, Australia; g Division of Medical Genetics, University of California at San Diego, La Jolla, CA 92093; h Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California 92093, USA a *Corresponding author: MC, [email protected] Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy’s path and hurricane-related social media activity. We show that real and perceived threats – together with the physical disaster effects – are directly observable through the intensity and composition of Twitter’s message stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Our findings suggest that massive online social networks can be used for rapid assessment (“nowcasting”) of damage caused by a large-scale disaster. Table S1 List of keywords included in the analysis, with their corresponding message counts. Keyword power sandy hurricane weather storm gas Governor stay safe recovery climate FEMA flooding no power climate change wall st blackout mta frankenstorm Cuomo prayforusa Count 4 825 717 4 745 099 4 680 290 3 333 025 2 555 196 1 991 524 498 135 484 732 431 591 420 217 329 789 264 132 261 998 236 009 233 411 213 520 206 504 205 467 92 014 91 293 Figure S1 Normalized local activity on the topic as a function of distance to the hurricane path. For the words strongly related to Hurricane Sandy (top row) activity decreases with distance, and after the distance of 10-15 de- grees (1200 – 1500 km) proximity does not affect the level of activity. Because if this, and also because for some words (“gas”, “power”, etc.) trends for East and West coasts differ, we use rank correlation for East coast cities as a measure of relevance. The values of these correlation coefficients between activity and distance are shown in insets. Figure S2 Originality of the content, expressed through the fraction of re-tweets in the stream of messages. Most of the words show the inverse relationship between normalized activity and re-tweet rate; however, in the event-related keywords this trend is more pronounced (compare “sandy” or “frankenstorm” with “weather” or “climate”). Figure S3 Global popularity of local content. Words are sorted, as in Figure S1, according to relevance based on the strength of activity-distance correlation for East Coast cities. Event-related keywords show a strong linear relation- ship between activity and global popularity of messages generated locally. As relevance of the word to the disaster weakens, so does the correlation between activity and popularity. Table S2 Ranking of the keywords included into analysis according to strength of the correlation between the distance and activity for East Coast cities. Event- and effect-related words on the top are used for further analysis of activity, including its relationship to dam- age. Spearman rank ρ -0.851 -0.8240 -0.778 -0.735 -0.731 -0.71 -0.673 -0.651 -0.470 -0.382 -0.365 -0.306 -0.284 -0.089 -0.134 -0.122 -0.101 -0.091 0.087 -0.038 P-value 1.28 10-11 2.02 10-10 9.26 10-9 1.5 10-7 1.84 10-7 5.82 10-7 3.74 10-6 9.46 10-6 0.003 0.018 0.024 0.062 0.084 0.596 0.422 0.467 0.545 0.585 0.604 0.822 keyword hurricane storm sandy power flooding frankenstorm no power Governor blackout weather mta FEMA Cuomo climate change gas stay safe climate prayforusa wall st recovery Kendall rank τ -0.690 -0.644 -0.596 -0.548 -0.548 -0.533 -0.519 -0.477 -0.343 -0.272 -0.231 -0.215 -0.179 -0.084 -0.081 -0.081 -0.081 -0.05 0.044 -0.038 P-value 1.07 10-9 1.23 10-8 1.38 10-7 1.29 10-6 1.29 10-6 2.42 10-6 4.46 10-6 2.54 10-4 0.002 0.016 0.042 0.058 0.113 0.458 0.474 0.474 0.474 0.66 0.697 0.734 Table S3 Activity-damage correlations across keywords, in order of decreasing strength. Note that event-related keywords (on the basis of activity-distance relationship) are most predictive of damage. For the final analysis we use the following selection: “sandy”, ”hurricane”, ”storm”, ”power”, and “flooding” (“mta” is excluded because of insuffi- cient number of active ZCTAs) keyword sandy flooding power hurricane mta no power storm gas blackout climate Governor change FEMA prayforusa frankenstorm climate recovery stay safe Cuomo weather wall st active ZCTAs 517 169 532 494 65 450 478 505 207 97 282 272 4 52 128 255 209 71 476 83 Kendall rank τ 0.33 0.27 0.26 0.26 0.24 0.21 0.21 0.18 0.18 0.19 0.17 0.16 0. 0.13 0.13 0.12 0.097 0.071 0.067 0.067 P-value 4.3 10-29 1.3 10-7 8.1 10-20 6.2 10-18 5.3 10-3 2.3 10-11 1.4 10-11 6.2 10-10 7.9 10-5 6. 10-3 3.1 10-5 6.5 10-5 1. 1.7 10-1 2.6 10-2 3.3 10-3 3.7 10-2 3.8 10-1 2.8 10-2 3.7 10-1 Spearman rank ρS P-value 2.2 10-29 0.47 7. 10-8 0.4 1.2 10-19 0.38 1.3 10-17 0.37 5.1 10-3 0.34 4.7 10-11 0.3 1.6 10-11 0.3 2.3 10-10 0.28 1. 10-4 0.27 8.6 10-3 0.27 2.9 10-5 0.25 9.5 10-5 0.23 8. 10-1 0.2 1.6 10-1 0.2 2.9 10-2 0.19 3.6 10-3 0.18 3.6 10-2 0.15 2.9 10-1 0.13 2.7 10-2 0.1 3.9 10-1 0.096 Pearson ρP 0.5 0.37 0.42 0.38 0.36 0.31 0.31 0.32 0.31 0.28 0.29 0.24 0.52 0.094 0.2 0.2 0.16 0.32 0.17 0.08 P-value 2.4 10-34 5.5 10-7 5.2 10-24 1. 10-18 3.7 10-3 9.3 10-12 3.5 10-12 9. 10-14 6.5 10-6 6.2 10-3 8. 10-7 8.4 10-5 4.8 10-1 5.1 10-1 2. 10-2 1.1 10-3 1.7 10-2 5.7 10-3 1.8 10-4 4.7 10-1 Figure S4 Comparison of predictive capacity of activity and sentiment. The figure maps all zipcode tabulation areas shaded by color, with saturation reflecting discrepancy of the area’s rank in two corresponding distributions. For in- stance, if a particular zipcode is 5th in the ranking of activity, but 100th in the ranking of damage the discrepancy is equal to 95. Discrepancies are normalized by the maximum observed deviation. The stronger the correlation is be- tween the distributions the more uniform and light the map would be, as is the case for activity-vs.-damage map on the left. Table S4 Effect of normalization variable choice on the strength of activity-damage relationship (ZCTA-resolution) Variables normalized by … … Census population statistic 0.32 0.46 0.49 P-value 2.58 10-29 1.92 10-29 8.18 10-34 … “Twitter population” P-value statistic 8.35 10-29 2.92 10-29 6.7 10-34 0.32 0.45 0.49 Correlation measure Kendall τK Spearman ρS Pearson ρP Table S5 County level estimates of damage: modeling (Hazus-MH) and ex-post data on insurance and FEMA Indi- vidual Assistance grants. Damage estimates ex-post, $M Hazus-MH, $M County Atlantic Bergen Burlington Camden Cape May Cumberland Essex Gloucester Hudson Middlesex Monmouth Ocean Passaic Salem Union Bronx Kings Nassau New York Orange Putnam Queens Richmond Rockland Suffolk Ulster Westchester Population 275422 918888 451336 513539 96304 157785 787744 289586 652302 823041 629384 580470 502885 65774 543976 1408473 2565635 1349233 1619090 374512 99607 2272771 470728 317757 1499273 181791 961670 Tweets 1580 9516 1684 1004 997 521 8260 1106 9322 8070 8246 4404 3840 122 5946 2459 10040 9085 50767 1310 568 9453 3538 2046 11851 400 6347 Users 574 2727 670 588 331 265 1908 470 2140 2102 1865 1052 1237 92 1360 944 3111 2363 15558 608 218 2662 699 509 3119 233 2234 954 729 54.6 147 29.3 12.7 844 6.29 314 406 919 587 41.8 18.6 87.2 50.6 660 1590 252 39.2 0.2 832 353 83.3 569 0.524 237 1630 1070 164 103 740 128 375 151 3600 776 1930 3240 34.2 167 395 635 5470 6860 4820 22.7 0.405 3650 1880 86.8 2720 8.03 1320 Table S6 Strength of activity-damage correlations for different damage estimates … by modeling (Hazus-MH) … from insurance and FEMA claims Damage is estimated … statistic 0.29 0.45 0.37 P-value 0.035 0.020 0.056 statistic 0.34 0.50 0.40 P-value 0.013 0.007 0.036 Correlation measure Kendall τK Spearman ρS Pearson ρP Table S7 Predictive power of sentiment, analyzed at different spatial resolutions and normalized either by the area Census population or local Twitter user count (“Twitter population”) Normalization Census population Twitter users count statistic -0.029 -0.07 P-value 0.31 0.014 Kendall τ for sentiment-damage relationship County ZCTA statistic -0.19 -0.23 P-value 0.11 0.06
1807.06655
1
1807
2018-07-17T20:20:41
Devam vs. Tamam: 2018 Turkish Elections
[ "cs.SI" ]
On June 24, 2018, Turkey held a historical election, transforming its parliamentary system to a presidential one. One of the main questions for Turkish voters was whether to start this new political era with reelecting its long-time political leader Recep Tayyip Erdogan or not. In this paper, we analyzed 108M tweets posted in the two months leading to the election to understand the groups that supported or opposed Erdogan's reelection. We examined the most distinguishing hashtags and retweeted accounts for both groups. Our findings indicate strong polarization between both groups as they differ in terms of ideology, news sources they follow, and preferred TV entertainment.
cs.SI
cs
Devam vs. Tamam: 2018 Turkish Elections Mucahid Kutlu1, Kareem Darwish2, and Tamer Elsayed1 1 Qatar University, Qatar 2 Qatar Computing Research Institute, HBKU, Qatar [email protected] [email protected] [email protected] Abstract. On June 24, 2018, Turkey held a historical election, trans- forming its parliamentary system to a presidential one. One of the main questions for Turkish voters was whether to start this new political era with reelecting its long-time political leader Recep Tayyip Erdogan or not. In this paper, we analyzed 108M tweets posted in the two months leading to the election to understand the groups that supported or op- posed Erdogan's reelection. We examined the most distinguishing hash- tags and retweeted accounts for both groups. Our findings indicate strong polarization between both groups as they differ in terms of ideology, news sources they follow, and preferred TV entertainment. Keywords: Turkish Elections, Erdogan, Turkey, Political Polarization 1 Introduction On April 18, 2018, the Turkish president Recep Tayyip Erdogan announced early elections for the presidency and the parliament that would bring into force the constitutional changes that were approved by referendum on April 16, 2017. The constitutional changes would transform Turkey from a parliamentary system to a presidential system. With the office of the president enjoying significantly increased powers, these elections are highly consequential for Turkey. There were several presidential candidates representing the different Turkish political blocks such as conservatives, seculars, nationalists, and Kurds. Given the front runner status of the incumbent candidate Recep Tayyib Erdogan, we focus in this paper on those who support him and those who oppose him in favor of other candidates. Ten days after the announcement of the elections, we started to crawl tweets by tracking keywords relevant to the elections. As of June 23, 2018 (i.e., until the elections), we crawled 108M tweets. Using a semi-automatic labeling followed by a label propagation method, we labeled roughly 652.7K twitter users, of which 279.2K are pro-Erdogan and 373.5K are anti-Erdogan. Next, we analyzed the most distinguishing hashtags and retweeted accounts for each group. In our analysis, we found that anti- and pro-Erdogan groups follow different news media, have different demands from the governments and even watch different TV series, suggesting strong polarization that goes beyond political preferences. 2 Kutlu et al. 2 Background Turkey has been enjoying democratic elections since 1950. While official results are announced by Supreme Election Council of Turkey3, votes are counted by the members of political parties collectively, with each of them obtaining a copy of election results for each ballot box. Furthermore, elections and the counting process are also observed by international institutions. Therefore, the election process is usually considered secure and the results are accepted peacefully by all political parties. As a result of referendum on April 16, 2017, Turkey has made significant changes in its constitution, giving more power to the president. While the first election with the new constitution had been scheduled for 2019, the Turkish president Recep Tayyip Erdogan announced early elections to be held on June 24, 2018. In this election, Turkish citizens cast two different ballots, one for the presidency and the second for parliament. Voter participation rate in both ballots was 86.24%. Eight political parties participated in parliamentary elections, namely: 1. The Justice and Development Party (AKP) which is Erdogan's party 2. The Nationalist Movement Party (MHP) 3. The Republican People's Party (CHP) 4. The People's Democratic Party (HDP) 5. The Iyi (good) Party (IYI) 6. The Saadet (felicity) Party (SP) 7. The Free Cause Party (Huda-Par) 8. The Motherland Party (VP) These parties offer a wide ideological spectrum for Turkish voters. For the first time in Turkish elections history, parties were also allowed to make alignments for parliamentary elections. AKP and MHP formed the "Public's Alignment", while CHP, IYI and SP formed the "Nation's Alignment", bringing parties with different ideological background together. Table 1 lists the political parties who participated in parliamentary elections and their election results. In the presidential elections, there were 6 candidates, namely Recep Tayyip Erdogan (AKP), Muharrem Ince (CHP), Selahattin Demirtas (HDP), Meral Aksener (IYI), Temel Karamollaoglu (SP), and Dogu Perincek (VP). MHP and Huda-Par announced their support for Erdogan in the presidential election. Ta- ble 2 lists the results of the presidential election. Other organizations with political influence include the Liberal Democratic Party, which is a liberal party, and the Hizmet Hareketi (service movement), which is a civil movement that the government refers to it as Gulenist Terror Organization (FET O) and accuses it of orchestrating the failed coup attempt in 2016. Also, Kemalist ideology, referring to principals of Mustafa Kemal Ataturk, is prevalent in Turkey, with adherents belonging to varying secular and nation- alist parties. 3 http://www.ysk.gov.tr/ Devam vs. Tamam: 2018 Turkish Elections 3 Party Description AKP MHP CHP IYI Erdogan's party Turkish nationalist party Secular party founded by Ataturk Turkish nationalist party founded by mostly ex-members of MHP Islamist party Secular Kurdish party that is mostly criti- cized for not distancing itself from the Kur- distan Workers Party (PKK), which is con- sidered a terrorist group by Turkey, USAb and many European countries. SP HDP Huda-Par Kurdish Islamist party VP Left-wing nationalist party None None Alignment Election Resultsa Public 42.56% 11.1% Public 22.65% Nation Nation 9.96% Nation None 1.34% 11.7% 0.31% 0.23% Table 1. Political parties participated for parliamentary elections on June 24, 2018. Abbreviations are used based on their official Turkish name. a http://ysk.gov.tr/doc/dosyalar/docs/24Haziran2018/KesinSecimSonuclari/ 2018MV-96C.pdf b https://www.state.gov/j/ct/rls/other/des/123085.htm Candidate Name Recep Tayyip Erdogan AKP CHP Muharrem Ince HDP Selahattin Demirtas Meral Aksener IYI Temel Karamollaoglu SP Dogu Perincek VP Party Election Resultsa 52.59% 30.64% 8.40% 7.29% 0.89% 0.20% Table 2. Presidential candidates and election results. a http://ysk.gov.tr/doc/dosyalar/docs/24Haziran2018/KesinSecimSonuclari/ 2018CB-416D.pdf 3 Data Collection and Labeling We collected tweets relating to Turkey and the elections starting on April 29, 2018 until June 23, 2018 – the day before the election. We tracked keywords related to the elections including political party names, candidate names, popu- lar hashtags during this process (e.g., #tamam and #devam), famous political figures (e.g., Abdullah Gul, the former president of Turkey) and terms that may impact people's vote (e.g., economy, terrorism and others). We wrote keywords in Turkish with Turkish alphabet, which contains some additional letters that do not exist in the English alphabet (e.g., ¸c, g, u). Next, we added versions of these keywords written strictly with English letters (e.g., "Erdogan" instead of "Erdogan") allowing us to catch non-Turkish tweets about elections. 4 Kutlu et al. In the process we collected 108 million tweets. Our first step was to label as many users by their stance as possible. The labeling process was done in two steps, namely: – Manual labeling based on user names. We assigned labels to users who explicitly specify their party affiliation in their Twitter name and screen name. We made one simplifying assumption, namely that the supporter of a particular party would be supporting the candidate supported by their party. We extracted a list of users who use "AKParti" (official abbreviation of AKP), "CHP", "HDP", or "IYI" in their Twitter user or screen name. We labeled the people who used "AKParti" as "pro-Erdogan", while the rest as "anti-Erdogan". Though "MHP" officially supported Erdogan in the elec- tion, we feared that the MHP supporters might not be universally supporting Erdogan. Further, the incumbent and front runner status of Erdogan caused his sup- porters to use the hashtag #devam (meaning "'continue") and his oppo- nents regardless of their political affiliation to use the hashtag #tamam ("enough"). Thus, we labeled users who had the hashtags #devam or #tamam in their profile description as supporting or opposing Erdogan. Lastly, users who had the hashtag #RTE (Recep Tayyip Erdogan) in their profile descrip- tion were labeled as pro-Erdogan. While providing a political party name as a part of twitter user profile is a strong indication of supporting the respective party, we manually checked all extracted names to ensure the correctness of labels. For instance, we found that some users expressed that they are against a particular party in their user name instead of supporting it. Therefore, whenever we suspected that keywords we used for labeling were not indicative of their political view, we manually investigated the accounts and removed their labels if their political views were unclear. Table 3 shows the number of our manual labels. – Label propagation. Label propagation automatically labels users based on their retweet behavior [4]. The intuition behind this method is that users that retweet the same tweets most likely share the same stances on the topics of the tweets. Given that many of the tweets in our collection were actually retweets or duplicates of other tweets, we labeled users who retweeted 10 or more tweets that were authored or retweeted by the pro- or anti- groups and no retweets from the other side as pro- or anti- respectively. We iteratively performed such label propagation 11 times, which is when label propagation stopped labeling new accounts. After the last iteration, we were able to label 652,729 users of which 279,181 were pro-Erdogan and authored 28,050,613 tweets and 373,548 were anti-Erdogan and authored 31,762,639 tweets. Fig- ure 1 shows the histogram of the pro- and anti-Erdogan tweets for the period of study. As the figure shows, interest in the election has steadily increased on average as the election day approached. There was a large drop in tweet activity around June 15, which corresponds to the end of Ramadan holiday (Ramazan Bayramı) and is a public holiday. Also, the anti-Erdogan group Devam vs. Tamam: 2018 Turkish Elections 5 produced a greater number of tweets on most days, with the gap widening in the last few days of the campaign. Supporters pro-Erdogan anti-Erdogan w/out party affiliation pro-CHP pro-IYI Party pro-HDP No. of Labeled Users 1,777 2,134 833 900 357 Table 3. Number of Manually Labeled Users (3,866 Unique Users). Fig. 1. Histogram of pro- and anti-Erdogan tweets 4 Analysis Next we analyzed the data to ascertain the differences in interests and focus between both the pro- and anti-Erdogan groups as expressed by the hashtags that they use and the accounts that they retweet. Doing so can provide valuable insights into both groups [1,2] To compute a relative importance score that accounts for the frequency of use by either group and the gap in use between both camps, we used the following formula: score = tp ∗ tpr ∗ (1 − f pr) (1) 6 Kutlu et al. where tp and f p are the number of times used by 1st and 2nd groups respectively, tpr is the ratio within 1st group (tp/totalA), and f pr is the ratio within 2nd group (f p/totalB). Thus, the greater the usage within a group and the disparity between usages in both groups, the greater the score. This formula is a variation on the Odds Ratio Numerator [3]. Tables 4 and 5 list the top 50 hashtags and top 50 retweeted accounts for both groups organized by category. Table 8 summarizes both tables and provides percentages for each category. As the Table 8 shows, more than 51% of hashtags used by the pro-Erdogan group were in positive praise of Erdogan and AKP, Erdogan's party, compared to 10.8% of the hashtags dedicated to attacking other presidential candidates and their parties. This ratio is roughly 5 to 1. On the other side, roughly a third of the hashtags on the anti-Erdogan camp praised the other presidential candidates and their parties and roughly a fifth of the hashtags were attacking Erdogan and AKP. This ratio 1.7 to 1. The large difference in ratio could be explained by the front runner status of Erdogan, where his proponents did not need to attack his opponents and instead needed to maintain a positive message. Though both groups discussed different social issues such as retirement, compulsory military service, and animal rights, the Palestinian issue featured prominently for the pro-Erdogan group. We proceeded to compare both groups based on the Palestinian issue by considering the union of the top 20 hashtags that mention Jerusalem (Turkish: Kudus, English: Quds), Palestine (Turkish: Filistin, English: Palestine), or Nakba (meaning: catastrophe in Arabic) for both groups. As the comparison in Table 10 shows, though both groups tweeted about the issue, the pro-Erdogan group were more than 6 times more likely to mention the Palestinian issue. Further, though some hashtags were common to both groups, some were dominated by one group. For future work, we plan to see if this discrepancy between both groups are an artifact of the climate surrounding the election or the difference more systematic. One of the things that caught our eye is the appearance of the names TV series in the top 50 hashtags. Thus, we were curious if other TV series that users from both group refer to. We obtained a list of 320 Turkish TV series that aired since 2014 to the present from Wikipedia4. Table 11 lists the series that were mentioned as hashtags with their full names at least 500 times and the percentage and count of mentions for both pro- and anti-Erdogan groups. Two observations are quite apparent: – TV series preferences follow directly from political positions and show a very high level of polarization. For example, the top 3 series in the table are mentioned more than 99% of the times by anti-Erdogan users. – Anti-Erdogan users refer to TV series much more often than pro-Erdogan users suggesting that they are larger consumers of TV series. We also examined the top retweeted accounts for anti- and pro-Erdogan ac- counts. We manually checked the accounts to identify their identity and political 4 https://en.wikipedia.org/wiki/List_of_Turkish_television_series Devam vs. Tamam: 2018 Turkish Elections 7 view. In order to identify political view of users, we checked their profile descrip- tions, most recent tweets and also profile pictures. For instance, users who use a picture of Ataturk for their profile or background image are assumed to be "Kemalist/Ataturkist". Concerning the top retweeted accounts (Tables 6, 7, and 9), there are a few interesting patterns, namely: – Official party accounts and ranking party member accounts accounted from the majority of retweets for the anti-Erdogan group (51.8% – 3.04 M tweets), while such accounts constituted roughly a third of retweeted accounts for the pro-Erdogan group (33.5% – 1.52 M tweets). – The most retweeted journalist by pro-Erdogan accounts are either freelance journalists or work for online news portals. Only two journalist work at reg- ular newspapers (Gunes and Posta). On the other hand, all top retweeted journalists by anti-Erdogan accounts work (or have worked before) at pop- ular TV channels or newspapers. – Both groups retweet tweets from regular people who seems popular on social media. However, we often observed strong ideological or political positions in these accounts. For example, 4 (out of 9) of the top retweeted accounts by anti-Erdogan group use pictures of Ataturk in their profile suggesting that they are Kemalists. Conversely, 2 (out of 6) of the top retweeted accounts by pro-Erdogan group use the picture of Erdogan in their profile. None of the regular accounts retweeted by pro-Erdogan group is identified as Kemalist. – Both groups retweeted accounts that don't have a clear owner such as RTE- Canli (Erdogan Live), which is dedicated to spreading positive news about Erdogan, and siyasifenomen (political phenomena), which is a dedicated anti- AKP account. However, the percentage of such retweets for the pro-Erdogan group was 24% compared to 10.7% for anti-Erdogan group. – Pro-Erdogan accounts were far more likely to retweet state media, while anti- Erdogan group rarely do so. For example, TRTHaber was retweeted 70,711 and 1,289 times by the pro-Erdogan and anti-Erdogan groups respectively. Also, AnadoluAjansi was retweeted 61,623 and 1,232 times for both groups respectively. This is not surprising given that we observed the hashtag #ka- patgitsin (Turn off (state media)) being used by the anti-Erdogan group. On the other hand, the anti-Erdogan group was far more likely to retweet foreign news sources. For example, sputnik TR was retweeted 64,767 and 4,907 times by the anti- and pro-Erdogan groups, respectively. Similarly, the retweet counts for BBC Turkce were 47,314 and 2,376 for both groups, respectively. – While Erdogan uses anti-FETO/PKK rhetoric in his political campaigns very frequently, only 2.7% of retweets belong to accounts dedicated to the opposition of these groups. 5 Conclusion This paper presents an analysis of pro- and anti-Erdogan Twitter users using more than 108 million tweets related to the Turkish election that were collected 8 Kutlu et al. from the period between April 29 and June 23, 2018. We semi-automatically labeled a few thousands users based on their stance towards Erdogan and then we used label-propagation to tag more than 652 thousand users. We examined the most distinguishing hashtags and retweeted accounts for both groups. Our results show strong polarization that go beyond political preferences and extend to which channels people watch and which television series people follow. References 1. Darwish, K., Magdy, W., Rahimi, A., Baldwin, T., Abokhodair, N.: Predicting on- line islamophopic behavior after# parisattacks. The Journal of Web Science 3(1) (2017) 2. Darwish, K., Magdy, W., Zanouda, T.: Trump vs. hillary: What went viral during the 2016 us presidential election. In: International Conference on Social Informatics. pp. 143–161. Springer (2017) 3. Forman, G.: An extensive empirical study of feature selection metrics for text clas- sification. Journal of machine learning research 3(Mar), 1289–1305 (2003) 4. Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., Baldwin, T.: # isisisnotislam or# deportallmuslims?: Predicting unspoken views. In: Proceedings of the 8th ACM Conference on Web Science. pp. 95–106. ACM (2016) Devam vs. Tamam: 2018 Turkish Elections 9 Category pro-Erdogan/ Establishment VakitTurkiyeVakti Hashtag devam Freq. Description 286,463 "continue" 270,134 AKP slogan "It is Turkey time" 65,519 AKP 52,875 "Turkey is developing (AKP) 46,201 "We are Erdogan" 45,625 Erdogan 39,573 "Erdogan means" AKParti TurkiyeS¸ahlanıyor WeAreErdogan Erdogan ErdoganDemek MilletinAdamı-MilletinAdayı 27,812 "the man of the nation, the candidate of the nation" IftiharVakti VakitAnkaraVakti DurmakYokYolaDevam AKKadınlarSahada 26,522 "time to be proud" 25,439 "It is Ankara's time" (AKP) 24,269 "no stopping" 23,911 "women of AK Party are on the field", tweets reporting VakitErzurumVakti SendeDestekOl ZumruduAnka OyumAKPartiye HazırızTurkiye BuyukLider-Istanbulda VakitIstanbulVakti VakitAdanaVakti IVoteBtsbbmas premiosmtvmiaw MTVLakpopbts Survivor2018 MTVBrkpopbts TV shows Election related 24Haziran Historical Events Anti-Opposition KimlerKimlerleBeraber 27Mayıs ba¸saramayacaksınız Issues Positions CHP GelBakalımMuharrem hatırla YıkımIttifakı Pro Palestine WeStandForQuds Nakba70 Kudus KudusI¸cinYeniKapıdayız Socio-economic UzmanC¸ avu¸slarKimsesizMi UzmanC¸ avu¸slarHakBekliyor 4clilerKagıt Uzerinde4bli gthb5bin Pro Huda-par dogrusuHudapar HudaparDiyorKi Pro MHP MHP Anti FET O 26NisanFetoKumpası their activities for elections 22,959 "It is Erzurum's time" (AKP) 22,611 "you too support" pro-erdogan 22,543 "emrald mythical bird" (Erdogan poem) 22,117 "my vote to AKP" 21,715 "Turkey, we are ready" 21,656 "Great leader is in Istanbul" 20,257 "It is Istanbul's time" (AKP) 20,245 "It is Adana's time" (AKP) 225,714 Music Awards 81,629 Music Awards 71,465 Music Awards 23,838 TV show 21,003 Music Awards 93,854 The election day 36,851 "27 May", reminding the coup happened on 27 May, 1960. 48,524 "who is with who" (anti CHP and HDP) 43,458 "you will not win" pro-erdogan slogan against anti- erdogan slogan "we will win" 36,691 CHP 24,457 "Come here Muharrem" (anti-Ince) 22,437 "remember (how turkey has developed)" 22,175 "destruction agreement" (anti-opposition) 38,203 "We stand with Jerusalem" 31,340 70 years anniversary "Nakba" (Palestinian catastrophe) 26,483 "Jerusalem" 23,339 "We are at Yenikapi for Jerusalem", calling for a rally in Yenikapi neighborhood of Istanbul 33,530 "are sergeants alone" demanding better pay 21,626 "Sergeants are waiting for their rights" 22,903 Government officers are demanding better pay 25,745 Demanding positions for agriculture engineers 23,278 "Huda-par is the right one" 20,467 "Huda-par is saying that" 33,876 MHP 20,607 anti FETO Table 4. Top 50 pro-Erdogan hashtags 10 Kutlu et al. Category Issues Hashtag BedelliAskerlik EmeklilikteYa¸saTakılanlar EYT HayvanaS¸iddetSu¸ctur Dolar Euro Anti-Erdogan/ Tamam Establishment Erdogan Pro-party slogans/ candidates TV shows Freq. Description 202,877 military service – pay not to go 146,780 demand for early retirement 75,858 demand for early retirement 15,652 "violence for animals is a crime" pro animal rights 47,010 currency devaluation 24,978 currency devaluation 232,829 enough (anti-Erdogan) 57,018 Erdogan 17,515 "Turn off" (anti state media) 17,146 "we are bored" (tamam – enough) 27,287 AKP 29,060 CHP 28,823 "what did Kilicdaroglu say" Quotes from the party leader 26,485 CHP candidate on CNN Turk 23,473 CHP candidate on NTV at 9:00 pm 21,565 "the star of this election is Ince" CHP candidate 19,230 "Coming for the nation" (CHP) 15,663 "muharrem ince because" CHP candidate 81,140 CHP candidate 77,139 "We will achieve(CHP) 53,640 "President for All" (CHP) KapatGitsin Sıkıldık AKP CHP MuharremInce Ba¸saracagız Hepimizin-Cumhurba¸skanı MuharremInce-HaberTurkde 36,009 CHP candidate on Haber Turk CHP Kılı¸cdarogluNeSoyledi MuharremInce-CNNTurkde MuharremInce-21deNTVde BuSe¸ciminYıldızıInce MilletI¸cinGeliyoruz MuharremInceC¸ unku HDP demirta¸s hdp SenleDegi¸sir IYI YuzunuGune¸seDonTurkiye Saadet Party degi¸stir Vatanim Sensin TV series VatanımSensin hileon VatanımSensinVeda MirayDaner BoranKuzum Survivor TV show survivor2018 Hilmur Siyah & Beyaz A¸sk SiyahBeyazA¸sk Asfer 71,986 HDP candidate 54,983 HDP 35,878 "it changes with you" (HDP) 49,742 39,894 39,452 15,690 15,314 29,514 20,561 59,731 "Turn your face to the sun" (IYI) 30,288 "change" (Saadet) Election related AdaylaraSoruyorum Historical Events News Media 24Haziran se¸cim2018 19Mayıs1919 Gezi5Ya¸sında GazeteSozcu 28,623 18,451 30,697 ask the candidates (TV) 17,456 election day 15,309 2018 elections 26,205 anniversary of Ataturk Youth and Sport Festivala 33,718 5 year anniversary of Gezi protests 26,744 Sozcu Newspaper, Secular Kemalist newspaper Table 5. Top 50 anti-Erdogan hashtags a the date assumed as Ataturk started the Independence War of Turkey Devam vs. Tamam: 2018 Turkish Elections 11 Category AKP Account RT Erdogan Akparti 06melihgokcek Freq. Description Identity Erdogan AKParti Ibrahim Melih Gok¸cek Savcı Sayan Suleyman Soylu 70,429 minister of interior affairs 388,555 Official account 328,863 Official account 165,588 ex-governor of Ankara SavciSayan suleymansoylu bayramsenocak Bayram ¸senocak 54,089 Head of Istanbul branch of AKP drbetulsayan 75,689 Old CHP member but currently an AKP member BurhanKuzu mahirunal Gov accounts tcbestepe Journalists/ analysts Accounts with nicknames MHP Regular Twitter users Anti- FETO/PKK accounts Media 45,013 Erdogan's advisor and spokesman of Presidency 162,739 Journalist, analyst 88,083 Journalist, analyst 66,679 Freelance journalist 64,025 Journalist at Gunes Newspaper 43,711 co-founder of AKP 39,541 Spokesman of AKP 222,061 Official presidency account Dr. 44,006 ex-minister Dr. Betul Sayan Kaya Prof. Burhan Kuzu Mahir unal Erdogan Binali Yıldırım 101,918 Prime minister Ibrahim Kalın Fatih Tezcan Omer Turan Malik Ejder Turgay Guler Abdurrahman Uzun TC Basbakan ikalin1 fatihtezcan omerturantv Malikejder47 turgayguler HarunAlanoglu Harun Alanoglu 49,986 Analyst AsliAyDincer Aslı Ay Din¸cer abdullahciftcib Abdullah C¸ ift¸ci Uzun- Abdurrahman nedimsener2010 Nedim ¸sener Murat Sarıca drlsmzwriter unknown medyaadami unknown themarginale unknown RTECanli HurAktivist unknown Malazgirt Ruhu unknown unknown maske3g unknown TheLaikYobaz unknown BestepeCB Enes Enesicoo name) last (no 246,125 Freelance journalist 222,614 Pro-Erdogan 82,839 Pro-Erdogan 68,334 Pro-Erdogan 59,125 Pro-Erdogan 51,779 Pro-Erdogan 45,739 Pro-Erdogan 43,660 Pro-Erdogan fan page 37,815 Probably pro-Erdogan 47,638 Journalist 47,220 Political strategist 41,568 Journalist 40,734 Journalist at Posta Newspaper 36,683 Journalist UstAkilOyunlari unknown unknown siyasetcanli enveryan unknown 118,883 Pro-Erdogan conspiracy theorist 36,867 Pro-Erdogan news media on twitter 72,158 Defines himself as Armenian (Turkish citizen) academic though the identity is unclear dbdevletbahceli Devlet Bah¸celi MHP Bilgi GkhnKhrman Gokhan Kahra- MHP 212,735 MHP leader 94,213 official account 191,645 popular pro-Erdogan account slmhktn gelinNcikAKz man Selami Haktan Cemile Ta¸sdemir Ugur Onal uguronal AK suHandan Handan Aksu UmmetciSiyaset Aydın Binboga GizliArsivTR unknown unknown TRT Yeni S¸afak Star Gazete FetoGercekleri trthaber yenisafak stargazete anadoluajansi Anadolu Ajansı tvahaber turkiyevakti A Haber Turkiye Vakti 67,536 popular pro-erdogan account 48,110 Pro-erdogan 43,149 Pro-erdogan 38,239 Pro-erdogan 46,608 Seems a pro-Palestine account 84,413 anti-FETO/PKK 37,261 anti-FETO 70,711 State media 69,829 Yeni Safak news paper 68,440 Star newspaper 61,623 State news agency 37,867 A Haber news channel 46,599 AKP media Table 6. Top 50 retweeted accounts for pro-Erdogan group 12 Kutlu et al. Category CHP Account vekilince erenerdemnet tgmcelebi barisyarkadas ATuncayOzkan kilicdarogluk aykuterdogdu herkesicinCHP senerabdullatif Identity Muharrem Ince Eren Erdem Mehmet Ali C¸ elebi Barı¸s Yarkada¸s Tuncay Ozkan Kemal Kılı¸cdaroglu Aykut Erdogdu CHP Abdullatif S¸ener Freq. Description 947,866 CHP candidate 204,782 ex-parliament member of CHP 156,808 Leading CHP member 78,639 Leading CHP member 75,491 CHP member 72,027 Party Leader 66,769 Leading CHP member 47,369 official party account of CHP 44,567 ex-AKP member but now in the parliament as a member of CHP HDP IYI Party hdpdemirtas HDPgenelmerkezi sahmetsahmet barisatay ayhanbilgen meral aksener iyiparti AytunCiray T Karamollaoglu aliaktas7 kacsaatoldunet siyasifenomen politikaloji azyazarozyazarr Regular Twitter HasanGunaltay accounts Accounts with nicknames Saadet Party esrapekdemir F ISBASARAN1 335,182 IYI candidate 76,526 parliament member of HDP 47,871 parliament member of HDP 45,415 Leading HDP member 117,731 official account of HDP Selahattin Demirta¸s 346,798 HDP candidate HDP Ahmet S¸ık Barı¸s Atay Ayhan Bilgen Meral Ak¸sener IYI Aytun C¸ ıray Temel Karamollaoglu 116,953 Saadet party candidate Ali Akta¸s unknown unknown unknown unknown Hasan Gunaltay Esra Pekdemir Feyzi I¸sba¸saran 72,829 official party account 57,962 Leading IYI member 382,711 popular anti-Erdogan account 138,302 anti-Erdogan 47,648 lawyer, supporter of Saadet party 54,339 political view is unclear 53,418 Probably a kemalist account 54,129 Kemalist 52,960 Kemalist 54,551 former politician (AKP) but it seems he does not support Journalists Liberal Demo- cratic party Media caapulcukiz AtillaTasNet M Selanik3 SunaVarol errdemglr FidelOKAN ismailsaymaz SedefKabas fatihportakal ismaildukel candundaradasi ugurdundarsozcu mustafahos tokcem t24comtr halktvcomtr sputnik TR DikenComTr solhaberportali bbcturkce odatv gazetesozcu cumhuriyetgzt BirGun Gazetesi Simge Ekici Atilla Ta¸s Mustafa Selanik Suna Varol Erdem Fidel OKAN Ismail Saymaz Sedef Kaba¸s Fatih Portakal Ismail Dukel Can Dundar Ugur Dundar Mustafa Ho¸s Cem Toker AKP anymore 49,901 activist, a "GEZI" protestor 72,623 celebrity, Anti-Erdogan 47,005 Anti-Erdogan 159,203 Kemalist 90,345 Kemalist 61,420 lawyer/writer 113,835 Journalist at Hurriyet newspaper 91,243 Academic/journalist 79,317 Journalist at Fox TV channel 75,873 Journalist at Halk TV channel 71,961 journalist, ex-director of Cumhuriyet newspaper 60,593 Journalist at Sozcu newspaper 46,368 Journalist, had worked at various news media 84,051 ex-leader of Liberal Democratic Party T24 Halk TV Sputnik Turkiye Diken Gazete Sol Haber BBC Turkey Oda TV Sozcu Gazetesi Cumhuriyet Gazete BirGun Gazetesi 78,632 Online news media 77,770 Halk TV channel 64,767 Russian news media in Turkish 52,046 Online news media 48,796 Online leftist news media 47,314 BBC news media in Turkish 46,440 Online news media 254,741 Sozcu newspaper 237,657 Cumhuriyet newspaper 113,153 Birgun newspaper Table 7. Top 50 retweeted accounts for anti-Erdogan group Devam vs. Tamam: 2018 Turkish Elections 13 Category pro-Erdogan and Establishment TV shows Issues Anti-Opposition Positions towards others Election related Historical Events Pro-party slogans/mentions/candidate Issues Anti-Erdogan or Establishment TV shows Election related Historical Events News Media Hashtag Count Percentage Pro-Erdogan 1,108,446 423,649 223,169 197,742 98,228 93,854 36,851 Anti-Erdogan 665,093 513,155 351,795 257,241 63,462 59,923 26,744 50.8 19.4 10.2 9.1 4.5 4.3 1.7 34.3 26.5 18.2 13.3 3.3 3.1 1.4 Table 8. Summary of 50 top pro- and anti- Erdogan hashtags Category RT Count Percentage Pro-Erdogan – AKP – MHP Both parties Government Accounts Journalists/analysts Media Regular Twitter accounts Accounts with nicknames Anti-FETO/PKK accounts 1,210,471 306,948 1,517,419 368,992 645,355 355,069 435,287 1,085,938 121,674 26.7 6.8 33.5 8.1 14.2 7.8 9.6 24 2.7 Anti-Erdogan – CHP party – HDP Party – IYI Party – Saadet Party – Liberal Democratic party All parties Journalists Media Regular Twitter accounts Accounts with nicknames 1,694,318 634,341 465,973 164,601 84,051 3,043,284 539,190 1,021,316 642,137 628,770 28.8 10.8 7.9 2.8 1.4 51.8 9.2 17.4 10.9 10.7 Table 9. Summary of 50 top pro- and anti- Erdogan retweeted accounts 14 Kutlu et al. pro anti Translation Raise your voice for Jerusalem SMS 4032 to financially support Palestine hashtag WeStandForQuds Nakba70 Kudus KudusI¸cinYenikapıdayız Filistin KudusI¸cinAyaktayız KalbimizFilistinde ZulmeLanetKuduseDestek Cure the oppression, support Jerusalem KudusI¸cinSesVer FilistinI¸cinYenikapıdayız We are in Yenikapi (rally area) for Palestine FilistinYaz4032yeGonder FreePalestine StandWithQuds Palestine KudusIslamındır KudusunMigferiRTE BatmandaKudusMitingi FilistinI¸cinBirlik KuduseSelahaddinOl FilistineUmutOl KudusI¸cinKıyamVakti FreeQuds KuduseSahipC¸ ık Nakba QudsBelongsToIslam SultanGaziKudusI¸cinAyakta Sultan Gazi stands for Jerusalem QudsDay4Return Sum total 38,203 1,255 39,458 31,340 6,127 37,467 Jerusalem 26,483 4,872 31,355 We are in Yenikapi (rally area) for Jerusalem 23,339 1,670 25,009 14,778 3,721 18,499 Palestine We stand for Jerusalem 13,437 231 13,668 7,551 3,313 10,864 Our hearts are in Palestine 7,047 5,716 1,331 6,785 5,315 1,470 6,752 5,568 1,184 6,146 2 6,144 1,475 778 2,253 2,066 77 1,989 1,895 445 1,450 1,732 30 1,702 1,491 395 1,096 1,231 61 696 1,172 877 3 815 72 804 1 743 15 641 121 176 504 311 224 215 177 128 174 190,698 29,276 219,974 Jerusalem is Islamic RTE (Erdogan) is the helmet of Jerusalem Rally for Jerusalem in Batman (Turkish city) Unity for Palestine Be Salahaddin for Jerusalem Be the hope for Palestine Time to uprise for Jerusalem 1,170 476 874 743 803 728 520 328 87 38 46 Support Jerusalem Table 10. The union of top 20 Palestine related hashtags for both pro- and anti- groups pro % pro count anti % anti count Type Drama, History, Romance Action, Drama, Romance Drama, Romance Action, Drama, War Series Vatanım Sensin Siyah Beyaz A¸sk Adını Sen Koy Soz Fazilet Hanım ve Kızları Drama Drama Sen Anlat Karadeniz Action, Crime, Thriller C¸ ukur Comedy, Drama Erkenci Ku¸s Dirili¸s Ertugrul Action, Adventure, Drama, History Action, Drama, Mystery Ufak Tefek Cinayetler Action, Drama, History Payitaht Abdulhamid Action, Drama, Romance Cesur Yurek Drama Kadın Comedy, Romance Kiralık A¸sk Crime, Drama Avlu Kara Para A¸sk Action, Crime, Drama Drama Yeter Anne Drama Table 11. Most mentioned TV series in the tweets. Types of series are mostly retrieved from IMDB website. sum 50,629 50,974 28,980 29,148 13,093 13,125 7,084 7,360 6,923 6,951 5,535 5,781 2,629 3,005 2,495 2,508 432 2,127 1,225 1,863 88 1,306 1,236 1,236 695 1,140 931 905 869 634 840 848 767 622 92 600 99.3 99.4 99.8 96.3 99.6 95.7 87.5 99.5 20.3 65.8 6.7 0 100.0 61.0 97.2 73.0 99.1 81.1 15.3 0.7 0.6 0.2 3.8 0.4 4.3 12.5 0.5 79.7 34.2 93.3 0.0 39.0 2.8 27.0 0.9 18.9 84.7 345 168 32 276 28 246 376 13 1,695 638 1,218 445 26 235 8 145 508
1506.05164
1
1506
2015-06-16T22:34:17
Partial Network Alignment with Anchor Meta Path and Truncated Generic Stable Matching
[ "cs.SI" ]
To enjoy more social network services, users nowadays are usually involved in multiple online social networks simultaneously. The shared users between different networks are called anchor users, while the remaining unshared users are named as non-anchor users. Connections between accounts of anchor users in different networks are defined as anchor links and networks partially aligned by anchor links can be represented as partially aligned networks. In this paper, we want to predict anchor links between partially aligned social networks, which is formally defined as the partial network alignment problem. The partial network alignment problem is very difficult to solve because of the following two challenges: (1) the lack of general features for anchor links, and (2) the "one-to-one$_\le$" (one to at most one) constraint on anchor links. To address these two challenges, a new method PNA (Partial Network Aligner) is proposed in this paper. PNA (1) extracts a set of explicit anchor adjacency features and latent topological features for anchor links based on the anchor meta path concept and tensor decomposition techniques, and (2) utilizes the generic stable matching to identify the non-anchor users to prune the redundant anchor links attached to them. Extensive experiments conducted on two real-world partially aligned social networks demonstrate that PNA can solve the partial network alignment problem very well and outperform all the other comparison methods with significant advantages.
cs.SI
cs
Partial Network Alignment with Anchor Meta Path and Truncated Generic Stable Matching Jiawei Zhang(cid:63), Weixiang Shao(cid:63), Senzhang Wang†, Xiangnan Kong∗, Philip S. Yu(cid:63)‡ (cid:63) University of Illinois at Chicago, Chicago, IL, USA ∗ Worcester Polytechnic Institute, Worcester, MA, USA † Beihang University, Beijing, China ‡ Institute for Data Science, Tsinghua University, Beijing, China {jzhan9, wshao4}@uic.edu, [email protected], [email protected], [email protected] 5 1 0 2 n u J 6 1 ] I S . s c [ 1 v 4 6 1 5 0 . 6 0 5 1 : v i X r a Abstract -- To enjoy more social network services, users nowa- days are usually involved in multiple online social networks simultaneously. The shared users between different networks are called anchor users, while the remaining unshared users are named as non-anchor users. Connections between accounts of anchor users in different networks are defined as anchor links and networks partially aligned by anchor links can be represented as partially aligned networks. In this paper, we want to predict anchor links between partially aligned social networks, which is formally defined as the partial network alignment problem. The partial network alignment problem is very difficult to solve because of the following two challenges: (1) the lack of general features for anchor links, and (2) the "one − to − one≤" (one to at most one) constraint on anchor links. To address these two challenges, a new method PNA (Partial Network Aligner) is proposed in this paper. PNA (1) extracts a set of explicit anchor adjacency features and latent topological features for anchor links based on the anchor meta path concept and tensor decomposition techniques, and (2) utilizes the generic stable matching to identify the non-anchor users to prune the redundant anchor links attached to them. Extensive experiments conducted on two real- world partially aligned social networks demonstrate that PNA can solve the partial network alignment problem very well and outperform all the other comparison methods with significant advantages. Index Terms -- Partial Network Alignment; Multiple Heteroge- neous Social Networks; Data Mining I. INTRODUCTION In recent years, online social networks providing various featured services have become an essential part in our lives. To enjoy more social network services, users nowadays are usually involved in multiple online social networks simultane- ously [14], [36], [37], [42] and there can be significant overlaps of users shared by different networks. As pointed out in [6], by the end of 2013, 42% of online adults are using multiple social sites at the same time. For example, 93% of Instagram users are involved in Facebook concurrently and 53% Twitter users are using Instagram as well [19]. Formally, the common users involved in different networks simultaneously are named as the "anchor users" [14], while the remaining unshared users are called the "non-anchor users" [42]. The connections between accounts of anchor users in different networks are defined as the "anchor links" [14] and networks partially aligned by anchor links can be represented as "partially aligned networks" [37]. Problem Studied: In this paper, we want to predict the anchor links across partially aligned networks, which is formally defined as the "partial network alignment" problem. Partial network alignment problem is very important for social networks and can be the prerequisite for many real- world social applications, e.g., link prediction and recom- mendations [36], [37], [42], [40], community detection [12], [39], [41] and information diffusion [35]. Identifying accounts of anchor users across networks provides the opportunity to compose a more complete social graph with users' information in all the networks they are involved in. Information in the complete social graph is helpful for a better understanding of users' social behavior in online social networks [14], [41], [35]. In addition, via the predicted anchor links, cross- platform information exchange enables new social networks to start their services based on the rich data available in other developed networks. The information transferred from developed networks can help emerging networks [37], [39] to overcome the information shortage problem promisingly [36], [37], [39]. What's more, the partial network alignment problem is a novel problem and different from existing link prediction works, like (1) traditional intra-network link prediction prob- lems [26], [27], which mainly focus on predicting links in one single social network, (2) inter-network link transfer problems links in one single network with [37], which can predict information from multiple aligned networks, and (3) inferring anchor links across fully aligned networks [14], which aims at predicting anchor links across fully aligned networks. The inferring anchor links across fully aligned networks problem [14] also studies the anchor link prediction problem. However, both the problem setting and method proposed to address the "network alignment" problem between two fully aligned networks in [14] are very ad hoc and have many disadvantages. First of all, the full alignment assumption of social networks proposed in [14] is too strong as fully aligned networks can hardly exist in the real world [42]. Secondly, the features extracted for anchor links in [14] are proposed for Foursquare and Twitter specifically, which can be hard to get generalized to other networks. Thirdly, the classification based link prediction algorithm used in [14] can suffer from the class imbalance problem [16], [20]. The problem will be more serious when dealing with partially aligned networks. Finally, the matching algorithm proposed in [14] is designed specially for fully aligned networks and maps all users (including both anchor and non-anchor users) from one network to another network via the predicted anchor links, which will introduce a large number of non-existing anchor links when applied in the partial network alignment problem. Totally different from the "inferring anchor links across fully aligned networks" problem [14], we study a more general network alignment problem in this paper. Firstly, networks studied in this paper are partially aligned [42], which contain large number of anchor and non-anchor users [42] at the same time. Secondly, networks studied are not confined to Foursquare and Twitter social networks. A minor revision of the "partial network alignment" problem can be mapped to many other existing tough problems, e.g., large biology network alignment [1], entity resolution in database inte- gration [2], ontology matching [7], and various types of entity matching in online social networks [22]. Thirdly, the class imbalance problem will be addressed via link sampling the constraint on anchor effectively in the paper. Finally, links is "one − to − one≤" (i.e., each user in one network can be mapped to at most one user in another network). Across partially aligned networks, only anchor users can be connected by anchor links. Identifying the non-anchor users from networks and pruning all the predicted potential anchor links connected to them is a novel yet challenging problem. The "one − to − one≤" constraint on anchor links can dis- tinguish the "partial network alignment" problem from most existing link prediction problems. For example, in traditional link prediction and link transfer problems [26], [27], [37], the constraint on links is "many-to-many", while in the "anchor link inference" problem [14] across fully aligned networks, the constraint on anchor links is strict "one-to-one". To solve the "partial network alignment" problem, a new method, PNA (Partial Network Aligner), is proposed in this paper. PNA exploits the concept of anchor meta paths [42], [26] and utilizes the tensor decomposition [21], [13] tech- nique to obtain a set of explicit anchor adjacency features and latent topological features. In addition, PNA generalizes the traditional stable matching to support partially aligned network through self-matching and partial stable matching and introduces the a novel matching method, generic stable matching, in this paper. The rest of this paper is organized as follows. In Section II, we will give the definition of some important concepts and for- mulate the partial network alignment problem. PNA method will be introduces in Sections III-IV. Section V is about the experiments. Related works will be given in Section VI. Finally, we conclude the paper in Section VII. II. PROBLEM FORMULATION Before introducing the method PNA, we will first define some important concepts and formulate the partial network alignment problem in this section. V = (cid:83) while E =(cid:83) A. Terminology Definition Definition 1 (Heterogeneous Social Networks): A heteroge- neous social network can be represented as G = (V,E), where i Vi contains the sets about various kinds of nodes, j Ej is the set of different types of links among nodes in V. Definition 2 (Aligned Heterogeneous Social Networks): Social networks that share common users are defined as the aligned heterogeneous social networks, which can be represented as G = (Gset, Aset), where Gset = (G(1), G(2),··· , G(n)) is the set of n different heterogeneous social networks and Aset = (A(1,2),A(1,3),··· ,A((n−1),n)) is the sets of undi- rected anchor links between networks in Gset. Definition 3 (Anchor Link): Given two social networks G(i) and G(j), link (u(i), v(j)) is an anchor link between G(i) and G(j) iff (u(i) ∈ U (i)) ∧ (v(j) ∈ U (j)) ∧ (u(i) and v(j) are accounts of the same user), where U (i) and U (j) are the user sets of G(i) and G(j) respectively. Definition 4 (Anchor Users and Non-anchor Users): Users who are involved in two social networks, e.g., G(i) and G(j), simultaneously are defined as the anchor users between G(i) and G(j). Anchor users in G(i) between G(i) and G(j) can be represented as U (i) A(i,j) = {u(i)u(i) ∈ U (i),∃v(j) ∈ U (j), and (u(i), v(j)) ∈ A(i,j)}. Meanwhile, the non-anchor user in G(i) between G(i) and G(j) are those who are involved in G(i) only and can be represented as U (i) A(i,j). Similarly, the anchor users and non-anchor users in G(j) between G(j) and G(i) can be defined as U (j) −A(i,j) respectively. Definition 5 (Full Alignment, Partial Alignment and Isolated): Given two social networks G(i) and G(j), if users in both G(i) and G(j) are all anchor users, i.e., U (i) = U (i) A(i,j) and U (j) = U (j) A(i,j), then G(i) and G(j) are fully aligned; if users in both of these two networks are all non-anchor users, i.e., U (i) = U (i) −A(i,j) and U (j) = U (j) −A(i,j), then these two networks are isolated; otherwise, they are partially aligned. Definition 6 (Bridge Nodes): Besides users, many other kinds of nodes can be shared between different networks, which are defined as the bridge nodes in this paper. The bridge nodes shared between G(i) and G(j) can be represented as B(i,j) = {v(v ∈ (V (i) − U (i))) ∧ (v ∈ (V (j) − U (j)))}. −A(i,j) = U (i)−U (i) A(i,j) and U (j) The social networks studied in this paper can be any partially aligned social networks and we use Foursquare, Twitter as a example to illustrate the studied problem and the proposed method. Users in both Foursquare and Twitter can make friends with other users, write posts, which can contain words, timestamps, and location checkins. In addition, users in Foursquare can also create lists of locations that they have visited/want to visit in the future. As a result, Foursquare and Twitter can be represented as heterogeneous social network G = (V,E). In Twitter V = U ∪ P ∪ W ∪ T ∪ L and in Foursquare V = U ∪ P ∪ W ∪ T ∪ I ∪ L, where U, P, W, T , I and L are the nodes of users, posts, words, timestamps, lists and locations. While in Twitter, the heterogeneous link set E = Eu,u ∪ Eu,p ∪ Ep,w ∪ Ep,t ∪ Ep,l and in Foursquare E = Eu,u∪Eu,p∪Ep,w∪Ep,t∪Ep,l∪Eu,i∪Ei,l. The bridge nodes shared between Foursquare and Twitter include the common locations, common words and common timestamps. B. Problem Statement Definition 7 (Partial Network Alignment): For any two given partially aligned heterogeneous social networks, e.g., G = ((G(i), G(j)), (A(i,j))), part of the known anchor links be- tween G(i) and G(j) are represented as A(i,j). Let U (i), U (j) be the user sets of G(i) and G(j) respectively, the set of other po- tential anchor links between G(i) and G(j) can be represented as L(i,j) = {(u(i), v(j))(u(i) ∈ U (i))∧ (v(j) ∈ U (j)}−A(i,j). We solve the partial network alignment problem as a link classification problem, where existing and non-existing anchor links are labeled as "+1" and "-1" respectively. In this paper, we aim at building a model M with the existing anchor links A(i,j), which will be applied to predict potential anchor links in L(i,j). In model M, we want to determine both labels and existence probabilities of anchor links in L(i,j). III. FEATURE EXTRACTION AND ANCHOR LINK PREDICTION Supervised link prediction method has been widely used in research due to its excellent performance and the pro- found supervised learning theoretical basis. In supervised link prediction, links are labeled differently according to their physical meanings, e.g., existing vs non-existent [42], friends vs enemies [31], trust vs distrust [32], positive attitude vs negative attitude [33]. With information in the networks, a set of heterogeneous features can be extracted for links in the training set, which together with the labels are used to build the link prediction model M. In this section, we will introduce different categories of general features extracted for anchor links across partially aligned networks, which include a set of explicit anchor adjacency features based on anchor meta paths and the "latent topological feature vector" extracted via anchor adjacency tensor decomposition. A. Traditional Intra-Network Meta Path Traditional meta paths are mainly defined based on the social network schema of one single network [26], [28]. Definition 8 (Social Network Schema): For a given network G, its schema is defined as SG = (TG,RG), where TG and RG are the sets of node types and link types in G respectively. Definition 9 (Meta Path): Based on the schema of network G, i.e., SG = (TG,RG), the traditional intra-network meta path in R2−−→ ··· Rk−1−−−→ Tk, where Ti ∈ G is defined as Φ = T1 TG, i ∈ {1, 2,··· , k} and Rj ∈ RG, j ∈ {1, 2,··· , k − 1} [26], [28]. R1−−→ T2 For example, according to the networks introduced in Sec- tion II, we can define the network schema of Twitter as SG = ({U ser, P ost, W ord, T imestamp, List, Location},{F ollow, W rite, Create, Contain, At, Checkin}). Based the schema, "User - Location - User" is a meta path of length 2 connecting user nodes in the network via location node and path "Alice - San Jose - Bob" is an instance of such meta on Fig. 1. Schema of aligned heterogeneous network. path in the network, where Alice, Bob and San Jose are the users and location in the network. B. Inter-Network Anchor Meta Path Traditional Intra-network meta paths defined based on one single network cannot be applied to address the inter-network partial network alignment problem directly. To overcome such a problem, in this subsection, we will define the concept of anchor meta paths and introduce a set of inter-network anchor meta paths [42] across partially aligned networks. Definition 10 (Aligned Social Network Schema): Given the partially aligned networks: G = (Gset, Aset), let SG(i) = (TG(i) ,RG(i) ) be the schema of network G(i) ∈ Gset, the schema of partially aligned networks G can be defined as i RG(i)) ∪ {Anchor}), where {Anchor} i TG(i) , ((cid:83) SG = ((cid:83) is the anchor link type. An example of the schema about two partially aligned social networks, e.g., G(i) (e.g., Foursquare) and G(j) (e.g., Twitter), is shown in Figure 1, where the schema of these two aligned networks are connected by the anchor link type and the green dashed circles are the shared bridge nodes between G(i) and G(j). Definition 11 (AMP: Anchor Meta Path): Based on the aligned social network schema, anchor meta paths connecting users across G is defined to be Ψ = T1 R2−−→ ··· Rk−1−−−→ Tk, where T1 and Tk are the "User" node type in two par- tially aligned social networks respectively. To differentiate the anchor link type from other link types in the anchor meta path, the direction of Ri in Ψ will be bidirectional if Ri = Anchor, i ∈ {1, 2,··· , k − 1}, i.e., Ti Ri←→ Tj. R1−−→ T2 Via the instances of anchor meta paths, users across aligned social networks can be extensively connected to each other. In the two partially aligned social networks (e.g., G = ((G(i), G(j)), (A(i,j)))) studied in this paper, various anchor meta paths from G(i) (i.e., Foursquare) and G(j) (i.e., Twitter) can be defined as follows: • Common Out Neighbor Anchor Meta Path (Ψ1): U ser(i) f ollow←−−−− U ser(j) or f ollow−−−−→ U ser(i) Anchor←−−−−→ U ser(j) "U (i) → U (i) ↔ U (j) ← U (j)" for short. PostUserWordTimestampLocationwritewrite-1checkin atcheckin at-1containcontain-1atat-1follow/follow-1Schema of Network(i)PostUserWordTimestampLocationwritewrite-1checkin atcheckin at-1containcontain-1atat-1follow/follow-1Schema of Network(j)anchorListcreatecreate-1contain-1containbridge node typesanchor link type • Common In Neighbor Anchor Meta Path (Ψ2): U ser(i) f ollow−−−−→ U ser(j) or f ollow←−−−− U ser(i) Anchor←−−−−→ U ser(j) "U (i) ← U (i) ↔ U (j) → U (j)" . • Common Out In Neighbor Anchor Meta Path (Ψ3): f ollow−−−−→ Anchor←−−−−→ U ser(j) f ollow−−−−→ U ser(i) U ser(i) U ser(j) or "U (i) → U (i) ↔ U (j) → U (j)". • Common In Out Neighbor Anchor Meta Path (Ψ4): f ollow←−−−− Anchor←−−−−→ U ser(j) f ollow←−−−− U ser(i) U ser(i) U ser(j) or "U (i) ← U (i) ↔ U (j) ← U (j)". These above anchor meta paths are all defined based the "User" node type only across partially aligned social networks. Furthermore, there can exist many other anchor meta paths consisting of user node type and other bridge node types from Foursquare to Twitter, e.g., Location, Word and Timestamp. contain • Common Location Checkin Anchor Meta Path 1 (Ψ5): −−−−−−−→ Location checkin at ←−−−−−−− U ser(i) write−−−→ P ost(i) checkin at P ost(j) write←−−− U ser(j) or "U (i) → P (i) → L ← P (j) ← U (j)". create−−−−→ List(i) • Common Location Checkin Anchor Meta Path 2 (Ψ6): −−−−−→ Location checkin at ←−−−−−−− U ser(i) P ost(j) write←−−− U ser(j) or "U (i) → I (i) → L ← P (j) ← U (j)". • Common Timestamps Anchor Meta Path (Ψ7): U ser(i) write−−−→ P ost(i) at−→ T ime at←− P ost(j) write←−−− U ser(j) or "U (i) → P (i) → T ← P (j) ← U (j)". write−−−→ P ost(i) contain U ser(j) or "U (i) → P (i) → W ← P (j) ← U (j)". • Common Word Usage Anchor Meta Path (Ψ8): U ser(i) −−−−−→ W ord contain←−−−−− P ost(j) write←−−− C. Explicit Anchor Adjacency Features Based on the above defined anchor meta paths, different kinds of anchor meta path based adjacency relationship can be extracted from the network. In this paper, we define the new concepts of anchor adjacency score, anchor adjacency tensor and explicit anchor adjacency features to describe such relationships among users across partially aligned social networks. Definition 12 (Anchor Meta Path Instance): Based on anchor R2−−→ ··· Rk−1−−−→ Tk, path ψ = meta path Ψ = T1 n1 − n2 − ··· − nk−1 − nk is an instance of Ψ iff ni is an instance of node type Ti, i ∈ {1, 2,··· , k} and (ni, ni+1) is an instance of link type Ri, ∀i ∈ {1, 2,··· , k − 1}. Definition 13 (AAS: Anchor Adjacency Score): The anchor adjacency score is quantified as the number of anchor meta path instances of various anchor meta paths connecting users across networks. The anchor adjacency score between u(i) ∈ U (i) and v(j) ∈ U (j) based on meta path Ψ is defined as: R1−−→ T2 (cid:12)(cid:12)(cid:12){ψ(ψ ∈ Ψ) ∧ (u(i) ∈ T1) ∧ (v(j) ∈ Tk)}(cid:12)(cid:12)(cid:12) , AASΨ(u(i), v(j)) = where path ψ starts and ends with node types T1 and Tk respectively and ψ ∈ Ψ denotes that ψ is a path instance of meta path Ψ. where ap ◦ bq denotes the vector outer product of ap and bq. topological feature vector of users in U (i) and U (j) respectively [21]. Each row of A and B represents a latent , u(j) m ), u(i) The anchor adjacency scores among all users across par- tially aligned networks can be stored in the anchor adjacency matrix as follows. Definition 14 (AAM: Anchor Adjacency Matrix): Given a certain anchor meta path, Ψ, the anchor adjacency matrix between Gi and Gj can be defined as AΨ ∈ NU (i)×U (j) and A(l, m) = AASΨ(u(i) l l ∈ U (i), u(j) m ∈ U (j). Multiple anchor adjacency matrix can be grouped together to form a high-order tensor. A tensor is a multidimensional array and an N-order tensor is an element of the tensor product of N vector spaces, each of which can have its own coordinate system. As a result, an 1-order tensor is a vector, a 2-order tensor is a matrix and tensors of three or higher order are called the higher-order tensor [13], [21]. Definition 15 (AAT: Anchor Adjacency Tensor): Based on meta paths in {Ψ1, Ψ2,··· , Ψ8}, we can obtain a set of anchor adjacency matrices between users in two partially aligned networks to be {AΨ1 , AΨ2 ,··· , AΨ8}. With {AΨ1 , AΨ2, ··· , AΨ8}, we can construct a 3-order anchor adjacency tensor X ∈ RU (i)×U (j)×8, where the ith layer of X is the anchor adjacency matrix based on anchor meta path Ψi, i.e., X (:, :, i) = AΨi, i ∈ {1, 2,··· , 8}. Based on the anchor adjacency tensor, a set of explicit anchor adjacency features can be extracted for anchor links across partially aligned social networks. Definition 16 (EAAF: Explicit Anchor Adjacency Features): For a certain anchor link (u(i) m ), the explicit anchor adja- cency feature vectors extracted based on the anchor adjacency tensor X can be represented as x = [x1, x2,··· , x8] (i.e., the anchor adjacency scores between u(i) m based on 8 different anchor meta paths), where xk = X (l, m, k), k ∈ {1, 2,··· , 8}. D. Latent Topological Feature Vectors Extraction and u(j) , u(j) l l Explicit anchor adjacency features can express manifest properties of the connections across partially aligned networks and are the explicit topological features. Besides explicit topo- logical connections, there can also exist some hidden common connection patterns [33] across partially aligned networks. In this paper, we also propose to extract the latent topological feature vectors from the anchor adjacency tensor. As proposed in [13], [21], a higher-order tensor can be decomposed into a core tensor, e.g., G, multiplied by a matrix along each mode, e.g., A, B,··· , Z, with various tensor decomposition methods, e.g., Tucker decomposition [13]. For the 3-order anchor adjacency tensor X can be example, decomposed into three matrices A ∈ RU (i)×P , B ∈ RU (j)×Q and C ∈ R8×R and a core tensor G ∈ RP×Q×R, where P, Q, R are the number of columns of matrices A, B, C [13]: gpqrap ◦ bq ◦ cr = [G; A, B, C], P(cid:88) Q(cid:88) R(cid:88) p=1 q=1 r=1 X = over sampling with "synthetic" instances [4]: the minority class is over sampled by introducing new "synthetic" examples along the line segment joining m of the k nearest minority class neighbors for each minority class instances. Parameter k is usually set as 5, while the value of m can be determined according to the ratio to over sample the minority class. For example, if the minority class need to be over sampled 200%, then m = 2. The instance to be created between a certain example x and one of its nearest neighbor y can be denoted as x + θT (x − y), where x and y are the feature vectors of two instances and θT is the transpose of a coefficient vector containing random numbers in range [0, 1]. IV. ANCHOR LINK PRUNING WITH GENERIC STABLE MATCHING In this section, we will introduce the anchor link pruning methods in details, which include (1) candidate pre-pruning, (2) brief introduction to the traditional stable matching, and (3) the generic stable matching method proposed in this paper, which generalizes the concept of traditional stable matching through both self matching and partial stable matching. A. Candidate Pre-Pruning Across two partially aligned social networks, users in a certain network can have a large number of potential anchor link candidates in the other network, which can lead to great time and space costs in predicting the anchor links. The problem can be even worse when the networks are of large scales, e.g., containing million even billion users, which can make the partial network alignment problem unsolvable. To shrink size of the candidate set, we propose to conduct candidate pre-pruning of links in the test set with users' profile information (e.g., names and hometown). As shown in Figure 3, in the given input test set, users are extensively connected with all their potential partners in other networks via anchor links. For each users, we propose to prune their potential candidates according to the following heuristics: • profile pre-pruning: users' profile information shared across partially aligned social networks, e.g., Foursquare and Twitter, can include username and hometown [34]. m ) ∈ L, if the username , u(j) Given an anchor link (u(i) and hometown of u(i) and u(j) m are totally different, e.g., cosine similarity scores are 0, then link (u(i) m ) will be pruned from test set L. • EAAF pruning: based on the explicit anchor adjacency tensor X extracted in Section III, for a given link m ) ∈ L, if its extracted explicit anchor adjacency (u(i) features are all 0, i.e., X (l, m, x) = 0, x ∈ {1, 2,··· , 8}, then link (u(i) m ) will be pruned from test set L. , u(j) , u(j) l l l l , u(j) l B. Traditional Stable Matching Meanwhile, as proposed in [14], the one-to-one constraint of anchor links across fully aligned social networks can be met by pruning extra potential anchor link candidates with traditional Fig. 2. Instance distribution in feature space. Method HOSVD introduced in [13] is applied to achieve these decomposed matrices in this paper. E. Class Imbalance Link Prediction Based on the extracted features, various supervised link prediction models [14], [37], [42] can be applied to infer the potential anchor links across networks. As proposed in [20], [16], conventional supervised link prediction methods [29], can suffer from the class imbalance problem a lot. To address the problem, two effective methods (down sampling [15] and over sampling [4]) are applied. Down sampling methods aim at deleting the unreliable negative instances from the training set. In Figure 2, we show the distributions of training links in the feature space, where negative links can be divided into 4 different categories [15]: (1) noisy links: links mixed in the positive links; (2) borderline links: links close to the decision boundary; (3) redundant links: links which are too far away from the decision boundary in the negative region; and (4) safe links: links which are helpful for determining the classification boundary. Different heuristics have been proposed to remove the noisy instances and borderline instances, which are detrimental for the learning algorithms. In this paper, we will use the method called Tomek links proposed in [30], [15]. For any two given instances x1 and x2 of different labels, pair (x1, x2) is called a tomek link if there exists no other instances, e.g., z, such that d(x1, z) < d(x1, x2) and d(x2, z) < d(x1, x2). Examples that participate in Tomek links are either borderline or noisy instances [30], [15]. As to the redundant instances, they will not harm correct classifications as their existence will not change the classification boundary but they can lead to extra classification costs. To remove the redundant instances, we propose to create a consistent subset C of the training set, e.g., S [15]. Subset C is consistent with S if classifiers built with C can correctly classify instances in S. Initially, C consists of all positive instances and one randomly selected negative instances. A classifier, e.g., kN N, built with C is applied to S, where instances that are misclassified are added into C. The final set C contains the safe links. Another method to overcome the class imbalance problem is to over sample the minority class. Many over sampling meth- ods have been proposed, e.g., over sampling with replacement, +++++++noisy negative linksborderline negative linksredundant negative linkssafe negative linkspositive linksdecision boundary C. Generic Stable Matching Stable matching based method proposed in [14] can only work well in fully aligned social networks. However, in the real world, few social networks are fully aligned and lots of users in social networks are involved in one network only, i.e., non- anchor users, and they should not be connected by any anchor links. However, traditional stable matching method cannot identify these non-anchor users and remove the predicted potential anchor links connected with them. To overcome such a problem, we will introduce the generic stable matching to identify the non-anchor users and prune the anchor link results to meet the one − to − one≤ constraint. In PNA, we introduce a novel concept, self matching, which allows users to be mapped to themselves if they are discovered to be non-anchor users. In other words, we will identify the non-anchor users as those who are mapped to themselves in the final matching results. Definition 20 (Self Matching): For the given two partially aligned networks G(1) and G(2), user ui ∈ U (1), can have his ui over users in U (2) ∪{ui} and ui preferring ui preference P (1) himself denotes that ui is an non-anchor user and prefers to stay unconnected, which is formally defined as self matching. Users in one social network will be matched with either partners in other social networks or themselves according to their preference lists (i.e., from high preference scores to low preference scores). Only partners that users prefer over themselves will be accepted finally, otherwise users will be matched with themselves instead. Definition 21 (Acceptable Partner): For a given matching µ : U (1) ∪ U (2) → U (1) ∪ U (2), the mapped partner of users ui ∈ U (1), i.e., µ(ui), is acceptable to ui iff µ(ui)P (1) ui ui. To cut off the partners with very low preference scores, we propose the partial matching strategy to obtain the promising partners, who will participate in the matching finally. Definition 22 (Partial Matching Strategy): The partial match- ing strategy of user ui ∈ U (1), i.e., Q(1) ui , consists of the first K the acceptable partners in ui's preference list P (1) ui , which are in the same order as those in P (1) ui , and ui in the (K +1)th entry of Q(1) ui . Parameter K is called the partial matching rate in this paper. An example is given in Figure 4, where to get the top 2 promising partners for the user, we place the user himself at the 3rd cell in the preference list. All the remaining potential partners will be cut off and only the top 3 users will participate in the final matching. Based on the concepts of self matching and partial matching strategy, we define the concepts of partial stable matching and generic stable matching as follow. Definition 23 (Partial Stable Matching): For a given match- ui ui,∀ui ∈ U (1) and ing µ, µ is (1) rational vj vj,∀vj ∈ U (2), (2) pairwise stable if there exist µ(vj)Q(2) no blocking pairs in the matching results, and (3) stable if it is both rational and pairwise stable. Definition 24 (Generic Stable Matching): For a given match- ing µ, µ is a generic stable matching iff µ is a self matching if µ(ui)Q(1) Fig. 3. Partial network alignment with pruning. Fig. 4. Example of partial matching strategy(K=2). ui stable matching. In this subsection, we will introduce the concept of traditional stable matching briefly. Given the user sets U (1) and U (2) of two partially aligned social networks G(1) and G(2), each user in U (1)(or U (2)) has his preference over users in U (2)(or U (1)). Term vjP (1) ui vk is used to denote that ui ∈ U (1) prefers vj to vk for simplicity, where vj, vk ∈ U (2) and P (1) is the preference operator of ui ∈ U (1). Similarly, we can use term uiP (2) vj uk to denote that vj ∈ U (2) prefers ui to uk in U (1) as well. Definition 17 (Matching): Mapping µ : U (1) ∪ U (2) → U (1) ∪ U (2) is defined to be a matching iff (1) µ(ui) = 1,∀ui ∈ U (1) and µ(ui) ∈ U (2); (2) µ(vj) = 1,∀vj ∈ U (2) and µ(vj) ∈ U (1); (3) µ(ui) = vj iff µ(vj) = ui. Definition 18 (Blocking Pair): A pair (ui, vj) is a a blocking pair of matching µ if ui and vj prefers each other to their i.e., (µ(ui) (cid:54)= vj) ∧ (µ(vj) (cid:54)= ui) and mapped partner, (vjP (1) Definition 19 (Stable Matching): Given a matching µ, µ is stable if there is no blocking pair in the matching results [5]. As introduced in [14], the stable matching can be obtained ui µ(ui)) ∧ (uiP (2) vj µ(vj)). with the Gale-Shapley algorithm proposed in [9]. WilliamNew JerseyWmNJRebeccaIllinoisBeckyILJonathanCaliforniaJonCAInput Test SetPre-PruningWilliamNew JerseyRebeccaIllinoisJonathanCaliforniaWmNJBeckyILJonCATraditional Stable MatchingWilliamNew JerseyRebeccaIllinoisJonathanCaliforniaWmNJBeckyILJonCA0.90.80.70.70.60.5Generic Stable Matching (K = 1)WilliamNew JerseyRebeccaIllinoisJonathanCaliforniaWmNJBeckyILJonCA0.90.80.70.70.5…Preference ListPartial Matching Strategy(K+1)th entry PROPERTIES OF THE HETEROGENEOUS NETWORKS TABLE I property user tweet/tip location friend/follow write locate # node # link network Twitter 5,223 9,490,707 297,182 164,920 9,490,707 615,515 Foursquare 5,392 48,756 38,921 76,972 48,756 48,756 or µ is a partial stable matching. As example of generic stable matching is shown in the bottom two plots of Figure 3. Traditional stable matching can prune most non-existing anchor links and make sure the results can meet one-to-one constraint. However, it preserves the anchor links (Rebecca, Becky) and (Jonathan, Jon), which are connecting non-anchor users. In generic stable matching with parameter K = 1, users will be either connected with their most preferred partner or stay unconnected. Users "William" and "Wm" are matched as link (William, Wm) has the highest score. "Rebecca" and "Jonathan" will prefer to stay uncon- nected as their most preferred partner "Wm" is connected with "William" already. Furthermore, "Becky" and "Jon" will stay unconnected as their most preferred partner "Rebecca" and "Jonathan" prefer to stay unconnected. In this way, generic stable matching can further prune the non-existing anchor links (Rebecca, Becky) and (Jonathan, Jon). The truncated generic stable matching results can be achieved with the Generic Gale-Shapley algorithm as given in Algorithm 1. V. EXPERIMENTS To demonstrate the effectiveness of PNA in predicting an- chor links for partially aligned heterogeneous social networks, we conduct extensive experiments on two real-world hetero- geneous social networks: Foursquare and Twitter. This section includes three parts: (1) dataset description, (2) experiment settings, and (3) experiment results. A. Dataset Description The datasets used in this paper include: Foursquare and Twitter, which were crawled during November 2012 [14], [36], [37], [42]. More detailed information about these two datasets is shown in Table I and in [14], [36], [37], [42]. The number of anchor links crawled between Foursquare and Twitter is 3, 388 and 62.83% Foursquare users are anchor users. B. Experiment Settings In this part, we will talk about the experiment settings in de- tails, which includes: (1) comparison methods, (2) evaluation methods, and (3) experiment setups. Algorithm 1 Generic Gale-Shapley Algorithm Input: user sets of aligned networks: U (1) and U (2). classification results of potential anchor links in L known anchor links in A(1,2) truncation rate K Output: a set of inferred anchor links L(cid:48) 1: Initialize the preference lists of users in U (1) and U (2) with predicted existence probabilities of links in L and known anchor links in A(1,2), whose existence probabilities are 1.0 2: construct the truncated strategies from the preference lists 3: Initialize all users in U (1) and U (2) as free 4: L(cid:48) = ∅ 5: while ∃ free u(1) in U (1) and u(1) 's truncated strategy is i non-empty do i from u(1) i 's trun- Remove the top-ranked account u(2) cated strategy if u(2) then j ==u(1) L(cid:48) = L(cid:48) ∪ {(u(1) Set u(1) as stay unconnected , u(1) )} j i i i i else if u(2) i j is free then L(cid:48) = L(cid:48) ∪ {(u(1) Set u(1) and u(2) ∃u(1) if u(2) that u(2) p j j i else j )} , u(2) as occupied 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: is occupied with. then j prefers u(1) L(cid:48) = (L(cid:48) − {(u(1) Set u(1) p to u(1) p p , u(2) as free and u(1) j )}) ∪ {(u(1) as occupied i i i j )} , u(2) end if 18: 19: 20: 21: 22: end while end if end if 1) Comparison Methods: The comparison methods used in the experiments can be divided into the following 4 categories: Methods with Generic Stable Matching: • PNAOMG: PNAOMG (PNA with Over sampling & Generic stable Matching) is the method proposed in this paper, which consists of two steps: (1) class imbalance link prediction with over sampling, and (2) candidate pruning with generic stable matching. • PNADMG: PNADMG (PNA with Down sampling & Generic stable Matching) is another method proposed in this paper, which consists of two steps: (1) class imbalance link prediction with down sampling, and (2) candidate pruning with generic stable matching. Methods with Traditional Stable Matching • PNAOM: PNAOM (PNA with Over sampling & tradi- tional stable Matching) is identical to PNAOMG except that in the second step, PNAOM applies the traditional stable matching [9], [14]. (a) AUC: alignment rate (b) AUC: negative positive rate Fig. 5. AUC of different class imbalance link prediction methods. • PNADM: PNADM (PNA with Down sampling & tradi- tional stable Matching) is identical to PNADMG except that in the second step, PNADM applies the traditional stable matching [9], [14]. Class Imbalance Anchor Link Prediction: • PNAO: PNAO (PNA with Over sampling) is the link prediction method with over sampling to overcome the class imbalance problem and has no matching step. • PNAD: PNAD (PNA with Down sampling) is the link prediction method with down sampling to overcome the class imbalance problem and has no matching step. Existing Network Anchoring Methods • MNA: MNA (Multi-Network Anchoring) is a two-phase method proposed in [14] which includes: (1) supervised link prediction without addressing class imbalance prob- lem; (2) traditional stable matching [9], [14]. • MNA no: MNA no (MNA without one-to-one constraint) is the first step of MNA proposed in [14] which can pre- dict anchor links without addressing the class imbalance problem and has no matching step. 2) Evaluation Metrics: The output of different link pre- diction methods can be either predicted labels or confidence scores, which are evaluated by Accuracy, AUC, F1 in the experiments. 3) Experiment Setups: In the experiment, initially, a fully aligned network containing 3000 users in both Twitter and Foursquare is sampled from the datasets. All the existing anchor links are grouped into the positive link set and all the possible non-existing anchor links are used as the potential link set. Certain number of links are randomly sampled from the potential link set as the negative link set, which is controlled by parameter θ. Parameter θ represents the #negative #positive rate, where θ = 1 denotes the class balance case, i.e., #positive equals to #negative; θ = 50 represents that case that negative instance set is 50 times as large as that of the positive instance set, i.e., #negative = 50×#positive. In the experiment, θ is chosen from {1, 2, 3, 4, 5, 10, 20, 30, 40, 50}. Links in the positive and negative link sets are partitioned into two parts with 10-fold cross validation, where 9 folds are used as the training set and 1 fold is used as the test set. To simulate the partial alignment networks, certain positive links are randomly sampled from the positive training set as the final positive training set under the control of parameter η. η is chosen from {0.1, 0.2,··· , 1.0}, where η = 0.1 denotes that the networks are 10% aligned and η = 1.0 shows that the networks are fully aligned. With links in the positive training set, anchor adjacency tensor based features and the latent feature vectors are extracted from the network to build link prediction model M. In building model M, over sampling and under sampling techniques are applied and the sampling rate is determined by parameter σ ∈ {0.0, 0.1, 0.2,··· , 1.0}, where σ = 0.3 denotes that 0.3×(#negative−#positive) negative links are randomly removed from the negative link set in under sampling; or 0.3×(#negative−#positive) positive links are generated and added to the positive link set in over sampling. Before applying model M to the test set, pre-pruning process is conducted on the test set in advance. Based on the prediction results of model M on the test set, post-pruning with generic stable matching is applied to further prune the non-existent candidates to ensure that the final prediction results across the partially aligned networks can meet the one − to − one≤ constraint controlled by the partial matching parameter K. C. Experiment Results In this part, we will give the experiment results of all these comparison methods in addressing the partial network alignment problem. This part includes (1) analysis of sampling methods in class imbalance link prediction; (2) performance comparison of different link prediction methods; and (3) parameter analysis. 1) Analysis of Sampling Methods: To examine whether sampling methods can improve the prediction performance on the imbalanced classification problem or not, we also compare PNAO, PNAD with MNA no and the results are given in Figure 5, where we fix θ as 10 but change η with values in {0.1, 0.2,··· , 1.0} and compare the AUC achieved by PNAO, PNAD and MNA no. We can observe that the AUC values of 0.10.20.30.40.50.60.70.80.91.0η0.600.650.700.750.800.850.900.95AUCPNAOPNADMNA_no01020304050θ0.600.650.700.750.800.850.900.95AUCPNAOPNADMNA_no (a) Acc.@θ = 5, η = 0.4 (b) F1@θ = 5, η = 0.4 (c) Acc.@θ = 50, η = 0.9 (d) F1@θ = 50, η = 0.9 Fig. 6. F1, Accuracy of PNAOMG and PNADMG with different partial matching rates. all these three methods increases with the increase of η but PNAO and PNAD perform consistently better than MNA no. In Figure 5(b), we fix η as 0.6 but change θ with values in {1, 2, 3, 4, 5, 10, 20, 30, 40, 50} and compare the AUC of PNAO, PNAD and MNA no. As shown in Figure 5(b), the performance of PNAO, PNAD and MNA no can all varies slightly with θ changing from 1 to 50 and PNAO, PNAD can achieve better performance than MNA no consistently. 2) Comparison of Different Link Prediction Methods: Meanwhile, as generic stable matching based post pruning can only output the labels of potential anchor links in the test set, we also evaluate all these methods by comparing their Accuracy and F1 score Tables II-III. In Table II, we fix θ as 10, K as 5 but change η with values in {0.1, 0.2,··· , 1.0}. Table II has two parts. The upper part of Table II shows the Accuracy achieved by all the methods with various η, and the lower part shows the F1 score. Generally, the performance of all comparison methods rises as η increases. In the upper part, methods PNAOMG and PNADMG can consistently perform better than all other comparison methods for different η. For example, when η = 0.5, the Accuracy achieved by PNAOMG is higher than PNAOM by 3.45%, higher than MNA by 6.0%, higher than PNAO by 7.51% and higher than MNA no by 7.75%; meanwhile, the Accuracy achieved by PNADMG is higher than PNADM, MNA, PNAD and MNA no as well. The advantages of PNAOMG and PNADMG over other comparison methods are more obvious under the evaluation of F1 as in class imbalance settings, Accuracy is no longer an appropriate evaluation metric [3]. For example, when η = 0.5, the F1 achieved by PNAOMG is about 13.25% higher than PNAOM, 24% higher than MNA, 101.6% higher than PNAO and 165% higher than MNA no; so is the case for method PNADMG. The experiment results show that PNAOMG and PNADMG can work well with datasets containing different ratio of anchor links across the networks. Similar results can be obtained from Table III, where we fix η = 0.6, K as 5 but change θ with values in {1, 2, 3, 4, 5, 10, 20, 30, 40, 50}. It shows that PNAOMG and PNADMG can effectively address the class imbalance problem. that The fact (1) PNAOMG can outperform PNAOM (PNADMG outperforms PNADM) shows that generic stable matching can work well in dealing with partially aligned social networks; (2) PNAOM can beat PNAO (and PNADM beats PNAD) means that stable matching can achieve very good post-pruning results; (3) PNAOM and PNADM can perform better than MNA (or PNAO and PNAD can achieve better results than MNA no) means that sampling methods can overcome the class imbalance problem very well. 3) Analysis of Partial Matching Rate: In the generic sta- ble matching, only top K anchor link candidates will be preserved. In this part, we will analyze the effects of pa- rameter K on the performance of PNAOMG and PNADMG. Figure 6 gives the results (both Accuracy and F1) of PNAOMG and PNADMG by setting parameter K with values 01020304050K0.920.930.940.950.960.970.980.991.001.01AccuracyPNAOMGPNADMG01020304050K0.550.600.650.700.75F1PNAOMGPNADMG01020304050K0.9840.9860.9880.9900.9920.9940.996AccuracyPNAOMGPNADMG01020304050K0.740.760.780.800.820.840.860.88F1PNAOMGPNADMG PERFORMANCE COMPARISON OF DIFFERENT METHODS FOR PARTIAL NETWORK ALIGNMENT WITH DIFFERENT NETWORK ALIGNMENT RATES. TABLE II ACC F1 Methods PNAOMG PNADMG PNAOM PNADM MNA PNAO PNAD MNA no PNAOMG PNADMG PNAOM PNADM MNA PNAO PNAD MNA no 0.1 0.964 0.960 0.942 0.940 0.917 0.905 0.905 0.895 0.280 0.283 0.230 0.239 0.211 0.014 0.010 0.004 0.2 0.966 0.974 0.938 0.951 0.918 0.907 0.908 0.899 0.375 0.374 0.318 0.324 0.267 0.054 0.048 0.021 0.3 0.973 0.961 0.948 0.949 0.922 0.915 0.911 0.901 0.442 0.412 0.384 0.369 0.375 0.211 0.131 0.042 anchor link sampling rate η 0.7 0.4 0.981 0.967 0.976 0.982 0.970 0.945 0.969 0.929 0.940 0.922 0.926 0.915 0.912 0.923 0.922 0.907 0.776 0.496 0.783 0.481 0.723 0.452 0.424 0.716 0.705 0.420 0.413 0.210 0.365 0.165 0.067 0.339 0.6 0.989 0.975 0.960 0.947 0.937 0.927 0.926 0.921 0.717 0.658 0.638 0.593 0.578 0.402 0.380 0.322 0.5 0.987 0.983 0.954 0.949 0.931 0.918 0.915 0.916 0.615 0.589 0.543 0.526 0.496 0.305 0.257 0.232 0.8 0.988 0.989 0.968 0.966 0.943 0.925 0.925 0.924 0.843 0.848 0.824 0.812 0.782 0.385 0.367 0.346 0.9 0.989 0.986 0.983 0.983 0.949 0.929 0.929 0.919 0.941 0.925 0.916 0.919 0.899 0.428 0.405 0.360 1.0 0.990 0.990 0.981 0.981 0.971 0.921 0.923 0.922 0.965 0.972 0.963 0.963 0.943 0.438 0.438 0.380 PERFORMANCE COMPARISON OF DIFFERENT METHODS FOR PARTIAL NETWORK ALIGNMENT WITH DIFFERENT NEGATIVE POSITIVE RATES. TABLE III Measure ACC F1 Methods PNAOMG PNADMG PNAOM PNADM MNA PNAO PNAD MNA no PNAOMG PNADMG PNAOM PNADM MNA PNAO PNAD MNA no 1 0.941 0.920 0.934 0.916 0.914 0.706 0.752 0.714 0.943 0.926 0.936 0.923 0.887 0.600 0.687 0.575 2 0.900 0.917 0.898 0.914 0.863 0.795 0.812 0.781 0.870 0.890 0.867 0.887 0.800 0.609 0.633 0.542 3 0.903 0.903 0.899 0.892 0.884 0.834 0.836 0.825 0.835 0.834 0.832 0.822 0.790 0.553 0.569 0.526 negative positive rate θ 4 0.904 0.913 0.882 0.910 0.886 0.849 0.865 0.839 0.805 0.821 0.772 0.819 0.760 0.515 0.528 0.483 5 0.905 0.893 0.898 0.887 0.878 0.880 0.875 0.873 0.776 0.754 0.769 0.747 0.694 0.492 0.455 0.447 10 0.989 0.975 0.960 0.947 0.937 0.927 0.926 0.921 0.717 0.658 0.638 0.593 0.578 0.402 0.380 0.322 20 0.995 0.994 0.975 0.977 0.966 0.958 0.955 0.953 0.608 0.602 0.550 0.563 0.508 0.294 0.230 0.204 30 0.995 0.998 0.981 0.981 0.970 0.970 0.968 0.968 0.552 0.577 0.470 0.468 0.397 0.251 0.131 0.105 40 0.998 0.997 0.992 0.990 0.978 0.976 0.976 0.975 0.565 0.548 0.438 0.419 0.346 0.131 0.093 0.075 50 0.997 0.997 0.995 0.990 0.986 0.980 0.980 0.980 0.524 0.533 0.366 0.405 0.329 0.051 0.067 0.041 in {1, 2, 3, 4, 5, 10, 20, 30, 40, 50}. In Figures 6(a)-6(b), parameters θ and η are fixed as 5 and 0.4 respectively. From the results, we observe that both PNAOMG and PNADMG can perform very well when K is small and the best is obtained at K = 1. It shows that the anchor link candidates with the highest confidence predicted by PNAO and PNAD are the optimal network alignment results when θ and η are low. In Figures 6(c)-6(d), we set η as 0.9 and θ as 50 (i.e., the networks contain more anchor links and the training/test sets become more imbalance), we find that the performance of both PNAOMG and PNADMG increases first and then decreases and finally stay stable as K increases, which shows that the optimal anchor link candidates are those within the top K candidate set rather than the one with the highest confidence as the training/test sets become more imbalance. In addition, the partial matching strategy can shrink the preference lists of users a lot, which can lead to lower time cost as shown in Figure 7 especially for the smaller K values which lead to better accuracy as shown in Figure 6. Results in all these figures show that generic stable match- ing can effectively prune the redundant candidate links and significantly improve the prediction results. VI. RELATED WORKS Aligned social network studies have become a hot research topic in recent years. Kong et al. [14] are the first to propose the anchor link prediction problem in fully aligned social networks. Zhang et al. [36], [37], [42], [40] propose to small core in nash equilibrium in college admission problems. Flor´een et al. [8] propose to study the almost stable matching by truncating the Gale-Shapley algorithm. VII. CONCLUSION In this paper, we study the partial network alignment problem across partially aligned social networks. To address the challenges of the studied problem, a new method PNA is proposed in this paper. PNA can extract features for anchor links based on a set of anchor meta paths and overcome the class imbalance problem with over sampling and down sampling. PNA can effectively prune the non-existing anchor links with generic stable matching to ensure the results can meet the one − to − one≤ constraint. Extensive experiments done on two real-world partially aligned networks show the superior performance of PNA in addressing the partial network alignment problem. VIII. ACKNOWLEDGEMENT This work is supported in part by NSF through grants CNS-1115234, Google Research Award, the Pinnacle Lab at Singapore Management University, and Huawei grants. REFERENCES [1] M. Bayati, M. Gerritsen, D. Gleich, A. Saberi, and Y. Wang. Algorithms for large, sparse network alignment problems. In ICDM, 2009. [2] I. Bhattacharya and L. Getoor. Collective entity resolution in relational data. TKDD, 1(1), 2007. [3] N. Chawla. Data mining for imbalanced datasets: An overview. In Data Mining and Knowledge Discovery Handbook. 2005. [4] N. Chawla, K. Bowyer, L. Hall, and P. Kegelmeyer. Smote: Synthetic minority over-sampling technique. J. Artif. Int. Res., 2002. [5] L. Dubins and D. Freedman. Machiavelli and the gale-shapley algorithm. The American Mathematical Monthly, 1981. [6] M. Duggan and A. Smith. Report at social-media-update-2013/. available Social media update 2013. 2013. http://www.pewinternet.org/2013/12/30/ [7] J. Euzenat and P. Shvaiko. Ontology Matching. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2007. [8] P. Flor´een, P. Kaski, V. Polishchuk, and J. Suomela. Almost stable matchings by truncating the gale-shapley algorithm. Algorithmica, 2010. [9] D. Gale and L. Shapley. College admissions and the stability of marriage. The American Mathematical Monthly, 1962. [10] D. Gusfield and R. Irving. The Stable Marriage Problem: Structure and [14] X. Kong, J. Zhang, and P. Yu. Inferring anchor links across heteroge- neous social networks. In CIKM, 2013. [15] M. Kubat and S. Matwin. Addressing the curse of imbalanced training sets: One-sided selection. In ICML, 1997. [16] R. Lichtenwalter, J. Lussier, and N. Chawla. New perspectives and methods in link prediction. In KDD, 2010. [17] X. Liu, S. Ji, W. Glanzel, and B. De Moor. Multiview partitioning via tensor methods. TKDE, 2013. [18] J. Ma. Stable matchings and the small core in nash equilibrium in the college admissions problem. Technical report, 1998. [19] MarketingCharts. Majority of twitter users also use instagram. 2014. Report available at http://www.marketingcharts.com/wp/online/ majority-of-twitter-users-also-use-instagram-38941/. [20] A. Menon and C. Elkan. Link prediction via matrix factorization. In ECML/PKDD, 2011. Algorithms. 1989. [11] N. Japkowicz and S. Stephen. The class imbalance problem: A systematic study. Intelligent Data Analysis, 2002. [12] S. Jin, J. Zhang, P. Yu, S. Yang, and A. Li. Synergistic partitioning in multiple large scale social networks. In IEEE BigData, 2014. [13] T. Kolda and B. Bader. Tensor decompositions and applications. SIAM REVIEW, 2009. Fig. 7. Time cost of PNAOMG and PNADMG with different partial matching rates. predict links for new users and new networks by transferring heterogeneous information across aligned social networks. A comprehensive survey about link prediction problems across multiple social networks is available in [38]. In addition to link prediction problems, Jin and Zhang et al. [12], [39], [41] introduce the community detection problems across aligned networks and Zhan et al. [35] study the information diffusion across aligned social networks. Meta path first proposed by Sun et al. [26] has become a powerful tool, which can be applied in either in link prediction problems [26], [27] or clustering problems [28], [25]. Sun et al. [26] propose to predict co-author relationship in heterogeneous bibliographic networks based on meta path. Sun et al. extend the link prediction model to relationship prediction model based on meta path in [27]. Sun et al. [28] propose to calculate the similarity scores among users based on meta path in bibliographical network. Sun et al. [25] also apply meta path in clustering problem of heterogeneous information networks with incomplete attributes. Tensor has been widely used in social networks studies. Moghaddam et al. [21] propose to apply extended tensor factorization model for personalized prediction of review helpfulness. Liu et al. [17] present a tensor-based framework for integrating heterogeneous multi-view data in the context of spectral clustering. A more detailed tutorial about tensor decomposition and applications is available in [13]. Class imbalance problems in classification can be very common in real-world applications. Chawla et al. [4] propose a technique for over-sampling the minority class with generated new synthetic minority instances. Kubat et al. [15] propose to address the class imbalance problems with under sampling of the majority cases in the training set. A systematic study of the class imbalance problem is available in [11]. College admission problem [23] and stable marriage prob- lem [10] have been studied for many years and lots of works have been done in the last century. In recent years, some new papers have come out in these areas. Sotomayor et al. [24] propose to analyze the stability of the equilibrium outcomes in the admission games induced by stable matching rules. Ma [18] analyzes the truncation in stable matching and the 0102030405060K280285290295300305310315secondPNAOMGPNADMGPNAOMPNADM [21] S. Moghaddam, M. Jamali, and M. Ester. Etf: Extended tensor fac- torization model for personalizing prediction of review helpfulness. In WSDM, 2012. [22] O. Peled, M. Fire, L. Rokach, and Y. Elovici. Entity matching in online social networks. In SOCIALCOM, 2013. [23] A. Roth. The college admissions problem is not equivalent to the marriage problem. Journal of Economic Theory, 1985. [24] M. Sotomayor. admission games induced by stable matching rules. Journal of Game Theory, 2008. The stability of the equilibrium outcomes in the International [25] Y. Sun, C. Aggarwal, and J. Han. Relation strength-aware clustering of heterogeneous information networks with incomplete attributes. VLDB, 2012. [26] Y. Sun, R. Barber, M. Gupta, C. Aggarwal, and J. Han. Co-author In relationship prediction in heterogeneous bibliographic networks. ASONAM, 2011. [27] Y. Sun, J. Han, C. Aggarwal, and N. Chawla. When will it happen?: In Relationship prediction in heterogeneous information networks. WSDM, 2012. [28] Y. Sun, J. Han, X. Yan, P. Yu, and T. Wu. Pathsim: Meta path-based top- k similarity search in heterogeneous information networks. In VLDB, 2011. [29] J. Tang, H. Gao, X. Hu, and H. Liu. Exploiting homophily effect for [30] I. Tomek. Two Modifications of CNN. IEEE Transactions on Systems, trust prediction. In WSDM, 2013. Man and Cybernetics, 1976. [31] K. Wilcox and A. T. Stephen. Are close friends the enemy? online social networks, self-esteem, and self-control. Journal of Consumer Research, 2012. [32] Y. Yao, H. Tong, X. Yan, F. Xu, and J. Lu. Matri: a multi-aspect and transitive trust inference model. In WWW, 2013. [33] J. Ye, H. Cheng, Z. Zhu, and M. Chen. Predicting positive and negative links in signed social networks by transfer learning. In WWW, 2013. [34] R. Zafarani and H. Liu. Connecting users across social media sites: A behavioral-modeling approach. In KDD, 2013. [35] Q. Zhan, S. Wang J. Zhang, P. Yu, and J. Xie. Influence maximization across partially aligned heterogenous social networks. In PAKDD, 2015. [36] J. Zhang, X. Kong, and P. Yu. Predicting social links for new users across aligned heterogeneous social networks. In ICDM, 2013. [37] J. Zhang, X. Kong, and P. Yu. Transferring heterogeneous links across location-based social networks. In WSDM, 2014. [38] J. Zhang and P. Yu. Link prediction across heterogeneous social networks: A survey. Technical report, 2014. [39] J. Zhang and P. Yu. Community detection for emerging networks. In SDM, 2015. [40] J. Zhang and P. Yu. Integrated anchor and social link predictions across partially aligned social networks. In IJCAI, 2015. [41] J. Zhang and P. Yu. Mcd: Mutual clustering across multiple heteroge- neous networks. In IEEE BigData Congress, 2015. [42] J. Zhang, P. Yu, and Z. Zhou. Meta-path based multi-network collective link prediction. In KDD, 2014.
1804.11242
4
1804
2019-12-17T07:22:53
Mapper on Graphs for Network Visualization
[ "cs.SI", "stat.ML" ]
Networks are an exceedingly popular type of data for representing relationships between individuals, businesses, proteins, brain regions, telecommunication endpoints, etc. Network or graph visualization provides an intuitive way to explore the node-link structures of network data for instant sense-making. However, naive node-link diagrams can fail to convey insights regarding network structures, even for moderately sized data of a few hundred nodes. We propose to apply the mapper construction--a popular tool in topological data analysis--to graph visualization, which provides a strong theoretical basis for summarizing network data while preserving their core structures. We develop a variation of the mapper construction targeting weighted, undirected graphs, called mapper on graphs, which generates property-preserving summaries of graphs. We provide a software tool that enables interactive explorations of such summaries and demonstrates the effectiveness of our method for synthetic and real-world data. The mapper on graphs approach we propose represents a new class of techniques that leverages tools from topological data analysis in addressing challenges in graph visualization.
cs.SI
cs
Mapper on Graphs for Network Visualization Mustafa Hajij∗, Paul Rosen†, Bei Wang‡ 9 1 0 2 c e D 7 1 ] I S . s c [ 4 v 2 4 2 1 1 . 4 0 8 1 : v i X r a Abstract Networks are an exceedingly popular type of data for representing relationships between individuals, businesses, proteins, brain regions, telecommunication endpoints, etc. Network or graph visualization provides an intuitive way to explore the node-link structures of network data for instant sense-making. However, naive node-link diagrams can fail to convey insights regarding network structures, even for moderately sized data of a few hundred nodes. We pro- pose to apply the mapper construction -- a popular tool in topological data analysis -- to graph visualization, which provides a strong theoretical basis for summarizing network data while preserving their core structures. We develop a variation of the mapper construction target- ing weighted, undirected graphs, called mapper on graphs, which generates property-preserving summaries of graphs. We provide a software tool that enables interactive explorations of such summaries and demonstrates the effectiveness of our method for synthetic and real-world data. The mapper on graphs approach we propose represents a new class of techniques that leverages tools from topological data analysis in addressing challenges in graph visualization. 1 Introduction Networks are often used to model social, biological, and technological systems. In recent years, our ability to collect and archive such data has far outpaced our ability to understand them. For instance, the Blue Brain Project -- the worlds largest-scale simulations of neural circuits -- generates instances of the micro-connectome containing 10 million neurons and 88 billion synaptic connections for the rodent brain. The challenges for graph visualization (sometimes called network visualization) are two-fold: how to effectively extract features from such complex data; and how to design effective visualizations to communicate these features to the users. We propose to address these challenges by leveraging the mapper construction [88], a tool in topological data analysis (TDA), to develop visualizations for large network data. Given a topological space X equipped with a function f on X, the classic mapper construction from the seminal work of Singh et al. [88] provides a topological summary of the data for efficient computation, manipulation, and exploration. It has enjoyed tremendous success in data science, from cancer research [72] to sports analytics [1], among others [17, 64, 65, 91]; it is also a cornerstone of several data analytics companies, e.g., Ayasdi and Alpine Data Labs. In this paper, we develop a variation of the mapper construction targeting weighted undirected graphs, called mapper on graphs. For the rest of the paper, we use networks to refer to the data and graphs as an abstraction to the data. The mapper construction connects naturally with visualization by providing a strong theoretical basis for simplifying large complex data while preserving their core structures. Specifically: ∗KLA corporation. E-mail: [email protected] †University of South Florida. E-mail: [email protected] ‡University of Utah. E-mail: [email protected]. Corresponding author. 1 • We propose a set of summarization techniques to transform large graphs into hierarchical representations and provide interactive visualizations for their exploration. • We demonstrate the effectiveness of our method on synthetic and real-world data using three different topological lenses that capture various properties of the graphs. • We provide open-sourced implementation together with our experimental datasets via GitHub (see the supplement material). 2 Related Work Graph visualization. We limit our review to node-link diagrams, which are utilized by many visu- alization software tools, including Gephi [7], GraphViz [34], and NodeXL [44]. For a comprehensive overview of graph visualization techniques, see [93]. One of the biggest challenges with node-link diagrams is visual clutter, which has been exten- improved node It is mainly addressed in three ways: sively studied in graph visualization [33]. layouts, edges bundling, and alternative visual representations. Tutte [92] provided the earliest graph layout method for node-link diagrams, followed by meth- ods driven by linear programming [40], force-directed embeddings [37, 47], embeddings of the graph metric [39], and connectivity structures [13, 50, 52, 53]. TopoLayout [2] creates a hybrid layout by decomposing a graph into subgraphs based on their topological features, including trees, complete graphs, bi-connected components, and clusters, which are subsequently grouped and laid out as meta-nodes. One of many differences between TopoLayout and our work is that we use functions defined on the graph to automatically and interactively guide decomposition and feature extraction among subgraphs. Edge bundling, which bundles adjacent edges together, is commonly used to reduce visual clutter on dense graphs [45]. For massive graphs, hierarchical edge bundling scales to millions of edges [38], while divided edge bundling [85] tends to produce higher-quality visual results. Nevertheless, these approaches only deal with edge clutter, not node clutter, and they only support limited types of analytic tasks [4, 67]. Finally, alternative visual representations have been used to remove clutter, ranging from varia- tions on node-link diagrams, such as replacing nodes with modules [31] and motifs [30], to abstract representations, such as matrix diagrams [28] and graph statistics [49]. Node clustering. The objective in node clustering (or graph clustering) is to group the nodes of the graph by taking into consideration its edge structure [84]. Common techniques include spectral methods [26, 36, 54, 94], similarity-based aggregation [90], community detection [69, 70], random walks [48, 80], and hierarchical clustering [12, 16]. Edge clustering has also been studied [23, 35]. Broadly speaking, our approach is a type of graph clustering that simultaneously preserves relationships between clusters. TDA in graph analysis and visualization. Persistent homology (the study of topological features across multi-scales) and mapper construction are two of the most widely used tools in TDA. A number of works use persistent homology to analyze graphs [29, 32, 46, 76, 77], and it has been applied to the study of collaboration networks [5, 20] and brain networks [21, 24, 56, 57, 58, 59, 79]. In terms of graph visualization, persistent homology has been used in capturing changes in time- varying graphs [43], as well as supporting interactive force-directed layouts [89]. The mapper construction [88] has been widely utilized in TDA for a number of applications [17, 64, 65, 73, 91]. Recently, it has witnessed major theoretical developments (e.g., [19, 25, 68]) that 2 Figure 1: An illustration of the mapper on graphs construction: (a) A weighted graph G = (V, E) has (b) a topological lens f : V → R applied. (c) A cover U of the range space is given by intervals U1, U2, U3, and U4 as cover elements. (d-e) The connected subgraphs induced by f−1(Ui) form a cover of G, denoted as f∗(U). (f) The 1-dimensional skeleton of the nerve (1-nerve) of f∗(U) is the resulting mapper on a graph whose nodes represent the connected subgraphs (in orange), and edges represent the non-empty intersections between the subgraphs (in purple). further adjudicate its use in data analysis. To the best of our knowledge, this is the first time the mapper construction is utilized explicitly in graph visualization. nonempty intersection of sets in U is contractible. indexing set A such that (cid:83) f (V ) of f , such that f (V ) ⊆(cid:83) Uα. Let f∗(U) denote the cover of G obtained by considering the the nerve of the cover U, that is, N (U) =(cid:8)σ ⊆ A (cid:84) α∈σ Uα (cid:54)= ∅(cid:9). We compute the nerve of f∗(U), 3 Methods: Mapper on Graphs Construction Suppose the data is a weighted graph G = (V, E) equipped with a positive edge weight w : E → R and a real-valued function defined on its nodes f : V → R. Our mapper on graphs method -- a variation of the classic mapper construction -- provides a general framework to analyze, simplify, and visualize G, as well as functions on G. An open cover of a topological space X is a collection U = {Uα}α∈A of open sets for some α∈A Uα = X. A finite open cover U is a good cover if every finite The mapper on graphs construction starts with a finite good cover U = {Uα}α∈A of the image connected components (i.e., maximal connected subgraphs) induced by nodes in f−1(Uα) for each α. Given a cover U = {Uα}α∈A of X, let N (U) denote the simplicial complex that corresponds to denoted as N (f∗(U)), and refer to its 1-dimensional skeleton as the mapper on a graph, denoted as M; see Figure 1 for an illustrative example. Parameters. Mapper on graphs is inherently multi-scale; its construction relies on two sets of parameters: the first defines the function/lens f , and the other specifies the cover U. For simplicity, we normalize the range space f (V ) to be within [0, 1]. 1. Topological Lens: The function f plays the role of a topological lens through which we look at the properties of the data, and different lenses provide different insights [9, 88]. 3 Mapper on graphs currently considers three graph-theoretic lenses, average geodesic distance (AGD), density estimation, and eigenfunctions of the graph Laplacian (see Figure 2), although our framework can be easily extended to include other lenses (see Section 6). 2. Cover: The range of f , f (V ) ⊆ [0, 1], is covered by U, which consists of a finite number of open intervals as cover elements U = {Uα}α∈A. A common strategy is to use uniformly sized overlapping intervals. Let n be the number of intervals, and  describes the amount of overlap between adjacent intervals (see Section 3.2 for details). Adjusting these parameters increases or decreases the amount of aggregation mapper on graphs provides. Figure 2: Examples of topological lenses for graphs: (a) average geodesic distance AGD (orange); (b) density estimation Dδ with δ = 2 (green); and (c) eigenvectors of the Fiedler vector of the graph Laplacian, l2 (purple). Darker colors mean lower function values. 3.1 Topological Lens An interesting open problem for the classic mapper construction is how to formulate topological lenses beyond the best practice or a rule of thumb [9, 10]. In practice, height functions, distances from the barycenter of the space, surface curvature, integral geodesic distances, and geodesic dis- tances from a source point in the space have all been proposed as reasonable choices [9]. In the graph setting, we focus on graph-theoretic lenses defined on the nodes of a graph, as illustrated in Figure 2. Each lens is chosen to reflect a specific property of interest that is intrinsic to the structure of a graph. In particular, we use as lenses average geodesic distance (AGD) [51] that detects symmetries in the graph while being invariant to reflection, rotation, and scaling; density estimation [87] that differentiates dense regions from sparse regions and outliers; and eigenfunctions of the graph Laplacian [55] that capture geometric properties of the graph. Average geodesic distance. Suppose a weighted graph G = (V, E) is equipped with a geodesic distance metric d. That is, d(u, v) measures the geodesic/graph distance between two nodes u, v ∈ V . d can be computed by utilizing Dijkstra's shortest path algorithm. The average geodesic distance, AGD : V → R, is given by AGD(v) = 1 V d(v, u). (cid:88) u∈V This definition implies that the nodes near the center of the graph will likely have low function values, while points on the periphery will have high values. The AGD function has been used 4 (a)(b)(c) extensively in shape analysis due to its desirable proprieties in detecting and reflecting symme- try [51] based on how the function values are distributed. Therefore, the AGD as a topological lens captures the symmetric properties of a graph, which are described by all or parts of the graph that are invariant to transformations such as reflection, rotation, and scaling. The mathematical notion of automorphism, in some sense, captures the symmetry of the space as it is a structural-preserving way of mapping a space to itself. More precisely, consider a graph G as a metric space equipped with the geodesic distance, (G, d). A bijec- tion T : V → V is called an automorphism on (G, d) if d(u, v) = d(T (u), T (v)) for every u, v ∈ V . Let Aut(G) denote the group of automorphisms on G. A function f : V → R is isometry invariant over Aut(G) if for every T ∈ Aut(G): f ◦ T = f . AGD is, therefore, let T an isometry invariant scalar function. be an automorphism on G, then for every v ∈ V , we can verify that AGD(T (v)) = 1V u∈V d(T (u)), and T (v) = 1V u∈V d(u, v) = AGD(v). See Figure 2(a) and Figure 3(a) for examples of AGD on graphs. (cid:80) (cid:80) Indeed, Density estimation. The density estimation func- tion [87] is given by (cid:88) u∈V Dδ(v) = −d(u, v)2 δ ), exp( is shown on the left; Figure 3: The effect of a lens. The orig- inal graph, colored by one of the three lenses, its corre- sponding mapper on a graph M, along with a chosen cover, is shown on the right. (b) Dδ with δ = 1. (c) l2. (a) AGD. where d(u, v) is the geodesic distance between two nodes in the graph and δ > 0. Since Dδ is completely defined in terms of the dis- tance d, it is not hard to see that Dδ is also isometry in- variant. Dδ correlates negatively with AGD as it tends to take larger values on nodes that are close to the center, see Figure 2(b) and Figure 3(b) for examples. Eigenfunctions of the graph Laplacian. Let C(G) be the vector space of all functions f : V −→ R. The unnormalized Laplacian of the graph G is the linear operator L : C(G) → C(G) defined by mapping f ∈ C(G) to Lf , where (Lf )(v) =(cid:80) u∈N (v) wu,v(f (v) − f (u)). The eigenvectors of L form a rich family of scalar functions defined on G with many geometric properties [55]. First, the gradient of the eigenfunctions of L tends to follow the overall shape of the data [63]; and these functions have been used in applications, such as graph understanding [86], segmentation [82], spectral clustering [71], and min-cut problems [66]. Sorting the eigenvectors of L by increasing eigenvalues, we use eigenvectors of the second and third smallest eigenvalues of L as the lens, denoted as l2 and l3. These vectors usually contain low-frequency information about the graph, and they help to retain the shape of complex graphs. In particular, l2, commonly referred to as the Fiedler vector [63], has desirable geometric properties [27]. For instance, the maximum and the minimum of the Fielder vector tend to occur at nodes with maximum geodesic distances [22], see Figure 2(c) and Figure 3(c) for examples. 5 (a)(b)(c) Furthermore, there is a connection between mapper on graphs, spectral clustering, and graph min-cut. For instance, the Fielder's vector l2 can be used to bi-partition the graph G (i.e., based on l2(v) > 0 or l2(v) ≤ 0); such a partition could also be approximated by computing mapper on a graph M with l2 as the lens and setting n = 2 and  ≈ 0. M not only provides a generalization of spectral clustering but also preserves the connections (which form the min-cut) between the clusters (for appropriately chosen  > 0). 3.2 Cover Given a graph G equipped with a lens function f : V → R, suppose the range of the function f (V ) is normalized to be within [0, 1], and A = {1,··· , n} for a finite good cover U = {Uα}α∈A of the interval [0, 1]. We represent this cover U visually by drawing long, colored rectangu- lar boxes, as indicated in 4. The mapper on graphs construction relies on the choice of a cover for the interval [0, 1]; such a choice is rather flexible but also essential to achieve effective graph visualization. To obtain an initial cover, we start by splitting [0, 1] into n (the resolution parameter) inter- vals [c1, c2],··· , [cn−1, cn] with equal length, such that c1 = 0 and cn = 1. The overlap parameter  is then used to obtain the initial cover U consisting of cover elements (ci − , ci+1 + ) for 1 ≤ i ≤ n − 1. Choosing n and  has a significant impact on the mapper on graphs output, as illustrated in Figure 4. Broadly speaking, smaller n leads to a smaller topo- logical summary of the graph; and smaller  captures fewer connections between clusters of nodes. In the ex- amples shown in the paper, we find a smaller  typically give a more effective visualization for large and highly connected graphs, e.g.,  ∈ [0.01, 0.1], while  ∈ [0.1, 0.3] appears to be sufficient for small graphs. 4 Visual Design and Interaction Varying  and n in a Figure 4: cover. (a) G with a AGD lens. Vari- ous mapper on graphs constructions: (b- d) n = 2, 3, and 4, respectively;  = 0.1. (e-f) n = 3,  = 0.2 and 0.3, respec- tively. We provide a linked-view interface to enable exploration of the structure of a graph. It connects the original graph G to its (multi-scale) summary in the form of a mapper on a graph M, through interactive cover manipulation that supports customization of M. 4.1 Cover Visualization and Interaction The mapper on graphs construction relies on the choice of two sets of parameters: a lens and a cover. Therefore, the cover visualization consists of two components: a histogram of the lens, showing the distribution of function values, and an interactive cover designer. Via interactive visualization, we treat the exploration and manipulation of these parameters as a vehicle to study and summarize the intrinsic structure of an input graph. 6 (a)(b)(c)(d)(e)(f) Histogram of a lens. Understanding the distribution of the values of a lens f can be helpful in the mapper on graphs construction. Figure 5(left) shows an example of a histogram for the AGD lens in gray. The histogram is split into a fixed number of bins within the range [0, 1]. We will illustrate later how the visual information encoded in the histogram can be utilized to optimize the choice of the cover. In addition, the histogram of a lens can be used to inform the choices for n and  -- generally speaking, a uniformly distributed lens function requires smaller . Cover visualization and interactive manipulation. The cover is visualized using a series of boxes, one per cover element, displayed next to the histogram of the lens. Each box is placed based upon the start and end val- ues of its interval and colored based upon the midpoint. Figure 5 shows the cover as red and orange boxes. While an initial, uniform cover is sufficient for most graph visualizations, we provide interactive manipula- tion of individual cover elements that can be used to obtain more desirable mapper on graphs output in some cases. Given an interval Ui ∈ U, the user can manipu- late its endpoints dynamically via an interactive interface such that Ui can be shrunk, expanded, or shifted, as illustrated in Figure 6. As a user manipulates the interval Ui, the connected components within f−1(Ui) split, merge, appear, or disappear. The histogram of a lens can be used to inform the cover manipulation; for instance, the length of an interval could be inversely proportional to the density of the histogram. Figure 5: The histogram of a lens. U consists of open intervals U1, U2, and U3. Figure 6: (a) The case when an interval Ui ∈ U shrinks, from left to right, or equivalently when it expands, from right to left, are shown. (b) The effect of interval shrinking (expanding) on the mapper on graphs nodes is shown. (c) The case when the interval Ui shifts to a new position is shown. (d) Changes to the mapper on graphs nodes that occur due to the interval shift are shown. 4.2 Graph Drawing For both G and its summary M, we apply a Fruchterman-Reingold force-directed layout [37] with the Barnes-Hut approximation for repulsive forces [6]. Our approach is ultimately agnostic of the graph layout algorithm, and different layouts (e.g., layered approaches) may improve the presentation of certain graphs. For a given lens, f : V → R, a node in G is colored by a saturated colormap (red for AGD, green for Dδ, and purple for l2 or l3) based on its function value. A node u in M (associated with 7 (a)(b)(c)(d) a connected component Cu ⊆ G) is colored similarly by taking the average of the function values of nodes in Cu. The size of u is proportional to Cu. For both graphs, edge thickness is drawn proportional to edge weight. For M, an edge [u, v] represents the nonempty intersection between Cu and Cv. Therefore, its edge weight, and thus thickness, is drawn proportional to the size of the intersection, Cu ∩ Cv. For readability, only the largest component of the mapper on a graph is included in the visu- alization. Furthermore, mapper on a graph nodes are removed from the output if the size of their connected component Cu is less than a user-selected value. Interactive Structural Correspondences 4.3 We provide three mechanisms for exploring structural correspondences between G and M: cover element selection, node selection, and edge selection. Figure 7: (a-c) Selecting a cover element (in blue) triggers the selection of its corresponding nodes in M (top) and G (bottom). (d-e) Selecting a node u of M (top right in blue) triggers the selection of its corresponding cover element that generates u (left) and nodes in G (bottom). Cover element selection. When a cover element U is se- lected, the action triggers the selection of nodes f−1(U ) in G, as well as nodes that represent connected compo- nents of f−1(U ) in M. As illustrated in Figure 7(a-c), after the selection of a cover element (top left in (a-c), highlighted in blue), our system selects the correspond- ing nodes in M (top) and in G (bottom). As previously noted, if the nodes of M captured by a particular cover element need fine-tuning, the box may be dragged, ex- panded, or contracted. M will update correspondingly. Node Selection. Each node u in M corresponds to a connected component Cu from the original graph G. With the selection of a node u, our interface recovers and highlights Cu from G, as well as the cover element that generates the node u, see Figure 7(d-e). Edge Selection. Each edge uv in M is determined by two connected components Cu and Cv in G. With the selection of an edge uv, our interface highlights the clusters Cu and Cv in G associated with its endpoints. Specifically, the sets Cu−(Cu∩Cv), Cv−(Cu∩Cv), and Cu∩Cv are colored differently Figure 8: Selecting an edge (blue) in M highlights the clusters of nodes in G as- sociated with its endpoints and their in- tersection. 8 (a)(b)(c)(d)(e)(b)(c)(a) to highlight node memberships and the relationship between the clusters. Figure 8 illustrates this process. Nodes that are unique to each endpoint are in purple and sky blue, respectively; nodes that correspond to the intersection are in blue (see Figure 8(a)). For comparison, clusters of nodes attached to individual endpoints are also highlighted in blue in Figure 8(b). 5 Results To demonstrate our approach, we have implemented our approach using Java and Processing1. We evaluate our approach by examining mapper on graphs on synthetic and real datasets. Our code and datasets are available on GitHub2. Synthetic datasets. We apply mapper on graphs to 20 synthetic datasets, all of which are generated using Net- workX [42]. Figure 9 shows 16 synthetic graphs G and their corresponding mapper on graphs outputs M. For each ex- ample, certain structures are emphasized depending on the choice of the lens and cover, such as symmetry (e.g., (b), (c), (k)) and the overall shape of the data (e.g., (a), (f), (l)). The original graphs for (a) and (f) have a circular shape, so we choose the Fiedler's vector l2 as the lens as it has variability across the graph. M for (f) is partic- ularly interesting as the original graph G comes from a torus mesh, and M appears similar to its corresponding Reeb graph. M also captures the dual structures of some graphs in the cases of Grid graph (j) and the Dorogovtsev- Goltsev-Mendes graph (c). USAIR 97. The previous example illustrates a natural in- terpretation of the nodes in M as clusters in G. In Fig- ure 10, we provide a natural interpretation of the edges in M as connections between clusters. The USAIR 97 graph consists of 332 nodes and 2126 edges [8]. The nodes rep- resent airports and the edges routes between airports. We use l3 as the lens and explore the USAIR 97 dataset by utilizing interactive edge selection as described in Section 4. Figure 10: Edge selection within M for the USAIR 97 graph: selecting edge (1, 2) in (a) vs. edge (2, 3) in (b). First in Figure 10(a), selecting edge (1, 2) in M allows us to inspect their corresponding clusters C1 (light and dark blue nodes) and C2 (dark blue and purple nodes) in G. C1 and C2 have Bethel and Anchorage International as major airports, respectively. Edge (1, 2) corresponds to airports in C1 ∩ C2 (blue nodes), including the Aniak and the St Mary's. M clearly captures the fact that these airports are the hubs between Bethel and Anchorage international in G. Second, selecting edge (2, 3) in M enables the exploration of C2 and C3 in G, respectively. C2, as shown in Figure 10(b), has Aniak and St Mary's; while C3 contains the Juneau International Airport. Edge (2, 3) in M is mainly represented by Anchorage International. M captures the fact that Anchorage International serves as a hub -- in order to go from any airport in C3 to airports in C2 one must travel through Anchorage. Finally, via node selection, node 6 in M corresponds to a peripheral cluster C6 on the outskirt 1https://processing.org/ 2https://github.com/USFDataVisualization/MapperOnGraphs 9 Anchorage IntJuneau IntSt Mary'sAniakSt Mary'sAniakBethelAnchorage IntGuam Int.Honolulu Int.Guam Int.Honolulu Int.(a)(b)123123456456 Figure 9: Mapper on graphs applied to the visualization of synthetic datasets. In all examples, M is shown on the top with its cover and the original graph G is shown on the bottom. (a) Connected caveman graph (n = 5,  = 0.1); (b) Lobster graph (n = 5,  = 0.1); (c) Dorogovtsev-Goltsev- Mendes graph (n = 3,  = 0.2, δ = 7); (d) Large bipartite graph (n = 9,  = 0.15); (e) Community graph (n = 5,  = 0.25); (f) Torus graph (n = 3,  = 0.3); (g) Dorogovtsev-Goltsev-Mendes graph (n = 3,  = 0.3); (h) Lollipop graph (n = 3,  = 0.1, δ = 7); (i) Small bipartite graph (n = 3,  = 0.4); (j) Grid graph (n = 3,  = 0.1); (k) Tree (n = 3,  = 0.1); (l) Ladder graph (n = 4,  = 0.1). 10 (a)(b)(c)(d)(e)(f)(g)(h)(i)(j)(k)(l) of G (see Figure 10(a)). C6 is represented mainly by the Guam international airport. In order to pass from any airport in C6 to airports in C5, one must pass from the Honolulu International, which is contained in edge (5, 6) in M. (a) Map of science graph G where nodes are colored by 13 scientific disciplines. Figure 11: (b) Mapper on a graph M (top, n = 10,  = 0.1) with l3 as the lens, in comparison with the (c) Applying interactive cover manipulation on M achieves better original graph G (bottom). clustering quality and shape summary. Map of science. The map of science graph [11] (see Figure 11(a)) consists of 554 nodes and 2276 edges. Nodes represent and are colored by specialties within 13 major scientific disciplines, and edges represent co-authorship of publications between those specialties. Since G does not exhibit obvious symmetry, we choose the 3rd smallest eigenfunctions of the graph Laplacian, l3, as the lens to help to retain the shape of G. As illustrated in Figure 11(b), both M and G are laid out by way of correspondence where M is shown to preserve the overall structure of G. The highlighted nodes in M also capture certain clusters in G. We could utilize interactive cover manipulation to obtain an even better representation of the data in Figure 11(c) where nodes in M are circled to highlight the majority scientific discipline from the underlying cluster. For instance, node 1 in M represents the humanities-labeled nodes in G; nodes 8 and 6 represent chemistry and biology, respectively. Node 8 and 6 merge at node 5 in M, which represents medical science and infectious diseases. 6 Scalable Computation The running time of mapper on graphs algorithm relies heavily on the choice of a lens. While the lenses we discussed earlier (Section 3) are effective in capturing various structures of an underlying graph, they are expensive to compute for very large graphs. To address the scalability issue, we need a lens that can be computed efficiently for very large graphs while still carrying structural information. We, therefore, consider PageRank [14] as an additional, scalable lens. We consider a version of the PageRank algorithm applicable to undirected graphs [41]. A PageRank vector R : V → R is defined for every node v ∈ V , (cid:88) u∈N (v) R(u) N (u) , R(v) = (1 − d) V + d 11 121110976845321HumanitiesSocialMSciencesHealthMProfessionalsChemistryEarthMSciencesMathMdMPhysicsBrainMResearchInfectiousMDiseasesMedicalMSpecialtiesBiotechnologyBiologyChemical(MMechMdMCivilMEngineeringEbMEngineeringMdMCSga,124356789101112gc,gb, where N (v) is the set of neighbors of v; 0 < d < 1 is the damping factor, which is typically set at 0.85. Using the formation of R(v), PageRank yields an iterative algorithm that can be computed efficiently in practice [14, 74]. The existence of the PageRank vector R is guaranteed by the PerronFrobenius theorem [78]. A high PageRank score at v typically means that v is connected to many nodes, which also have high PageRank scores. The PageRank has been shown to be a continuous function in [0, 1] [81]. For example, Figure 12(a) bottom illustrates the continuous variation of R on V for a random geometric graph. For the lens, we utilized f (v) = log(R(v)), as it provided a good distribution of function values. We utilize the PageRank implementation in NetworkX [42] and ran mapper on graphs on two synthetic graphs generated using NetworkX [42] and five real-world large graphs obtained from Stanford Large Network Dataset Collection [62] with up to 3 million edges using a MacBook Pro with 2.3 GHz Quad-Core Intel Core i5 with 8 GB memory. We report the average computational time in terms of PageRank (R) and mapper on graphs (M) in Table 1. Table 1: Average computational time for mapper on graphs with PageRank on five large real-world graphs. Time is reported in seconds. Graph Amazon0302 [60] Figure -- V -- 12(g) 262, 111 -- E -- n 5 1, 234, 877 ca-CondMat [61] 12(e) 23, 133 93, 497 com-amazon.ungraph [95] 12(c) 334, 863 925, 872 com-youtube.ungraph [95] 12(d) 1, 134, 890 2, 987, 624 soc-Epinions1 [83] 12(f) 75, 879 508, 837 5 5 6 6  0.15 0.15 0.15 R (s) M (s) 2.88 31.63 4.18 46.90 0.15 4.15 0.15 240.33 14.44 0.15 16.74 1.02 Finally, we would like to demonstrate that not only our approach is scalable using the PageR- ank lens, it also produces meaningful visualization results. Figure 12 gives examples of applying mapper on graphs to seven large graphs using the PageRank lens. Figure 12(a-b) are both synthetic graphs: (a) is a random geometric graph [75] with a radius 0.2 (n = 10,  = 0.15), while (b) contains a balanced tree G with branching factor 5 and height 9 (n = 3,  = 0.15). Mapper on graphs M for both graphs are shown to capture the global organizational principle of the original graph. Figure 12(c) contains a co-purchasing graph based on the CWBTIAB feature (Customers Who Bought This Item Also Bought) on Amazon website: if a product i is frequently purchased together with product j, then the original graph G contains an edge (i, j). While the node-link diagram of G cannot be improved beyond a hairball, M provides a very compact summary containing information regarding popular products serving as "hubs". Similarly, Figure 12(d-g) show the mapper on graphs M for (d) YouTube social network, (e) Condense Matter collaboration network, (f) Epinions social network, and (g) a 2nd Amazon product co-purchasing network on March 2nd, 2003. The original graphs for these figures are not shown because they, too, are essentially hairballs. 7 Discussion In this paper, we present a TDA approach for graph visualization using a variant of the mapper construction called mapper on graphs. Our approach is effective at detecting clusters in a graph and preserving the relations among these clusters. It is also flexible in capturing the structure of a graph across multiple scales based on different topological or geometric lenses. Mapper on graphs could potentially be applied to other visualization tasks, for instance, as a skeleton representation for the 12 Figure 12: Mapper on graphs using the PageRank lens. In examples (a-c), mapper on a graph M is shown on the top with its cover, and the original graph G is shown on the bottom. For examples (d-g), the original graphs G are not shown because it renders essentially as a hairball, similar to V = 1, 000, E = 53, 741. (b) A the graph G shown in (c). (a) A random geometric graph: V = 66, 430, E = 66, 429. (c) Amazon product co-purchasing network: (9, 5) balanced tree: V = 1, 134, 890, E = 2987624. V = 334, 863, E = 925, 872. (d) YouTube social network: (e) Condense Matter collaboration network: (f) Epinions social V = 75, 879, E = 508, 837. (g) A 2nd Amazon product co-purchasing network on network: March 2nd, 2003: V = 262, 111, E = 1, 234, 877. V = 23, 133, E = 93, 497. underlying graph in determining an initial layout in graph drawing. Traditionally, the PageRank vector is employed on the web graph, which could be considered as a temporal network -- the PageRank vector at a previous instance of the web graph is used as an initial vector to obtain a fast PageRank solution for the current instance of the web graph. Therefore, Mapper on graphs in conjugation with the PageRank lens could be utilized for the study of temporal networks. Our focus in this paper is applying mapper on graphs to graph visualization. We are also interested in the theoretical properties of mapper on graphs. For example, how do we measure the distance between a mapper on graphs M and its underlying graph G? What is an appropriate metric under which M converges to the Reeb graph of G as the granularity of the cover goes to zero? What is the structural stability of mapper on graphs with respect to perturbations of the lens f , graph G, and cover U? Recent theoretical advances on the stability [15, 19] and convergence [3, 15, 18, 19, 25, 68] of mapper construction could address these questions, at least partially. However, questions remain that are unique to mapper on graphs: e.g., what is the relation between the shape of M and the geometric and topological properties of the lens f ? Acknowledgments This work was supported in part by the National Science Foundation NSF IIS-1513616 and NSF DBI-1661375. 13 (a)(b)(c)(d)(e)(g)(f) References [1] Muthu Alagappan. From 5 to 13: Redefining the positions in basketball. MIT Sloan Sports Analytics Conference, 2012. [2] Daniel Archambault, Tamara Munzner, and David Auber. Topolayout: Multilevel graph layout by topological features. IEEE transactions on visualization and computer graphics, 13(2), 2007. [3] Aravindakshan Babu. Zigzag Coarsenings, Mapper Stability and Gene-network Analyses. PhD thesis, Stanford University, 2013. [4] Benjamin Bach, Nathalie Henry Riche, Christophe Hurter, Kim Marriott, and Tim Dwyer. To- wards unambiguous edge bundling: Investigating confluent drawings for network visualization. IEEE transactions on visualization and computer graphics, 23(1):541 -- 550, 2017. [5] Maria Bampasidou and Thanos Gentimis. Modeling collaborations with persistent homology. CoRR, abs/1403.5346, 2014. [6] Josh Barnes and Piet Hut. A hierarchical o(n log N ) force-calculation algorithm. Nature, 324(6096):446, 1986. [7] Mathieu Bastian, Sebastien Heymann, and Mathieu Jacomy. Gephi: an open source software for exploring and manipulating networks. In ICWSM, pages 361 -- 362, 2009. [8] Vladimir Batagelj and Andrej Mrvar. Pajek datasets. http://vlado.fmf.uni-lj.si/pub/ networks/data/, 2006. [9] S. Biasotti, D. Giorgi, M. Spagnuolo, and B. Falcidieno. Reeb graphs for shape analysis and applications. Theoretical Computer Science, 392:5 -- 22, 2008. [10] S. Biasotti, S. Marini, M. Mortara, and G. Patane. An overview on properties and efficacy of topological skeletons in shape modelling. Shape Modeling International, 2003. [11] Katy Borner, Richard Klavans, Michael Patek, Angela M Zoss, Joseph R Biberstine, Robert P Light, Vincent Larivi`ere, and Kevin W Boyack. Design and update of a classification system: The UCSD map of science. PloS one, 7(7):e39464, 2012. [12] Ulrik Brandes, Marco Gaertler, and Dorothea Wagner. Experiments on graph clustering algo- rithms. In European Symposium on Algorithms, pages 568 -- 579, 2003. [13] Ulrik Brandes and Christian Pich. Eigensolver methods for progressive multidimensional scal- ing of large data. In Graph Drawing, pages 42 -- 53. Springer, 2007. [14] Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems, 30(1-7):107 -- 117, 1998. [15] Adam Brown, Omer Bobrowski, Elizabeth Munch, and Bei Wang. Probabilistic convergence and stability of random mapper graphs. arXiv preprint arXiv:1909.03488, 2019. [16] Thang Nguyen Bui, Soma Chaudhuri, Frank Thomson Leighton, and Michael Sipser. Graph bisection algorithms with good average case behavior. Combinatorica, 7(2):171 -- 191, 1987. [17] Gunnar Carlsson. Topological pattern recognition for point cloud data. Acta Numerica, 23:289 -- 368, 2014. 14 [18] Mathieu Carri´ere, Bertrand Michel, and Steve Oudot. Statistical analysis and parameter selection for mapper. Journal of Machine Learning Research, 19:1 -- 39, 2018. [19] Mathieu Carri´ere and Steve Oudot. Structure and stability of the one-dimensional mapper. Foundations of Computational Mathematics, 18(6):1333 -- 1396, 2018. [20] C. J. Carstens and K. J. Horadam. Persistent homology of collaboration networks. Mathe- matical Problems in Engineering, 2013, 2013. [21] Ben Cassidy, Caroline Rae, and Victor Solo. Brain activity: Conditional dissimilarity and IEEE 12th International Symposium on Biomedical Imaging (ISBI), persistent homology. pages 1356 -- 1359, 2015. [22] Moo K Chung, Seongho Seo, Nagesh Adluru, and Houri K Vorperian. Hot spots conjecture and its application to modeling tubular structures. In International Workshop on Machine Learning in Medical Imaging, pages 225 -- 232, 2011. [23] Weiwei Cui, Hong Zhou, Huamin Qu, Pak Chung Wong, and Xiaoming Li. Geometry-based edge clustering for graph visualization. IEEE Transactions on Visualization and Computer Graphics, 14(6):1277 -- 1284, 2008. [24] Y. Dabaghian, F. M´emoli, L. Frank, and G. Carlsson. A topological paradigm for hippocampal spatial map formation using persistent homology. PLoS Computational Biology, 8(8):e1002581, 2012. [25] Tamal K Dey, Facundo Memoli, and Yusu Wang. Topological analysis of nerves, reeb spaces, mappers, and multiscale mappers. arXiv preprint arXiv:1703.07387, 2017. [26] Inderjit S Dhillon. Co-clustering documents and words using bipartite spectral graph par- In Proceedings of the 7th ACM SIGKDD international conference on Knowledge titioning. discovery and data mining, pages 269 -- 274, 2001. [27] Chris H. Q. Ding, Xiaofeng He, Hongyuan Zha, Ming Gu, and Horst D. Simon. A min-max cut algorithm for graph partitioning and data clustering. IEEE International Conference on Data Mining, pages 107 -- 114, 2001. [28] Kasper Dinkla, Michel A Westenberg, and Jarke J van Wijk. Compressed adjacency matrices: IEEE Transactions on Visualization and Computer untangling gene regulatory networks. Graphics, 18(12):2457 -- 2466, 2012. [29] Irene Donato, Giovanni Petri, Martina Scolamiero, Lamberto Rondoni, and Francesco Vac- carino. Decimation of fast states and weak nodes: topological variation via persistent homol- ogy. Proceedings of the European Conference on Complex Systems, pages 295 -- 301, 2012. [30] Cody Dunne and Ben Shneiderman. Motif simplification. Proceedings of the SIGCHI Confer- ence on Human Factors in Computing Systems, 2013. [31] Tim Dwyer, Nathalie Henry Riche, Kim Marriott, and Christopher Mears. Edge compression techniques for visualization of dense directed graphs. IEEE Transactions on Visualization and Computer Graphics, 19(12):2596 -- 2605, 2013. [32] Weinan E, Jianfeng Lu, and Yuan Yao. The landscape of complex networks. CoRR, abs/1204.6376, 2012. 15 [33] Geoffrey Ellis and Alan Dix. A taxonomy of clutter reduction for information visualisation. IEEE Transactions on Visualization and Computer Graphics, 13(6):1216 -- 1223, 2007. [34] John Ellson, Emden Gansner, Lefteris Koutsofios, Stephen C North, and Gordon Woodhull. Graphviz -- open source graph drawing tools. Graph Drawing, pages 483 -- 484, 2002. [35] Ozan Ersoy, Christophe Hurter, Fernando Paulovich, Gabriel Cantareiro, and Alex Telea. IEEE Transactions on Visualization Skeleton-based edge bundling for graph visualization. and Computer Graphics, 17(12):2364 -- 2373, 2011. [36] Miroslav Fiedler. Algebraic connectivity of graphs. Czechoslovak mathematical journal, 23(2):298 -- 305, 1973. [37] Thomas M. J. Fruchterman and Edward M. Reingold. Graph drawing by force-directed place- ment. Software: Practice and experience, 21(11):1129 -- 1164, 1991. [38] Emden R Gansner, Yifan Hu, Stephen North, and Carlos Scheidegger. Multilevel agglomerative edge bundling for visualizing large graphs. In IEEE Pacific Visualization Symposium, pages 187 -- 194, 2011. [39] Emden R Gansner, Yehuda Koren, and Stephen North. Graph drawing by stress majorization. In Graph Drawing, pages 239 -- 250. Springer, 2005. [40] Emden R. Gansner, Eleftherios Koutsofios, Stephen C. North, and Kiem-Phong Vo. A tech- nique for drawing directed graphs. IEEE Transactions on Software Engineering, 19(3):214 -- 230, 1993. [41] Vince Grolmusz. A note on the pagerank of undirected graphs. arXiv preprint arXiv:1205.1960, 2012. [42] Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dy- namics, and function using NetworkX. Proceedings of the 7th Python in Science Conference, 2008. [43] Mustafa Hajij, Bei Wang, Carlos Scheidegger, and Paul Rosen. Visual detection of struc- tural changes in time-varying graphs using persistent homology. IEEE Pacific Visualization Symposium (PacificVis), 2018. [44] Derek Hansen, Ben Shneiderman, and Marc A Smith. Analyzing social media networks with NodeXL: Insights from a connected world. Morgan Kaufmann, 2010. [45] Danny Holten and Jarke J Van Wijk. Force-directed edge bundling for graph visualization. Computer Graphics Forum, 28(3):983 -- 990, 2009. [46] Danijela Horak, Slobodan Maleti´c, and Milan Rajkovi´c. Persistent homology of complex net- works. Journal of Statistical Mechanics: Theory and Experiment, page P03034, 2009. [47] Yifan Hu. Efficient, high-quality force-directed graph drawing. Mathematica Journal, 10(1):37 -- 71, 2005. [48] Glen Jeh and Jennifer Widom. SimRank: a measure of structural-context similarity. In Proceedings of the 8th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 538 -- 543, 2002. 16 [49] Sanjay Kairam, Diana MacLean, Manolis Savva, and Jeffrey Heer. Graphprism: Compact visualization of network structure. In Advanced Visual Interfaces, 2012. [50] Marc Khoury, Yifan Hu, Shankar Krishnan, and Carlos Scheidegger. Drawing large graphs by low-rank stress majorization. Computer Graphics Forum, 31:975 -- 984, 2012. [51] Vladimir G Kim, Yaron Lipman, Xiaobai Chen, and Thomas Funkhouser. Mobius transfor- mations for global intrinsic symmetry analysis. Computer Graphics Forum, 29(5):1689 -- 1700, 2010. [52] Yehuda Koren. On spectral graph drawing. In Computing and Combinatorics, pages 496 -- 508. Springer, 2003. [53] Yehuda Koren, Liran Carmel, and David Harel. Ace: A fast multiscale eigenvectors computa- tion for drawing huge graphs. IEEE Symposium on Information Visualization, pages 137 -- 144, 2002. [54] Brian Kulis, Sugato Basu, Inderjit Dhillon, and Raymond Mooney. Semi-supervised graph clustering: a kernel approach. Machine learning, 74(1):1 -- 22, 2009. [55] Stephane Lafon and Ann B Lee. Diffusion maps and coarse-graining: A unified framework for dimensionality reduction, graph partitioning, and data set parameterization. IEEE transac- tions on pattern analysis and machine intelligence, 28(9):1393 -- 1403, 2006. [56] Hyekyoung Lee, Moo K. Chung, Hyejin Kang, Boong-Nyun Kim, and Dong Soo Lee. Com- puting the shape of brain networks using graph filtration and gromov-hausdorff metric. Inter- national Conference on Medical Image Computing and Computer Assisted Intervention, pages 302 -- 309, 2011. [57] Hyekyoung Lee, Moo K. Chung, Hyejin Kang, Bung-Nyun Kim, and Dong Soo Lee. Discrim- inative persistent homology of brain networks. IEEE International Symposium on Biomedical Imaging: From Nano to Macro, pages 841 -- 844, 2011. [58] Hyekyoung Lee, Hyejin Kang, Moo K. Chung, Bung-Nyun Kim, and Dong Soo Lee. Persistent brain network homology from the perspective of dendrogram. IEEE Transactions on Medical Imaging, 31(12):2267 -- 2277, 2012. [59] Hyekyoung Lee, Hyejin Kang, Moo K. Chung, Bung-Nyun Kim, and Dong Soo Lee. Weighted functional brain network modeling via network filtration. NIPS Workshop on Algebraic Topol- ogy and Machine Learning, 2012. [60] Jure Leskovec, Lada A Adamic, and Bernardo A Huberman. The dynamics of viral marketing. ACM Transactions on the Web (TWEB), 1(1), 2007. [61] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):2, 2007. [62] Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data, June 2014. [63] Bruno L´evy. Laplace-beltrami eigenfunctions towards an algorithm that understands geometry. In IEEE International Conference on Shape Modeling and Applications, page 13, 2006. 17 [64] Shusen Liu, Dan Maljovec, Bei Wang, Peer-Timo Bremer, and Valerio Pascucci. Visualizing high-dimensional data: Advances in the past decade. IEEE Transactions on Visualization and Computer Graphics, 23(3):1249 -- 1268, 2017. [65] P. Y. Lum, G. Singh, A. Lehman, T. Ishkanov, M. Vejdemo-Johansson, M. Alagappan, J. Carls- son, and G. Carlsson. Extracting insights from the shape of complex data using topology. Scientific Reports, 3, 2013. [66] Ulrike Von Luxburg. A tutorial on spectral clustering. Statistics and computing, 17(4):395 -- 416, 2007. [67] Fintan McGee and John Dingliana. An empirical study on the impact of edge bundling on In Proceedings of the International Working Conference on user comprehension of graphs. Advanced Visual Interfaces, pages 620 -- 627. ACM, 2012. [68] Elizabeth Munch and Bei Wang. Convergence between categorical representations of Reeb space and mapper. In S´andor Fekete and Anna Lubiw, editors, Proceedings of the 32nd Inter- national Symposium on Computational Geometry, volume 51 of Leibniz International Proceed- ings in Informatics (LIPIcs), pages 53:1 -- 53:16, Dagstuhl, Germany, 2016. Schloss Dagstuhl -- Leibniz-Zentrum fuer Informatik. [69] Mark E. J. Newman. Fast algorithm for detecting community structure in networks. Physical review E, 69(6):066133, 2004. [70] Mark EJ Newman. Properties of highly clustered networks. Physical Review E, 68(2):026121, 2003. [71] Andrew Y Ng, Michael I Jordan, and Yair Weiss. On spectral clustering: Analysis and an algorithm. In Advances in neural information processing systems, pages 849 -- 856, 2002. [72] Monica Nicolau, Arnold J. Levine, and Gunnar Carlsson. Topology based data analysis iden- tifies a subgroup of breast cancers with a unique mutational profile and excellent survival. Proceedings of the National Academy of Sciences, 108(17):7265 -- 7270, 2011. [73] Monica Nicolaua, Arnold J. Levine, and Gunnar Carlsson. Topology based data analysis identifies a subgroup of breast cancers with a unique mutational profile and excellent survival. Proceedings National Academy of Sciences of the United States of America, 108(17):7265 -- 7270, 2011. [74] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab, 1999. [75] Mathew Penrose. Random geometric graphs. Oxford University Press, 2003. [76] Giovanni Petri, Martina Scolamiero, Irene Donato, and Francesco Vaccarino. Networks and cy- cles: A persistent homology approach to complex networks. Proceedings European Conference on Complex Systems 2012, Springer Proceedings in Complexity, pages 93 -- 99, 2013. [77] Giovanni Petri, Martina Scolamiero, Irene Donato, and Francesco Vaccarino. Topological strata of weighted complex networks. PLoS ONE, 8(6):e66506, 2013. [78] S. Unnikrishna Pillai, Torsten Suel, and Seunghun Cha. The Perron-Frobenius theorem: some of its applications. IEEE Signal Processing Magazine, 22(2):62 -- 75, 2005. 18 [79] Virginia Pirino, Eva Riccomagno, Sergio Martinoia, and Paolo Massobrio. A topological study of repetitive co-activation networks in in vitro cortical assemblies. Physical Biology, 12(1), 2015. [80] Pascal Pons and Matthieu Latapy. Computing communities in large networks using random In International symposium on computer and information sciences, pages 284 -- 293, walks. 2005. [81] Luca Pretto. Analysis of web link analysis algorithms: The mathematics of ranking. In Maristella Agosti, editor, Information Access through Search Engines and Digital Libraries, pages 97 -- 111. Springer, 2008. [82] Martin Reuter, Silvia Biasotti, Daniela Giorgi, Giuseppe Patan´e, and Michela Spagnuolo. Dis- crete laplace -- beltrami operators for shape analysis and segmentation. Computers & Graphics, 33(3):381 -- 390, 2009. [83] Matthew Richardson, Rakesh Agrawal, and Pedro Domingos. Trust management for the se- mantic web. In International semantic Web conference, pages 351 -- 368. Springer, 2003. [84] Satu Elisa Schaeffer. Graph clustering. Computer science review, 1(1):27 -- 64, 2007. [85] David Selassie, Brandon Heller, and Jeffrey Heer. Divided edge bundling for directional network data. IEEE Transactions on Visualization and Computer Graphics, 17(12):2354 -- 2363, 2011. [86] David I Shuman, Sunil K Narang, Pascal Frossard, Antonio Ortega, and Pierre Vandergheynst. The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains. IEEE Signal Processing Magazine, 30(3):83 -- 98, 2013. [87] Bernard W Silverman. Density estimation for statistics and data analysis, volume 26. CRC press, 1986. [88] Gurjeet Singh, Facundo M´emoli, and Gunnar Carlsson. Topological methods for the analysis of high dimensional data sets and 3d object recognition. Eurographics Symposium on Point-Based Graphics, 22, 2007. [89] Ashley Suh, Mustafa Hajij, Bei Wang, Carlos Scheidegger, and Paul Rosen. Persistent ho- mology guided force-directed graph layouts. Proceedings of IEEE Visualization Conference (InfoVis), 2019. [90] Yuanyuan Tian, Richard A Hankins, and Jignesh M Patel. Efficient aggregation for graph summarization. In Proceedings of the ACM SIGMOD international conference on Management of data, pages 567 -- 580, 2008. [91] Brenda Y Torres, Jose Henrique M Oliveira, Ann Thomas Tate, Poonam Rath, Katherine Cumnock, and David S Schneider. Tracking resilience to infections by mapping disease space. PLoS biology, 14(4), 2016. [92] W. T. Tutte. How to draw a graph. Proceedings of the London Mathematical Society, s3- 13(1):743 -- 767, Jan 1963. URL: http://dx.doi.org/10.1112/plms/s3-13.1.743, doi:10. 1112/plms/s3-13.1.743. [93] Tatiana Von Landesberger, Arjan Kuijper, Tobias Schreck, Jorn Kohlhammer, Jarke J van Wijk, J-D Fekete, and Dieter W Fellner. Visual analysis of large graphs: State-of-the-art and future research challenges. Computer Graphics Forum, 30(6):1719 -- 1749, 2011. 19 [94] Scott White and Padhraic Smyth. A spectral clustering approach to finding communities in graphs. In Proceedings of the SIAM international conference on data mining, pages 274 -- 285, 2005. [95] Jaewon Yang and Jure Leskovec. Defining and evaluating network communities based on ground-truth. Knowledge and Information Systems, 42(1):181 -- 213, 2015. 20
1607.02952
1
1607
2016-07-11T13:57:35
Are human interactivity times lognormal?
[ "cs.SI", "physics.soc-ph" ]
In this paper, we are analyzing the interactivity time, defined as the duration between two consecutive tasks such as sending emails, collecting friends and followers and writing comments in online social networks (OSNs). The distributions of these times are heavy tailed and often described by a power-law distribution. However, power-law distributions usually only fit the heavy tail of empirical data and ignore the information in the smaller value range. Here, we argue that the durations between writing emails or comments, adding friends and receiving followers are likely to follow a lognormal distribution. We discuss the similarities between power-law and lognormal distributions, show that binning of data can deform a lognormal to a power-law distribution and propose an explanation for the appearance of lognormal interactivity times. The historical debate of similarities between lognormal and power-law distributions is reviewed by illustrating the resemblance of measurements in this paper with the historical problem of income and city size distributions.
cs.SI
cs
Are human interactivity times lognormal? Norbert Blenn∗and Piet Van Mieghem Delft University of Technology 16 December 2015 Abstract In this paper, we are analyzing the interactivity time, defined as the duration between two consecutive tasks such as sending emails, collecting friends and followers and writing comments in online social networks (OSNs). The distributions of these times are heavy tailed and often described by a power-law distribution. However, power- law distributions usually only fit the heavy tail of empirical data and ignore the information in the smaller value range. Here, we argue that the durations between writing emails or comments, adding friends and receiving followers are likely to follow a lognormal distribution. We discuss the similarities between power-law and lognormal dis- tributions, show that binning of data can deform a lognormal to a power-law distribution and propose an explanation for the appearance of lognormal interactivity times. The historical debate of similarities between lognormal and power-law distributions is reviewed by illustrat- ing the resemblance of measurements in this paper with the historical problem of income and city size distributions. 1 Introduction Massive data from online social media and online social networking (OSN) enables accurate analysis of the human behavior and of the interaction times between individuals through technology such as in word-of-mouth market- ing, opportunistic networking and viral spreading. Empirical measurements contradict the commonly assumed exponential distribution of Poissonian inter-event times [1] in spreading processes or epidemic models. Multiple publications [2, 3, 4, 5, 6, 7, 8] report that the interactivity time, defined as ∗Faculty of Electrical Engineering, Mathematics and Computer Science, P.O Box 5031, 2600 GA Delft, The Netherlands; email : N.Blenn@, [email protected] 1 the duration between two consecutive tasks like sending emails, accessing web pages, instant messaging and phone calls, follow power-law distribu- tions. These findings recently led to non-Markovian analyses, addressed in the work of Cator et al. [9], Iribarren and Moro [10], Van Mieghem and van de Bovenkamp [11] and Schweizer et al. [12]. Given that the inter-activity distributions are heavy tailed, word-of-mouth spreading, viral infections or dynamics of memes are expected to endure or survive longer, compared to basic Markovian models [10, 13]. Barabasi [2] infers that heavy-tailed dis- tributions may arise from a priority queue, where individuals execute tasks of which the majority can be completed in short time, but some tasks wait long due to a perceived priority. Barabasi's priority queue model fits the distribution of durations between events quite well, leading to a power-law distribution with an exponent γ around 1. A power-law random variable X ≥ τ has the probability density function fX (t) = ct−γ t ≥ τ (1) where c = 1−γ function (pdf) of a lognormal random variable X for t ≥ 0 is τ 1−γ and τ > 0 is the lower bound for X. The probability density (cid:104)− (log t−µ)2 2σ2 (cid:105) exp fX (t) = √ σt 2π (2) where (µ, σ) are called the parameters of the lognormal pdf, that are the mean and variance of log X as shown in Appendix A. When we assume that inter-event durations are power-law distributed, we encounter the following issues: 1. In many cases, only a part of the data (the tail larger than τ ) is modeled by a power-law. The lower bound τ in (1) does not correspond to the physical minimum of the random variable X, but τ is fitted from the data by ignoring smaller values that do not obey the power-law. Often, these smaller values may have a large probability to occur, so that their neglect is difficult to justify. In other words, only a part of the process (above τ ) is modeled by a power-law (1), while the other part (below τ ) is not. 2. Most processes or measurements possess both a lower as well as an upper bound. Apart from the lower bound τ , an upper bound κ is often invoked, at which a cut-off is observed: the power-law behavior is confined to the range τ ≤ X ≤ κ, although Xmin < τ and Xmax > κ. 2 However, it is often unclear whether the process in the deep tail still obeys a power-law distribution or some other, much faster decreasing distribution. The upper bound κ is usually empirically determined, rather than based on the physical maximum of X. As long as Pr[X > κ] = c t−γdt = (cid:90) ∞ κ (cid:16) κ (cid:17)1−γ τ is small (with respect to the measurement precision), the upper bound κ is justified, else other validation arguments are needed. 3. We demonstrate here that the binning of data (either by the data- provider or by the researcher) alters the shape of a lognormal distri- bution into an apparent power-law. Particularly in relation to human activities or behaviors, we question in this paper the widely assumed power-law distribution. We present measurements of inter-event durations from Digg.com and Reddit.com, two online social news aggregators [14, 15, 16], and from the Enron data set1, a collection of emails sent by employees of the company Enron, and argue that a lognormal distribution is a valid candidate for the distribution of human inter-event durations in Section 2. The problem of fitting a lognormal is explained in Section 3, followed by previously reported lognormally distributed data sets in Section 4. Existing theoretical models are compared in Section 5, a plausible interpretation for lognormal human behavior is proposed in Section 6 and Section 7 concludes. Mathematical properties of the lognormal distribution are deferred to the Appendix A. Appendix B presents results of likelihood tests for the observed distributions. 2 Observations and Measurements from OSN All events in an OSN are based on users' activities, such as posts, friend- requests and comments. A complete data set including all activities of users from Digg.com for a duration of 4 years, described in Tang et al. [14] and Doerr et al. [15], allows us to analyze the time frame in which users of Digg.com add their friends. Doerr et al. [19] found that reaction times in a retweet network from Twitter and Digg are close to a lognormal distribution with parameters µ = 10.1 and σ = 2.2. The process of adding friends shows bursts of activity also observed and analyzed in email communication 1Enron Data-set, http://www.cs.cmu.edu/∼enron/ Email Leslie Kaelbling and Melinda Gervasio, 3 [2, 10, 23, 17, 18]. In these publications the question arises, whether the observed distribution of inter-activity times is described by a power-law, lognormal or a cascading Poisson process. Malmgren et al. [17, 18] describe that circadian and weekly activity cycles in human behavior are the factors that lead to heavy tails. They pro- posed a cascading Poisson process, consisting of a nonhomogeneous Poisson process that reflects periodicity and a homogeneous Poisson process describ- ing active intervals, which is shown to model the interactivity distributions of e-mail communication. Because the network of Digg.com is directed (like in Twitter.com or other OSNs), a user can be followed by other users to become their "friend", while a user cannot add followers. This means that the process of adding friends is solely based on the user himself, whereas obtaining followers depends on the activities of other users. The random variable Tf riend denotes the time between the addition of two friends and, similarly, Tf ollower is the time between receiving two followers. Figure 1: Time difference (in seconds) between the addition of two consec- utive friends. Figures 1 and 2 depict the distribution of durations between adding friends Tf riend and of receiving followers Tf ollower for 7.4 million friendship relations in Digg. Fitting the data, i.e. all realizations of Tf riend, by the state of the art technique by Clauset et al. [20] to a power-law (1) results 4 in an exponent γ = 1.53 for τ = 59s, whereas all realizations of Tf ollower are fitted best by a lognormal (2) with parameters µ = 10.45 and σ = 2.75. For Tf ollower an estimated p-value of 0.0 indicates that a power-law fit provides not the best solution, whereas the p-value for Tf riend of 0.23 indicates a reasonable fit for a power-law distribution. Figure 2: Time differences (in seconds) between the receipt of two consecu- tive followers. The reason that the distribution of Tf ollower does not fit the lognormal distribution over the whole range lies in the nature of Digg.com. Tang et al. [14] showed that only a few users were active over a long period, while just a fraction of them was actually submitting stories. Only 2% of all registered users succeeded to have their submissions "promoted" to the frontpage [15]. Since the username of a submitter appears next to the story, these users receive a lot of followers during the relatively small period that their story was listed on the front page. Therefore, fTf ollower (x) is large for small x in Fig. 2. In summary, even ignoring the small time values, the random vari- able Tf riend and Tf ollower possess different distributions. The process that generates Tf riend is more likely described by a variant of Barabasi's prior- ity queue model, leading to power-law behavior. Since the random variable Tf ollower is generated by the collective dynamics of different individuals (that are likely weakly dependent), central limit law arguments may point towards the lognormal distribution [1, p. 121-126]. 5 Similar properties occur in sending and receiving emails. Obviously, a user can only send an email when he is online, whereas emails arrive at a user's inbox at his email server at all times. We analyzed the durations between receiving and sending emails in the Enron data set, which contains emails of all employees of Enron during roughly 6 years, starting in January 1998 until February 2004. Similar distributions arise as shown later in Figs. 9 and 10. A third data set from Reddit.com2, an OSN in which users mainly sub- mit, comment or vote on bookmarks. The pdf of the duration T between consecutive comments and submissions in Reddit are shown in Fig. 3. Figure 3: Time difference between commenting and bookmark submission in Reddit.com The tails of the distributions in Fig. 3 seem nicely fitted by a power-law distribution with exponents γ ≈ 1. However, as mentioned in the introduc- tion, the increasing regime in fT (t) for small values of t, the peak of fT (t) nor the concave form of the pdf can be modeled by a power-law distribution. 2The Reddit.com data-set is hosted at Google BigQuery (bigquery.cloud.google.com/dataset/fh-bigquery). 6 3 Fitting a lognormal distribution The two main approaches are based on the pdf and the EDF (empirical dis- tribution function3), after a logarithmic transformation of the data. Figure 4 depicts the data fitted4 to the distribution function of a normal distribution (4) and shows that the parameters of the EDF are about the same as those in Fig. 2 (pdf approach). Figure 4: Empirical distribution function (EDF) of the inter-follower dura- tions Tf ollower (same data as in Fig. 2). 3.1 The effect of binning 3.1.1 Theory We generate [1, p. 41] n realizations of a lognormal random variable X, which we denote by the set {xk}1≤k≤n = {x1, x2, . . . , xn}. All n realiza- tions lie in the interval [xmin, xmax], where the minimum value is xmin = min1≤k≤n xk and the maximum value is xmax = max1≤k≤n xk. The bin- ning operation [1, p. 580-581] divides the entire data interval [xmin, xmax] 3The empirical distribution function is sometimes also called empirical cdf : the cumu- lative distribution function (cdf) based on an empirical measure. 4Fitting data to a EDF usually flattens interesting parts of a pdf, especially the tail of a distribution. Still, the benefit lies in the fact that binning is not needed and "raw" data can be directly fitted [1, p. 580-581]. 7 into m sub-intervals of length ∆x = xmax−xmin and the j-th subinterval [xmin + (j − 1) ∆x, xmin + j∆x] for 1 ≤ j ≤ m is associated with a bin hj, that contains the number of realizations of X or data points of set {xk}1≤k≤n lying within the j-th subinterval, m (cid:90) xmin+j∆x hj ≈ n xmin+(j−1)∆x fX (u) du Clearly, for a given set {xk}1≤k≤n, increasing the binsize ∆x decreases the number of bins m. The effect of binning on the pdf fX (t) is depicted in Fig. 5, where n = 106 realizations from a lognormal random variable with parameters µ = 10 and σ = 2 are drawn. As demonstrated in Appendix A, the scaled random variable Y = bX has parameter µY = µX + ln b, but σY = σX , implying that "binning" only changes the parameter µ, but leaves the parameter σ invariant! By binning (scaling) the distribution with different binsizes, the "up-going regime", where fX (t) increases with t, disappears and the observable part of the distribution "evolves" towards a straight line on a log-log plot. Binning the data with larger binsizes decreases the parameter If µ − σ2 decreases, µ, even to the extent that µ may become negative. the maximum of the lognormal at eµ−σ2 tends to zero (infinitely far to the left on a log-log scale). Therefore, just the decreasing part of the quadratic shape of (2) will be visible in a log-log plot. 3.1.2 Data analysis Binning the data in different time units, say per minute instead of per second, scales the distribution by a factor of 60 (since 60 seconds equals 1 minute), which will shift the parameter µmin of the CDF towards the left to µmin = µsec − ln(60) ≈ µsec − 4.1. However, a remarkable property of the lognormal distribution is that the parameter σ will not change after linear scaling as shown in the Appendix A. An important consequence of a binning operation is illustrated in the pdfs in Fig. 6 and Fig. 7, that show the pdf of Tf ollower binned per minute and per hour, respectively. Conforming to the theory, the parameter µ decreases by a factor of about ln 60 ≈ 4.1, while the parameter σ keeps its value, but the shape of the distribution changes. The distribution, binned per hour, is shown in Fig. 7, where the distribution can be confounded with a power-law distribution (with exponential cut-off). Moreover, this misinterpretation may be justified, because the exponent γ = 1.57 of a power-law fitted to the hourly binned data is close to the exponent γ = 1.53 8 Figure 5: The effect of different binsizes on a lognormal random variable found for the Tf riend distribution in Fig. 1. Fig. 8 shows the complementary cumulative distribution function of Tf ollower binned per hour, fitted using the method of Clauset et al. [20]. The resulting power-law exponent in Fig. 8 is γ = 1.81. The visualization in Fig. 8 is misleading because the original distribution is, as shown earlier, a lognormal distribution. For completeness we like to refer to Table 3 in Appendix B, where we list fitted parameters, p values and the result of log-likelihood tests, conducted using the method of Virkar and Clauset [51]. As shown in the table, the larger the used binsizes, the higher the p values indicating that a power-law fits the data. For small binsizes (low p values) the results are not conclusive or rather in favor of a lognormal distribution. To further demonstrate the effect, Figs. 6, 7 and 8 depict distributions in which the data was artificially binned by minutes and hours. In reality, such binning operation might occur if the data provider (the OSN or web service) returns values per hour or even larger scales. In other words, data measured in larger time steps over a certain total time range thus erases the possibility to distinguish between a lognormal and power-law distribution. The sending time of an email in the Enron data set until May 2001 was stored per minute, whereas afterwards (June 2001 - February 2004) the sending time is stored with an accuracy of a second. The resulting pdf of time differences between sent emails is plotted in Fig. 9, where the 9 Figure 6: The probability density function (pdf) of the inter follower times Tf ollower binned per minute. Figure 7: The probability density function (pdf) of the inter follower times Tf ollower binned per hour. 10 Figure 8: The ccdf of the inter-follower time TF ollower where data is binned per hour. black and red dots represent the measurements per second and per minute, respectively. The parameters of the fitted lognormal (µ = 9.5, σ = 3.24) and power-law distribution (γ ≈ 1) correspond to those of Digg.com in Fig. 2 and Fig. 1. The pdf of inter-arrival times of received emails, split in observations per minute (red) and per second (black) in Fig. 10, can be compared to the durations of added followers, where the parameters are again in the same range as shown before. We found that the EDF of the data (not shown) agrees with the pdfs in Fig. 9 and Fig. 10, underlining the likeliness that a lognormal random variable models the data better than a power-law. 4 Reported parameters of power-law and lognor- mal distributions Table 1 lists inter-arrival times and the fitted exponents found in publica- tions in which the aspect of binning was ignored. Rather small power-law exponents γ between 0.7 and 1.8 are found in multiple data sets of human activity. Lognormal distributions were reported for similar human activity as shown in Table 2, which extends the collection of Limpert et al. [21]. The 11 Figure 9: Time difference between consecutively sent emails per person in the Enron data set. oldest analysis was conducted by Boag [22] in 1949. Based on the scal- ing invariance of σ as demonstrated in Appendix A, the parameter σ can be compared over different measurements, whereas the parameter µ cannot, since µ depends on the units in which the lognormal random variable is mea- sured. Interestingly, all σ's in Table 2 lie within an amazingly small range of 0.35 ≤ σ ≤ 3.2, which shows that the parameter σ only varies over about If σ is rather one order of magnitude in different measured phenomena. small as in our measurements where 2.73 ≤ σ ≤ 3.24, the first term in (10) dominates and a quadratic function appears in a log-log plot. Consequently, these rather small values of σ and those in Table 2 contradict the common deductions made from (10) in Appendix A, namely that only for large values of σ power-law and lognormal distributions are indistinguishable. Equations (8) and (9) in Appendix A explain why the lognormal distribution may seem linear in a certain regime. 5 The Historical Debate of the Power-law versus Lognormal Distribution Mitchell [40] discusses the fascinating and abundant appearance of power- law distributions and mentions processes such as self-criticality, that are 12 Figure 10: Time difference between consecutively received emails per person in the Enron data set. related to phase transitions, as the main producers of power-laws, but she remarks that the precise nature as well as the deviations from a power-law are still open to debate. Table 2 illustrates that the research on lognormal distributions has a long history. Unfortunately, also the processes that pro- duce (almost) lognormal behavior are not well understood. Mitzenmacher [41] overviews processes leading to power-law and lognormal distributions, emphasizing that minor changes in the process will lead to either a power- law or a lognormal distribution. Mitzenmacher mentions the work of Gabaix [42], who analyzed the size distribution of cities in the United States. In- terestingly, Gabaix [42] found that the city size distribution follows a Zipf distribution, which is a power-law distribution (1) with an exponent γ = 1. Gabaix argues that cities cannot become infinitely small, a fact that imposes a lower bound to their size. When modeling the size of cities as a Markov chain with a fixed number of cities, which grow stochastically as proposed by Gibrat [43], then the steady state of the Markov chain will follow Zipf's distribution with an exponent γ = 1. If there is no lower bound on the city size, so that cities can be arbitrarily small, then the distribution degenerates to a lognormal distribution. Gibrat [43], whose work is often associated with the law of proportionate effect [39], argues in his model that transition probabilities or the variance 13 Data-set Time between sending Emails Time between sending Emails Time between clicks in website usage Time between similar actions in web data Time between messages in instant-messaging Time between phone calls Time between phone calls Time between sending Emails Time between sending short messages Exponent (γ) Reference 1 1.2 1, 1.25 1.1, 1.2, 1.8 1.53 0.9 0.7 1 0.7 Barabasi (2005) [2] Eckmann et al. (2004) [3] Gon¸calves and Ramasco (2008) [4] Radicchi (2008) [5] Leskovec and Horvitz (2008) [6] Candia et al. (2008) [7] Karsai et al. (2012) [8] Karsai et al. (2012) [8] Karsai et al. (2012) [8] Table 1: Power-law exponents found for durations between technology re- lated human dynamics of transition probabilities in a growth process are independent from the size. Gibrat, who estimated the distribution of city sizes, concluded that the law of proportionate growth leads to a distribution that is lognormal. However, Simon [44] showed that Gibrat's law of the proportionate effect may lead to other heavy-tailed distributions as well. Champernowne [45] and Cordoba [46] analyzed the income distribution of England and Wales with Markov theory. Again, their crucial assumption is that incomes have a lower bound. Eeckhout [47] analyzed the distribution of city sizes by using accurate data from the US census in 2000 and found that the heavy tail obeys Zipf's law. But, the entire distribution is better described by a lognormal than a Pareto distribution. By comparing the census data from 1990 and 2000, Eeckhout shows that the growth of a city is independent of its size. The parameters of the lognormal distribution found by Eeckhout are µ = 7.28 and σ = 1.75. The difference with the above mentioned Markov chain approach lies in the fact that Eeckhout [47] modeled the process by a multiplicative process, which leads to a lognormal distribution. This multiplicative process, pro- posed by Kapteyn [48] in 1903 for the first time and later coined the "Law of Proportionate Effect" by Gibrat [43], is based on the central limit theorem applied to a multiplicative process, which leads to lognormal distributed sizes [1]. Gibrat's growth process is defined as St = at × St−1 (3) where the size St of an item at state t depends upon the previous size St−1 times a positive, random factor at. By taking the logarithm of both sides in 14 Table 2: Literature of lognormal distributions (excerpt) σ 2.126 ≈ 2 process email forwarding email forwarding µ 5.547 ≈ 8 µ1 = 1 hour µ2 = 2 days 2.47 2.47 14 days 100 days 2.3 hours 2.4 days 12.6 days 21.4 days 9.6 months 15.9 monts 17.2 months 14.5 months 60 years 4 days 3 to 5 0.5 0.43 3.5 7.439 3.29 3.3 µ1 = 1.31 µ2 = 2.26 1 to 2 µ1 = 3.7 µ2 = 5.6 5.29 0.38 0.36 1.14 1.24 1.48 1.47 1.50 2.11 2.5 2.8 3.21 3.02 1.16 ≈ 2 1.4 1.634 0.70 0.846 0.890 0.89 σ1 = 0.32 σ2 = 0.56 0.35 − 0.45 1.095 σ1 = 0.8 σ2 = 3.1 0.42 email forwarding infection times latency periods of diseases latency periods of diseases latency periods of diseases latency periods of diseases latency periods of diseases latency periods of diseases latency periods of diseases survival times after cancer diagnosis survival times after cancer diagnosis survival times after cancer diagnosis survival times after cancer diagnosis age of onset of Alzheimer incubation periods (viral infections) task completion strike duration time of individual activities call duration message holding time transmission holding time channel holding time channel holding time call holding time citations citations citations citations reference Iribarren and Moro [10] Stouffer et al. [23] Stouffer et al. [24] Nishiura [25] Limpert [21] Sartwell [26] Sartwell [26] Sartwell [26] Sartwell [26] Sartwell [26] Sartwell [26] Boag [22] Feinleib and Macmahon [27] Feinleib and Macmahon [27] Boag [22] Horner [28] Lessler et al. [29] Linden [30] Lawrence [31] Mohana et al. [32] Spedalieri et al. [33] Barcelo and Jord´an [34] Barcelo and Jord´an [34] Barcelo and Jord´an [34] Barcelo and Jord´an [34] Bolotin [35] Eom and Fortunato [36] Redner [37] Stringer et al.[38] Radicchi et al.[55] retweeting behavior distribution of votes on pages of Digg.com Van Mieghem et al. [39] Doerr et al.[19] 15 (3) and denoting ξt ≡ ln at, we obtain, after iteration, ln St = ln S0,i + ξ1 + ξ2 + . . . + ξt (cid:80)t k=1 ξk−tµ σ (cid:90) y−tµ √ t √ σ t d→ N (0, 1), we arrive at, for e−u2/2 du By the Central Limit Theorem [1], large t, Pr[ln St ≤ y] → 1√ 2π −∞ from which approximately ∼= tµ + ln St √ tσN (0, 1) where µ denotes the mean and σ2 the variance of the sequence {ξk}1≤k≤t. For large t, a power-law distribution (1) tends to zero as O (t−γ), while a (cid:16) t−1 exp (cid:104)− log2 t (cid:105)(cid:17) lognormal distribution (2) tends considerably faster as O to zero, illustrating that the deep tails are significantly different. Malevergne [49] addressed this fact by the concept of a slowly varying function, in par- ticular, for x → ∞ and t > 0, the power-law distribution (1) features 2σ2 fX (t · x) fX (x) lim x→∞ = t−γ The lognormal distribution (2) on the other hand is not slowly varying. In the limit x → ∞, a lognormal distribution will, for t > 1, always tend to zero: fX (t · x) fX (x) lim x→∞ = lim x→∞ − (ln(t))2 e 2σ2 e 1 t − ln(t)· ln(x)−µ σ2 = 0 This different tail behavior questions whether exponential bin sizes should be used in a log-log plot, because these may hide the rapid decrease in the tail. 6 An explanation of lognormal human interactiv- ity times Perhaps, a plausible explanation of the appearance of lognormal human in- teractivity times is that the logarithm log T of a human interactivity time T is Gaussian or normally distributed (see Appendix A), most likely as a consequence of the Central Limit Theorem. Roughly speaking, the Cen- tral Limit Theorem applies for a large number of weakly dependent random 16 variables, where none of them is dominant. Thus, rather than concentrat- ing on the time T , it seems more natural to focus on the random variable log T as the decisive quantity. The logarithm of a human related measure often occurs: for example, in our hearing system, the intensity of sound is logarithmically experienced. But more importantly, the large variability in human performance also seems logarithmically distributed [50, 30] and the measured interactivity times are strongly related to the large differences in human performance and/or behavior. On the other hand, if Y is an exponential random variable with mean 1 γ−1 for Y ≥ log τ (else Y = 0) and X = eY , then Pr [X ≤ t] = Pr [Y ≤ log t] = 1 − e−(γ−1)(log t−log τ ) = 1 − (cid:19)1−γ (cid:18) t τ dt Pr [X ≤ t] = γ−1 τ 1−γ t−γ is a perfect power-law probability density so that d function as in (1). However, if log T ≥ log τ were exponentially distributed with mean 1 γ−1 , the memoryless property of the exponential distribution [1, p. 43] would indicate that Pr [log T ≥ t + u log T > u] = Pr [log T ≥ t] In other words, given that the logarithm of a human interactivity time is larger than u time units, the probability that log T exceeds t+u time units is equal to the probability that log T exceeds t time units, for any u and t larger than log τ , precisely as if the log-interactivity time u never has been spent or waited, which is quite counterintuitive for a duration between consecutive activities. Alternatively, with u = log s and s > τ , the memoryless property of log T implies "scale-freeness in T ": (cid:20) (cid:21) Pr log T s ≥ t log T s > 0 = Pr [log T ≥ t] which shows, ignoring the condition log T s > 0, the independence on the "scale s". But, we have shown in Section 3.1 that rescaling the human interactivity time (by different bin sizes) definitely alters the distribution. From these arguments, we can infer that a power-law time T is less defendable than a lognormally distributed T . 7 Conclusion In this paper, the interactivity durations of individuals, between creating friendship relations, writing emails, commenting and voting on online con- tent are analyzed. We found that the distribution of durations to add friends 17 follows a power-law with an exponent of γ (cid:39) 1.8, whereas the durations to acquire followers are well described by a lognormal with µ ≈ 10.5 and σ ≈ 2.8. Due to the small probability of executing two tasks in a small time interval (typically ignored in fitting a power law), we claim that a lognor- mal distribution covers the entire activity time range better than a power distribution. In addition, we show that binning of lognormally distributed data can seriously affect the perception: the parameter µ shifts towards smaller val- ues, but the parameter σ of a lognormal distribution does not change after a binning or scaling operation. In the extreme case, only the heavy tail of the lognormal distribution (2) remains, which follows a power-law distribu- tion (1) with an exponent of γ close to 1. As explained in the Appendix, there exists an interval in which the lognormal distribution is indistinguish- able from a power-law distributions with power-law exponent γ ≈ 1 + ε, for small ε > 0. Similar observations and concerns, discussed for a long time in the litera- ture of city size and income distributions and reviewed in Section 5, supports that a lognormal distribution is modeling the whole data range better than power-laws. Finally, Section 6 argues that the logarithm of a quantity as- sociated with human activities rather than the quantity itself is the better descriptor, because human performance seems to fit a lognormal. References [1] P. Van Mieghem. Performance Analysis of Communications Systems and Networks. Cambridge University Press, 2014. [2] A.-L. Barab´asi. The origin of bursts and heavy tails in human dynamics. Nature, 435:207–211, May 2005. [3] J.-P. Eckmann, E. Moses, and D. Sergi. Entropy of dialogues creates co- herent structures in e-mail traffic. Proceedings of the National Academy of Sciences of the United States of America, 101(40):14333–14337, 2004. [4] B. Gon¸calves and J. J. Ramasco. Human dynamics revealed through Web analytics. Physical Review E, 78.2026123, 2008. [5] F. Radicchi. Human activity in the web. Physical Review E, 80.026118, Aug 2009. 18 [6] J. Leskovec and E. Horvitz. Planetary-scale views on a large instant- messaging network. In Proceeding of the 17th international conference on World Wide Web, pages 915–924. ACM, 2008. [7] J. Candia, M. C. Gonz´alez, P. Wang, T. Schoenharl, G. Madey, and A.-L. Barab´asi. Uncovering individual and collective human dynamics from mobile phone records. Journal of Physics A: Mathematical and Theoretical, 41(22):224015, 2008. [8] M. Karsai, K. Kaski, A.-L. Barab´asi, and J. Kert´esz. Universal features of correlated bursty behaviour. Scientific Reports, 2:397, May 2012. [9] E. Cator, R. van de Bovenkamp, and P. Van Mieghem. Susceptible- infected-susceptible epidemics on networks with general infection and cure times. Physical Review E, 87:062816, Jun 2013. [10] J. L. Iribarren and E. Moro. Impact of Human Activity Patterns on the Dynamics of Information Diffusion. Physical Review Letters, 103(3):038702, Jul 2009. [11] P. Van Mieghem and R. van de Bovenkamp. Non-Markovian Infection Spread Dramatically Alters the Susceptible-Infected-Susceptible Epi- demic Threshold in Networks. Physical Review Letters, 110:108701, Mar 2013. [12] I. Scholtes, N. Wider, R. Pfitzner, A. Garas, C. J. Tessone, and F. Schweitzer. Causality-driven slow-down and speed-up of diffusion in non-markovian temporal networks. Nature Communications, 5:5024, September 2014. [13] M. Karsai, M. Kivela, R. K. Pan, K. Kaski, J. Kert´esz, A. L. Barab´asi, and J. Saramaki. Small but slow world: How network topology and burstiness slow down spreading. Physical Review E, 83(2):025102, Feb. 2011. [14] S. Tang, N. Blenn, C. Doerr, and P. Van Mieghem. Digging in the Digg Social News Website. IEEE Transactions on Multimedia, 13(5):1163– 1175, 2011. [15] C. Doerr, N. Blenn, S. Tang, and P. Van Mieghem. Are Friends Over- rated? A Study for the Social News Aggregator Digg.com. In Computer Communications, volume 35, pages 796–809, 2012. 19 [16] P. Van Mieghem. Human psychology of common appraisal: The reddit score. IEEE Transactions on Multimedia, 13(6):1404–1406, 2011. [17] R. D. Malmgren, D. B. Stouffer, A. E. Motter and L. A. N. Amaral A Poissonian explanation for heavy tails in e-mail communication. Pro- ceedings of the National Academy of Sciences, 105(47):18153, 2008. [18] R. D. Malmgren, D. B. Stouffer, A. S. L. O. Campanharo and L. A. N. Amaral On universality in human correspondence activity. Science, 325(5948):1696–1700, 2009. [19] C. Doerr, N. Blenn, and P. Van Mieghem. Lognormal Infection Times of Online Information Spread. PLoS ONE, 8(5):e64349, 05 2013. [20] A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-Law Distribu- tions in Empirical Data. SIAM review, 51(4):661–703, Nov. 2009. [21] E. Limpert, W. A. Stahel, and M. Abbt. Log-normal distributions across the sciences: Keys and clues. BioScience, 51(5):341–352, 2001. [22] J. W. Boag. Maximum Likelihood Estimates of the Proportion of Pa- tients Cured by Cancer Therapy. Journal of the Royal Statistical Soci- ety. Series B (Methodological), 11(1), 1949. [23] D. B. Stouffer, R. D. Malmgren, and L. A. N. Amaral. Com- ment on The origin of bursts and heavy tails in human dynamics. arXiv:physics/0510216, 2005. [24] D. B. Stouffer, R. D. Malmgren, and L. A. N. Amaral. Log-normal arXiv:physics/0605027 statistics in e-mail communication patterns, 2006. [25] H. Nishiura. Early efforts in modeling the incubation period of infec- tious diseases with an acute course of illness. Emerging Themes in Epidemiology, 2007. [26] P. E. Sartwell. The distribution of incubation periods of infectious disease. American Journal of Hygiene, 51:310–318, 1950. [27] M. Feinleib and B. Macmahon. Variation in the duration of survival of patients with the chronic leukemias. Blood, 15, 1960. [28] R. D. Horner. Age at onset of Alzheimer's disease: clue to the relative importance of etiologic factors? American journal of epidemiology, 126(3):409–14, 1987. 20 [29] J. Lessler, N. G. Reich, R. Brookmeyer, T. M. Perl, K. E. Nelson, and D. A. Cummings. Incubation periods of acute respiratory viral infec- tions: a systematic review. The Lancet infectious diseases, 9(5):291– 300, May 2009. [30] W. J. van der Linden. A Lognormal Model for Response Times on Test Items. Journal of Educational and Behavioral Statistics, 31(2), 2006. [31] R. J. Lawrence. The Lognormal Distribution of the Duration of Strikes. Journal of the Royal Statistical Society. Series A, 147(3), 1984. [32] S. Mohan, M. Gopalakrishnan, H. Balasubramanian, and A. Chan- drashekar. A lognormal approximation of activity duration in PERT using two time estimates. Journal of the Operational Research Society, 58(6):827–831, 2006. [33] A. Spedalieri, I. Mart´ın-Escalona, and F. Barcel´o. Simulation of tele- impact of lognormal distributed In Wireless Communications and Networking Confer- traffic variables in UMTS networks: call duration. ence, pages 2381–2386. IEEE, 2005. [34] F. Barcel´o and J. Jord´an. Channel Holding Time Distribution In Cel- In Electronics Letters, Vol.34 No.2, pages 146–147, lular Telephony. 1998. [35] V. A. Bolotin. Modeling Call Holding Time Distributions for CCS Network Design and Performance Analysis. IEEE Journal on Selected Areas in Communications, 12:433–438, 1994. [36] Y.-H. Eom and S. Fortunato. Characterizing and Modeling Citation Dynamics. PLoS ONE, 6(9):e24926, Sept. 2011. [37] S. Redner. Citation Statistics from 110 Years of Physical Review. Physics Today, 58(6):49–54, 2005. [38] M. Stringer, M. Sales-Pardo, and L. A. N. Amaral. Effectiveness of journal ranking schemes as a tool for locating information. PLoS One, 3(2):e1683, 2008. [39] P. Van Mieghem, N. Blenn, and C. Doerr. Lognormal distribu- tion in the digg online social network. The European Physical Jour- nal B - Condensed Matter and Complex Systems, 83:251–261, 2011. 10.1140/epjb/e2011-20124-0. 21 [40] M. Mitchell, Complexity: A Guidede Tour, Oxford University Press, 2009. [41] M. Mitzenmacher. A Brief History of Generative Models for Power Law and Lognormal Distributions. Internet Mathematics, 1(2), 2003. [42] X. Gabaix. Zipf's Law For Cities: An Explanation. Quarterly Journal of Economics, 114:114–739, 1999. [43] R. Gibrat. Les In´egalit´es ´economiques [The Economic Inequalities]. Librairie du Recueil Sirey, 1931, French. [44] H. A. Simon. On a class of skew distribution functions. Biometrika, 42(3–4):425–440, 1955. [45] D. G. Champernowne. A Model of Income Distribution. The Economic Journal, 63(250):pp. 318–351, 1953. [46] J. C. Cordoba. A Generalized Gibrat's Law. International Economic Review, 49(4):1463–1468, 2008. [47] J. Eeckhout. Gibrat's Law for (All) Cities. American Economic Review, 94(5):1429–1451, September 2004. [48] J. C. Kapteyn. Skew Frequency curves in Biology and Statistics. Molec- ular and General Genetics MGG, 19(3):205–206, 1918. [49] Y. Malevergne, V. Pisarenko, and D. Sornette. Gibrats law for cities: uniformly most powerful unbiased test of the Pareto against the log- normal. Swiss Finance Institute Research Paper Series 09-40, Swiss Finance Institute, 2009. [50] W. Shockley, "On the statistics of individual variations of productivity in research laboratories", Proceedings of the Institute of Radio Engi- neers (IRE), Vol. 45, No. 3, pp. 279-290, 1957. [51] Y. Virkar and A. Clauset. Power-law distributions in binned empirical data. The Annals of Applied Statistics, 8(1):89–119, 03 2014. [52] F. Black and M. S. Scholes. The Pricing of Options and Corporate Liabilities. Journal of Political Economy, 81(3):637–54, May-June 1973. [53] D. Garcia, P. Mavrodiev, and F. Schweitzer. Social resilience in online In Proceedings of the first communities: The autopsy of friendster. ACM conference on Online social networks, ACM, February 2013. 22 [54] H. Kesten. Random Difference Equations and Renewal theory for prod- uct of Random Matrices. Acta Mathematica, CXXXI:207–248, 1973. [55] F. Radicchi, S. Fortunato, and C. Castellano. Universality of citation distributions: Toward an objective measure of scientific impact. Pro- ceedings of the National Academy of Sciences, 105(45), 2008. A The lognormal random variable and distribu- tion N(cid:0)µ, σ2(cid:1) is a Gaussian or normal random variable. Hence, X ≥ 0. The A lognormal random variable [1, p. 57] is defined as X = eY where Y = distribution function FX (t) = Pr[X ≤ t] = Pr[Y ≤ log t] is (cid:20) (cid:90) log t −∞ exp − (u − µ)2 2σ2 du = 1 2 (cid:21) (cid:18) (cid:19)(cid:19) (cid:18) t − µ √ σ 2 FX (t) = √ 1 2π σ 1 + erf (4) where erf(x) is the error function. The probability density function (pdf) of a dt Pr[X ≤ lognormal random variable X follows from the definition fX (t) = d t], for t ≥ 0, as (2), where (µ, σ) are called the parameters of the lognormal pdf, while the mean and variance are [1, p. 57] and E [X] = eµe Var [X] = e2µeσ2(cid:16) σ2 2 eσ2 − 1 (cid:17) The limit σ → 0 reduces to a Dirac delta function at t = eµ, thus limσ→0 fX (t) = δ (t − eµ). Given the mean and variance, the parameters of the lognormal are found (cid:18) (cid:19) σ2 = log 1 + Var [X] (E [X])2 (5) as and µ = log E [X] − σ2 2 (6) Although E [X] ≥ 0, we remark that the parameter µ can be negative. Moreover, (5) and (6) show that the scaled lognormal random variable Y = bX, where b is a positive real number, has mean σY = σ and µY = µ + log b. Hence, scaling by a factor b does not change the parameter σ, which 23 has interesting consequences for binning and measured data: the unit (e.g. second versus hours) in which the random variable is measured does not alter the parameter σ, only the parameter µ. The change of the argument t → eu in fX (t) leads to (cid:20) − (u−(µ−σ2))2 2σ2 (cid:21) exp fX (eu) = e−µ+ σ2 √ 2π illustrating that the scaled lognormal pdf eµ− σ2 N(cid:0)µ(cid:48), σ2(cid:1) with mean µ(cid:48) = µ − σ2. The maximum of fX (t) occurs at t = 2 fX (eu) is a Gaussian pdf (7) σ 2 σ2 2 2π σ eµ−σ2 and equals maxt≥0 fX (t) = e−µe √ , which follows directly from (7). Moreover, we find easier from (7) than from (2) that limu→−∞ fX (eu) = fX (0) = 0 and that f(cid:48) X (0) = 0. This means that any lognormal starts at t = 0 from zero, increases up to the maximum at t = eµ−σ2 > 0 after which it decreases towards zero at t → ∞. Thus, the lognormal is bell-shaped, but, in contrast to the Gaussian, the lognormal pdf is not symmetric around its maximum at t = eµ−σ2 and can be seriously skewed. The expression for the lognormal pdf in (2) can be rewritten [49] in a "power-law"-like form as fX (t) = − µ2 √ e 2σ2 σ 2π t−α(t) (8) (9) where the exponent α (t) equals α (t) = 1 + log t − 2µ 2σ2 2σ2 (cid:12)(cid:12)(cid:12) log t−2µ (cid:12)(cid:12)(cid:12) < ε. Thus, when t ∈ [e2µ−2σ2ε, e2µ+2σ2ε] which illustrates that a lognormal random variable behaves as a power-law random variable, provided the last fraction in (9) is negligibly small, say ε. The latter happens when or in terms of the lower bound τ = e2µ−2σ2ε and upper bound κ = e2µ+2σ2ε defined in Section 1, the pdf (2) of a lognormal random variable is almost indistinguishable from the pdf (1) of a power-law random variable with power exponent γ ≈ 1 + ε. The t-interval [e2µ−2σ2ε, e2µ+2σ2ε] exceeds the maximum eµ−σ2 of the lognormal pdf and is clearly longer when σ is larger (as well as the tolerated accuracy ε increases). Malvergne et al. [49] mention that, if σ = 3.4, then the exponent α (t) in (9) varies less than 0.3 units over a range of three orders of magnitude. 24 Taking the logarithm on both sides of (2) results in √ σ2 − 1) ln(t) − ln( ln(fX (t)) = − 1 2πσ) − µ2 2σ2 2σ2 ln(t)2 + ( µ (10) σ2 − 1) ln(t) in (10) dominates, which If σ is large, then the second term ( µ leads to a straight line with in a log-log plot resembling a power-law with exponent γ = 1. On the other hand, if σ is small or µ = σ2, the first, quadratic term in (10) dominates. B Distinguishing power-law from lognormals by likelihood testing We apply the method of Clauset et al. [20] and Virkar and Clauset [51] to our data to distinguish between power-law and lognormal distributions. Clauset et al. [20] approached the problem of estimating the exponent γ in (1) by testing different distributions. In their data, lognormals and power- laws were not clearly distinguishable either: for some tested data-sets, a lognormal distribution actually achieved a higher p-values (goodness of fit) than power-laws, but log ratio tests suggested that other tested distributions are closer to power-laws. By using the technique in [20] to fit the distribution of Tf riend, a power-law with exponent γ = 1.53 was found with a reasonable p-value of 0.23. The distribution of Tf ollower is most likely not a power- law because the p-value of 0.0. Table 3 lists the parameters for all used datasets using Clauset and Virkar's fitting technique [51] with the according log-likelihood (Log-lh) and p values. A positive log-likelihood ratio indicates that the power-law is favored over the lognormal. Distribution (binned in) Exponent (γ) power-law p xmin lognormal µ adding friends Tf riend (seconds) adding follower Tf ollower (seconds) adding follower Tf ollower (hours) sending emails (seconds) sending emails (minutes) receiving emails (seconds) receiving emails (minutes) commenting on Reddit.com (seconds) commenting on Reddit.com (hours) 1.53 2.03 1.81 2.33 2.03 2.01 2.21 1.08 1.91 0.23 0.0 0.37 0.0 0.21 0.0 0.05 0.0 0.01 59 12 116 86 1 1 182 112 64 0.54 10.45 6.43 9.53 6.9 10.31 6.23 10.2 0.88 σ 2.26 2.75 3.1 3.24 3.32 2.73 3.54 3.13 2.41 Log-lh p 0.0015 0 0 0 0 0 0 0 0 LR 418.67 -1327.5 -297.66 -373.7441 -391.13 -958.67 -136.31 -0.0024 -20.73 # of data-points 7,156,722 6,734,405 41,184 68,346,901 62,031,701 69,528,701 15,365,001 180,156,539 50,044 Table 3: Estimated parameters using the method of Clauset et al. [20] 25
1012.4050
1
1012
2010-12-18T03:00:21
Motif Analysis in the Amazon Product Co-Purchasing Network
[ "cs.SI", "physics.soc-ph" ]
Online stores like Amazon and Ebay are growing by the day. Fewer people go to departmental stores as opposed to the convenience of purchasing from stores online. These stores may employ a number of techniques to advertise and recommend the appropriate product to the appropriate buyer profile. This article evaluates various 3-node and 4-node motifs occurring in such networks. Community structures are evaluated too.These results may provide interesting insights into user behavior and a better understanding of marketing techniques.
cs.SI
cs
COMS6998 - Network Theory - HW3 Motif Analysis in the Amazon Product Co-Purchasing Network Computer Science Department, Columbia University∗ Abhishek Srivastava (Dated: May 18, 2014) Online stores like Amazon and Ebay are growing by the day. Fewer people go to departmental stores as opposed to the convenience of purchasing from stores online. These stores may employ a number of techniques to advertise and recommend the appropriate product to the appropriate buyer profile. This article evaluates various 3-node and 4-node motifs occurring in such networks. Community structures are evaluated too.These results may provide interesting insights into user behavior and a better understanding of marketing techniques. 0 1 0 2 c e D 8 1 ] I S . s c [ 1 v 0 5 0 4 . 2 1 0 1 : v i X r a I. INTRODUCTION According to a recent study, the number of people choosing to shop at a physical departmental store is on a decline. More and more people today are using the convenience of online shopping [4]. The growth of sites like Amazon and Ebay is evidence of this emerging trend. Stores also tend to encourage buyers with discounts and e-coupons for shopping online since it means that they do not have to stock up goods at their brick and mor- tar stores but may ship them as and when required from the warehouse directly to the buyer. This is now a well proven business model for lowering operational costs and maximizing profits. As a result of this trend, stores online are able to pro- file buyers based on their preferences. Stores may use such information to recommend products to other buy- ers showing a similar profile or may cleverly advertise the products that a buyer is more likely to buy. In ei- ther case, the advertising engine would need to analyze large datasets of information containing past records of buyers, the products they bought and the timing of their purchase. Leskovec et all [1] used such a dataset from a large online retailer to study the effectiveness of vi- ral marketing techniques. They researched the effective- ness of personal recommendations between buyers and modeled these based on a simple stochastic model. Vi- ral marketing is a proven technique as demonstrated by the growth of email services like Yahoo and Hotmail who based their marketing on this technique. Each email sent out from their email services contained a footer advertis- ing the service. Simple, and very effective. Referral marketing is surely the future of web adver- tising. Free services online tend to lose their value if they are easily available to even those who don’t need them. Google used a referral technique to launch their GMail mail service by allowing users only by invitation. This requires some effort from the potential user of the free service tool to actively seek out users to try and get a referral. It also gives current users a value perception of the free product they are using because it is not widely available to everybody. ∗ [email protected] This article will aim to look at the Amazon product co- purchasing network, on both a micro as well as a macro scale. Understanding the interactions at a localized and micro scale may help in isolating the noise and point to interesting trends that can be extrapolated to the larger scale. Motifs have been used extensively to study inter- actions in biological networks, especially in bacteria like the E-Coli. The article shows how motifs can be used in a product co-purchasing network to gain insights into rela- tions between products. Both 3-node and 4-node motifs have been analyzed. Community structures have long been used in network analysis and the article by Leskovec [1] identified com- munities and the products that these communities pre- ferred. In this article, we suggest using community de- tection methods to make the motif-based analysis more accurate and pertain to a select list of products. Section II describes the source and the structure of the dataset we will use for analysis. Section III concen- trates on the motifs discovered in the dataset, their sig- nificance and their frequency of occurrence. Section IV discusses algorithms for detecting community structures in the dataset for identifying trends between products frequently co-purchased together. II. NATURE AND DESCRIPTION OF THE DATASET The dataset for this article was obtained from the pub- licly available Stanford Network Analysis Platform [2]. The description reads as follows : “Network was collected by crawling Amazon website. It is based on Customers Who Bought This Item Also Bought feature of the Ama- zon website. If a product i is frequently co-purchased with product j, the graph contains a directed edge from i to j.” Along with the edge-list representation of co- purchased products, there is also metadata present for each product summarized in Table I. This article’s experiments were carried out on a sub- set of the original dataset to restrict the computational resources required to carry them out. The portion of the dataset which will be used for analysis in this article was collected on March 02 2003. Some statistics of this dataset are presented in Table II. As depicted by the statistics, the network is quite dense with a clustering 2 TABLE I. Sample Amazon Product Metadata B. Market Segmentation Property Id ASIN Title Group SalesRank Similar Products Categories Reviews Value 1 0827229534 Patterns of Preaching: A Sermon Sampler Book 396585 5 0804215715 156101074X 0687023955 0687074231 082721619X 2 —Books[283155]—Subjects[1000]— Religion & Spirituality[22]— Christianity[12290] —Clergy[12360]— sPreaching[12368] Total: 2 downloaded: 2 avg rating: 5 2000-7-28 cutomer: A2JW67OY8U6HHK rating: 5 votes: 10 helpful: 9 2003-12-14 cutomer: A2VE83MZF98ITY rating: 5 votes: 6 helpful: 5 Buyers online, as anywhere else, are usually classi- fied into profiles that are indicative of their past buy- ing trends. Market segmentation is a marketing term referring to the aggregating of prospective buyers into groups (segments) that have common needs and will re- spond similarly to a marketing action. Market segmen- tation enables companies to target different categories of consumers who perceive the full value of certain prod- ucts and services differently from one another. Generally three criteria can be used to identify different market segments: 1) Homogeneity (common needs within segment) 2) Distinction (unique from other groups) 3) Reaction (similar response to market) TABLE II. Dataset Statistics Property Nodes Edges Nodes in largest WCC Edges in largest WCC Nodes in largest SCC Edges in largest SCC Average clustering coefficient Number of triangles Fraction of closed triangles Diameter (longest shortest path) 90-percentile effective diameter Value 262111 1234877 262111 (1.000) 1234877 (1.000) 241761 (0.922) 1131217 (0.916) 0.4240 717719 0.2361 29 11 coefficient of about 0.42. The fraction of nodes belong- ing to the largest strongly connected component is very high - 0.922. This implies that the products sampled are very closely related with each other. III. MOTIFS : DESCRIPTION AND SIGNIFICANCE C. Analysis Functions for Motifs In this section, we will define a product purchasability function for a 3-node motif that will indicate the prob- ability of product being purchased in the context of the in at vertex i and Emotif, 3-node motif using in-degree V i the total count of edges in the motif : f (Pi) = V i in Emotif (1) The product purchasability function is not defined for a vertex in the motif with in-degree zero. For all other vertices, this function will return the fraction of edges coming into the product as opposed to the total num- ber of edges. To rate each motif, we will then declare a Motif Rank function that will indicate the fraction of nodes that have a finite, positive product purchasability function. Contrary to what the name of this function im- plies, it does not identify the importance or significance of a motif. Instead, this function looks at the fraction of nodes (products) whose purchasability may be defined and thus provide a larger actionable product-set. A. Introduction to Motifs Motif Rank = Number of Nodes with Positive f (Pi) Total Nodes in Motif Motifs can be described as recurring, significant pat- terns of interconnections present in a network. These motifs have been found to occur more frequently than in random graphs; a number of biological networks are composed solely of a large number of such motifs.Each type of network seems to display its own set of charac- teristic motifs (ecological networks have different motifs than gene regulation networks, etc). Milo et all analyzed such network motifs in their famous article [3] where they showed that motifs formed the basic building blocks of a number of biological networks and they also formulated methods to detect the commonly occurring motifs in a network. (2) It must be noted that the Product Purchasability and the Motif Rank functions are comparable only within the particular class of k-node motifs (where k is usually 3 or 4) for which the functions were defined. We will now look at some of the most commonly occurring motifs discov- ered in the product co-purchasing network in the next sections. D. Analysis of 3-Node Motifs in Network The statistics of 3-node motifs present in the network studied in this article have been summarized in Table TABLE III. MotifId Nodes Edges Count 131613 78578 104071 217566 16090 20400 32962 3685 2 135904 21579 28397 19319 1 2 3 4 5 6 7 8 9 10 11 12 13 3 3 3 3 3 3 3 3 3 3 3 3 3 2 2 3 2 3 4 4 4 3 3 4 5 6 III. As seen in biological networks, the probability of occurrence of some motifs is much higher (by an order of magnitude) than others. This is indicative of a structural similarity present in the network. Figure 1 shows a 3- node motif with a frequency count of 131613 and MotifID 1. Motif IDs were assigned to the commonly occurring 3-node and 4-node motifs by the original article on motifs by Milo et all [3]. MotifID 1 shown in Figure 1 is a representation of the case where when a customer bought a product, he / she went ahead and bought either or both of the other 2 products. The f (Pi) of nodes in this motif is 0.5 for the nodes at the bottom and undefined for the node at the top. We assume that the time instant at which the prod- uct represented by the top node is the present instant. The customer may then purchase both the other prod- ucts, either of the 2 products or none of them. The motif rank can then be computed as 0.66. FIG. 1. Motif ID : 1 MotifID 3 shown in Figure 2 is a interesting motif with a relatively high frequency of occurrence. There is a re- ciprocating relation between 2 of the nodes. This is a strongly connected component indicating the closeness similarity between the nodes. The f (Pi) of the nodes in this motif are all 0.33. The Motif Rank function for this motif is found to be 1. FIG. 2. Motif ID : 3 MotifID 4 shown in Figure 3 has the highest frequency 3 of occurrence among all the 3-node motifs. The next highest frequency of occurrence is about 40% lower than the frequency of this motif. This a converging motif - consumers who bought largely unrelated products (the 2 nodes at the top) also bought the product represented by the node at the bottom. The unrelated nature of the 2 product nodes at the top stands out in this motif. The high frequency of this motif also points to the fact that there is a converging factor in the network implying that a large number of customers end up purchasing a small subset of products. Identifying this small subset of products can be used by the online store for improving services and reducing operational costs by smartly stock- ing this identified subset of products. The Motif Rank of this motif is 0.33 due to the presence of just one node with a positive f (Pi) function. FIG. 3. Motif ID : 4 MotifID 10 shown in Figure 4 contains a strongly con- nected component showing a close correlation between the products. The f (Pi) of the node at the top is unde- fined. The node in the centre has a f (Pi) of 0.66 and the node at the bottom has one of 0.33. Customers buying the product represented by the node at the top may buy the one in the middle too. The argument can be extended to the product at the bottom too. With increasing edge separation between product nodes, the probability that the customer will buy the product falls exponentially. This is due to the fact that most customers place bud- gets and prioritize the items to purchase depending on the ones they need the most. FIG. 4. Motif ID : 10 E. Analysis of 4-Node Motifs in Network In this section, we used a motif searching algorithm to detect all 4-node motifs in the network and obtained their frequency of occurrences. Motif IDs range from 1 to 200, encompassing all the possible permutations of 4- node motifs. Figure 5 shows the frequency distribution of the 4-node motifs. The three tallest bars belong to Motif ID 59, 26 and 5. FIG. 5. 4-Node Motif Frequency Distribution FIG. 6. Motif ID : 5 4 this node to be purchased. Its interesting to observe that the Motif ID 25 shown in Figure 7 appears in second place, statistically. This can be identified as a converging motif with all nodes tracing a path to the bottom node. Again, the f (Pi) function of the bottom node is the highest among the nodes in the motif. This motif may also represent a similarity in tastes from customers belonging to different schools of thought or having different backgrounds. FIG. 7. Motif ID : 25 Motif ID 59 is truly indicative of the convergence trend mentioned previously. It is also statistically the most sig- nificant 4-node motif, just like its similar looking coun- terpart among the 3-node motifs. FIG. 8. Motif ID : 59 F. Extrapolating the Micro to the Macro Figures 6, 7 and 8 show the 3 most frequently occurring 4-node motifs in the product co-purchasing network.The Motif IDs 25 and 59 share a characteristic similar to that observed in the most frequently occurring 3-node motif with MotifID 4. They are both converging motifs in- dicating the high probability of a customer buying the product to which the edges in the motif converge. The interesting resemblance to the analysis done for 3-node motifs is that the 4-node motif with Motif ID in Figure 8 also has the highest frequency of occurrence among all 4-node motifs. Figure 6 is the third most frequently occurring 4-node motif in the network. The f (Pi) of the 2 nodes at the bottom are 0.66 and 0.33. This motif is neither converg- ing nor diverging. But there is a trend in the motif to move toward the bottom node with a higher f (Pi), indi- cating a higher probability of the product represented by Motifs, by themselves do not describe the large scale structure of the network. To infer the properties of the larger picture, we will have to aggregate the perspective provided by the individual motif analysis. The suggested method to obtain the most mileage would be to break the original network into a number of communities using the Girvan-Newman algorithm [5] or the faster Clauset, Neuman, Moore algorithm [6]. Once this is done, each of these communities represents a singular class of objects (nodes). If our network is large and varied, we can con- tinue this process till we reach our required coarseness of sub-categorization. These resulting networks can then be subjected to motif analysis as as carried out in the previous sections. In case of the product co-purchasing network used in this article, such granularity will enable us in study- ing the dynamics of particular products more accurately. Since buyer profiles are built with progressive purchases which may not belong to the same community of prod- ucts, we cannot extrapolate the findings obtained from these community-centric entities to build customer pro- files. What we may use them for is building product purchasing trends. We can monitor the motif statistics over time to gather useful information about trends. For example, if the frequency of occurrence of converging mo- tifs increases, we deduce that a larger set of customers are looking to buy a fewer, smaller subset of products. Having adjusted the coarseness of the community sub- categorization, we can make a good guess as to what these products are and whether, as online retailers, we need to make any operational changes to match the de- mand. IV. COMMUNITY DECTECTION FOR MOTIF ANALYSIS Social networks are a product of the contexts that bring people together. The context can be a shared inter- est in a particular topic or kind of a book. Some- times there are circumstances, such as a specific job or religious affiliation, that make people more likely to be interested in the same type of book or DVD. Community discovery algorithms presented in [5] and [6] provide mechanisms for community detection in com- plex systems. The Girvan-Neuman algorithm [5] focuses on identifying edges that are the weakest in the network, the ones that are the least central . These would in- advertently be edges that are connecting communities. Then communities are detected by progressively remov- ing such edges from the original graph. The modu- larity maximization method [6] detects communities by searching over possible divisions of a network for one or more that have particularly high modularity. Since ex- haustive search over all possible divisions is usually in- tractable, practical algorithms are based on approximate optimization methods such as greedy algorithms, sim- ulated annealing, or spectral optimization, with differ- ent approaches offering different balances between speed and accuracy.The usefulness of modularity optimization is however questionable: on the one hand, it has been shown that modularity optimization often fails to detect 5 clusters smaller than some scale, depending on the size of the network (resolution limit); on the other hand the landscape of modularity values is characterized by a huge degeneracy of partitions with high modularity, close to the absolute maximum, which may be very different from each other.The choice of algorithms to use for community detection may be made at the behest of the investigator who knows the nature of the network being studied. V. CONCLUSIONS AND FUTURE WORK The article defined some functions for analyzing the occurrence and nature of motifs present in a network. Motifs, by themselves are not very much helpful in fea- ture extraction,as observed, and we must combine such analysis with other methods like community detection. Nevertheless, we have shown that motifs can be used to visualize trends, extract interesting large scale features and on the whole, be useful in predicting user behavior in a network such as a product co-purchasing network. With reference to a co-purchasing network, we were able to show that the following traits may be extracted using motifs : (1) Prediction of product demand (2) Purchasing Trends in product categories (3) Relations between different products The extraction of these trends is vital from the perspec- tive of online retailers hoping to cash in on the growing number of customers choosing to shop online. The one striking trend that this article found was that there is a large presence of converging motifs, indicating that most customers tend to buy a select few products. This is not a contradiction to the “long tail” phenomenon. On the contrary, it can be shown that the presence of the long tail is a large scale phenomenon and would not make it- self visible at a micro sampling of the network. As [1] has shown, the long tail is the future of online retailing; selling less of more is more pronounced in online retailing than in physical retailing. In the future, one can look more deeply into the inter- actions between motifs and into the cascading effects of these motifs in the context of the network neighborhood. Various trends may be identified and used effectively for improving marketing and advertising of products by the management of a retailing organization. [1] Leskovec, Adamic, Huberman The Dynamics of Viral Marketing ACM Transactions on the Web, Vol. 1, No. 1, Article 5, May 2007 [2] SNAP Stanford Network Analysis Platform http://snap.stanford.edu [3] Milo,Shen-Orr,Itzkovitz,Kashtan,Chklovskii,Alon Net- work Motifs: Simple Building Blocks of Complex Networks Nature, Vol 298, 25 October 2002 [4] Robust Sales for Holiday Weekend http://www.nytimes.com/2010/11/29/business/economy/29shop.html New York Times, 28 November 2010 [5] Girvan-Newman algorithm (Girvan M. and Newman M. E. J., Community structure in social and biological networks Proc. Natl. Acad. Sci. USA 99, 7821¡96¿7826 (2002)) [6] A. Clauset, M.E.J. Newman, C. Moore Finding Large community in networks 2004
1912.08921
1
1912
2019-12-08T18:35:23
Network-Based Delineation of Health Service Areas: A Comparative Analysis of Community Detection Algorithms
[ "cs.SI", "cs.LG", "stat.ML" ]
A Health Service Area (HSA) is a group of geographic regions served by similar health care facilities. The delineation of HSAs plays a pivotal role in the characterization of health care services available in an area, enabling a better planning and regulation of health care services. Though Dartmouth HSAs have been the standard delineation for decades, previous work has recently shown an improved HSA delineation using a network-based approach, in which HSAs are the communities extracted by the Louvain algorithm in hospital-patient discharge networks. Given the existent heterogeneity of communities extracted by different community detection algorithms, a comparative analysis of community detection algorithms for optimal HSA delineation is lacking. In this work, we compared HSA delineations produced by community detection algorithms using a large-scale dataset containing different types of hospital-patient discharges spanning a 7-year period in US. Our results replicated the heterogeneity among community detection algorithms found in previous works, the improved HSA delineation obtained by a network-based, and suggested that Infomap may be a more suitable community detection for HSA delineation since it finds a high number of HSAs with high localization index and a low network conductance.
cs.SI
cs
Network-Based Delineation of Health Service Areas: A Comparative Analysis of Community Detection Algorithms Diego Pinheiro1[0000−0001−9300−7196], Ryan Hartman3[0000−0001−8044−5461], Erick Romero1[0000−0001−5456−3093], Ronaldo Menezes2[0000−0002−6479−6429], and Martin Cadeiras1[0000−0003−4545−2871] 1 Department of Internal Medicine, University of California, Davis, USA 2 Department of Computer Science, University of Exeter, UK 3 Independent Researcher Abstract. A Health Service Area (HSA) is a group of geographic regions served by similar health care facilities. The delineation of HSAs plays a pivotal role in the characterization of health care services available in an area, enabling a better planning and regulation of health care ser- vices. Though Dartmouth HSAs have been the standard delineation for decades, previous work has recently shown an improved HSA delineation using a network-based approach, in which HSAs are the communities ex- tracted by the Louvain algorithm in hospital-patient discharge networks. Given the existent heterogeneity of communities extracted by different community detection algorithms, a comparative analysis of community detection algorithms for optimal HSA delineation is lacking. In this work, we compared HSA delineations produced by community detection algo- rithms using a large-scale dataset containing different types of hospital- patient discharges spanning a 7-year period in US. Our results replicated the heterogeneity among community detection algorithms found in pre- vious works, the improved HSA delineation obtained by a network-based, and suggested that Infomap may be a more suitable community detec- tion for HSA delineation since it finds a high number of HSAs with high localization index and a low network conductance. Keywords: Hospital-Patient Discharge Networks · Community Detec- tion Algorithms · Health Service Area · Comparative Analysis 1 Introduction A Health Service Area (HSA) is as a group of geographic regions in which residing patients most often receive healthcare services from similar health care facilities. It was first introduced in 1973 by Wennberg and Gittelsohn as a more meaningful unit of analysis for healthcare data than administrative geographic divisions such as counties [13]. By examining variations in expenditures among HSAs delineated in Vermont, the authors showed, for instance, that the expenditure per capita among HSAs varied from $54 to $162 and such variation, however, had no correlation with age-adjusted mortality. 2 Pinheiro et al. In 1996, Wenneberg then proposed the Dartmouth Atlas of Health Care in the United States [12] which is the current standard HSA delineation in the US. Effectively, Each Dartmouth-HSAs are delineated in three steps. First, each health care facility is assigned to its respective city/town. Then, each ZIP Code is assigned to the city/town of the health care facility from which residing patients receive most of their healthcare services. As a result, each Dartmouth-HSA is the group of ZIP Codes associated to the same city/town. Finally, enclave ZIP Codes, if any, are assigned the city/town of its adjacent ZIP Codes to unsure geographic contiguity. Recently, Hu et al. [7] has proposed a network-based approach to HSA de- lineation in which a Hospital-Patient Discharge Network (HPDN) was built and the community detection algorithm Louvain was subsequently applied to find communities (i.e., HSAs) with the highest network modularity. In their HPDN, nodes represent distinct ZIP Codes and links represent the total number of dis- charges between the ZIP Codes of health care facilities and patient residencies. Using claims-based hospital discharges in Florida, the authors demonstrated that Louvain-HSAs presented, for instance, a higher localization index than Dartmouth-HSAs, which is measure of internal validity that quantifies the pro- portion of patients receiving services from health care facilities located at the same HSA in which they reside. Yet, a comparative analysis of community detection algorithms, is still lack- ing for optimal network-based HSA delineation. Such comparative analysis is needed given the heterogeneity of communities extracted by different commu- nity detection algorithms [6]. Though such comparative analysis was previously provided for grouping hospitals [3], the underlying networks differ from HPDNs in two fundamental aspects: nodes were hospitals instead of geographical regions, and links were patients sharing between hospitals instead of the total number of hospital discharges. In this paper, a comparative analysis of was conducted for HSAs delineated by four commonly used community detection algorithms, namely, Block Model [8], Infomap [10] , Louvain [1], and Speaker-Listener Label Propagation Algorithm (SLPA) [14], were compared. A claims-based patient-hospital discharge data was used; it containing a total of 124, 970, 471 discharges over a 7-year period in California, US. Our results replicated the existent heterogeneity of communities extracted by different algorithms of community detection and reinforced the use of a network-based approach to HSA delineation. The results demonstrated, for instance, that Infomap was the most suitable algorithm because it was capable of delineating a high number of HSAs, and Infomap-HSAs still presented a high localization index and a low network conductance. To shift the standard HSA delineation methodology from Dartmouth to a network-based approach, further studies on the reliability, validity, and generality of a network-based approach are required. Network-Based HSA Delineation: A Comparative Analysis 3 2 Methodology A network-based delineation of Health Service Areas (Fig. 1) consists of (A) modeling claims-based patient-hospital discharge data as networks of ZIP Code Tabulation Areas (ZCTAs), (B) applying a diverse set of community detection algorithms, and (C) performing a comparative analysis of the extracted com- munities (i.e., HSAs) according to multiple quality metrics of HSA delineation. Overall, 28 Hospital-Patient Discharge Network (HPDN) were built, one for each combination of 4 discharge types and 7 years. For each HPDN, each of the 4 community detection algorithms was applied, and a total of 112 HSA delineations were obtained. Though only a subset of HPDNs and HSA de- lineations are presented, all of the code, datasets, networks, and analysis are available on the Open Science Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/GW73Y. Fig. 1. Network-based delineation of Health Service Areas (HSAs). (A) Hospital dis- charge data is used to build Hospital-Patient Discharge Networks (HPDN) in which nodes represent ZIP Code Tabulation Areas (ZCTAs), and links represent the total number of discharges between the ZCTA locations of health care facilities and patient residencies. (B) Community detection algorithms are applied over HDPNs to delineate HSAs. (C) Delineated HSAs are evaluated according to multiple quality metrics of HSA delineation. 2.1 Hospital-Patient Discharge Networks Hospital-Patient Discharge Networks (HPDNs) were built using claims-based hospital discharge data obtained from the California Health and Human Ser- vices Agency (CHHS) [2]. This dataset is publicly available and contains a total Hospital-Patient Discharge Network Patient ResidencyHealth Care Facility Hospital Discharge ZCTA 04ZCTA 01ZCTA 03ZCTA 02ZCTA 05ZCTA 07ZCTA 08ZCTA 06ACEvaluation of Health Service Areas (HSAs) Delineation HSA 1ZCTA 04ZCTA 01ZCTA 03ZCTA 02ZCTA 05ZCTA 07ZCTA 08ZCTA 06HSA 2BCommunityDetection AlgorithmsAlgorithm 1Algorithm 2Algorithm m…M1=<latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit><latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit><latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit><latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit>+<latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit>+<latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit>+<latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit>M2=<latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit><latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit><latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit><latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit>Mn=<latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit><latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit><latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit><latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit>…Metrics 4 Pinheiro et al. of 124, 970, 471 hospital-patient discharges of different types spanning a 7-year period from 2012 through 2018. The four discharge types are Inpatient from Emergency Department (ED), Inpatient, Ambulatory Surgery, and ED Only. Each data point contains the type of discharge, the year, the name of the facility (e.g., Alameda Hospital, University of California Davis Medical Center). Also, it contains the 5-digit ZIP Codes (e.g., 94501, 95831) of both facility loca- tion and patient residency as well as the respective number of discharges between them. Hospital discharges to patient residency ZIP Codes other than those with 5-digits were excluded (2.6%); these were mainly discharges of patients from states other than California (e.g., ARIZONA, NEVADA (state), Other U.S.), from locations outside the US (e.g., OUTSIDE U.S.), from unknown locations (e.g., UNKNOWN), and from homeless population (e.g., HOMELESS). ZIP Codes are a collection of delivery routes maintained U.S. Postal Service and ZIP Code Tabulation Area (ZCTAs) are actual generalized areal represen- tations maintained by the U.S. Census Bureau. Therefore, for each ZIP Code of both health care facility and patient residency, the corresponding ZCTA was obtained using the ZIP Code to ZCTA Crosswalk provided from the Uniform Data System Mapper [11]. A separate weighted and undirected HPDN network was built for each type of hospital discharge and for each year according to the methodology proposed by Hu et al. [7]. In each network, nodes are ZCTAs, links are the total number of discharges between the ZCTAs of health care facilities and patient residencies. The HPDN is an undirected network because a link wij encodes the total number of discharges between ZCTAs i and j without arbitrarily distinguishing whether the direction is due to a health care facility at i discharging patients residing at j or patients residing at i going to a facility at j for health care services. 2.2 Community Detection In a network-based HSA delineation, each HSA correspond to a distinct com- munity extracted by a community detection algorithm from a hospital-patient discharge network (HPDN) [7]. While the existence of communities in real-world networks is agreed upon, there is no generally accepted definition of what a com- munity is, or what the most appropriate way to find them is [5]. Some algorithms take a stronger approach to community detection by looking for cliques, which are a group of nodes for which there is a link between every pair of nodes [4]; other approaches just look for more densely connected subgraphs within the network such that a community is a subset of nodes within a network that are densely connected to each other when compared to the rest of the network. The lack of a general definition of what a community should be is also mir- rored in the existent heterogeneity of communities extracted by different commu- nity detection algorithms [6] and as such requires a comparison among commu- nity detection algorithms. Four commonly used algorithms were selected: Lou- vain Modularity, Infomap, Stochastic Block Model, and Speaker-listener Label Propagation. These algorithms were selected as they provide four very distinct Network-Based HSA Delineation: A Comparative Analysis 5 approaches to community detection and have their implementations easily pro- vided by their authors. The Louvain algorithm [1] finds communities that maximizes the network modularity. This quantifies the extent to which the density of links within the found communities excessively surpasses that of what would be expected if links were placed at random. Trying all possible partitions is not computationally feasible, and Louvain modularity takes a heuristic approach by maximizing the local modularity of smaller communities that are only subsequently joined if such aggregation leads to an increased modularity. These smaller communities start as individual nodes and are iteratively joined together into greater communities until the a single community containing the whole network is reached. The Stochastic Block Model [8] uses a maximum likelihood estimator to in- fer the block structure of the network. This algorithm attempts to recover the hierarchical block structure of the network where each block represents a com- munity. The block model used in this study is the degree-corrected variant given the weighted aspect of HPDNs and that previous work has shown that the such variant tends to perform better on empirical networks [9]. The Infomap algorithm [10] finds communities that maximizes the map equa- tion instead of modularity. The map equation quantifies the length of the coding scheme necessary to communicate the sequence of movements of random walkers within the network. In essence, if a community structure exists, random walk- ers will become trapped within these communities because movements within- communities are more likely than between-communities. Therefore, the coding scheme necessary to communicate the sequence of movements can be reduced by taking into account the community structure as every time a walker enters into a community, the community is identified, and a smaller community-specific coding scheme is used to quantify within-community movements. The Speaker-Listener Label Propagation Algorithm (SLPA) [14] is a localized community detection algorithm based on the concept of label propagation. SLPA finds communities by initially assigning each node to a unique label. Nodes then iteratively changes their label to the label most often used by its neighbors. Initially, this label exchange rule promotes the formation of smaller consensus groups which will subsequently compete with one another for node members depending on the balance between their within-group and between-group in- teractions. In contrast to the other algorithm's, SLPA does not require prior information about the network, nor does it attempt to maximize any metric as a proxy for well-defined communities. Instead, it only relies on the network structure to identify the communities. While SLPA is able to find overlapping communities, the post processing threshold was set to r = 0.5 to ensure the ex- traction of non-overlapping communities and thus provide a better comparison to the other non overlapping algorithms used. 2.3 Evaluation of Health Service Areas (HSA) Delineation The quality of a HSA delineation can be evaluated according to multiple and often conflicting metrics [7,3]. The following four delineation metrics of a HSA c 6 Pinheiro et al. were used: the number of communities (NC), the localization index (LIc),network conductance (Cc), and the total number of discharges (Dc). In a network-based HSA delineation, the total number of delineated HSAs NC is determined by the specific community detection algorithm used as it is the number of communities extracted. The NC is an important metric since it determines the number of distinct meaningful units of analysis ultimately uncovered and, as in any community detection problem, trivial solutions such as 1 (one) and n, the total number of nodes, are generally undesired [6]. The localization index LIc of a community c quantifies the proportion of patients seeking and receiving health care services from hospitals within the HSA in which they reside. A high value of LIc is desired since it describes HSA c uncovered a geographic region in which residing patients receive comparable health care services. Formally, the localization index LIc of community c can be defined as LIc = ND(c,c) ND(c) , (1) community j, and ND(c) =(cid:80)NC in which ND(i,j) is the total number of discharges from patients residing at ZCTAs within community i that are discharged from hospitals at ZCTAs within j ND(c,j) is the total number of discharges from patients living within community c. The network conductance Cc of a community c is a network-based measure which quantifies the extent to c is well-formed. It is calculated using the total links running within its community i relative to links running from i to other communities. Conductance is based on the degree-based definition of a commu- nity [5]. Formally, the conductance C(c) of a community c can be calculated as Cc = wext C wC , (2) nodes i and j, wC =(cid:80) community c, and wext C =(cid:80) in which, for a weighted network, Wij is the strength of the link connecting i∈C,j Wij is the total strength of links originating within i∈C,j /∈C Wij is the external strength. Aside from the aforementioned metrics, the total number of discharges ND(c) from patients living in one of the ZCTAs found within community c is also cal- culated. Ideally, a community detection algorithm would maximize the number of HSAs where each has a high localization index and a low conductance. Yet, as the total number of communities increases from one to n, the typical value of localization index decreases from 1 to 0 and the typical value of network conductance increases from 0 to 1. To provide a reliable estimate for each metric, B = 1, 000 bootstrap samples with replacement draw from the distribution of each metric were used to calculate a mean value for the localization index (cid:104)li(cid:105), network conductance (cid:104)c(cid:105), and total number of discharges (cid:104)d(cid:105). The standard deviation was also provided for each of the aforementioned estimators. Network-Based HSA Delineation: A Comparative Analysis 7 3 Results and Discussion The network statistics of each individual HPDN varied among discharge types and over the years (Table 1). Considering the year of 2012, for instance, Inpatient from ED and ED Only HPDNs had comparable total number of nodes n. Their number of links m were 49, 000 and 127, 000, respectively, suggesting that a ED Only HPDN has a higher number of distinct ZCTA pairs for which hospital dis- charges occurred between hospital locations and patient residencies. Also, their the total network link strength w were 1.6 million and 9.2 million, respectively, and their network density ρ were 0.0345 and 0.0883, respectively,suggesting that the healthcare service underlying a ED Only HPDN has a higher demand and is more dense. Over the years, the average shortest path length l and clustering coefficient c of HPDNs slightly decreased. Table 1. Statistics of Hospital-Patient Discharge Networks (HPDNs). For each type of discharge and for each year, the following network measures were quantified: the total number of nodes (n), the total number of links (m), the total weight (w), the network density (ρ), the average shortest path length (l), as well as the clustering coefficient (c). Other types of discharges and network metrics are available on the Open Science Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/ GW73Y. n m w ρ l c Type of Discharge Year Inpatient from ED ED Only 2012 1.69E+03 4.92E+04 1.63E+06 3.45E-02 2.81 1.19E-03 2013 1.69E+03 4.97E+04 1.63E+06 3.49E-02 2.72 1.12E-03 2014 1.69E+03 5.05E+04 1.64E+06 3.56E-02 2.71 1.02E-03 2015 1.68E+03 5.25E+04 1.72E+06 3.70E-02 2.89 9.74E-04 2016 1.75E+03 5.37E+04 1.74E+06 3.50E-02 2.70 9.53E-04 2017 1.75E+03 5.38E+04 1.75E+06 3.52E-02 2.67 9.84E-04 2018 1.75E+03 5.41E+04 1.75E+06 3.54E-02 2.62 9.31E-04 2012 1.69E+03 1.27E+05 9.25E+06 8.83E-02 2.15 2.14E-04 2013 1.69E+03 1.28E+05 9.65E+06 8.95E-02 2.18 2.07E-04 2014 1.69E+03 1.33E+05 1.03E+07 9.25E-02 2.20 1.90E-04 2015 1.69E+03 1.39E+05 1.12E+07 9.66E-02 2.16 1.78E-04 2016 1.76E+03 1.42E+05 1.15E+07 9.15E-02 2.15 1.81E-04 2017 1.76E+03 1.43E+05 1.17E+07 9.25E-02 2.15 1.88E-04 2018 1.76E+03 1.42E+05 1.14E+07 9.17E-02 2.16 1.96E-04 Overall, HSA delineation results (Fig. 2 and Table 2) have reinforced the su- periority of network-based HSA delineation as well as confirmed the heterogene- ity among communities extracted by different community detection algorithms even in the same dataset. Such results are not only consistent with community 8 Pinheiro et al. detection comparisons from previous works [6], but also advocate for a further comparison among community detection algorithms. Table 2. Comparison of HSAs delineated using the community detection algorithms Block Model, Infomap, Louvain, and SLPA in terms of in terms of the number of communities (nc) as well as the typical values of the localization index (cid:104)li(cid:105), network conductance (cid:104)c(cid:105), and total number of discharges (cid:104)d(cid:105). The discharge types presented are Inpatient from ED and ED Only for the years of 2012 and 2018. The other discharge types and years are available on the Open Science Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/GW73Y. Type of Discharge Year Community Detection Inpatient from ED ED Only 2012 2018 2012 2018 BLOCK MODEL INFOMAP LOUVAIN SLPA BLOCK MODEL INFOMAP LOUVAIN SLPA BLOCK MODEL INFOMAP LOUVAIN SLPA BLOCK MODEL INFOMAP LOUVAIN SLPA nc (cid:104)li(cid:105) (cid:104)c(cid:105) (cid:104)d(cid:105) 35 70 20 110 35 62 15 111 33 90 24 139 34 76 24 126 0.47 0.77 0.86 0.69 0.47 0.80 0.87 0.65 0.45 0.77 0.92 0.70 0.45 0.84 0.90 0.73 0.82 0.18 0.13 0.25 0.74 0.15 0.13 0.28 0.84 0.22 0.09 0.28 0.83 0.15 0.09 0.25 51, 450 25, 539 89, 235 16, 392 54, 090 30, 397 125, 833 16, 830 311, 009 114, 117 430, 396 74, 049 359, 908 160, 869 512, 044 97, 810 The comparison of HSA delineations (Fig. 2) involves the evaluation of con- flicting metrics such as higher number of communities and localization index. Considering the discharge type ED Only and year 2018 (Table 2), for instance, the difference between the number Louvain-HSAs and SLPA-HSAs was 4-fold, with 24 Louvain-HSAs and 126 SLPA-HSAs. This fewer number of Louvain- HSAs using hospitals discharge in California is also consistent with the fewer number of Louvain-HSAs in the previous work from Hu et al. [7] using hospi- tal discharges in Florida. Though the localization index of Louvain-HSAs (.90) was 7% higher than that of Infomap-HSAs (.84), 52 more Infomap-HSAs were delineated, representing a 2-fold increase. By examining their geographical patterns (Fig. 3), the respective geograph- ical areas of Louvain-HSAs correspond to a wider and more discontinuous ge- ographical areas than those of Infomap-HSAs. Yet, Block Model-HSAs appear to be the poorest HSAs delineated not only because they are the fewest num- ber of HSAs delineated, which corresponds to a wider and more discontinuous Network-Based HSA Delineation: A Comparative Analysis 9 area, but also as their localization index is lower than .5 which raises concerns about the internal validity of the HSAs delineated. Lastly, Block Model-HSAs presented the highest variability regarding their localization index, conductance, and total number of discharges. Using the nested version of Block Model has not changed this results. Conversely, SLPA-HSAs are the highest number of HSAs but their localization index is typically less than .7, which is higher than that of Block Model-HSAs but still raises concerns regarding the internal validity of SLPA-HSAs. The hospital discharge data and the Hospital-Patient Discharge Networks (HPDNs) inherently represent a flow between hospitals and patients and the apparent superior results achieved by Infomap may be related to the fact that, instead of modularity, the Infomap optimizes the map equation and thus takes into account the local flows emerging from the movements of random walkers trapped within the HPDN communities. Interestingly, Infomap-HSAs presented improved localization index and conductance over time. 4 Conclusions Health Service Areas (HSAs) are meaningful units of analysis for improving the scientific basis of both clinical practice and policy decision making in the delivery of health care. The optimal delineation of HSAs is necessary to create not only more meaningful units of analysis, but also characterizing medical practices with greater accountability regarding their respective community needs and shared care practices. As HSAs shift from the Dartmouth approach towards a network-based ap- proach, further work will be needed to establish a comprehensive methodology for network-based HSA delineation, which should include (i) a broader set of community detection algorithms, (ii) hospital discharge data from states other than California, and integration with other healthcare datasets of expenditures. Further work is still needed to establish a comprehensive methodology for this type of approach. References 1. Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb- vre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics-Theory and Experiment, 2008(10), October 2008. 2. CHHS. California health and human services agency. https://data.chhs.ca.gov. Accessed: 2019-11-15. 3. Jordan Everson, John M Hollingsworth, and Julia Adler-Milstein. Comparing methods of grouping hospitals. Health Services Research, 24(4):333 -- 9, June 2019. 4. Santo Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75 -- 174, February 2010. 5. Santo Fortunato and Darko Hric. Community detection in networks: A user guide. Physics Reports, 659:1 -- 44, November 2016. 10 Pinheiro et al. 6. Ryan Hartman, Josemar Faustino, Diego Pinheiro, and Ronaldo Menezes. Assess- ing the suitability of network community detection to available meta-data using rank stability. WI, pages 162 -- 169, 2017. 7. Yujie Hu, Fahui Wang, and Imam M Xierali. Automated Delineation of Hospital Service Areas and Hospital Referral Regions by Modularity Optimization. Health Services Research, 53(1):236 -- 255, February 2018. 8. Tiago P. Peixoto. Hierarchical block structures and high-resolution model selection in large networks. Physical Review X, 4(1), March 2014. 9. Tiago P. Peixoto. Model selection and hypothesis testing for large-scale network models with overlapping groups. Physical Review X, 5(1), March 2015. 10. M. Rosvall and C. T. Bergstrom. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 105(4):1118 -- 1123, January 2008. 11. UDS. Uniform data system mapper. zip code to zcta crosswalk. https://www. udsmapper.org/zcta-crosswalk.cfm. Accessed: 2019-11-15. 12. John Wennberg. The Dartmouth Atlas of Health Care. American Hospital Associ- ation, Chicago, IL, 1996. 13. John Wennberg and Alan Gittelsohn. Small Area Variations in Health Care De- livery: A population-based health information system can guide planning and reg- ulatory decision-making. Science, 182(4117):1102 -- 1108, December 1973. 14. Jierui Xie, Boleslaw K. Szymanski, and Xiaoming Liu. SLPA: uncovering over- lapping communities in social networks via A speaker-listener interaction dynamic process. CoRR, abs/1109.5720, 2011. N e t w o r k - B a s e d H S A D e l i n e a t i o n : A C o m p a r a t i v e A n a l y s i s 1 1 Fig. 2. Comparison of HSAs delineated using Block Model, Infomap, Louvain, and SLPA community detection algorithms. The HSA delineations were compared in terms of the number of communities (NC ), localization index (LI(c)), network conductance (C(c)), and total number of discharges (ND(i, j)). The discharge types presented are Inpatient from ED (top) and ED Only (bottom). All results are available on the Open Science Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/GW73Y. Inpatient from EDED OnlyNumber of CommunitiesLocalization IndexNumber of DischargesNetwork ConductanceYears 1 2 i P n h e i r o e t a l . Fig. 3. Maps of HSA delineated using the community detection algorithms Block Model, Infomap, Louvain, and SLPA for discharge types Inpatient from ED (top) ED Only (bottom) in 2018. Each HSA is displayed as a geographical boundary aggregating one or more ZCTAs along with its respective Id. HSAs were then colored using a color blind palette with 9 distinct colors. All maps are available on the Open Science Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/GW73Y
1610.07754
1
1610
2016-10-25T07:24:37
Activity Maximization by Effective Information Diffusion in Social Networks
[ "cs.SI", "cs.DB" ]
In a social network, even about the same information the excitements between different pairs of users are different. If you want to spread a piece of new information and maximize the expected total amount of excitements, which seed users should you choose? This problem indeed is substantially different from the renowned influence maximization problem and cannot be tackled using the existing approaches. In this paper, motivated by the demand in a few interesting applications, we model the novel problem of activity maximization. We tackle the problem systematically. We first analyze the complexity and the approximability of the problem. We develop an upper bound and a lower bound that are submodular so that the Sandwich framework can be applied. We then devise a polling-based randomized algorithm that guarantees a data dependent approximation factor. Our experiments on three real data sets clearly verify the effectiveness and scalability of our method, as well as the advantage of our method against the other heuristic methods.
cs.SI
cs
Activity Maximization by Effective Information Diffusion in Social Networks Zhefeng Wang†, Yu Yang‡, Jian Pei‡ and Enhong Chen† †University of Science and Technology of China,Hefei, China ‡Simon Fraser University, Burnaby, Canada [email protected], [email protected], [email protected], [email protected] 6 1 0 2 t c O 5 2 ] I S . s c [ 1 v 4 5 7 7 0 . 0 1 6 1 : v i X r a ABSTRACT In a social network, even about the same information the excitements between different pairs of users are different. If you want to spread a piece of new information and maximize the expected total amount of excitements, which seed users should you choose? This problem indeed is substantially different from the renowned influence maximization prob- lem and cannot be tackled using the existing approaches. In this paper, motivated by the demand in a few interest- ing applications, we model the novel problem of activity maximization. We tackle the problem systematically. We first analyze the complexity and the approximability of the problem. We develop an upper bound and a lower bound that are submodular so that the Sandwich framework can be applied. We then devise a polling-based randomized al- gorithm that guarantees a data dependent approximation factor. Our experiments on three real data sets clearly ver- ify the effectiveness and scalability of our method, as well as the advantage of our method against the other heuristic methods. 1. INTRODUCTION Based on messages between users in an instant messaging network, such as Whatsapp and WeChat, you can model topics and strengths/frequencies of interaction activities be- tween users. Now you want to raise the awareness of a con- troversial social issue. Within a budget, you want to spread the information in the network so that people in the network discuss the issue as much as possible. Which users should you choose to start spreading the words? Isn't this an instance of the well known and well studied influence maximization problem [17]? The answer is "no" indeed. Influence maximization selects a seed set of nodes within a given budget constraint such that the expected number of nodes influenced by information diffusion is max- imized. However, to satisfy the requirement that "people in the network discuss the (target) issue as much as possi- ble", we not only want to influence many users, but most importantly also want to maximize the expectation of the sum of strength of the interaction activities about the target issue. This variation of the information diffusion problem, called activity maximization, is very different from influence maximization. Can we adapt some existing influence maximization meth- ods to solve the activity maximization problem? Unfortu- nately, the answer is no due to the following major reasons. First, the activity maximization problem focuses on the in- teraction activities between the active users (i.e., the users influenced) while the influence maximization problem aims to simply maximize the expected number of the active users. Since activity strength is different from edge to edge, more active users do not necessarily lead to more interaction ac- tivities. Second, at the technical level, the objective func- tions in the influence maximization problem and the activity maximization problem proposed here have different proper- ties, as to be shown in Section 3. Many existing methods for the influence maximization problem rely on some special properties, such as submodurarity and supermodurarity, of the objective function in influence maximization, which un- fortunately do not hold for activity maximization. Third, interaction activities happen between user pairs. The ex- isting methods for influence maximization, however, do not consider activity strengths on edges in their objective func- tions. Motivated by the interesting application scenarios and the technical challenges associated, in this paper, we propose a novel problem, activity maximization, which aims to maxi- mize the expectation of the total activity among all active users. A unique novel feature of our problem is that the optimization objective captures interactions among active users. We make several contributions. First, we identify a novel research problem with interest- ing applications. We propose the novel activity maximiza- tion problem that aims to maximize the expectation of the overall activities in a social network. To the best of our knowledge, we are the first to explore the interactions among active nodes in information propagation. Second, we assess the challenges of the proposed activity maximization problem. We show that the activity maxi- mization problem is NP-hard under the two most popularly used information diffusion models, namely the independent cascade (IC) model and the linear threshold (LT) model. We also prove that computing the activities with respect to a given set of nodes is #P-hard under both the IC model and the LT model. Moreover, we show that the objective func- tion of the problem is neither submodular nor supermodular. The theoretical results clearly show that the proposed ac- tivity maximization problem cannot be easily solved using 1 Notation G = (V, E, B) Description A social network, where each edge (u, v) ∈ E is associated with a diffusion model- dependent parameter Bu,v δL(·), δU (·) n = V Au,v δA(S) GS = (VS , ES ) The propagation subgraph induced by seed set S, where VS is the set of all active nodes and ES = {(u, v) u ∈ VS ∧ v ∈ VS} The number of nodes in G The interaction strength of edge (u, v) The activity of a given seed set S The lower bound and the upper bound re- spectively A "live-edge" graph instance of G g is sampled from all possible instances of G The set of nodes reachable from node set S in g (u, v) ∈ The transpose graph of g: g iff (v, u) ∈ gT The reverse reachable (RR) set for node v The hypergraph consist of hyperedges The number of the hyperedges in H The degree of the node set S in H H mH D(S) RgT (v) gT g g ∼ G Rg(S) Table 1: Frequently used notations. the existing methods for influence maximization. To under- stand the feasibility of approximate solutions, We appraise the approximability of the problem by constructing a reduc- tion from the densest k-subgraph problem. Third, to develop practical approximate solutions, we de- velop a lower bound and an upper bound of activities. We prove that maximizing the lower bound or upper bound is still NP-hard under the IC model and the LT model. More- over, computing the lower bound or upper bound is still #P-hard under the IC model and the LT model. However, we show the submodularity of the lower bound and the up- per bound, which facilitates approximation. Fourth, we develop a polling based randomized algorithm. We design a sampling method to obtain an unbiased estima- tion of activities. We also show how to efficiently implement the greedy strategy on the estimate of activities. We extend the sandwich approximation scheme to prove that the pro- posed algorithm has a data dependent approximation factor. Last, we verify our algorithm on three real world data sets. The experimental results confirm the effectiveness and the efficiency of the proposed algorithm. The rest of the pager is organized as follows. We formu- late the activity maximization problem in Section 2. In Sec- tion 3, we observe several interesting and useful properties of the proposed problem. We develop a lower bound and an upper bound in Section 4. In Section 5, we devise the polling based algorithm. We review the related work in Section 6. We report the empirical evaluation results in Section 7, and conclude the paper in Section 8. Table 1 summarizes the frequently used symbols and their meanings. 2. PROBLEM FORMULATION In this section, we first review two widely used information diffusion models, and then give the formal statement of the activity maximization problem. 2.1 Diffusion Models The independent cascade (IC) model and the linear threshold (LT) model [17] are the two most widely used information diffusion models. Our discussion in this paper is based on these two models. We briefly review them here. Consider a social network G = (V, E, B), where V is a set of vertices, E ⊆ V × V is a set of edges, and B is a diffusion model-dependent parameter. Specifically, in the IC model, Bu,v is the propagation probability of edge (u, v), which is the probability that v is activated by u after u is activated. In the LT model, Bu,v is the influence weight of edge (u, v), which indicates the importance of u influencing v. Both models assume a seed set S ⊆ V . Let St be the nodes that are activated in step t (t = 0, 1, . . .) and S0 = S. In the IC model, the information diffusion process unfolds as follows. At step t + 1, each node v in St has only one chance to activate each inactive neighbor u with the prob- ability Bv,u. The process terminates when no more nodes can be activated. In the LT model, the information diffusion process un- folds as follows. Initially, each node v selects a threshold θv in range [0, 1] uniformly at random. At step t > 0, an inactive node v is activated if (cid:80) w∈N (v)∩( ∪ The process stops at a step t when St = ∅. Si) Bw,v ≥ θv. i<t Kempe et al. [17] also provided an alternative perspec- tive of the information diffusion based on "live-edge" graphs. Given a graph G, each edge is marked as "live" on certain randomized rules, and the random subgraph obtained from all live edges and all nodes in V is called the "live-edge" graph [5]. Kempe et al. [17] proved that we can construct equivalent "live-edge" graph models for both IC model and LT model. For the IC model, a "live-edge" graph instance can be obtained by marking each edge (u, v) as "live" with probability Bu,v independently. For the LT model, the cor- responding rule is: each node v marks at most one incoming edge (u, v) as "live" with probability 1 −(cid:80) u∈N (v) Bu,v. 2.2 Activity Maximization The activity maximization problem also considers infor- mation diffusion in a social network with an extra parame- ter A. Each edge (u, v) ∈ E is associated with an activity strength Au,v, which captures the interaction strength be- tween u and v when they are both active. Given a social network G, an information diffusion model M, and a seed set S, the diffusion process forms a propa- gation induced subgraph GS = (VS, ES), where VS is the set of all active nodes and ES = {(u, v) u ∈ VS ∧ v ∈ VS} is the set of all edges whose two endpoints are both in VS. Then, we can define the activity of a given seed set S as δA(S) = E Au,v (1) (cid:35) (cid:34) (cid:88) (u,v)∈ES where E[·] is the expectation operator. Since information diffusion is a stochastic process, we take the expectation with respect to all possible diffusion instances. The activity measures the overall interaction strength among the active nodes and thus can reflect the overall strength of the activity caused by the information propagated in the social network. Now, we can formally define the activity maximization problem as follows. Given a social network G, an informa- tion diffusion model M, and a budget k, find a seed set S∗ such that ∗ S = arg max S ⊆ V S = k δA(S) (2) 2 From the definition, we can see the difference between the proposed activity maximization problem and the tra- ditional influence maximization problem. The traditional influence maximization problem aims to maximize the ex- pected number of the active nodes but does not maximize the interactions among them. In contrast, the proposed ac- tivity maximization problem focuses on the activity caused by the information diffused and tries to maximize the inter- action strength among the active nodes. 3. PROPERTIES OF ACTIVITY MAXI- MIZATION In this section, we first prove the hardness of the activity maximization problem. Then we discuss the properties of the objective function δA(·). Last, we show the approxima- bility of the problem. 3.1 Hardness Results We first assess the hardness of the activity maximization problem. Theorem 1. Activity maximization is NP-hard under the IC model and the LT model. Proof. We prove by reducing from the set cover prob- lem [16], which is well known in NP-complete. Given a ground set U = {u1, u2, . . . , un} and a collection of sets {S1, S2, . . . , Sm} whose union equals the ground set, the set cover problem is to decide if there exist k sets in S so that the union equals U. Given an instance of the set cover problem, we construct a corresponding graph with 2n + m nodes as follows. We create a node xi for each set Si, two nodes yj and y(cid:48) j for each element uj, and two edges (xi, yj) and (xi, y(cid:48) j) with propagation probability 1 for the IC model and with influ- ence weight 1 for the LT model and activity 0 if uj ∈ Si. We also create an edge between yj and y(cid:48) j with propagation probability 0 and activity 1 for each element uj. The in- formation diffusion will be a deterministic process, since all propagation probabilities are either 1 or 0. Therefore, the set cover problem is equivalent to deciding if there is a set S of k nodes such that δA(S) = n. The theorem follows immediately. Activity maximization is NP-hard. Then, what is the hardness of computing the activity with respect to a given seed set S? Theorem 2. Given a seed set S, computing δA(S) is #P- hard under the IC model and the LT model. Proof. We prove by reducing from the influence spread computation problem, which was proved #P-hard under the IC model and the LT model [7, 8]. Given an instance of the influence spread computation problem, we keep the same graph G and influence diffusion parameters B. We set Au,v = 1 for any u, v ∈ V and com- pute x1 = δA(S) in the graph G. Next, we add a new node v(cid:48) for each node v in the graph G and an edge between v and v(cid:48) with propagation probability 1 for the IC model and with influence weight 1 for the LT model and activity 1. Now, we obtain a new graph G(cid:48) and can compute x2 = δA(S) in the graph G(cid:48). For any newly added node v(cid:48), the only way to be activated is through its only neighbor v. Moreover, a newly added node v(cid:48) will be activated if its neighbor v is active, (a) Counter example 1 (b) Counter example 2 Figure 1: Counter examples since the propagation probability of the newly added edges is 1. Thus, x2 − x1 is exactly the influence spread in the graph G. The theorem follows immediately. In [17], Kempe et al. introduced the triggering model that generalizes the IC model and the LT model. In the trigger- ing model, each node v independently chooses a subset of its neighbors as its "triggering set" according to some dis- tribution. A node will be activated if at least one node of its triggering set is active. We can see that the reduction we construct in the proof of Theorem 2 still holds for the triggering model. Thus, we have the following result. Corollary 2.1. Given a seed set S, computing δA(S) is #P-hard in any triggering model M if computing influence spread is #P-hard in M. 3.2 Modularity of Objective Functions The objective function of influence maximization is sub- modular under the IC model and the LT model. Unfor- tunately, the objective function in activity maximization is no submodular. Moreover, we can show that δA(·) is not supermodular as well. Theorem 3. δA(·) is not submodular under the IC model and the LT model. Proof. We prove by a counter example. Consider Fig. 1(a). The first number in the tuple on each edge repre- sents the propagation probability for the IC model and the influence weight for the LT model. The second number is the activity of the edge. For example, in the counter example 1, (1, 1) on edge (v1, v2) means Bv1,v2 = 1 and Av1,v2 = 1. In this example, we have δA({v1}) = 1, δA({v1, v5}) = 5 and δA({v5}) = 2. That is, δA({v1}) − δA(∅) < δA({v1, v5}) − δA({v5}) Therefore, δA(·) is not submodular. From counter example 1, we can see that the reason why δA(·) is not submodular is the "combination effect" between the newly added node and the existing seed nodes. For example, If we add v1 into S when S = ∅, then there is only one endpoint is active for edge (v2, v4) and (v2, v3), that is v2. But if we add v1 to S when S = {v5}, then both the two endpoints of edge (v2, v4) and (v2, v3) are active, since v3 and v4 are activated by v5. Theorem 4. δA(·) is not supermodular under the IC model and the LT model. 3 v1v2v3v4v5(1,1)(0,1)(0,1)(1,1)(1,1)v1v2v3v4(1,1)(1,1)(1,1)(1,1) Proof. Again, we prove by a counter example. Consider the counter example 2 in Fig 1(b), we have δA({v2}) = 3, δA({v1, v2}) = 4 and δA({v1}) = 4. Thus, δA({v2}) − δA(∅) > δA({v2, v1}) − δA({v1}) That is, δA(·) is not supermodular. 3.3 Approximability Since δA(·) is neither submodular nor supermodular, we cannot adopt the standard procedure for optimizing sub- modular function or supermodular function to get an ap- proximation solution. To explore the approximability of the activity maximization problem, we explore the connection between the activity maximization problem and the densest k-subgraph extraction problem. Theorem 5. If there exists a polynomial time algorithm approximating the activity maximization problem within a ratio of α, then there exists a polynomial time algorithm that can approximate the densest k-subgraph problem within a ratio of α. Proof. We prove by constructing a reduction from the densest k-subgraph problem to the activity maximization problem. Given a graph and an integer k, the densest k-subgraph problem is to find a subgraph of exactly k vertices that has the maximum density. For a subgraph GS = (VS, ES), the density is define as ES VS . Given an instance of the densest k-subgraph problem, we construct a corresponding instance of the activity maximiza- tion problem. We keep the same graph and set Bu,v = 0 and Au,v = 1 for u, v ∈ V . Then, the activity maximiza- tion problem is to find a set of k vertices and maximize the number of edges whose both endpoints are in this set. It is equivalent to maximizing the density since the number of vertices is constant. Khot [18] showed that the densest k-subgraph problem does not admit PTAS1 (Polynomial Time Approximation ), we im- BP T IM E(2n Scheme [31]) assuming N P (cid:42) (cid:84) imization problem assuming N P (cid:42) (cid:84) >0 mediately have the following result. Corollary 5.1. There is no PTAS for the activity max- BP T IM E(2n ). >0 In fact, finding a good approximation to the densest k- subgraph problem is challenging. The current best approxi- mation ratio of n1/4+ for  > 0 was achieved by Bhaskara et al. [2]. It is still unknown if there exists a polynomial algo- rithm that can approximate the densest k-subgraph problem with a constant factor. 4. LOWER BOUND AND UPPER BOUND In this section, we first give a lower bound and an upper bound on activities. Then we discuss the properties of the lower bound and the upper bound. 1A PTAS is an algorithm that returns a solution within a factor 1 +  of being optimal (or 1 -  for maximization problems) in polynomial time for any  > 0. 4 4.1 The Bounds Since the "combination effect" among seed nodes com- prises the submodularity of the objective function δA(·), we try to develop a lower bound of δA(·) that is submodular by ignoring the "combination effect". The major idea is that we only consider the edges whose two endpoints are acti- vated by the same seed node. Accordingly, the lower bound can be defined as Au,v] (3) E{x} δL(S) = E[ (cid:88) (u,v)∈ (cid:83) x∈S where E{x} is the set of edges of the propagation subgraph induced by seed set {x}. Recall that the propagation sub- graph induced by a seed set consists of the nodes that can be activated by the seed set. Here, the seed set consists of only one node x. It is easy to see that δL(S) ≤ δA(S) for any S ⊆ V , since we ignore the edges whose endpoints are activated by different seed nodes. A straightforward way to get an upper bound is to con- sider all the edges that have at least one active endpoint. In this way, the upper bound equals to the activity of edges that have one active endpoint plus the activity of edges whose two endpoints are both active. The latter is exactly the activ- ity we want to compute. Here, we present a tighter upper bound from the perspective of active nodes, which can be defined as δU (S) = E[ w(v)] (4) (cid:88) (cid:88) v∈VS where w(v) = 1 2 Au,v. u∈N (v) Given a seed set S, δU (S) equals to the half of the activity of edges that have one active endpoint plus the activity of edges whose two endpoints are both active. Thus, δU (S) is better than the straightforward one. Also, we can see that the upper bound is essentially a weighted version of the influence spread, where the weight of node v is 1 u∈N (v) Au,v. For 2 the influence spread, w(v) = 1 for each node v. 4.2 Properties of the Bounds (cid:80) Using the lower bound and the upper bound, we can ap- proximate the information activity problem by maximizing the lower bound and the upper bound [21]. However, max- imizing the lower bound and the upper bound is still NP- hard. Theorem 6. Maximizing the lower bound is NP-hard un- der the IC model and the LT model. Proof. We prove by reducing from the NP-complete set cover problem [16]. We show the reduction constructed in the proof of Theorem 1 still holds for the lower bound. The lower bound only considers the edges whose two endpoints can be activated by the same seed node. In the previous reduction, for all the edges whose activity is not equal to 0 (the edges between yj and y(cid:48) j), their two endpoints can be activated by the same node. Thus, the set cover problem can be solved by deciding if there is a set S of k nodes such that δL(S) = n. Theorem 7. Maximizing the upper bound is NP-hard un- der the IC model and the LT model. Proof. We prove by reducing from the NP-hard influ- ence maximization problem [17]. 2 dmax 1, v(cid:48) 1), (v, v(cid:48) 2, . . . , v(cid:48) 2), . . . , (v, v(cid:48) Given an instance of the influence maximization prob- lem, let dmax be the highest degree of the nodes in the graph G. Then, for each node v in G, we add Nd = dmax − dv new nodes, v(cid:48) Nd , and Nd new edges, (v, v(cid:48) Nd ). Now we obtain a new graph G(cid:48). We set the propagation probability of the newly added edges to 0 for the IC model, and set the influence weight of the newly added edges to 0 for the LT model, and set the infor- mation activity of all the edges in G(cid:48) to Then, we have ∀v ∈ V , w(v) = 1, and ∀v(cid:48) ∈ V (cid:48) \ V , w(v(cid:48)) = 2 . Since the propagation probability of all newly added edges is 0, the newly added nodes can never be activated. Therefore, we have I G(S) = δG(cid:48) U (S),∀S ⊆ V , where I(S) is the influence spread of a give seed set S in G and δG(cid:48) U (S) is the upper bound in G(cid:48). U = arg max δG(cid:48) Next, we prove that S∗ U , we can always replace it with a node in V \ S∗ U (S) does not contain any newly added nodes. If there is any newly added node in S∗ U and increase the value of the objective function. Thus, if S∗ U is the optimal solution of maximizing the upper bound in G(cid:48), it must be the optimal solution of the influence maximization in G. dmax . Although maximizing the lower bound and the upper bound is NP-hard, the objective functions of the lower bound and the upper bound are submodular. Theorem 8. δL(·) is submodular under the IC model and the LT model. Proof. Given a graph G and an influence diffusion model, either the IC model or the LT model, we can con- struct "live-edge" graphs for G using the methods proposed in [17]. Let g be a "live-edge" graph instance. Denote by P r(g) the probability that g is selected from all possible in- stances. Let Eg(S) be the set of edges whose two endpoints can be reachable from the same node in the seed set S. Then we can rewrite δL(S) to (cid:88) (cid:88) We only need to prove Q(S) = (cid:80) δL(S) = P r(g) g∼G (u,v)∈Eg (S) Au,v (u,v)∈Eg (S) Au,v is submod- ular for any "live-edge" graph instance g, since an non- negative linear combination of submodular functions is also submodular. To prove, let M and N be two sets such that M ⊆ N ⊆ V . For any v ∈ V \ N , consider the difference between Q(M ∪ {v}) and Q(M ). It must be contributed from the edges whose two endpoints can be reachable from v but cannot be reachable from the nodes in M . These edges must be a super set of the edges whose two endpoints can be reachable from v but cannot be reachable from the nodes in N , since M ⊆ N . It follows that Q(M ∪ {v}) − Q(M ) ≥ Q(N ∪ {v}) − Q(N ). Therefore, Q(S) is submodular and the theorem follows. Theorem 9. δU (·) is submodular under the IC model and the LT model. Proof. We can prove the theorem by the same "live- edge" technique used in the proof of Theorem 8. Let Rg(S) 5 be the set of nodes reachable from S in g. Then, δU (S) can be rewritten to (cid:88) (cid:88) The way to prove that Q(cid:48)(S) = (cid:80) δU (S) = v∈Rg (S) P r(g) g∼G w(v) w(v) is submod- v∈Rg (S) ular is similar to the proof of Q(S) in Theorem 8. The nodes that can be reachable from v but cannot be reach- able from the nodes in M must be a super set of the nodes that can be reachable from v but cannot be reachable from It follows that Q(cid:48)(M ∪ {v}) − Q(cid:48)(M ) ≥ the nodes in N . Q(cid:48)(N ∪ {v}) − Q(cid:48)(N ). Therefore, Q(cid:48)(S) is submodular and the theorem follows. Theorems 8 and 9 are good news. With the submodular- ity we can adopt the standard procedure for optimizing sub- modular functions to obtain an approximation solution [24]. One challenge remains. Applying the algorithm proposed in [24] requires evaluating the lower bound and the upper bound. However, computing the lower bound and the up- per bound with respect to a given seed set is unfortunately #P-hard. Theorem 10. Given a seed set S, computing δL(S) is #P-hard under the IC and the LT model. Proof. We prove by reducing from the influence spread computation problem. We show that the reduction we con- struct in the proof of Theorem 2 still holds for the lower bound case. Let y1 = δL(S) in the graph G and y2 = δL(S) in the graph G(cid:48). Since the propagation probability of the edge (v, v(cid:48)) is 1 for the IC model and the influence weight of the edge (v, v(cid:48)) is 1 for the LT model, v and v(cid:48) can be activated by the same seed node. It follows that y2 − y1 is also the influence spread in the graph G. Theorem 11. Given a seed set S, computing δU (S) is #P-hard under the IC and the LT model. Proof. We prove by reducing from the influence spread computation problem. The reduction is the same as the one in the proof of Theorem 7. We already showed I G(S) = δG(cid:48) U (S) for any seed set S ⊆ V . Therefore, the theorem follows immediately. Since computing the activity, the lower bound and the upper bound is #P-hard, we will discuss how to estimate them in the next section. 5. A POLLING BASED METHOD Recently, a polling based algorithmic framework [3, 29] was proposed for the influence maximization problem. The framework includes two steps. In the first step, it estimates the influence spread through sampling. In the second step, it finds an approximation solution for maximizing the esti- mate. If we can bound the estimation error, then the solu- tion also enjoys an approximation guarantee for the influence maximization problem. To solve the activity maximization problem, we also design a polling based method. 5.1 Estimation In a social network G, given an information diffusion model, either the IC model or the LT model, and a seed set S, let g be a "live-edge" graph instance of G and Rg(S) be the set of nodes reachable from S in g. Denote by RgT (v) the reverse reachable (RR) set [30] for node v in g, where gT is the transpose graph [3] of g: (u, v) ∈ g iff (v, u) ∈ gT . We write (u, v) ∼ E to indicate that we randomly pick (u, v) from E as a sample according to a certain distribution. The meaning of v ∼ V is similar. To estimate the activity, we first have the following result. Theorem 12. For any seed set S ⊆ V , P r g∼G,(u,v)∼E (u,v)∈E Au,v. (cid:34) (cid:35) S ∩ RgT (u) (cid:54)= ∅ ∧ S ∩ RgT (v) (cid:54)= ∅ (cid:35) Proof. δA(S) = T · δA(S) = E where T =(cid:80) (cid:34) (cid:88) (cid:88) (cid:88) (cid:88) (u,v)∈E (u,v)∈E = = = P r (u,v)∈E P r g∼G P r g∼G (u,v)∈ES Au,v (cid:34) (cid:35) Au,v (cid:35) (u, v) ∈ ES u ∈ Rg(S) ∧ v ∈ Rg(S) (cid:34) (cid:34) ∃w1, w2 ∈ S, w1 ∈ RgT (u)∧ (cid:35) Au,v w2 ∈ RgT (v) (cid:34) = T · (cid:88) Au,v Au,v P r g∼G ∃w1, w2 ∈ S, w1 ∈ RgT (u)∧ (cid:35) (u,v)∈E w2 ∈ RgT (v) (cid:104)∃w1, w2 ∈ S, w1 ∈ RgT (u)∧ (cid:105) g∼G,(u,v)∼E S ∩ RgT (u) (cid:54)= ∅ ∧ S ∩ RgT (v) (cid:54)= ∅(cid:105) (cid:104) w2 ∈ RgT (v) P r P r T (5) g∼G,(u,v)∼E = T · = T · Eq. 5 is the expected probability with respect to the ac- tivity distribution of edges, where the probability for edge (u, v) is Au,v T . Theorem 12 implies that we can estimate δA(S) by esti- mating the probability of the event S ∩ RgT (u) (cid:54)= ∅ ∧ S ∩ RgT (v) (cid:54)= ∅. To achieve the estimation, we conduct a poll as follows. We select an edge (u, v) with probability Au,v T , and run Monte Carlo simulation of the "live-edge" process. During the process, we record all the nodes that can reach u and v through "live" edges. Algorithm 1 summarizes the process. One critical observation is that we do not need to conduct the "live-edge" process on the entire graph. Instead, we can simulate the process starting from u and v, respectively. We only need to make sure that each edge is marked consistently as the same status ("live" or "blocked") in these two sim- ulations. We call the pair of two RR sets obtained from a poll a hyperedge. All the generated hyperedges constitute a hypergraph H. , Figure 2: Hyperedge for activities model M Input: Social network G = (V, E, B), A and diffusion Output: A hyperedge E 1: Initialize E = (∅,∅) 2: Pick an edge (u, v) with probability Au,v T . 3: Generate a "live-edge" graph instance g according to the diffusion model M 4: Let N1 = RgT (u) and N2 = RgT (v) 5: Let E = (N1, N2) 6: return E Algorithm 1: Generate Hyperedges Denote by mH the number of the hyperedges in H. If a node v appears in both RR sets of a hyperedge E, E said is to be fully covered by v. If a node v only appears in one of the two RR sets of a hyperedge E, E is said to be partially covered by v. Denote by D(S) the degree of the set of nodes S, which is the number of hyperedges in H that can be fully covered by S. According to Theorem 12, T · D(S) is an unbiased estimator of δA(S) for any fixed mH . Please note that there also exists "combination effect" between nodes in this case. For example, in the left part of Figure 2, v1 only appears in the first RR set of hyperedge E and v4 only appears in the second RR set. v1 and v4, respectively, partially covers E. But E is fully covered by the combination of v1 and v4. Thus, similar to δA(·), D(·) is not submodular neither. mH Similarly, for the lower bound and the upper bound, we have the following two results. Theorem 13. For any seed set S ⊆ V , δL(S) = T · S ∩ (RgT (u) ∩ RgT (v)) (cid:54)= ∅(cid:105) (cid:104) P r , g∼G,(u,v)∼E where T =(cid:80) (u,v)∈E Au,v. Proof. The lower bound only considers the edges whose two endpoints can be activated by the same seed node. Thus, to prove the theorem, we only need to let w1 = w2 in the proof of Theorem 12, that is δL(S) =T · =T · (cid:104)∃w ∈ S, w ∈ RgT (u) ∧ w ∈ RgT (v) S ∩ (RgT (u) ∩ RgT (v)) (cid:54)= ∅(cid:105) (cid:104) g∼G,(u,v)∼E (cid:105) P r P r g∼G,(u,v)∼E Using Theorem 13, we can estimate the lower bound using essentially the same sampling process as the activity. The only difference is that there is only one node set in the hy- peredge for the lower bound, that is N1 ∩ N2. In this case, a 6 . . .. . .RR Set 1RR Set 2v1v2v3v4v5. . .Hyperedgeℰ. . .v1v2v3v4v5. . .Hyperedgeℰ. . .. . .Node Set 1(n1)Node Set 2(n2)Node Set 3(n3) Input: Social network G, Hypergraph H and budget k Output: Seed set S 1: Initialize S = E1 = E2 = E3 = ∅ 2: for v ∈ V do 3: M G(v) = v.e 4: end for 5: while S < k do 6: 7: 8: 9: 10: 11: end for 12: end while 13: return S Algorithm 2: Maximum Coverage on Hypergraph v = arg maxu∈V \S M G(u) S = S ∪ {v} update E1, E2, and E3 for u ∈ V \ S do update M G(u) according to Eq. 6 E2 and E3, in this data structure, where E1 and E2 are the sets of hyperedges whose first and second RR sets have been covered, respectively, and E3 is the set of hyperedges that have been fully covered. Fig. 3 shows these two data struc- tures. With these data structures, we have the following fact. Fact 1. Given a seed set S, for each vertex v ∈ V \ S, the marginal gain D(S ∪ {v}) − D(S) is M G(v) = v.e3 \ E3 + v.e1 ∩ E2 + v.e2 ∩ E1 (6) Rationale. If we add a node v to the current seed set S, the newly covered hyperedges can be divided into two groups. The first group is the hyperedges that can be covered by v alone but not covered by S, that is v.e3 \ E3. The second group is the hyperedges that are partially covered by S and are fully covered if v is added to S, that is v.e1 ∩ E2 and v.e2 ∩ E1. Fact 1 implies that we can pick the node with the largest marginal gain in each iteration and then incrementally up- date the marginal gains of the rest nodes. Algorithm 2 de- scribes the details. 2, and E(cid:48) Here, we briefly explain how to incrementally update the marginal gain. Assuming E1, E2 and E3 are updated to E(cid:48) 1, E(cid:48) 3, respectively, we update the marginal gains as follows. For each hyperedge E ∈ E(cid:48) 1 \ E1, we increase the marginal gains of the nodes in E.n2 by 1. For each hyperedge E ∈ E(cid:48) 2 \ E2, we increase the marginal gains of the nodes in E.n1 by 1. For each hyperedge E ∈ E(cid:48) 3 \ E3, we first decrease the marginal gains of the nodes in E.n3 by 1. Then, we decrease the marginal gains of the nodes in E.n2 by 1 if E ∈ E1, and decrease the marginal gains of the nodes in E.n1 by 1 if E ∈ E2. Now, the only remaining question is to decide how many hyperedges we need to sample, which will be addressed next. 5.3 Sample Complexity In this subsection, we discuss how to use a sample of proper size to restrict the estimate error of the activity, the lower bound and the upper bound. With the technique, we show that the polling algorithm can provide an approxi- mate solution to maximizing the lower bound and the upper bound. To bound the estimate error of the polling method, we have the following lemma from [11]. Figure 3: Data Structures hyperedge E is covered by node v if and only if v ∈ N1 ∩ N2. Theorem 14. For any seed set S ⊆ V , (cid:104) S ∩ RgT (v) (cid:54)= ∅(cid:105) , δU (S) = W · where W =(cid:80) v∈V w(v). P r g∼G,v∼V Proof. The upper bound is essentially a weighted vari- ation of the influence spread. Thus, we can apply the proof proposed in [25]. There is also only one node set in the hyperedge for the upper bound. We can generate the hyperedge using the sampling method proposed in [25]. Since we can estimate the objective function (δA(·), δL(·) or δU (·)) by the degrees of the set of nodes, we can regard H as encoding an approximation to the objective function. With the estimate of the objective function, we go to the second step of the polling based framework, that is, max- imizing the estimate. To achieve this goal, we adopt the simple but powerful greedy strategy, which picks the node with the largest marginal gain (the increase of degree in H for our case) iteratively. Next, we show how to efficiently implement a greedy strategy on the hypergraph. 5.2 Efficient Implementation of the Greedy Strategy For the lower bound and the upper bound, there is only one node set in each hyperedge. Thus, we can use the stan- dard greedy algorithm for maximum coverage problem to obtain an approximate solution [30]. However, there are two node sets in the hyperedge for the activity maximiza- tion problem. A hyperedge can be fully or partially covered by a node or a node set. Thus, we cannot directly apply the greedy strategy. To tackle this issue, here we discuss how to efficiently implement the greedy strategy on the hypergraph. First, we store the original hyperedges of two RR sets in a more efficient manner. There are three sets, n1, n2 and n3 for each hyperedge E, where n1 and n2 are the sets of nodes that can only cover the first and second RR set of E, respectively, and n3 is the set of nodes that can cover both two RR sets of E. Fig. 2 illustrates the idea. Then, we build an inverted index for each node. There are three sets, e1, e2 and e3 for each node v, where e1 and e2 are the sets of hyperedges whose first and second RR set can be covered by v, respectively, and e3 is the set of hyperedges that can be fully covered by v. Third, we maintain a global data structure to record the current covered hyperedges. There are also three sets, E1, 7 . . .. . .. . .ℰ1ℰ2ℰ3ℰ4. . .Node vEdge Set 1(e1)Edge Set 2(e2)Edge Set 3(e3). . .. . .. . .Covered HyperedgesEdge Set 1(E1)Edge Set 2(E2)Edge Set 3(E3) 1: Compute Υ1 according to 1, 2, δ1, δ2 2: mH = Υ1 3: Generate mH hyperedges and add to H 4: S =maximum coverage on H 5: while D( S) < Υ1 do 6: Generate mH hyperedges and add to H 7: mH = 2mH 8: 9: end while 10: return S S =maximum coverage on H Algorithm 3: SSA Algorithm i=0 ZN and µZ = S Let S = (cid:80)N Lemma 1. Let Z1, Z2, . . . be independently and identically distributed according to Z in the interval [0, 1] with mean µZ . N . Let Υ = 4(e − 2) ln(2/δ) and Υ1 = 1 + (1 + )Υ. If N is the number of samples when S >= Υ1, then P r[µZ − µZ ≤ µZ ] > 1 − δ and E[N ] ≤ Υ1/µZ . Lemma 1 provides a stopping condition for the sampling pro- cess. Given a seed set S, we can keep sampling hyperedges until D(S) ≥ Υ1. Then, T · D(S) is an (, δ) estimation [23] of δA(S). The analysis is similar in the cases of the lower bound and the upper bound. mH 2 Nguyen et al. [26] analyzed the conditions that the polling algorithmic framework must meet to obtain an approxima- tion solution. Let S∗ be the optimal seed set and S be the seed set returned by the greedy strategy on the estimate of the objective function f (·) (δL(·) or δU (·)). Denote by f (·) the estimate of the objective function f (·). The conditions are P r[ f ( S) ≤ (1 + 1)f ( S)] ≥ 1 − δ1 )] ≥ 1 − δ2 P r[ f (S ) ≥ (1 − 2)f (S ∗ ∗ (8) where δ1 + δ2 ≤ δ and 1 + (1 − 1/e)2 ≤ . Let N be the number of samples such that both Eq. 7 and Eq. 8 are guaranteed. Then we have the following lemma from [26]. Lemma 2. Given a social network G, if the number of hyperedges mH ≥ N , then the polling algorithm returns S satisfying P r[f ( S) ≥ (1 − 1/e − )f (S∗)] ≥ 1 − δ and S is an (1 − 1/e − ) approximate solution. Using Lemmas 1 and 2, to obtain an approximation solu- tion to maximizing the lower bound or upper bound, we can keep sampling hyperedges and checking if the conditions are met. Algorithm 3 from [26] describes the process. Please note that, in Lines 4 and 8 of Algorithm 3, we adopt the standard greedy algorithm for the maximum coverage prob- lem to get S. Using Algorithm 3, we can provide a (1 − 1/e − ) ap- proximation solution to maximizing the lower bound and the upper bound with probability of at least 1 − δ. But we must point out that the analysis does not hold for the activity maximization problem. This is because a neces- sary condition of the polling algorithmic framework is that we can approximate the estimate using the greedy strategy. The condition is not met in the case of the activity maxi- mization problem, since the estimate of the activity is not submodular. Thus, the polling algorithm cannot provide an approximation solution to the activity maximization prob- lem. But it is still a good heuristic for the activity maxi- mization problem. Furthermore, by combining the approxi- mation algorithm for the lower bound and the upper bound, (7) 1: Let SU be a α approximation to the upper bound 2: Let SL be a β approximation to the lower bound 3: Let SA be a solution to the original problem 4: δA(·) is a multiplicative γ-error estimate of δA(·) 5: S = arg maxS0∈{SU ,SL,SA} δA(S0) 6: return S Algorithm 4: Sandwich Approximation Framework we can derive a data dependent approximation scheme for the activity maximization problem. 5.4 Data Dependent Approximation There is no general way to optimize or approximate a non-submodular function. Lu et al. [21] proposed a sand- wich approximation strategy, which approximates the objec- tive function by approximating its lower bound and upper bound. The sandwich approximation strategy works as fol- lows. First, we find a solution to the original problem with any strategy. Second, we find an approximate solution to the lower bound and the upper bound, respectively. Last, we return the solution that has the best result for the orig- inal problem. Here, we extend the strategy to the case in which the ob- jective function is intractable and have the following result. (cid:110) δA(SU ) (cid:111) 1 − γ Theorem 15. Let S be the seed set returned by Algo- rithm 4, then we have δA(S) ≥ max Proof. Let S∗ δL(S∗ L) δA(S∗ A) A be the optimal solutions to maximizing the lower bound, the upper bound and the ac- tivity, respectively. Then, we have α, U and S∗ L, S∗ δU (SU ) 1 + γ δA(S ∗ A) (9) β δU (SU ) ≥ δA(SU ) δU (SU ) ∗ A) · α · δU (S · α · δU (S ∗ U ) δA(SU ) = δA(SU ) δU (SU ) ≥ δA(SU ) δU (SU ) ≥ δA(SU ) δU (SU ) · α · δA(S ∗ A) δA(SL) ≥ δL(SL) ≥ β · δL(S ∗ L) · β · δA(S ∗ A) ≥ δL(S∗ L) δA(S∗ A) Let Smax = arg maxS0∈{SU ,SL,SA} δA(S0), then δA(Smax) ≥ max (cid:110) δA(SU ) δU (SU ) (cid:111) α, δL(S∗ L) δA(S∗ A) β δA(S ∗ A) Since ∀S0 ∈ {SU , SL, SA},δA(S0) − δA(S0) ≤ γδA(S0), we have (1 + γ)δA(S) ≥ (1 − γ)δA(Smax). It follows that δA(S) ≥ (1 − γ) (1 + γ) δA(Smax) Theorem 15 indicates that we can approximate the activ- ity maximization problem within a factor that is dependent on the data. Since it is #P-hard to compute δA(·) and δU (·), and is NP-hard to find S∗ A, we cannot compute the exact approximation factor. But we can estimate δA(SU ) δU (SU ) by computing its lower bound (1−γ)δA(SU ) . It follows that (1+γ)δU (SU ) L and S∗ 8 (1+γ)2 · α · δA(SU ) (1−γ)2 δU (SU ) proximation factor. is a computable lower bound of the ap- Now, we put all the pieces of the puzzle together. We first adopt the polling algorithm to maximize the lower bound and the upper bound. As discussed in Section 5.3, it pro- vides (1− 1/e− ) approximate solutions to the lower bound and the upper bound, respectively. Consequently, we have α = β = (1 − 1 e − ) in Algorithm 4. Then, we also use the polling algorithm to get a heuristic solution (SA) to the activity maximization problem. Last, we get a (γ, δ) esti- mation of δA(·) based on Lemma 1 to complete Line 5 of Algorithm 4. According to Theorem 15, the sandwich algo- rithm returns a seed set S such that δA(S) ≥ max (cid:110) δA(SU ) δU (SU ) (cid:111) 1 − γ 1 + γ δL(S∗ L) δA(S∗ A) , (1 − 1 e − )δA(S ∗ A) 6. RELATED WORK Domingos and Richardson [12] first exploited the influence between users in social networks for viral marketing. Kempe et al. [17] formulated the problem as a discrete optimization problem, which is also well known as the influence maximiza- tion problem. The influence maximization problem aims to optimize the influence spread (the expected number of ac- tivated nodes) in a given information diffusion model, such as the IC model and the LT model. Due to its important applications in viral marketing and some other areas, it has drawn much attention from both academia and industry [19, 13, 10, 22, 33, 4]. Under the IC model and the LT model, Kempe et al. [17] proved that influence maximization is NP-hard. Moreover, Chen et al. [7, 8] proved that computing influence spread is #P-hard. Thus, many heuristic algorithms were proposed to solve the problem under these two models [7, 8, 15, 20, 9]. Recently, a polling based method [3] was proposed for influence maximization. Unlike the previous heuristic algo- rithms, this method can provide a solution with provable approximation guarantee. Later, Tang et al. [30, 29] re- duced the sample complexity and improved the efficiency. Nguyen et al. [26] further sped up the algorithm with a dif- ferent bounding technique [11]. In this paper, we extend this algorithmic framework to solve our activity maximiza- tion problem in a non-trivial way. A series of extensions to the influence maximization prob- lem have been studied. For example, Goyal et al. [14] proposed a data based approach to influence maximization based on a credit distribution model. Instead of maximizing the influence spread under some propagation models with respect to some learned parameters, they tried to find influ- ential nodes from the action log data directly. Chen et al. [6] considered the time-delay aspect of influence diffusion and studied the influence maximization with time-critical con- straint. Tang et al. [28] studied the problem of maximiz- ing the influence spread and the diversity of the influenced crowd simultaneously. Bhagat et al. [1] argued that prod- uct adoption should be distinguished from influence spread in viral marketing, as influence spread is essentially used as "proxy" for product adoption. Wang et al. [32] distinguished the information coverage and information propagation, and proposed a new optimization objective that includes the val- ues of the informed nodes. All these extensions were from the perspective of nodes and tried to exploit the values of nodes as separate individuals in different diffusion models 9 Network HepPh DBLP LiveJournal # Vertices 12,008 317,080 3,997,962 # Edges 118,521 1,049,866 34,681,189 Average degree 9.9 3.3 8.7 Table 2: The statistics of the data sets. and different problem settings. They did not consider activ- ity strengths on edges in their objectives. In contrast, our problem captures the interactions among nodes and enables different (often orthogonal) applications of information dif- fusion. 7. EXPERIMENTS In this section, we evaluate our algorithm via a series of experiments on three real-world data sets. 7.1 Settings 1 We ran our experiments on three real-world data sets, which are available at the SNAP website (http://snap. stanford.edu). Tab. 2 shows the statistics of the data sets. The propagation probability Bu,v for the IC model and the influence weight for the LT model of an edge (u, v) is set to degree(v) , as widely used in literatures [5]. Since activity maximization is a novel problem that has not been studied in the past, nor the activity of each edge, we do not have any real data for the purpose of experiments. Thus, we verify our algorithm with two synthetic activity settings. In the first case, we uniformly set Au,v to 1 for each edge (u, v). In the second case, we set Au,v to the value of the diffusion parameter Bu,v. The intuition is that there might be more interactions between u and v if u is more likely to activate v. For the approximation parameters, we set  = 0.1, δ = 0.001 and γ = 0.05 for all data sets. We compare the proposed algorithm, referred as Sand- wich, with three heuristic algorithms: InfMax, Degree and PageRank. InfMax returns the nodes for influence maxi- mization. We followed the implementation reported in [26]. Degree returns the nodes with high degrees. PageRank re- turns the nodes with high PageRank [27] scores. We implemented our algorithm and the baselines in Java. All experiments were conducted on a PC computer with a 3.4GHZ Intel Core i7-3770 processor and 32 GB memory, running Microsoft Windows 7. 7.2 Effectiveness Fig. 4 shows the activity computed by each algorithm on the three data sets, respectively. For better illustration, we report the comparative gain ratio instead of the absolute activity value. The comparative gain ratio of an algorithm A is defined as δA(SA)−δA(S) , where SA and S are the seed sets returned by algorithm A and the Sandwich algorithm, respectively. δA(S) Our algorithm Sandwich almost always has the best per- formance. Only in very few cases, Sandwich is outperformed marginally. In the uniform settings, algorithm Degree per- forms well under the IC model but has a relatively bad per- formance under the LT model. InfMax and PageRank often have a bad performance under both the IC model and the LT model in the uniform settings. In the diffusion settings, Inf- Max algorithm is a good heuristic under both the IC model and the LT model. Algorithm PageRank performs well on the DBLP data set but has a bad performance on the other (a) HepPh-IC-uniform (b) HepPh-IC-diffusion (c) HepPh-LT-uniform (d) HepPh-LT-diffusion (e) DBLP-IC-uniform (f) DBLP-IC-diffusion (g) DBLP-LT-uniform (h) DBLP-LT-diffusion (i) LiveJournal-IC-uniform (j) LiveJournal-IC-diffusion (k) LiveJournal-LT-uniform (l) LiveJournal-LT-diffusion Figure 4: Information activity on three data sets two data sets. Algorithm Degree often has a bad perfor- mance under both the IC model and the LT model in the diffusion settings. These baseline algorithms only use the properties of the social network or the diffusion process but totally ignore the activity strengths on edges. In contrast, our algorithm utilizes the unbiased estimate of the activity and its lower and upper bounds to solve the problem. This is why our algorithm always has a good performance while the baseline algorithms fail in many cases. 7.3 Approximation Quality A major advantage of our algorithm is that it carries a data dependent approximation ratio. Since the exact ap- proximation is intractable to compute, we report the com- putable lower bound of the approximation ratio, that is (1+γ)2 · (1 − e − ) · δA(SU ) (1−γ)2 . Fig. 5 shows the results on δU (SU ) the three data sets. The ratio varies in different data sets. On the same data set, the ratios under the IC model and the LT model also differ. In general, the ratio under the LT model is greater than the one under the IC model in the same activity set- tings. The ratio does not change much with respect to the size of the seed set k. Roughly the ratio increases when k increases. A possible reason is that the gap between the ac- tivity and the upper bound shrinks when k increases, since there are more nodes activated with a larger value of k. 10 7.4 Scalability Since the activity settings do not affect the running time, we only report the running time in the uniform case. Fig. 6 shows the running time on the three data sets. In most of the cases, the running time of our algorithm decreases when the size of seed set k increases. This is be- cause the time cost in Sandwich depends on the number of sampled hyperedges. According to Lemma 1, the expected number of samples is inversely proportional to µZ , which is the probability of the event S∩RgT (u) (cid:54)= ∅∧S∩RgT (v) (cid:54)= ∅. It increases when k increases. A similar analysis holds for the lower bound and the upper bound. PageRank is faster than our algorithm on the two smaller data sets but slower on the largest data set. Degree and InfMax are more effi- cient than our algorithm, but they are substantially weaker than ours in effectiveness in many cases. It is worthy not- ing that our algorithm is actually very efficient. The largest running time is only about 600 seconds on the largest data set, which has millions of nodes and tens of millions of edges. 7.5 Influence Spread versus Activity To explore the relation between influence spread and ac- tivity, we report their values in the uniform settings. We choose the uniform settings for our experiments here be- cause in such a situation, the activity is exactly the number of edges between the active nodes. In the diffusion settings, there is no such correspondence. We also calculate their ra- K050100150200Comparative Gain Ratio-0.6-0.4-0.200.2SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.2-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.5-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.3-0.2-0.100.1SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.3-0.25-0.2-0.15-0.1-0.050SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.2-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.5-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.1-0.08-0.06-0.04-0.0200.02SandwichInfMaxDegreePageRank (a) HepPh (b) DBLP (c) LiveJournal Figure 5: Approximation ratio on three data sets (a) HepPh-IC (b) HepPh-LT (a) k = 20 (b) k = 200 (c) DBLP-IC (d) DBLP-LT (e) LiveJournal-IC (f) LiveJournal-LT Figure 6: Running time on three data sets tio, which is the influence spread against the information activity. Tab. 3 shows the results on the three data sets. The ratio differs under different models. In general, the ratio under the LT model is greater than the one under the IC model. Possibly active nodes are more closely connected to each other under the LT model. Interestingly, the influ- ence spread in the DBLP data set is greater than the one in the HepPh data set while the activity in the DBLP data set is smaller than the one in the HepPh data set. It is probably because the average degree of HepPh is greater than that of DBLP. As a result, there are more edges among the active nodes in the HepPh data set. The results suggest that the ratio is related to the average degree. We also notice that the ratio is similar when k = 20 and k = 200. This result suggests that the relation between the Figure 7: Interaction ratio on three data sets influence spread and the activity does not vary much with respect to the size of seed set. The ratio can be viewed as the average degree of the propagation induced subgraph. The average degree of the propagation induced subgraph is smaller than the average degree of the whole graph. This is because only a small proportion of the nodes can be ac- tivated. Thus, there are many edges between active nodes and inactive nodes. The average degree of the propagation induced subgraph only considers the edges between active nodes. Thus, we report the interaction ratio of the active nodes, which is the number of edges whose both endpoints are active against the number of edges that have at least one active endpoint. The results are shown in Fig. 7. The interaction ratios are not high on all three data sets. This indicates that only a small proportion of the neighbors are activated and interact with the active nodes. This result demonstrates an essential difference between activity maxi- mization and influence maximization. 8. CONCLUSIONS In this paper, to address the demand raised in several interesting applications, we proposed and formulated a novel problem, activity maximization. We proved the hardness of the problem under both the IC model and the LT model. We also developed a lower bound and an upper bound of the objective function, and observed several useful properties of the lower bound and the upper bound. We designed a polling based algorithm to solve the problem that carries a data dependent approximation ratio. Our experimental results on three real data sets verified the effectiveness and efficiency of our method. As future work we are interested in learning the activity of user pairs from real-world data. 9. REFERENCES 11 K050100150200Approximiation Ratio0.10.150.20.250.30.35IC-ULT-UIC-DLT-DK050100150200Approximiation Ratio0.10.150.20.250.3IC-ULT-UIC-DLT-DK050100150200Approximiation Ratio0.060.080.10.120.140.160.18IC-ULT-UIC-DLT-DK050100150200Time (s)01020304050SandwichInfMaxDegreePageRankK050100150200Time (s)012345SandwichInfMaxDegreePageRankK050100150200Time (s)020406080SandwichInfMaxDegreePageRankK050100150200Time (s)0510152025SandwichInfMaxDegreePageRankK050100150200Time (s)0200400600800SandwichInfMaxDegreePageRankK050100150200Time (s)0100200300400SandwichInfMaxDegreePageRankData setHepPhDBLPLiveJournalInteraction ratio00.10.20.30.40.5IC modelLT modelData setHepPhDBLPLiveJournalInteraction ratio00.20.40.60.8IC modelLT model IC model LT model Data HepPh DBLP LiveJ influence 932 2,291 66,615 k=20 activity 4,868 3,509 958,95 ratio 5.22 1.53 1.44 influence 3,217 13,764 186,726 k=200 activity 17,016 21,165 333,598 ratio 5.28 1.54 1.79 influence 1,988 2,834 89,559 k=20 activity 26,017 5,179 184,842 ratio 13.08 1.83 2.06 influence 5,467 17,445 297,014 k=200 activity 61,524 32,712 839,334 ratio 11.25 1.88 2.83 Table 3: Influence spread and information activity on three data sets [1] S. Bhagat, A. Goyal, and L. V. Lakshmanan. Maximizing product adoption in social networks. In WSDM, pages 603–612. ACM, 2012. [2] A. Bhaskara, M. Charikar, E. Chlamtac, U. Feige, and A. Vijayaraghavan. Detecting high log-densities: an o (n 1/4) approximation for densest k-subgraph. In STOC, pages 201–210. ACM, 2010. [3] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA, pages 946–957. Society for Industrial and Applied Mathematics, 2014. [4] S. Chen, J. Fan, G. Li, J. Feng, K.-l. Tan, and J. Tang. Online topic-aware influence maximization. VLDB, 8(6):666–677, 2015. [5] W. Chen, L. V. Lakshmanan, and C. Castillo. Information and influence propagation in social networks. Synthesis Lectures on Data Management, 5(4):1–177, 2013. [6] W. Chen, W. Lu, and N. Zhang. Time-critical influence maximization in social networks with time-delayed diffusion process. In AAAI, pages 592–598. AAAI Press, 2012. [7] W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In SIGKDD, pages 1029–1038. ACM, 2010. [8] W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In ICDM, pages 88–97. IEEE, 2010. [9] S. Cheng, H. Shen, J. Huang, W. Chen, and X. Cheng. Imrank: influence maximization via finding self-consistent ranking. In SIGIR, pages 475–484. ACM, 2014. [10] E. Cohen, D. Delling, T. Pajor, and R. F. Werneck. Sketch-based influence maximization and computation: Scaling up with guarantees. In CIKM, pages 629–638. ACM, 2014. [11] P. Dagum, R. Karp, M. Luby, and S. Ross. An optimal algorithm for monte carlo estimation. SIAM Journal on computing, 29(5):1484–1496, 2000. [12] P. Domingos and M. Richardson. Mining the network value of customers. In SIGKDD, pages 57–66. ACM, 2001. [13] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable influence estimation in continuous-time diffusion networks. In NIPS, pages 3147–3155, 2013. [14] A. Goyal, F. Bonchi, and L. V. Lakshmanan. A data-based approach to social influence maximization. VLDB, 5(1):73–84, 2011. [15] A. Goyal, W. Lu, and L. V. Lakshmanan. Simpath: An efficient algorithm for influence maximization 12 under the linear threshold model. In ICDM, pages 211–220. IEEE, 2011. [16] R. M. Karp. Reducibility among combinatorial problems. In Complexity of computer computations, pages 85–103. Springer, 1972. [17] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing the spread of influence through a social network. In KDD, pages 137–146. ACM, 2003. [18] S. Khot. Ruling out ptas for graph min-bisection, dense k-subgraph, and bipartite clique. SIAM Journal on Computing, 36(4):1025–1071, 2006. [19] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In SIGKDD, pages 420–429. ACM, 2007. [20] Q. Liu, B. Xiang, E. Chen, H. Xiong, F. Tang, and J. X. Yu. Influence maximization over large-scale social networks: A bounded linear approach. In CIKM, pages 171–180. ACM, 2014. [21] W. Lu, W. Chen, and L. V. Lakshmanan. From competition to complementarity: comparative influence diffusion and maximization. VLDB, 9(2):60–71, 2015. [22] B. Lucier, J. Oren, and Y. Singer. Influence at scale: Distributed computation of complex contagion in networks. In SIGKDD, pages 735–744. ACM, 2015. [23] M. Mitzenmacher and E. Upfal. Probability and computing: Randomized algorithms and probabilistic analysis. Cambridge University Press, 2005. [24] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functionsi. Mathematical Programming, 14(1):265–294, 1978. [25] H. T. Nguyen, T. N. Dinh, and M. T. Thai. Cost-aware targeted viral marketing in billion-scale networks. In INFOCOM. IEEE, 2016. [26] H. T. Nguyen, M. T. Thai, and T. N. Dinh. Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In SIGMOD. ACM, 2016. [27] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: bringing order to the web. 1999. [28] F. Tang, Q. Liu, H. Zhu, E. Chen, and F. Zhu. Diversified social influence maximization. In ASONAM, pages 455–459. IEEE, 2014. [29] Y. Tang, Y. Shi, and X. Xiao. Influence maximization in near-linear time: A martingale approach. In SIGMOD, pages 1539–1554. ACM, 2015. [30] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets practical efficiency. In SIGMOD, pages 75–86. ACM, 2014. [31] V. V. Vazirani. Approximation algorithms. Springer Science & Business Media, 2013. [32] Z. Wang, E. Chen, Q. Liu, Y. Yang, Y. Ge, and B. Chang. Maximizing the coverage of information propagation in social networks. In IJCAI, pages 2104–2110. AAAI Press, 2015. [33] Y. Yang, X. Mao, J. Pei, and X. He. Continuous influence maximization: What discounts should we offer to social network users? In SIGMOD. ACM, 2016. 13
1212.2893
1
1212
2012-12-12T17:22:33
Communication Learning in Social Networks: Finite Population and the Rates
[ "cs.SI", "physics.soc-ph" ]
Following the Bayesian communication learning paradigm, we propose a finite population learning concept to capture the level of information aggregation in any given network, where agents are allowed to communicate with neighbors repeatedly before making a single decision. This concept helps determine the occurrence of effective information aggregation in a finite network and reveals explicit interplays among parameters. It also enables meaningful comparative statics regarding the effectiveness of information aggregation in networks. Moreover, it offers a solid foundation to address, with a new perfect learning concept, long run dynamics of learning behavior and the associated learning rates as population diverges. Our conditions for the occurrence of finite population learning and perfect learning in communication networks are very tractable and transparent.
cs.SI
cs
Communication Learning in Social Networks: Finite Population and the Rates∗ Jianqing Fan† Xin Tong‡ Yao Zeng§ Princeton University MIT Harvard University Abstract Following the Bayesian communication learning paradigm, we propose a finite population learning concept to capture the level of information aggregation in any given network, where agents are allowed to communicate with neighbors repeatedly before making a single decision. This concept helps determine the occurrence of effective information aggregation in a finite network and reveals explicit interplays among parameters. It also enables meaningful comparative statics regarding the effectiveness of information aggregation in networks. Moreover, it offers a solid foundation to address, with a new perfect learning concept, long run dynamics of learning behavior and the associated learning rates as population diverges. Our conditions for the occurrence of finite population learning and perfect learning in communication networks are very tractable and transparent. 2 1 0 2 c e D 2 1 ] I S . s c [ 1 v 3 9 8 2 . 2 1 2 1 : v i X r a Keywords: Social networks, Bayesian update, communication, finite population learning, perfect learning, learning rates. ∗We thank Daron Acemoglu, S´ebastien Bubeck, John Campbell, Emmanuel Farhi, Drew Fudenberg, Matthew Jackson, Gareth James, Philip Reny, Philippe Rigollet, Andrei Shleifer, Alp Simsek, and Yiqing Xing for valuable comments and suggestions. All errors are ours. †Department of Operations Research and Financial Engineering, Princeton University. ‡Department of Mathematics, Massachusetts Institute of Technology. §Department of Economics, Harvard University. 1 1 Introduction The effectiveness of information aggregation has been long and widely recognized as a central theme for good decision making at both individual and aggregate levels. Boosted by the Internet and particularly online social networks, this theme is especially impor- tant in communication and decision making in the modern world. People communicate with their friends, through extremely efficient, open and multi-dimensional approaches, in social networks before making specific decisions. In particular, these circumstances of information exchange often involve strategic interactions among people, which call for new modeling techniques beyond mainstream statistics and economics literature, such as the convolution of game theory and graphical models. Recently, Acemoglu et al. (2012a) provide a fascinating model to study communication in social networks and the implications for information aggregation. They employ a game- theoretic framework to model people's information aggregation in social networks. They define an intuitive concept of asymptotic learning, which means as the population of a network diverges, the probability that a large fraction of people take "correct" actions converges to one or eventually exceeds a high threshold. Given agents communicate either truthfully or strategically, they establish equilibrium conditions under which asymptotic learning occurs. They also discuss the welfare implications of asymptotic learning, and investigate the impacts of specific types of cost structures and social cliques. Motivated by the asymptotic learning concept, we ask the following questions. Can we define a good communication learning concept regarding a finite population network? If so, does such learning occur in a given finite social network? What are necessary and sufficient conditions to guarantee such learning? Can we write down clean and tractable rates at which a society achieves long run asymptotic learning? These questions are relevant and important, because it is common practice for people to assess the effectiveness of information aggregation in given organizations, regions or nations. Such assessment regarding finite population networks naturally offers a solid foundation for people to 2 understand the quality of social learning when the society evolves. As of now, current researchers in social networks have not provided desirable answers to these questions, and previous works called for fresh inputs (Goyal (2009); Acemoglu and Ozdaglar (2010); Jackson (2010)). Based on an information exchange game in social networks modified from Acemoglu et al. (2012a), we propose a finite population learning concept, which captures the level of aggregation of disperse information in any given communication network. In the model, there is an underlying state. People in a social network do not know the underlying state, but they have a common prior on the distribution of the state. After receiving initial private signals related to the underlying state, they exchange information simultaneously in the network, at times specified by a homogenous Poisson process, until taking an irreversible action to exit the network. Upon each person's exit, she makes an estimate of the underlying state. Her payoff depends on the waiting time before making the decision and the expected mean-square error between her estimate and the underlying state. The longer she waits, the more information she gathers and hence the better her estimate is, but the more discounting incurs. Thus, she needs to take a prompt action after obtaining sufficient amount of information in the network. The newly defined finite population learning concept involves three parameters, ǫ, ¯ǫ, and δ for a given social network Gn of population size n; rigorously, it is called (ǫ, ¯ǫ, δ)- learning. The parameter ǫ is the precision under which an agent's decision is considered "correct", 1 − ¯ǫ represents the fraction of agents in the network who make the approx- imately correct decision, and 1 − δ represents the probability at which such a fraction of agents make the approximately correct decision. We think of these three parameters as tolerance parameters of finite population learning. To contrast with asymptotically driven concepts, (ǫ, ¯ǫ, δ)-learning is simply referred to as finite population learning in verbal discussions. We derive necessary and sufficient conditions for the occurrence of finite population learning under any given equilibrium. Intuitively, finite population learning is more likely 3 to occur when the number of signals an agent obtains under equilibrium is larger, or the tolerances of learning are larger. Interestingly, the impact of the information precisions on finite population learning is ambiguous, which parallels the well-known Hirshleifer effect and subsequent work on the social value of information but stems from a new and different mechanism. We also provide necessary and sufficient conditions for the occurrence of finite population learning under any equilibrium, namely, without knowledge of a particular equilibrium. A straightforward advantage of our conditions is that these conditions lead to meaning- ful comparative statics regarding the effectiveness of information aggregation in networks. In these conditions, the underlying forces, such as tolerances, information precisions and information-sensitiveness, that shape the effectiveness of information aggregation in a given finite communication network are explicitly displayed in a single formula. Com- pared to the asymptotic learning results in previous literature, our conditions for finite population learning involve only one equilibrium outcome, which is the number of signals an agent obtains when she exits under equilibrium. More importantly, different from our finite population learning concept in which the total amount of information is fixed, the existing asymptotic learning literature employs an implicit assumption that the total amount of information grows linearly with the population size. Hence, the learning status with respect to a sequence of networks with growing population reflects not only the ef- fectiveness of information aggregation of certain network structures, but also an increased endowment of total information. Our finite population learning concept overcomes this defect and disentangles the effectiveness of information aggregation from the growth of information endowment. The finite population learning concept enables us to investigate the rate at which a sequence of growing communication networks {Gn}∞n=1, which is referred to as a society, reaches perfect learning. Perfect learning occurs if all communication networks in a society achieve finite population learning under vanishing tolerances as population grows. For example, we say δ-perfect learning occurs along society {Gn}∞n=1 if i). (ǫ, ¯ǫ, δn)-learning 4 occurs for each network Gn in the society, and ii). δn goes to zero as n goes to infinity. The learning rate is characterized by the sequence {δn}∞n=1. Clearly, faster learning rate implies perfect learning is reached at a higher quality. It is instructive to distinguish our learning rate concept from the speed of convergence to a pre-defined consensus in existing social learning literature, which mainly concerns about the time towards a consensus in a circumstance where people make repeated decisions and learn from others' previous decisions to help to make their own future decisions. In such a context, the observable sequence of aggregate decisions naturally reveals the dynamics of information aggregation along the time dimension. In our story of direct communication, however, although people communicate with each other repeatedly, they only make a single decision, and different people may go through varying communication rounds before their decisions. This makes the time dynamics of information aggregation largely unobservable, and thus calls for alternative dimensions to look into the information dynamics. We have given conditions for societies to reach δ-perfect learning at a certain desired rate {δn}∞n=1. Given a sequence of networks and the associated equilibria, we define an equilibrium informed agent as one who obtains an unbounded number of signals as the population size goes to infinity. The δ-perfect learning occurs if almost all agents in the society are equilibrium informed. Moreover, without involving any equilibrium, we define a socially informed agent (roughly) as one who has an unbounded number of neighbors in a finite distance as the population goes to infinity. The δ-perfect learning occurs if almost all agents are socially informed. We also explicitly explore the achievable fastest learning rate for perfect learning in a given society. Under some circumstances, achievable learning rate could be in the exponential order. This implies that a society with growing population might achieve a desirable level of finite population learning very quickly. Relation to Literature. Our work lies in the category of Bayesian social learning in social networks, in which decision makers in a social network update their information 5 according to the Bayes' rule. General Bayesian social learning is divided into two sub- categories, namely Bayesian observational learning and Bayesian communication learning. In Bayesian observational learning, agents observe past actions of their neighbors. From these observed actions, agents update their beliefs and make inferences. Herd behavior is a very typical consequence of observational learning. In literature, Banerjee (1992), Bikhchandani et al. (1992) and Smith and Sorensen (2000) are early attempts to model herd effects through Bayesian observational learning. Banerjee and Fudenberg (2004) and Smith and Sorensen (2008) relax the assumption of full observation network topol- ogy and study Bayesian observational learning with sampling of past actions. Recently, Acemoglu et al. (2011) and Muller-Frank (2012) investigate how detailed network struc- tures could add new interesting insights. Our work belongs to Bayesian communication learning, which means that agents can- not directly observe actions of others but can communicate with each other before mak- ing a decision. Consequently, agents update their beliefs and make inferences based on the information given by others. New interesting considerations arise in Bayesian communication learning; for example, agents may not want to truthfully reveal their information to others through communication. Crawford and Sobel (1982) pioneers the research in strategic communication, and Acemoglu et al. (2012a) is an interesting piece that looks into how communication learning shapes information aggregation in social net- works. Other works such as Galeotti et al. (2011) and Hagenbach and Koessler (2010) also study strategic communication in social networks, but their focus is not on informa- tion aggregation. There is a branch of literature that applies various non-Bayesian updating methods to investigate information aggregation and social learning. DeGroot (1974) develops a tractable non-Bayesian learning model which is frequently employed in research of social networks today. Essentially, the DeGroot model is pertaining to observational learning, in which agents make today's decisions by taking the average of neighbors' beliefs revealed in their decisions yesterday. DeGroot (2003) and Golub and Jackson (2010, 2012a,b,c) apply 6 the DeGroot model to financial networks and general social networks, respectively. By a field experiment, Mobius et al. (2010) compares a non-Bayesian model of communication with a model in which agents communicate their signals and update information based on Bayes' rule. Their evidence is generally in favor of the Bayesian communication learning approach. Our paper is most related to Acemoglu et al. (2012a). Compared to their work, we employ a simplified framework for network communication and exploit more undeveloped mechanisms. In particular, we mainly focus on the effect of social learning and infor- mation aggregation in finite population communication networks. This allows for clear comparative statics with respect to learning, and for discussion on the rates of learning as the population increases. As of now, researchers have not provided desirable results in finite population communication network as well as results regarding learning rates. To the best of our knowledge, our work is the first attempt to address these questions with clear answers. Our work is also related to Golub and Jackson (2012a,b,c), in particular on the in- vestigation of learning rate. Golub and Jackson (2012a,b,c) employ the DeGroot model to analyze the impacts of homophily in social networks, which refers to the tendency of agents to associate relatively more with those who are similar to them, on the learning rate in the context of observational learning. Our results of learning rate are different from theirs in two aspects. First, our focus is on Bayesian communication learning rather than non-Bayesian observational learning. Second, as discussed before, our concept of learning rate is based on perfect learning as the population in networks diverges, rather than the time towards a consensus in their model. An appealing feature of Golub and Jackson (2012a,b,c) is that their results of learning rate are based on certain statistics of networks rather than the full network structures, which could lead to potentially more empirical traction. We would also like to relate this work to social network papers in existing statistics literature. The larger part of those papers are based on graphical models, which are ideal 7 to describe structural formation. Rather than providing a list of state-of-the-art contribu- tions, we refer interested readers to Newman (2010) and Kolacazyk (2009), which might serve as a broad introduction to the field. Our work supplements structural modeling with human behavior modeling through game theory. Such model enrichment is neces- sary for some specific objectives; for example, we will see that strategic interaction and contextual information that sit outside graphical models are crucial to determine the final information aggregation status. Also, our theoretical results are in the same spirit of the finite sample results in the statistical learning theory, such as the Vapnik-Chervonenkis inequality. Such results with a clear characterization of strategic interactions may have potential to expand the scope of the finite sample approach beyond statistical learning theory. The rest of the paper is organized as follows. Section 2 introduces the information exchange game and characterizes its equilibrium. New finite population learning concept is proposed in Section 3. Section 4 discusses dynamics of learning and addresses learning rates explicitly. In the final section, we discuss possible directions for further research. All proofs are in the supplementary materials. 2 The Model In this section, we present our model of information exchange in social networks, which is closely related to Acemoglu et al. (2012a), but has different focus. In this model, people, formally called as agents, are organized in some network structure. Each agent has her initial information. Agents are able to solicit information from their neighbors through communication, restricted by the network structure and a communication clock. The communication clock defines the times at which each agent is able to communicate with others. At each round of communication, agents are obliged to transmit truthfully all information they have to their neighbors in the network. By such communication, the information set of an agent can become larger as time evolves. With the help of her initial 8 and acquired information, every agent is able to make a decision and exit. An exit strategy is needed due to the time value of information content. After exit, an agent would not have any incentive to further acquire information from neighbors, but she is still obliged to transmit all her information to others in the next round of communication. Through certain measure of agents' decisions, we are further able to characterize the quality of learning and information aggregation. We make the following assumptions to simplify the analysis and focus on a concept of finite population learning, which will be rigorously defined in the next section. First, we assume mandatory communication, which means that no agent holds her information to herself. When communication times arrive, an agent has to send all her information set to all of her direct neighbors. Second, we assume truthful communication, which means whenever an agent sends information, she has to send unmanipulated information, whether it is her own private information or obtained information originated from other agents. We will first analyze communication and information aggregation in a given finite population network, and then consider the limit as the population grows to infinity. In this course, we assume that existing links are kept when a network grows. Before formal definition of the game, we would like to illustrate how information flows with an example. For simplicity, suppose there are four agents in the network below. At time t = 0, each agent i has some private signal si, which captures her initial information. So the total information endowment in the system is {s1, s2, s3, s4}. Communication occurs at t = 1, 2. Due to the structure of the graph in our example, there is no need to consider beyond the second communication round, since no additional information will be communicated further. I1 = {s1} 3 t = 0 : 1 2 4 We will study two cases, and focus on agent 1's information set I1. In the first case, 9 suppose no agent exits after time t = 0. So the information flow is as follows: t = 1 : 1 s2 2 I1 = {s1, s2, s3} s3 3 I3 = {s3, s4} s4 4 I1 = {s1, s2, s3, s4} s4 3 I3 = {s3, s4} t = 2 : 1 2 4 After the first round of communication, i.e., t = 1, agent 1 has signals {s1, s2, s3}. Also note that at this time agent 3 has {s3, s4}. At t = 2, agent 3 sends the newly grabbed signal s4 to agent 1. So agent 1's information set enriches to {s1, s2, s3, s4}. In the second case, suppose agent 3 exits after time t = 0, then she is still obliged to send all her signals (in this case, only her private signal) she acquires to neighbors, but she does not have any incentive to receive others' signal. Therefore, the information flow is as follows. t = 1 : 1 s2 2 I1 = {s1, s2, s3} s3 I3 = {s3} 3 4 t = 2 : 1 2 4 I1 = {s1, s2, s3} I3 = {s3} 3 Note that as agent 3 does not receive signal from agent 4 at t = 1, she does not have any new information to send to agent 1 at the second communication round. Therefore, agent 1's information set is still {s1, s2, s3} at t = 2. By contrasting the two cases in this toy example, we see that agents' decisions affect the information flow in the network. Now we formally introduce the information exchange game. Suppose we are interested in a social network with agents N n = {1, 2, ..., n}. To model communication in the network, we organize these agents in a directed graph Gn = (N n,E n), in which each node i ∈ N n represents an agent. We allow directed graphs to have multi-edges, so that two agents can communicate to each other. An ordered pair (j, i) ∈ E n means agent j can send information to agent i directly. The goal of every agent is to estimate θ ∈ R, which represents an underlying state of the world. Agents' knowledge of θ is captured by a 10 normally distributed common prior θ ∼ N(0, 1/ρ). At time t = 0, agent i is endowed with her private signal si = θ + zi. All zi ∼ N(0, 1/¯ρ) are independent and they are also independent of θ. The distributions of zi's are common knowledge and so is the network architecture. Our results are not affected if the means of θ and zi are changed to non-zero values. In this network, agents exchange their information as follows. Suppose agents live in a world with continuous time t ∈ [0,∞). Waiting induces a common exponential discount of the payoff with rate r > 0. Instead of communicating at fixed times, all agents communicate simultaneously at some points in time that follow a homogeneous Poisson process with rate λ > 0, which is independent of θ and zi. This Poisson clock is also common knowledge. After communication, agents update beliefs according to the Bayes' rule. For example, the posterior distribution of θ on k distinct signals is Gaussian with precision ρ + k ¯ρ. So more private information, i.e., a higher k, will increase the precision and lead to a better estimate. Hence, there is a natural trade-off between waiting to get more information and acting earlier to reduce the discount of information value, which makes an optimal stopping problem for each agent i. We call the incentive to get more information information effect, and the incentive to act earlier discount effect. In this course, at any given time t, each agent i either makes an estimate xi of the fundamental state of the world θ, or "wait" for more information. Just as illustrated in the four agents' example, we assume that after agents make estimate and exit, they do not receive new information, but they continue to transmit information that they have already obtained when new rounds of communication take place. We introduce a few more notations to facilitate the discussion. Let I n i,t denote the information set of agent i at time t. We next specify the payoff structure and the opti- mization problem faced by agents. Suppose agent i takes action xi at time t when the realization of the underlying state is θ, then her instantaneous payoff of taking an action xi is un i (xi) = ψ − (xi − θ)2 , 11 where ψ is a real-valued constant that captures the information sensitiveness of the deci- sion problem, which we will elaborate later. At time t with information set I n i,t, agent i's optimal expected instantaneous payoff of taking an action before discounting is U n i,t(I n i,t) = max xi E(un i (xi)I n i,t) . It is easy to see that agent i's optimal estimate is xn,∗i,t = E[θI n time t. Thanks to the normality assumption of the fundamental θ and signals {si}n the optimal expected instantaneous payoff of agent i taking an action after observing k i,t] if she decides to act at i=1, distinct signals can be calculated explicitly: E[ψ − (xn,∗i,t − θ)2I n i,t] = ψ − 1 ρ + ¯ρk . (2.1) At any time t with information set I n i,t, before trying to make a best estimate and exit, agent i has to make a decision about whether to exit. To facilitate the analysis, we first assume that any agent can obtain non-negative payoff upon her exit. This assumption will be formally characterized after we define the equilibrium. As a result, due to discount in time, each agent should make an estimate and exit precisely at a finite time, and especially, at a time instantaneously after communications take place. Moreover, each agent would only get finite number of signals even if they waited forever, because there are in total n signals {si}n profiles in which every agent exits at a finite communication round, rather than at any i=1 in the network. Therefore, we actually only need to consider strategy arbitrary time. Denote by ln = (ln 1 , . . . , ln n), where each ln i is agent i's communication round before exit. Throughout the paper, we use ln −i to denote ln without the component ln i . Let τk be the physical time until k rounds of communication. Agent i's payoff for choosing action ln i is U n i (ln i , ln −i) = E(cid:26)e−rτln i max xi E[ψ − (xi − θ)2I n i (ln)](cid:27) , 12 where I n i (ln) is agent i's information set upon exit, which depends on other agents' exit strategies ln −i. By (2.1) and the exponential waiting time of the Poisson clock, we have U n i (ln i , ln −i) = ¯rln i ψ − 1 i ! , ρ + ¯ρkn,ln where ¯r = λ/(λ + r) and kn,ln i is the number of signals agent i get upon exit if every agent acts according to ln in the network Gn. With this reduction, the following complete information static game will be considered. Definition 1 The information exchange game Γinfo(Gn) is a triple {N n,Ln,U n}, in which (a) N n is the set of agents, i.e., N n = {1, 2, ..., n}; (b) Ln is the collection of agents' strategy spaces. For any agent i ∈ N n, her strategy space Ln i ∈ Ln is a finite set Ln i = {0, 1, 2, ..., (Ln i )max} , where (Ln i )max = maxj∈Gn{length of shortest path from j to i} ; (c) U n i ∈ U n is the payoff function for agent i: i ψ − −i) = ¯rln U n i (ln i , ln 1 i ! . ρ + ¯ρkn,ln (2.2) We consider pure-strategy Nash equilibria of this game. As an agent's payoff gain from waiting is weakly larger (i.e., no smaller than) when other agents also wait more rounds, the information exchange game is a supermodular game. The following result is a direct application of Topkis (1979), which guarantees the existence of a pure-strategy Nash equilibrium in supermodular games. Lemma 1 The information exchange game Γinfo(Gn) has at least one pure-strategy Nash equilibrium. 13 We denote a pure-strategy Nash equilibrium of the game by σn,∗, and the set of all pure-strategy Nash equilibria by Σn,∗. We further denote by ln,σ∗ i the communication steps after which agent i exits under equilibrium σn,∗, and denote by kn,σ∗ i the number of distinct signals agent i has obtained when she exits under equilibrium σn,∗. In order to make sure that every agent i gets non-negative payoffs and exits ultimately in the initial strategic circumstance of information exchange, we focus on information exchange games and associated equilibria that satisfy the following assumption in the rest of this section. Assumption 1 ψ[ρ + ¯ρ(kn,σ∗ i )max] > 1 for all agent i, where (kn,σ∗ i )max is the maximum number of signals agent i can get if all other agents choose their exit steps according to σn,∗. The parameter ψ captures the information sensitiveness of the decision problem. In- terestingly, the information sensitiveness of the decision problem is not monotone in ψ. When ψ takes negative or very small positive value, agents would like to wait forever to discount payoff to zero, in which case the decision problem is information irrelevant. When ψ is large enough, information is relevant. Specifically, when ψ is moderate, in- formation effect dominates, and thus the decision problem is more information sensitive; while when ψ is large, the discount effect dominates, and thus the decision problem is less information sensitive. Now we provide an example of the network game and its equilibrium. On the four- agent graph displayed previously, suppose λ = r, ψ = 1 and ρ = ¯ρ = 1 2. The decision problem for agents 2 and 4 are simple. They should exit right away because they will not get any new signals due to graph structure, but incur discounting penalty should they not act promptly. The payoff matrix for agent 1 (row) and 3 (column) is as follows, in which the first and the second value in each cell are respectively the payoffs of agent 1 and agent 3 [see (2.2)]. 14 Agent 3 0 Step 1 Step 0 Step 0, 0 0, 1 6 Agent 1 1 Step 2 Step 1 4, 0 1 8, 0 1 3 6 4 , 1 20, 1 6 There is one equilibrium of the game. In this equilibrium, agents 2 and 4 exits immediately after they receive their private signals, while agent 1 and agent 3 exit after the first communication round. Before proceeding to discuss information aggregation or learning status, we briefly dis- cuss the equilibrium outcomes of the strategy game in Definition 1. This reduced game is a complete information static game, which involves no uncertainty. However, the uncer- tainties in the fundamental and in the communication clock were abstracted out through taking expectations, which results in the deterministic payoff function (2.2). Therefore the two equilibrium outcomes, ln,σ∗ i and kn,σ∗ i , both deterministic, characterize the strate- gic interactions of information exchange among agents in the initial circumstance. This enables us to characterize a learning status by focusing only on such equilibrium outcomes. We can perform the following comparative statics of the number of signals agent i ob- tains under equilibrium kn,σ∗ i . Intuitively, kn,σ∗ i is larger when the discount rate is smaller or the Poisson clock is faster. It is also larger when the precision of public information ρ is lower or the decision problem is more information sensitive. However, the precision of private information ¯ρ has ambiguous impact on kn,σ∗ i , because an increase in the pre- cision of private information has two conflicting effects. It increases not only the relative quality of the private signal at hand, which prompts an agent to exit earlier, but also the relative information content of her neighbors' private signals, which in turn encour- ages her to wait. The former effect is stronger when the precision of public information is higher, while the latter is stronger when the precision of public information is lower. The discussions in this paragraph can be formalized against mathematical rigor, but the game-theoretic technicality involved is beyond the scope of this paper. 15 Finally, we also remark that the role of kn,σ∗ i is our paper is similar to the influence vector v in Acemoglu et al. (2012b). The quantity kn,σ∗ i will play a central role in the next sections. 3 Finite Population Learning In this section, we measure the level of information aggregation in any given communica- tion network. Related recent research on learning in social networks focuses on asymptotic learning, which means that as the fraction of agents taking the correct action converging to one as the population of the social network grows large (Acemoglu et al. (2011, 2012a)). However, as discussed in Acemoglu and Ozdaglar (2010), people are also interested in the information dynamics away from long run limit. In pursuing this goal, a new concept of learning in social networks is introduced. Definition 2 Given a social network Gn, the information exchange game Γinfo(Gn) and an equilibrium profile σn,∗, for a triple (ε, ¯ε, δ), we say Gn achieves (ε, ¯ε, δ)-learning under σn,∗ if Pσn,∗ 1 n n Xi=1 (1 − M n,ε i ) > ¯ε! 6 δ , where M n,ε i = 1(xi − θ 6 ε), xi is agent i's optimal action upon exit, and Pσn,∗ denotes the conditional probability given σn,∗ . In this definition, the parameter ε sets the precision on what the approximately correct decision is for individual agents, 1 − ¯ε controls the fraction of agents who make the approximately correct decision, and 1 − δ represents the probability at which such a high fraction of agents make the approximately correct decision. In particular, we highlight the difference between ε and ¯ε, because these two parameters capture different tolerances. Concretely, ε is at the individual level while ¯ε is at the aggregate level. A natural question to ask is whether such finite population learning occurs in a given communication network. If so, under what conditions? The following proposition provides 16 a necessary condition and a sufficient condition for (ε, ¯ε, δ)-learning in a given social network under any equilibrium profile. When there is no confusion, we refer to the information exchange game Γinfo(Gn) simply as Gn. Denote by erf(x) = 2√πR x error function of the standard normal distribution. 0 e−t2dt the Proposition 1 For a given social network Gn under any equilibrium σ∗(= σn,∗), (a) (ε, ¯ε, δ)-learning does not occur if 1 n n Xi=1 erf εsρ + ¯ρkn,σ∗ 2 i   < (1 − ¯ε)(1 − δ) . (b) (ε, ¯ε, δ)-learning occurs if 1 n n Xi=1 erf εsρ + ¯ρkn,σ∗ 2 i   > 1 − ¯εδ . (3.1) (3.2) This proposition provides clear conditions for the occurrence of finite population learn- ing. Our conditions are more operative and transparent than their asymptotic counter- parts in previous literature. Specifically, our conditions only require one equilibrium outcome kn,σ∗ i , and the set {kn,σ∗ i }n i=1 is directly induced by an equilibrium σn,∗ in a com- munication network Gn. Hence, conditions (3.1) and (3.2) not only allow us to investigate the effect of learning in a given communication network, but also offer a more interpretable link between the communication equilibrium and its corresponding information aggrega- tion status. Conditions (3.1) and (3.2) also allow us to untangle the interplay among parameters. For example, we are able to answer the following question. Given the tolerances ε, ¯ε, δ and the information precisions ρ and ¯ρ, how does the change of kn,σ∗ i affect the occurrence of finite population learning in a given social network Gn? When kn,σ∗ i 's are sufficiently small to validate condition (3.1), finite population learning does not occur. Similarly, when most of kn,σ∗ i 's are sufficiently large so that the condition (3.2) is satisfied, finite population 17 learning occurs. Similar marginal interpretations also apply to parameters ε, ¯ε, δ, ρ and ¯ρ. Generally, finite population learning in a given social network Gn is more likely to occur when the equilibrium induces larger numbers of signals obtained by agents. It is also more likely to occur when the tolerances and the information precisions are higher. As interplays among the parameters ε, ¯ε, δ, ρ, ¯ρ and kn,σ∗ i are clear through (3.1) and (3.2), the two conditions provide various comparative statics that help us better understand learning in different social circumstances. Since the total amount of information is fixed in any finite population network, these comparative statics indeed disentangle the effectiveness of information aggregation from the endowment of information, so that the net effect of information aggregation is transparent. It is interesting to note that (1 − ¯ε)(1 − δ) < 1 − ¯εδ for any 0 < ¯ε, δ < 1. This gap indicates that failure of condition (3.1) does not necessarily lead to condition (3.2), and vice versa. Two perspectives help understand this gap. First, we use Markov's inequality to get tractable forms of the necessary and the sufficient conditions. Sharper inequalities may lead to weaker conditions and thus probably fill a part of the gap, but they are likely to make these conditions intractable and less transparent. Secondly and more importantly, as we discussed above, conditions (3.1) and (3.2) involve equilibrium outcomes in a clean and simple formula. The cost for enjoying this clarity is that we did not fully utilize {kn,σ∗ }n i=1. i Also, a beauty of symmetry arises in our necessary and sufficient conditions for finite population learning. The parameters ¯ε and δ are completely interchangeable in these con- ditions, which was not expected as they captures tolerances in different categories. On the other hand, in our two conditions, parameter ε stands in a position that is unchangeable with ¯ε and δ, which hints that ε and ¯ε play different roles in finite population learning. Conditions (3.1) and (3.2) have powerful implications. The next corollary establishes a necessary condition and a sufficient condition without equilibirum outcomes. The proof is straightforward, but the results are non-trivial. 18 Corollary 1 For any social network Gn and any equilibrium σn,∗, (a) (ε, ¯ε, δ)-learning does not occur if erf εr ρ + ¯ρn 2 ! < (1 − ¯ε)(1 − δ) . (b) (ε, ¯ε, δ)-learning occurs if erf εrρ + ¯ρ 2 ! > 1 − ¯εδ . (3.3) (3.4) Corollary 1 follows from the fact that 1 ≤ kn,σ∗ ≤ n. It is interesting because under some circumstances, we can determine the occurrence of finite population learning without i knowing either the structure of the social network or the equilibrium. Intuitively, if any one parameter of the tolerances, information precisions or population size is too low, such that the condition (3.3) is satisfied, we may conclude that finite population learning does not occur no matter how effective the communication network is organized. Conversely, if any one of the tolerances or information precisions is sufficiently large such that condition (3.4) holds, we know that finite population learning surely occurs even if all agents are isolated. Finally, as the information exchange game exhibits strategic complementarity, it is ex- pected that multiple equilibria might emerge under some circumstances. An interesting perspective in investigating finite population learning is to measure the effect of learning against multiple equilibria. We provide the following generalized (conservative) version of finite population learning to accommodate multiple equilibria without equilibrium se- lection. Definition 3 Denote by Σn,∗ = {σn,∗} the set of equilibria of Γinfo(Gn). The (ε, ¯ε, δ)- learning occurs if Pσn,∗ 1 n sup σn,∗∈Σn,∗ ) > ¯ε! 6 δ . n Xi=1 (1 − M n,ε i 19 This definition offers a conservative standard to evaluate finite population learning in the sense that the least favorable equilibrium determines the learning status. When Σn,∗ is a singleton, the above definition reduces to Definition 2. The proof of Proposition 1 can be recycled to derive the next corollary. Corollary 2 Given an information exchange game Γinfo(Gn), (a) (ε, ¯ε, δ)-learning does not occur if min σn,∗∈Σn,∗ 1 n n Xi=1 (b) (ε, ¯ε, δ)-learning occurs if erf εs ρ + ¯ρkn,σ∗ 2 i   < (1 − ¯ε)(1 − δ) . min σn,∗∈Σn,∗ 1 n n Xi=1 erf εsρ + ¯ρkn,σ∗ 2 i   > 1 − ¯εδ . 4 Perfect Learning and the Rates Based on the analysis of finite population learning, we consider the effect of information aggregation and learning as population in communication networks grows. Our approach to address the limiting behavior of learning is different from asymptotic learning in existing literature (Acemoglu et al. (2011, 2012a)). In particular, we highlight finite population learning as the foundation of asymptotic learning. Consequently, we are able to check learning status all along the path to the limit, and the probabilistic tolerance parameters naturally induce learning rates. This concept of learning rate is different from what is employed in Golub and Jackson (2012a,b,c) that focuses on the time dimension. 4.1 Perfect Learning Recall that we have three tolerance parameters ε, ¯ε, and δ that define (ε, ¯ε, δ)-learning. To inquire the limiting behavior in a society {Gn}∞n=1, where existing links are kept when 20 networks grow, we can focus on one parameter at a time, keeping the other two fixed. The following definition introduces δ-perfect learning on a given society {Gn}∞n=1. Definition 4 We say δ-perfect learning occurs in society {Gn}∞n=1 under equilibria {σn,∗}∞n=1 if there exists a vanishing positive sequence {δn}∞n=1 such that (ε, ¯ε, δn)-learning occurs in Gn under its associated σn,∗ for all n . Compared to the perfect asymptotic learning concept in Acemoglu et al. (2012a), our definition of perfect learning is both stronger and more general for the following reasons. First, we require the networks in the society to achieve learning not only in the limit but also all along the path towards the limit. Second, by focusing on different parameters ε, ¯ε and δ, we could address three different kinds of asymptotic learning. As discussed in the previous section, these three parameters exhibit different impacts on finite popula- tion learning, so that they can play different roles in perfect learning. Third and most importantly, this definition allows us to investigate learning rates, which is the focus of the next subsection. In the following, we will derive two sufficient conditions for δ-perfect learning. The first condition, stated as Proposition 2, relies on the equilibrium outcome kn,σ∗ i . The second condition, stated as Proposition 3, relies only on the formation of the society. To deliver the first sufficient condition, we define an equilibrium informed agent in a society. Definition 5 (Equilibrium Informed Agent) For agent i in a given society {Gn}∞n=1, she is equilibrium informed with respect to {Gn}∞n=1 under equilibria {σn,∗}∞n=1 if lim n→∞ kn,σ∗ i = ∞ . An agent has equilibrium informed status means that she enjoys increasing information advantage as population grows. The next proposition offers a sufficient condition for δ- perfect learning. In a similar spirit, we have a more general sufficient condition, Lemma 3, 21 in the supplementary materials. The proof of Proposition 2 is omitted as it is a corollary to Lemma 3. Proposition 2 The δ-perfect learning occurs in a society {Gn}∞n=1 under equilibria {σn,∗}∞n=1 if 1 nEIn,∗ = 1 , lim n→∞ where EIn,∗ the set of equilibrium informed agents in the network Gn under equilibrium σn,∗. Proposition 2 states that perfect learning occurs when almost all agents are equilibrium informed. This is consistent with the idea of social learning that successful learning allows individuals to have sufficient information to make a good decision, and that such individuals represent an overwhelming proportion of the society. We can have such a transparent condition because our perfect learning concept is powered by finite population learning, a sufficient condition of which only involves one set of equilibrium variables: {kn,σ∗ }. i Next we consider the second sufficient condition that relies only on formation of the society. To streamline the presentation in the main texts, we assume that each agent enjoys a positive payoff even if she exits at the beginning. From (2.1), this is equivalent to the following assumption. Assumption 2 (ρ + ¯ρ)ψ > 1 . We will hold this assumption for the rest of this section. In the supplementary mate- rials, we relax this assumption and discuss all possible cases. Before looking into the next sufficient condition for perfect learning, we first point out an important observation which states that, although the number of signals an agent gets in equilibrium may diverge to infinity with growth of the communication network, the equilibrium communication steps will not increase unboundedly. 22 Lemma 2 Under Assumption 2, for any agent i, the communication rounds she optimally experiences before taking an action in any social network Gn is bounded from above by a constant independent of n. Mathematically, ln,σ∗ i 6 ln i < min(cid:26)(Ln i )max, ln(cid:18)1 − 1 (ρ + ¯ρ)ψ(cid:19) / ln ¯r(cid:27) , (4.1) in which ln i stands for the optimal communication rounds for agent i given that other agents wait until the maximum allowable step, and (Ln i )max is the maximum length of all paths ended with i in Gn. A more general version (without Assumption 2) of Lemma 2 with its associated proof is included in the supplementary materials as Lemma 4. A key idea behind Lemma 2 is that after agent i gets sufficiently large number of signals within some finite communication steps, even expecting infinite number of signals does not justify the discount of further waiting. The intuition is that for well connected agents, they will get sufficient information after a few communication rounds to make a decision, whereas for the not well connected agents, waiting too long discounts their information value. From condition (4.1), we see that the upper bound is exclusively determined by parameters of the information exchange game. Lemma 2 plays an important role in shaping our next sufficient condition that bypasses equilibrium and directly links perfect learning to network formations. Recall Proposition 2 which states that almost all agents' kn,σ∗ i → ∞ is sufficient for perfect learning. On the other hand, from Lemma 2 we know that no agent has an optimal unbounded commu- nication step ln,σ∗ i . By combining the two observations, we know the only possibility to validate Proposition 2 is that almost all agents get unbounded number of signals within fi- nite communication steps. This consideration leads to our following definition of a socially informed agent. Definition 6 (Socially Informed Agent) For each agent i i,l0 = ∞}, where Bn {Gn}∞n=1, let Li = min{l0 ∈ N : limn→∞ Bn 23 in a given society i,l is the set of agents in Gn whose shortest path to i has length at most l. Agent i is socially informed with respect to {Gn}∞n=1 if Li is finite, and if there exists N ∈ N such that for n > N, we have ψ − 1 ρ + ¯ρBn i,Li > 0 , and ¯rLi ψ − 1 i,Li! > ¯rl ψ − ρ + ¯ρBn 1 ρ + ¯ρBn i,l! for all 0 ≤ l < Li . (4.2) (4.3) Moreover, we denote by SIn the set of socially informed agents in the network Gn. In Definition 6, condition (4.2) is automatically satisfied in view of Assumption 2. Intuitively, a socially informed agent can be reached by a large number of neighbors after some finite communication steps Li. Furthermore, condition (4.3) ensures that this agent strictly prefers to wait at least until the arrival of such communication step Li, given other agents never exit. Therefore, agent i is guaranteed to obtain a large number of signals from finite communication steps, if other agents never exit. Note also that the definition of a socially informed agent does not require knowledge of any specific equilibrium. It only depends on the topological structure of the graph and on the parameters in the information exchange game. With the help of socially informed agents, we bypass equilibrium and state the following sufficient condition for perfect learning. Proposition 3 The δ-perfect learning occurs in a society {Gn}∞n=1 under any equilibrium {σn,∗}∞n=1 if 1 nSIn = 1 . lim n→∞ Proposition 3 is interesting because we can determine the occurrence of perfect learning through knowledge on the formation of society alone. Given the tractable conditions for socially informed agents, we can check whether a given society sufficiently supports perfect learning under any equilibrium. Especially, given the difficulty of explicitly solving for equilibria of the information exchange game in general cases, Proposition 3 is of more value. 24 4.2 Learning Rates In this subsection we define the learning rate for δ-perfect learning. It is natural to expect similar concepts of learning rates for ε-perfect learning and ¯ε-perfect learning. Definition 7 If δ-perfect learning occurs in {Gn}∞n=1 under equilibria {σn,∗}∞n=1, then we call the corresponding sequence of tolerances {δn}∞n=1 the learning rate. It is worth highlighting the difference between our learning rate concept and the speed of convergence to a pre-defined consensus mainly employed in observational learning prob- lems. The latter concerns about the time towards a consensus in a circumstance where people make repeated decisions and learn from others' previous decisions to help make their own future decisions (Golub and Jackson (2012a,b,c)). In observational learning problems with repeated decisions, the observable sequence of aggregate decisions natu- rally reveals the time dynamics of information aggregation. However in direct commu- nication setup, dynamics of information aggregation along the time dimension is largely unobservable, which calls for alternative dimensions to look into the information dynam- ics. Tolerance parameters {δn}∞i=1 offer a natural standpoint to look into the information aggregation dynamics. This feature also distinguishes our work from existing literature on learning rate of similar spirit. For example, Acemoglu et al. (2009) attempt to define and investigate an asymptotic learning based rate in an observational learning context. Although their concept also captures a sequence of diminishing probabilities, it does not characterize the learning status in every social network along the society. On the other hand, it is not trivial to construct concretely the smallest sequence {δn}∞n=1 for perfect learning, while keeping other parameters fixed. Recall that the suffi- cient condition part of Proposition 1 implies δ-perfect learning occurs with rates {δn}∞n=1 if 1 n n Xi=1 erf εs ρ + ¯ρkn,σ∗ 2 i   > 1 − δn ¯ε . 25 Theoretically, if we can directly solve the inequalities with respect to δn, the achievable fastest learning rate {δn}∞n=1 is constructed. However, some technical problems prevent us from directly doing so. First, we cannot read off a transparent rate out of the error function. Second, without specific knowledge of network formations, the relation between and n is hard to be pinned down generally. Moreover, as we will see in the binomial kn,σ∗ i tree example, kn,σ∗ i could be drastically different even for a same graph. Hence, we will first discuss learning rates on specific examples, and generalize to more general categories when possible. Example 1 (Isolated Agents) When all agents are isolated from each other in a com- munication network Gn, we have kn,σ∗ i = 1 for every agent i. In Example 1, the negative condition (3.1) is reduced to erf εrρ + ¯ρ 2 ! < (1 − ¯ε)(1 − δn) . If parameters are such that erf(cid:16)εq ρ+¯ρ 2 (cid:17) < (1 − ¯ε), the above inequality holds for large n for any vanishing sequence {δn}∞n=1. This tells us that in fairly general circumstances, purely isolated society cannot achieve δ-perfect learning. Example 2 (Complete Graph) When the communication network Gn is a complete graph, and the benefit of getting n − 1 new signals justifies the discount of one communi- cation step, kn,σ∗ = n for every agent i. i In Example 2, we have erf εrρ + ¯ρn 2 ! > 1 − δn ¯ε , ∀n ∈ N , as a sufficient condition for δ-perfect learning, which translates to δn > 1 ¯ε 1 − erf εrρ + ¯ρn 2 !! . 26 (4.4) The sequence of the right hand sides of inequality (4.4) can serve as the learning rate. At the cost of getting a conservative estimate, we approximate the error function in order to get a more transparent learning rate. Note that the error function erf can be approximated by 1 − erf(x) < 1 √2π 1 x e−x2/2 . Therefore a sufficient condition for δ-perfect learning is δn > 1 √π ¯ε 1 ε√ρ + ¯ρn exp(cid:18)− ε2(ρ + ¯ρn) 4 (cid:19) . Keep other parameters fixed, and focus on the relations between population size n and δn. We see that δn could decrease in the order of exp (−¯ρε2n/5). This implies that when population grows, the probability that at least ¯ε fraction of people make the wrong decision decreases very quickly to zero. Following the idea of error function approximations, we go beyond Example 2 to consider a more general case in which kn,σ∗ i > f (n) for every agent i where f (n) is a deterministic sequence. A sufficient condition for δ-perfect learning is then δn > 1 √π ¯ε 1 exp(cid:18)− ε2(ρ + ¯ρf (n)) 4 (cid:19) . (4.5) εpρ + ¯ρf (n) If f (n) diverges to infinity as n goes to infinity, the right hand side of inequality (4.5) converges to 0. Keeping other parameters fixed, this implies δn could decrease in the order of exp(−¯ρε2f (n)/5). Formally, we summarize these discussions with the next proposition. Proposition 4 Suppose there exists a diverging sequence f (n) such that kn,σ∗ i > f (n) for any agent i in network Gn with associated equilibrium σn,∗, then δ-perfect learning could occur with learning rate {δn}∞n=1, where each δn is in the order of exp(−¯ρε2f (n)/5). The next example is a direct application of Proposition 4. Example 3 Suppose f (n) = C · n where 0 < C < 1, then δ-perfect learning could occur 27 with learning rate {δn}∞n=1, where each δn is in the order of exp(−¯ρε2Cn/5). An interpretation of this example is that, even if communication is sparse in the sense that each of the agents can only get a small proportion of information in the entire population, perfect learning can still be reached at a fast rate. This example represents a scenario in which communication networks in a society consist of dispersed social groups while agents within these social groups are very closely connected. This is related to interesting results pertaining to social cliques or homophily as discussed in Golub and Jackson (2012a,b,c). In most models, however, there is no universal bound for kn,σ∗ i . Lemma 3 in the supplementary materials renders Proposition 4 as a special case, but it still does not cover cases when direct conservative estimate for kn,σ∗ i is not feasible. Next we consider such a case: the binomial tree, which is widely considered as an axiomatic representation of various hierarchical structures in the human society Jackson (2010). In particular, as the information flow within a binomial tree can be either from the root to the leafs or from the leafs to the root, binomial trees can accommodate both the top-down and the bottom-up cases of information transmission in various real-world scenarios. Hence, it is instructive to analyze the binomial tree with a few different settings, where we generalize our game by allowing the information sensitiveness ψ = ψn to vary along the society {Gn}∞n=1. Example 4 (Binomial Tree: Information Flow from Root to Leafs) The agents in the communication network Gn form a binomial tree, where information can only flow from root to leafs. For simplicity, consider only the number of agents n such that n = 1 + 2 + 4 + ... + 2(mn−1), where mn is the number of layers in the binomial tree. The following graph illustrates such a binomial tree with three layers. 28 1 2 3 4 5 6 7 We will study two scenarios of this binomial tree, in both of which λ = r so that ¯r = 1/2. i) ψn = ρ = ¯ρ = 1. For agent 1 on the top layer, he should exit right after step 0 because he does not have any chance to receive others' private information. For agent 2 and 3, who are on the second top layer, they decide between step 0 and 1. A simple calculation on their pay off functions reveals that they should exit after step 0. Agents 4, 5, 6, 7 who are on the third layer potentially should decide between 0,1 and 2 steps. But since agents 2 and 3 cannot not pass through agent 1's info, step 2 is eliminated before any calculation. So agents on the third layer actually faces same decision problems as agents on the second layer. Continue with the same argument till the mn'th layer, we learn that everyone in the communication network exits right after she gets the private signal. Therefore, this scenario is the same as isolated points in terms of information aggregation. In general, as depicted in this subcase i), when the communication game is less information sensitive, the precision of the prior is higher, or the precision of the private signal is lower, it is less likely to achieve δ-perfect learning, even if the agents are well connected. ii) ψn < 2 ρ+(mn−1)¯ρ − 1 ρ+mn ¯ρ and ε2 < − 4 ¯ρ log(cid:16) 1 2q ρ+2¯ρ ρ+¯ρ(cid:17). Same as subcase i), agent 1 does not have a choice. For agents on the second layer to choose exit at step 1, we need ψn < 2 ρ+2¯ρ. For agents on the third layer to exit at step 2, we need ρ+¯ρ − 1 ψn < min(cid:26) 2 ρ + ¯ρ − 1 ρ + 2¯ρ , 2 ρ + 2¯ρ − 1 ρ + 3¯ρ(cid:27) = 2 ρ + 2¯ρ − 1 ρ + 3¯ρ . 29 In general, an agent on layer j wait till the j − 1 step if ψn < min{g(1), . . . , g(j − 1)} = g(j − 1) . where g(x) = 2 ρ+(x+1)¯ρ . The last equality holds because g(x) is a decreasing function, thanks to g′(x) < 0. Hence under equilibrium, agents on layer j have j ρ+x¯ρ − 1 signals. In particular, agents in the last layer each has mn = log2(n + 1) signals. Note that there are n+1 2 agents in this layer. Using (3.2), a similar derivation to that in Example 2 leads to that the learning rate δn should be δn > 1 nε¯ε√π log2(n+1) Xi=1 2j−1 1 √ρ + ¯ρj exp(cid:18)− ε2(ρ + ¯ρj) 4 (cid:19) . To unravel right hand side of the above inequality, we let h(x) = 2x−1 1 √ρ + ¯ρx exp(cid:18)− ε2(ρ + ¯ρx) 4 (cid:19) . Then h(x) is monotone increasing, because h(x + 1)/h(x) > 1 under our condition. Therefore, it is sufficient to have δn > 1 nε¯ε√π log2(n+1)·2log2(n+1)−1 (cid:19) . Therefore δn could decay in the order of plog(n + 1) · (n + 1)−ε2 ¯ρ/4, which is a pρ + ¯ρ log2(n + 1) exp(cid:18)− ε2(ρ + ¯ρ log2(n + 1)) polynomial rate. 1 4 Compared to the complete graph, the binomial tree aggregates information much slower. The difference in learning rates arises not only from the physical network struc- tures, but also from different strategic interactions among agents in the two environments. Next, we consider a twin case of the binomial tree, in which information flows in the op- posite direction. 30 Example 5 (Binomial Tree: Information Flow from Leafs to Root) Now let in- formation flow from leafs to root, i.e., reverse all the directed edges in Example 4. The following graph illustrates such a binomial tree with three layers. 1 2 3 4 5 6 7 We give the following results. The detailed analysis is similar to Example 4. i) ψn = ρ = ¯ρ = 1. All agents exit after time 0. ii) ψn < 2 ρ+2(mn−1) ¯ρ − 1 ρ+2mn ¯ρ. All agents get the maximum number of signals that they could possibly get, then δn can be such that δn > 1 nε¯ǫ√π log2(n+1) Xj=1 2j−1 1 pρ + 2(mn−j+1) ¯ρ exp(cid:18)− ε2(ρ + 2(mn−j+1) ¯ρ) 4 (cid:19) . A conservative estimate on the summation on the right hand side would give δn ∼ n−3/4, a much faster rate than that in Example 4 when ε2 ¯ρ ≪ 3, which can be considered as a typical case as we have in mind very small ε. Note that different information flow directions matter for learning rates. When pa- rameters are in comparable range, the bottom-up case exhibits a higher learning rate than the top-down case does. In other words, the bottom-up organization of information flow within a binomial tree is more efficient in terms of aggregating information. This result is consistent with early economics and sociology literature; Hayek (1945) for example, highlight the importance of dispersed information sources. The four sub-cases under binomial tree setting demonstrate that beyond a directed graphical model, contextual information is also very important for information aggre- gation. These comparisons are made possible only with help of our concept of finite 31 population learning and δ-perfect learning. Properties or statistics of the graph alone cannot determine the learning status. Rather, as we argued from the very beginning of this work, the enriched game theory plus graphical modeling approach are both interesting and necessary in helping understand the information aggregation in social networks. 5 Remarks and Further Research We have proposed a finite population learning concept to capture the level of information aggregation in any given communication network. In our framework, one equilibrium out- come, i.e., the number of signals obtained by an agent when she makes a decision, plays a key role. This equilibrium outcome is computable (Mckelvey and Mclennan (1996)), which also allows us to numerically check the learning status. Different from existing literature that mainly addresses the learning behavior at the limit, this new concept helps reveal explicit interplays among time discount, frequency of communication, information precision and information sensitiveness of the decision problem in any finite communica- tion network. As the total amount of information is fixed in a given finite network, our approach enables meaningful comparative statics regarding the effectiveness of informa- tion aggregation in networks. We also provide conditions for learning under a particular equilibrium, under any equilibrium, and under all equilibria, respectively. Thanks to its tractability and transparency, the finite population learning concept offers a solid foun- dation to investigate long run dynamics of learning behavior and the associated learning rates as population diverges. Our analysis is also subject to certain limitations, which suggest directions for future research. In our model, complete information on the structure of a given communication network is required in determining the number of signals obtained by an agent, and in checking its corresponding learning status. In some circumstances, researchers do not want to assume such specific information; rather they want to get some understanding of the learning status regarding a large class of networks. This goal calls for some new 32 criteria that can determine the learning status for given classes of networks with given finite population; ideally, these criteria should be formulated in terms of some summary statistics of these networks. Relaxing the knowledge on specific network structure may also lead to more general results about the learning rates. However, this task is challenging within the current finite population learning framework. Specifically, our established conditions for finite population learning require all agents' exact numbers of signals upon their exits. Only knowing some commonly used summary statistics of the associated graphs can hardly help offer good estimates of these numbers of signals, mostly because these numbers of signals are also affected by other parameters not directly related to the network structure, such as the information precisions and the tolerances of learning. Therefore, the learning status of a certain class of communication networks is largely undetermined if we just consider properties of the graphs. To address this issue, we would like to have novel statistical properties of communication networks that are more friendly to the analysis of communication learning. Golub and Jackson (2012a,b,c) are promising attempts towards this direction, but their results are limited to the context of non-Bayesian observational learning. Another line of generalization is to make our model more flexible and realistic. For example, the current setting assumes that agents have private signals with the same precision, which amounts to assuming that the total amount of information grows linearly with the population size when we consider the perfect learning. It might be interesting to allow the total information to increase in a nonlinear (e.g., log rate) fashion with the population size, and allow non-uniform distribution of signal precisions among agents. Also, even when we focus on certain classes of networks without specifying complete network structure, it is still assumed that any agent in the communication network knows the complete network structure. This assumption can be relaxed by limiting agents' knowledge on the network to a certain local neighborhood, and infer other parts of the network according to her local knowledge. Keeping the Bayesian learning paradigm, other potential generalizations of our current work include considering the implications of 33 correlated private information among agents, and heterogeneous characteristics of agents. 34 References Acemoglu, D., Bimpikis, K. and Ozdaglar, A. (2012a). Dynamics of information exchange in endogenous social networks. Theoretical Economics. Acemoglu, D., Carvalho, V., Ozdaglar, A. and Tahbaz-Salehi, A. (2012b). The network origins of aggregate fluctuations. Econometrica. Acemoglu, D., Dahleh, M., Lobel, I. and Ozdaglar, A. (2009). Rate of conver- gence of learning in social networks. Proceedings of the American Control Conference. Acemoglu, D., Dahleh, M., Lobel, I. and Ozdaglar, A. (2011). Bayesian learning in social networks. Review of Economic Studies, 78 1201 -- 1236. Acemoglu, D. and Ozdaglar, A. (2010). Opinion dynamics and learning in social networks. Dynamic Games and Applications, 1 3 -- 49. Banerjee, A. (1992). A simple model of herd behavior. Quarterly Journal of Economics, 107 797 -- 817. Banerjee, A. and Fudenberg, D. (2004). Word-of-mouth learning. Games and Eco- nomic Behavior, 46 1 -- 2. Bikhchandani, S., Hirshleifer, D. and Welch, I. (1992). A theory of fads, fashion, custom, and cultural change as informational cascades. Journal of Political Economy, 100 992 -- 1026. Crawford, V. and Sobel, J. (1982). Strategic information transmission. Econometrica, 50 1431 -- 1451. DeGroot, M. (1974). Reaching a consensus. Journal of the American Statistical Asso- ciation, 69 118 -- 121. DeGroot, M. (2003). Persuasion bias, social influence, and unidimensional opinions. Quarterly Journal of Economics, 118 909 -- 968. 35 Galeotti, A., Ghiglino, C. and Squintani, F. (2011). Strategic information trans- mission in networks. working paper. Golub, B. and Jackson, M. (2010). Naive learning in social networks and the wisdom of crowds. American Economic Journal: Microeconomics, 2 112 -- 149. Golub, B. and Jackson, M. (2012a). Does homophily predict consensus times? testing a model of network structure via a dynamic process. Review of Network Economics. Golub, B. and Jackson, M. (2012b). How homophily affects the speed of learning and best-response dynamics. Quarterly Journal of Economics. Golub, B. and Jackson, M. (2012c). Network structure and the speed of learning: Measuring homophily based on its consequences. Annals of Economics and Statistics. Goyal, S. (2009). Connections: An Introduction to the Economics of Networks. Prince- ton University Press. Hagenbach, J. and Koessler, F. (2010). Strategic communication networks. Review of Economic Studies, 77 1072 -- 1099. Hayek, F. (1945). The use of knowledge in society. The American Economic Review, 35 519 -- 530. Jackson, M. (2010). An Overview of Social Networks and Economic Applications. North Holland. Kolacazyk, E. (2009). Statistical Analysis of Network Data: Methods and Models. Springer. Mckelvey, R. and Mclennan, A. (1996). Computation of Equilibria in Finite Games. Elsevier. Mobius, M., Phan, T. and Szeidl, A. (2010). Treasure hunt. working paper. 36 Muller-Frank, M. (2012). A general framework for rational learning in social networks. Theoretical Economics. Newman, M. (2010). Networks: an Introduction. Oxford University Press. Smith, L. and Sorensen, P. (2000). Pathological outcomes of observational learning. Econometrica, 68 371 -- 398. Smith, L. and Sorensen, P. (2008). Rational social learning with random sampling. working paper. Topkis, D. (1979). Equilibrium points in non-zero sum n-person submodular games. SIAM Journal of Control and Optimization, 17 773 -- 787. 37 Supplementary Materials The supplementary materials provide proofs and generalized results of corresponding parts in the main text. Proof of Proposition 1. To prevent (ε, ¯ε, δ)-learning, it is enough to show that a lower bound of Pσn,∗(cid:0) 1 ity, nPn i=1 (1 − M n,ε i ) > ¯ε(cid:1) is greater than δ. It follows from Markov inequal- erf εs ρ + ¯ρkn,σ∗ i = n−1(1−¯ε)−1 Eσn,∗ M n,ε Xi=1 Xi=1 2 n n i   . Pσn,∗ 1 n n Xi=1 M n,ε i > 1 − ¯ε! 6 n−1(1−¯ε)−1 This implies that Pσn,∗ 1 n n Xi=1 (1 − M n,ε i ) > ¯ε! > 1 − n−1(1 − ¯ε)−1 n Xi=1 Therefore, it is enough to take erf εsρ + ¯ρkn,σ∗ 2 i   . 1 − n−1(1 − ¯ε)−1 n Xi=1 erf εs ρ + ¯ρkn,σ∗ 2 i   > δ , which concludes that condition (3.1) is necessary for (ε, ¯ε, δ)-learning. To ensure (ε, ¯ε, δ)-learning, note that Pσn,∗ 1 n n Xi=1 (1 − M n,ε i ) > ¯ε! 6 Eσn,∗ (Pn i=1(1 − M n,ε n¯ε i )) = n −Pn i=1 erf(cid:18)εq ρ+¯ρkn,σ∗ 2 (cid:19) i . n¯ε Demanding the right hand side of the above inequality no larger than δ, is the same as assuming condition (3.2). This completes the proof. The following provides a more general sufficient condition for δ-perfect learning. Given equilibria {σn,∗}∞n=1, let f1 > f2 > . . . > fJ , where each fj(n) is a monotone increasing 1 function (not necessarily strictly increasing) on n, and let {bj n, j = 1, . . . , J} be such that {i : kn,σ∗ n i > f1(n)} > b1 n , {i : f1(n) > kn,σ∗ i > f2(n)} n > b2 n , and up until {i : fJ−1(n) > kn,σ∗ i > fJ (n)} n > bJ n . n 6 1. The rest agents i's are such that Clearly, b1 fJ (n) > kn,σ∗ n ∈ (0, 1) and 0 6 b1 n, . . . , bJ i > 1. Their fraction is at most 1 − (b1 n + . . . + bJ n + . . . + bJ n). Lemma 3 δ-perfect learning occurs if j=1 bj n = 1, (a) limn→∞PJ (b) for each j ∈ {1 . . . , J}, limn→∞ bj n(cid:18)1 − erf(cid:18)εq ρ+¯ρfj (n) 2 (cid:19)(cid:19) = 0 . Proof of Lemma 3. Recall that a sufficient condition for (ε, ¯ε, δn)-learning is 1 n n Xi=1 erf εs ρ + ¯ρkn,σ∗ 2 i   > 1 − δnε . Then by the definition of bj n and fj, it is enough to have erf εrρ + ¯ρfj(n) 2 ! · bj n + 1 − J Xj=1 J Xj=1 This translates to bj n! erf εr ρ + ¯ρ 2 ! > 1 − δnε . δn > 1 ¯ε J Xj=1 bj n 1 − erf εrρ + ¯ρfj(n) 2 !! + 1 − J Xj=1 bj n! 1 − erf εr ρ + ¯ρ 2 !!! . To ensure the existence of {δn} such that limn→∞ δn = 0, it is enough to have 2 j=1 bj n = 1 and limn→∞PJ bj n 1 − erf εrρ + ¯ρfj(n) 2 !! = 0, for j ≤ J. lim n→∞ Note that if fj does not increase strictly for n > N∗, bj n needs to decrease to 0. Also, allowing more than one tolerances among ε, ¯ε, δ to vary with population size n leads to interesting learning results. In particular, from the proof of Lemma 3, a sufficient condition for (ε, ¯εn, δn)- learning is δn ¯εn > J Xj=1 bj n 1 − erf εrρ + ¯ρfj(n) 2 !! + 1 − J Xj=1 bj n! 1 − erf εrρ + ¯ρ 2 !! . In this condition, the role of δn and that of ¯εn are completely interchangeable, which implies that we can trade in some probabilistic confidence for some fraction of agents who make wrong decisions. The following provides a generalized version of Lemma 2 when Assumption 2 is relaxed. Lemma 4 (Generalized Lemma 2) For any agent i, either the communication steps she optimally experiences before taking an action in any social network Gn along a society {Gn}∞n=1 is bounded from above by a constant independent of n, or she waits until the maximum allowable step. Specifically, (a) If (ρ + ¯ρ)ψ > 1, then for any agent i ln,σ∗ i 6 ln i < min(cid:26)(Ln i )max, ln(cid:18)1 − 1 (ρ + ¯ρ)ψ(cid:19) / ln ¯r(cid:27) , where ln i stands for agent i's optimal communication rounds given that other agents wait till the maximum allowable step. (b) If (ρ + ¯ρ)ψ 6 0 (equivalently, ψ ≤ 0), then for any agent i ln,σ∗ i = ln i = (Ln i )max . 3 (c) If 0 < (ρ + ¯ρ)ψ 6 1, then there are two subcases. (c.1) For agent i with lim n→∞Bn i < 1 − ρψ ¯ρψ , where Bn i is the set of agents whose signals agent i can get if no one exits before maximum allowable step, we have ln,σ∗ i = ln i = (Ln i )max . lim n→∞Bn i > 1 − ρψ ¯ρψ , ln,σ∗ i 6 ln i 6 min(cid:16)(Ln i )max, l{Gn}∞ i n=1 (cid:17) , (c.2) For agent i with we have either or ln,σ∗ i = (Ln i )max , is a constant that depends on the society and agent i's position where l{Gn}∞ n=1 i in the society, but does not change with n. Proof of Lemma 4. We proceed case by case. Case (a), (ρ + ¯ρ)ψ > 1. In this case, agent i enjoys a positive payoff ψ − 1 ρ+¯ρ if she exists at t = 0 and does not communicate with anyone else. Note that her expected payoff by taking ln i communication steps is strictly upper bounded by ¯rln i ψ. Therefore, it is suboptimal for her to choose a ln i such that which implies ¯rln i ψ 6 ψ − 1 ρ + ¯ρ , ln i < ln(cid:18)1 − 1 (ρ + ¯ρ)ψ(cid:19) / ln ¯r 4 is necessary for agent i's optimality. It is obvious that ln,σ∗ i 6 ln i , since other agents do not necessarily wait forever in an equilibrium, so that it may be optimal for agent i to exit earlier too. We get the result by combining these with the upper bound ln i 6 (Ln i )max. Case (b), (ρ + ¯ρ)ψ 6 0. Now agent i always gets a negative payoff whenever she exits. Because waiting dis- counts the negative payoff, she optimally chooses to wait as long as possible, no matter i = ln what other agents do. Therefore, ln,σ∗ i = (Ln Case (c.1), 0 < (ρ + ¯ρ)ψ 6 1 and limn→∞ Bn The maximum number of private signals agent i can get is Bn i = (Ln gets a negative payoff whenever she exists. Hence, ln,σ∗ i )max. i < 1−ρψ ¯ρψ . i . Again, agent i always i )max . i = ln i > 1−ρψ ¯ρψ . Case (c.2), 0 < (ρ + ¯ρ)ψ 6 1 and limn→∞ Bn For any Gn with Bn i > 1−ρψ ¯ρψ , we consider the communication step (Ln i )max when agent i obtains signals from all her sources Bn i , provided others wait maximum steps. Note that (Ln and Bn i )max is non-decreasing in n for any agent i (by the no deleting assumption), i,l is strictly monotone increasing in l when l 6 (Ln i )max. Also for a given communication network Gn, there exists one communication step ln′ i such that after this step agent i gets positive payoff, given that other agents wait maximum steps. Hence, it is suboptimal for her to wait longer than ln′ i if ¯rψ 6 ψ − which implies 1 ρ + ¯ρBn i i,ln′ , Bn i,ln i < λ + r − ρrψ ¯ρrψ (5.1) is necessary for agent ln i 's optimality. Now we consider two sub-cases. First is when limn→∞ Bn i < ∞. Then we must have limn→∞(Ln i )max < ∞ , since (Ln i )max 6 Bn i . Hence, ln i 6 lim n→∞ (Ln i )max < ∞ , 5 for all Gn satisfying Bn l{Gn}∞ 1i n=1 i > 1−ρψ ¯ρψ and limn→∞ Bn i < ∞. We denote limn→∞(Ln i )max as , which is a constant that depends on the society and agent i's position in the society and does not change with respect to n. Second, we discuss the case when limn→∞ Bn i )max < ∞ or limn→∞(Ln limn→∞(Ln i )max = l{Gn}∞ limn→∞(Ln n for any given i and Bn Gn, there exists a largest GN with its associated (LN n=1 1i i = ∞. Now there should be either i 6 i )max = ∞ . In the former scenario, we have ln for all Gn. In the latter case, as (Ln i )max is non-decreasing in i,l is strictly monotone increasing in l when l 6 (Ln i )max for any i )max that satisfies condition (5.1). Hence, by (5.1) we obtain ln i 6 (LN i )max , for all Gn satisfying Bn i )max as l{Gn}∞ such (LN 2i n=1 ¯ρψ , limn→∞ Bn i > 1−ρψ i )max = ∞ . We denote , which is again a constant that depends on the society and agent i = ∞ and limn→∞(Ln i's position in the society and does not change with respect to n. To sum up, we denote i n=1 either l{Gn}∞ by l{Gn}∞ agent i in such Gn with Bn or l{Gn}∞ i > 1−ρψ n=1 1i 2i n=1 in respective cases, and it follows ln i 6 l{Gn}∞ i n=1 for ¯ρψ , where l{Gn}∞ i n=1 is independent of n. As for ln,σ∗ i , since other agents play equilibrium strategies, agent i gets weakly fewer signals than that she can get when other agents wait maximum steps. There can be two cases, either she gets positive payoff and takes an action weakly earlier, namely, ln,σ∗ i 6 ln i , or she cannot get enough signals to ensure a positive payoff so that she optimally until the maximum allowable step, i.e., ln,σ∗ i = (Ln i )max. This concludes the proof. Proof of Proposition 3. By Lemma 3, it suffices to show that limn→∞ kn,σ∗ = ∞ under any equilibria {σn,∗}∞n=1 for any socially informed agent i. In the following, we consider a fixed socially informed agent i. Recall that in Definition 6, Li is defined as the smallest positive integer such that limn→∞ Bn signals can reach i in the first l rounds of communication under equilibrium σn,∗. i,Li = ∞ . Denote by Bn,σ∗ the set of agents whose i,l i The problem is simple when Li = 1. Clearly, Bn,σ∗ i,1 = Bn i,1 under any equilibrium σn,∗. 6 As agent i is socially informed, we have for sufficiently large n ψ − 1 ρ + ¯ρBn,σ∗ i,1 > 0 under any σn,∗ and ¯r ψ − 1 ρ + ¯ρBn,σ∗ i,1 ! > ψ − 1 ρ + ¯ρ under any σn,∗ . The above display implies that agent i should at least wait for one communication under any σn,∗ for sufficiently large n. As a consequence, = limn→∞ Bn > Bn,σ∗ i > limn→∞ Bn,σ∗ round. Hence, kn,σ∗ limn→∞ kn,σ∗ i,1 = ∞ under any {σn,∗}∞n=1. i,1 i i,1 The following discussion is on the cases when Li > 2. We proceed through three steps. Step 1. We claim when Li > 2, for sufficiently large n, there exists at least one path {jLi−1, jLi−2, ..., j1, i} from jLi−1 to i such that lim n→∞Bn jLi−l,l = ∞ for all l ∈ {1, . . . , Li − 1} . (5.2) i,Li−1\Bn i,j = ∞, Bn Now we construct the path {jLi−1, jLi−2, ..., j1, i} that satisfies condition (5.2). Because Li is the smallest integer j such that limn→∞ Bn i,Li−2, the set of agents that are of distance Li − 1 to i, must be finite in the limit, i.e., limn→∞ Bn i,Li−2 < ∞. Therefore, there is at least one agent j of distance Li−1 to i, such that limn→∞ Bn j,1 = ∞. We denote one of such agents j as jLi−1. If Li = 2, the desired path has been constructed. When Li > 3, choose any path {jLi−1, jLi−2, ..., j1, i} from the chosen jLi−1 to i. Clearly, jLi−l ∈ Bn i,Li−l. Moreover, condition (5.2) is satisfied in view of limn→∞ Bn jLi−1,1 = ∞. i,Li−1 \ Bn Step 2. We next argue that when Li > 2, agent jLi−l on the path {jLi−1, jLi−2, ..., j1, i} will not exit before she experiences l communication steps under any equilibrium σn,∗ provided that n is sufficiently large. It is worth noting that agent jLi−l does not necessarily get a positive payoff when she experiences l communication steps in equilibrium. We will see this by induction from jLi−1 to j1 sequentially. We first show that agent jLi−1 will not exit before she experiences her first communication step in any equilibrium 7 σn,∗ provided that n is sufficiently large. It requires that there exists N such that for all social networks Gn ∈ {Gn}∞n=1 and its associated equilibrium σn,∗ with n > N, ¯r ψ − 1 jLi−1,1! > ψ − ρ + ¯ρBn,σ∗ 1 ρ + ¯ρ . (5.3) To validate condition (5.3), recall condition (4.3) from Definition 6 for l = Li − 1, which states that there exists N such that for all social networks Gn ∈ {Gn}∞n=1 with n > N it holds ¯r ψ − ρ + ¯ρBn 1 i,Li! > ψ − 1 ρ + ¯ρBn i,Li−1 . (5.4) By the definition of Li, the construction of jLi−1 and the fact that Bn,σ∗ jLi −1,1 = Bn jLi−1,1 under any equilibrium σn,∗ with any n, we know that limn→∞ Bn,σ∗ jLi−1,1 = limn→∞ Bn jLi−1,1 = ∞ under any σn,∗ and limn→∞ Bn i,Li−1 < ∞. Also we have Bn i,Li−1 > 1. Note that the right hand side of condition (5.4) is greater than or equal to the right hand side of condition (5.3), we obtain easily that (5.3) holds for sufficiently large n. Hence we get that agent jLi−1 will not exit before she experiences her first communication step under any σn,∗ provided that n is sufficiently large. We then show that agent jLi−2 (for Li ≥ 3) will not exit before she experiences her second communication step under any equilibrium for sufficiently large n. It requires that there exists N such that for all social networks Gn ∈ {Gn}∞n=1 and its associated equilibrium σn,∗ with n > N, ¯r2 ψ − 1 jLi−2,2! > ψ − ρ + ¯ρBn,σ∗ 1 ρ + ¯ρ , and ¯r2 ψ − 1 jLi−2,2! > ¯r ψ − ρ + ¯ρBn,σ∗ 1 jLi−2,1! . ρ + ¯ρBn,σ∗ (5.5) (5.6) To validate (5.5) and (5.6), we use again the condition (4.3) from Definition 6 for l = Li − 2 and l = Li − 1, which state that there exists N such that for all social networks 8 Gn ∈ {Gn}∞n=1 with n > N we have ¯r2 ψ − 1 i,Li! > ψ − ρ + ¯ρBn and ¯r2 ψ − 1 i,Li! > ¯r ψ − ρ + ¯ρBn 1 ρ + ¯ρBn i,Li−2 , 1 ρ + ¯ρBn i,Li−1! . (5.7) (5.8) jLi−2,2 = limn→∞ Bn Similarly, by the definition of Li and the construction of jLi−1 and jLi−2, we know that limn→∞ Bn i,Li−2 < ∞, and limn→∞ Bn,σ∗ jLi−2,1 < ∞ under any equilibrium σn,∗. Also we have Bn jLi−2,1) for any n under any equilibrium σn,∗. Note that the right hand side of condition (5.7) is i,Li−1 < ∞, limn→∞ Bn i,Li = ∞, limn→∞ Bn i,Li−2 > 1 and Bn,σ∗ jLi−2,1 ⊆ Bn jLi−2,1 6 limn→∞ Bn jLi−2,1 ⊆ Bn i,Li−1 (and thus Bn i,Li−1 > Bn jLi−2,1 > Bn,σ∗ greater than or equal to the right hand side of condition (5.5), and the right hand side of condition (5.8) is greater than or equal to the right hand side of condition (5.6). Then it can be verified that the next two inequalities hold for sufficiently large n, the right hand sides of which are the same as those in conditions (5.5) and (5.6): ¯r2 ψ − 1 ρ + ¯ρBn jLi−2,2! > ψ − 1 ρ + ¯ρ , and ¯r2 ψ − 1 ρ + ¯ρBn jLi−2,2! > ¯r ψ − 1 jLi−2,1! . ρ + ¯ρBn,σ∗ (5.9) (5.10) Furthermore, recall that we have already shown that agent jLi−1 will not exit before she experiences her first communication step under any equilibrium σn,∗ provided that n jLi−1,1 ⊆ Bn,σ∗ is sufficiently large, which implies that Bn,σ∗ jLi−2,2 under any σn,∗ for sufficiently jLi−2,2 > limn→∞ Bn,σ∗ large n, and thus limn→∞ Bn,σ∗ jLi−1,1 = ∞ under any equilibrium σn,∗. Also we know that limn→∞ Bn,σ∗ jLi−2,1 < ∞. Together with conditions (5.9) and (5.10), these facts validate conditions (5.5) and (5.6). Hence we get that agent jLi−2 will not exit before she experiences her second communication step in any σn,∗ provided that n is 9 sufficiently large. The arguments above for jLi−2 can be extended successively to j1. Hence, under any equilibrium σn,∗, no jLi−l in the established path {jLi−1, jLi−2, ..., j1, i} will exit before she experiences l communication steps under any equilibrium σn,∗ provided that n is sufficiently large. A byproduct is that limn→∞ Bn,σ∗ jLi−l,l = ∞ under any σn,∗, for l ∈ {1, 2, ..., Li − 1}. Step 3. Finally, we argue that the socially informed agent i will not exit before she experiences Li communication steps under any equilibrium σn,∗ when n is sufficiently large. It requires that there exists N ∈ N such that for all social networks Gn ∈ {Gn}∞n=1 with n > N, we have ψ − 1 > 0 , ρ + ¯ρBn,σ∗ i,Li i,Li ! > ¯rl ψ − 1 ρ + ¯ρBn,σ∗ 1 ρ + ¯ρBn,σ∗ i,l ! , (5.11) (5.12) and for all l < Li. ¯rLi ψ − Recall that we have already shown that agent jLi−l in the constructed path will j2,Li−2 ⊆ ... ⊆ Bn,σ∗ i,Li > limn→∞ Bn,σ∗ j1,Li−1 ⊆ Bn,σ∗ j1,Li−1 > ... > limn→∞ Bn,σ∗ not exit before she experiences Li − l communication steps for l ∈ {1, 2, ..., Li − 1}, under any equilibrium σn,∗ provided that n is sufficiently large, which implies that jLi−1,1 ⊆ Bn,σ∗ Bn,σ∗ limn→∞ Bn,σ∗ der any σn,∗. Also, we have Bn,σ∗ i,Li under any σn,∗ for sufficiently large n, and thus jLi−1,1 = ∞ un- i,l, under any σn,∗ for l ∈ {1, 2, ..., Li− 1}, which implies the right hand sides of condition (4.3) are greater than or equal to th right hand sides of condition (5.12), for l ∈ {1, 2, ..., Li − 1}. Moreover, we know that limn→∞ Bn,σ∗ i,l < ∞ for l ∈ {1, 2, ..., Li − 1} by the definition of Li. Together with conditions (4.2) and (4.3) in Definition 6, these facts validate con- jLi−2,2 > limn→∞ Bn,σ∗ 6 limn→∞ Bn i,l i,l ⊆ Bn i,l and thus Bn,σ∗ i,l 6 Bn ditions (5.11) and (5.12). Hence we get that the socially informed agent i will not exit before she experiences Li communication steps and she can enjoy a positive payoff when she experiences Li communication steps, under any σn,∗ provided that n is sufficiently 10 large. This further implies kn,σ∗ finally leads to limn→∞ kn,σ∗ when Li > 2. This concludes the proof. i > Bn,σ∗ > limn→∞ Bn i i,Li under any σn,∗ with sufficiently large n, which i,Li = ∞ under any σn,∗ i,Li = limn→∞ Bn 11
1803.08858
1
1803
2018-03-23T16:07:05
Twitter and the Press: an Ego-Centred Analysis
[ "cs.SI" ]
Ego networks have proved to be a valuable tool for understanding the relationships that individuals establish with their peers, both in offline and online social networks. Particularly interesting are the cognitive constraints associated with the interactions between the ego and the members of their ego network, whereby individuals cannot maintain meaningful interactions with more than 150 people, on average. In this work, we focus on the ego networks of journalists on Twitter, and we investigate whether they feature the same characteristics observed for other relevant classes of Twitter users, like politicians and generic users. Our findings are that journalists are generally more active and interact with more people than generic users. Their ego network structure is very aligned with reference models derived from the social brain hypothesis and observed in general human ego networks. Remarkably, the similarity is even higher than the one of politicians and generic users ego networks. This may imply a greater cognitive involvement with Twitter than with other social interaction means. Moreover, the ego networks of journalists are much stabler than those of politicians and generic users, and the ego-alter ties are often information-driven.
cs.SI
cs
Twitter and the Press: an Ego-Centred Analysis Chiara Boldrini IIT-CNR Pisa, Italy [email protected] Marco Conti IIT-CNR Pisa, Italy [email protected] Mustafa Toprak IIT-CNR Pisa, Italy [email protected] [email protected] Andrea Passarella IIT-CNR Pisa, Italy as it is known that many traits of social behaviour (resource shar- ing, collaboration, diffusion of information) are chiefly determined by its structural properties [16]. In an ego network, the individual, referred to as ego, is at the center of the graph, and the edges con- nect her to the peers (called alters) with which she interacts. The ego-alter tie strength is typically computed as a function of the frequency of interactions between the ego and the alter. Grouping these ties by their strength, a layered structure emerges in the ego network (Figure 1), with the inner circles containing the socially closest peers and the outer circles the more distant relationships. According to the social brain hypothesis from evolutionary psycol- ogy [6], the existence and sizes of the groups are determined by the maximum cognitive capacity of the brain that humans can allocate to meaningful social relationships, i.e., beyond the mere level of acquaintances. In this model, five layers exist within the limit of the Dunbar number, which is the maximum number of social rela- tionships (around 150) that an individual, on average, can actively maintain [10, 18]. Beyond the Dunbar number, relationships are just acquaintances and their maintenance has a negligible effect on the cognitive resources. Figure 1 illustrates the typical sizes of each layer (1.5, 5, 15, 50, 150). ABSTRACT Ego networks have proved to be a valuable tool for understand- ing the relationships that individuals establish with their peers, both in offline and online social networks. Particularly interesting are the cognitive constraints associated with the interactions be- tween the ego and the members of their ego network, whereby individuals cannot maintain meaningful interactions with more than 150 people, on average. In this work, we focus on the ego net- works of journalists on Twitter, and we investigate whether they feature the same characteristics observed for other relevant classes of Twitter users, like politicians and generic users. Our findings are that journalists are generally more active and interact with more people than generic users. Their ego network structure is very aligned with reference models derived from the social brain hypothesis and observed in general human ego networks. Remark- ably, the similarity is even higher than the one of politicians and generic users ego networks. This may imply a greater cognitive involvement with Twitter than with other social interaction means. Moreover, the ego networks of journalists are much stabler than those of politicians and generic users, and the ego-alter ties are often information-driven. CCS CONCEPTS • Networks → Online social networks; • Human-centered computing → Social network analysis; • Mathematics of com- puting → Graph theory; KEYWORDS online social networks, ego networks, Twitter, journalists 1 INTRODUCTION Online Social Networks are one of the most prominent examples of cyber-physical convergence: social relationships that previously could exist only in the offline world are now transported into the virtual, online dimension and new interactions are enabled that were not possibile before. OSN are thus at the same time very similar and very different from offline social networks, and for this reason several researchers have tried to understand if and to which extent they obey to the same common principles. Ego networks are the graph-based abstraction that is typically used to study the social relations between an individual and its peers [8, 10, 12, 13]. The ego network is an important abstraction, Figure 1: Layered structure of human ego networks Quite interestingly, ego networks formed through many in- teraction means, including face-to-face contacts, letters, phone calls, emails, and, remarkably, also OSN, are well aligned with this model [18]. Specifically, Dunbar et al. [7] have found very similar properties also in Facebook and Twitter ego networks. In this sense, OSN become one of the outlets that is taking up the brain capacity of humans, and thus are subject to the same limitations that have been measured for more traditional social interactions, but are not capable of "breaking" the limits imposed by cognitive constraints to our social capacity. Tie strengths and how they determine ego network structures have been the subject of several additional work. For example, in [9] authors provide one of the first evidences of the existence of an ego network size comparable to the Dunbar's num- ber in Twitter. The relationship between ego network structures and the role of users in Twitter was analysed in [14]. In general, ego network structures are also known to impact significantly on the way information spreads in OSN, and the diversity of information that can be acquired by users [1]. Thanks to its public API and its impressive number of users (330 million active users as of October 20171), Twitter is one of the most studied OSN in the related literature on social networking. Generic users on Twitter have received a lot of attention, where the aim was to characterise how they engage with the platform [11], interact with each other, and how real life affects what we observe on Twitter and vice versa [17]. However, users on Twitter are not created equal: their behaviour on the platform is intertwined to their social status and their job. For this reason, researchers have recently focused their attention to special classes of Twitter users that, for one reason or another, can be singled out. For example, Arnaboldi et al. [3] have studied how politicians engage with other people on Twitter, highlighting that, while the same ego network structure appears, there is a significant difference with respect to generic users in terms of ego network variability and amount of information-driven relationships. Another interesting category of Twitter users is that of journal- ists. Previous research has highlighted how journalists use Twitter as a platform for personal branding [4] and to promote content from their news websites [15]. In this sense, journalists share with politi- cians many of the same motivations for using Twitter. However, no previous work has studied how journalists create and maintain social relationships on Twitter, and whether this resembles what we observe for similar categories of users or for generic users. Thus, in this paper, exploiting the ego network abstraction described above, we investigate the activity of journalists on Twitter in terms of how they engage with other users. We found that journalists are significantly more active than the average generic users and that they have a marked preference for social communications involving retweets. From the ego network's standpoint, journalists feature a layered structure that is is very similar to the general ego network model of Figure 1, sometimes much more than what has been observed for other types of Twitter users. Specifically, the size of the active network is much closer to the theoretical value of 150, and very similar to the one observed in offline ego networks before the diffusion of OSN. This is a surprising result, that may indicate that journalists invest a large portion, compared to other types of users, of their social capacity on Twitter. The ego networks of journalists are also very stable over time, and this is very different from the findings about politicians and generic users on Twitter [3]. This may be due to the fact that journalists use Twitter less as a leverage to win people over and more as a social communication tool. Finally, we show that many ego-alter relationships are information-driven: they are often activated by a hashtag, their future interactions also involve hashtags, and this holds true approximately for all the layers with the same intensity. 1Source: Wikipedia 2 2 THE DATASET We downloaded the timeline for the journalists belonging to the Italian journalists list at https://twitter.com/stampa_tweet/lists/ giornalisti. This list comprises 492 journalists that are the most popular in Italy. Due to the Twitter API limitations, only the 3200 most recent tweets could be downloaded for each journalist. Of these 492 members, we discard those with a protected timeline and with zero tweets, ending up with 486 journalists. All of them are long-time Twitter users, since their most recent registration dates back to 2012. However, as we will discuss later on, not all of them are equally engaged with the Twitter platform. 2.1 Observability The 3200 tweets limitation imposed by the Twitter API affects journalists' timelines non uniformly. Specifically, around 69% of users (corresponding to 335 out of the 486 journalists) have posted more tweets than what we are able to download. We refer to these users as partially observed. This is a significant difference with respect to the dataset analysed in [2], where, for 98% of users, 3200 tweets were enough to cover the whole Twitter activity. Please note that being partially or fully observed is an indirect measure of the user's tweeting frequency: the more the tweets posted, the quicker the 3200 slots are saturated. Indeed, the average daily tweeting frequency is 0.6 for the fully observed users and 6.0 for the partially observed ones (which, anyway, is still a feasible value for truly human Twitter activity). We refer to the portion of timeline that we are able to observe as observed timeline. When the 3200 tweets limitation does not kick in, the observed timeline overlaps with the active timeline, which we estimate as the Twitter activity since the user registration on Twitter2. While the distinction between partially observed and fully observed users is binary, the actual coverage of the observed timeline with respect to the active timeline is more nuanced. Hence, the percentage of active timeline observed typically changes on a per user basis. The direct consequence of the uneven time coverage of the observed timelines is that the number of tweeting journalists in our dataset constantly increases over time starting from 2007, because the most active users are present only in the most recent intervals. Figure 2 shows how this impacts on the daily volume of tweets generated over time. We plot in gray the time series of total observed tweets per day, while in blue we plot the number of users with active observed timeline (i.e., for which the coverage of the 3200 tweets has already started). While the growth in the the number of active users is approximately linear, the increase in the observed tweets is exponential. This further highlights one of the characteristics of this dataset: the most active users are only observed for a short amount of time but they are the ones that impact the most on the number of generated tweets. 2.2 Data cleaning and filtering Not all the downloaded timelines are suitable for either a general analysis of the behaviour of journalists on Twitter or for the ego network analysis. In fact, some journalists may have left Twitter long ago, others may use it only sporadically, others may feature 2The real active timeline would be the time between the first and last tweet. However, in this case the time of the first tweet is unknown due to the API limitations. Occasional users are not interesting for our analysis, since their engagement with the platform is low and so is their cognitive in- volvement. For this reason, in the following we will focus on regular and active users only (corresponding to the green bar in Figure 3), which amount to 387 journalists in total. Figure 3: User classification 2.2.3 Stationarity. In our analysis, we are not only interested in active and regular users, but we also need to make sure that their Twitter activity has already stabilised. In fact, it is a frequent finding in the related literature that users tend to be more active during the initial interactions with the platform, reaching a steady state later on, when the engagement is somewhat consolidated. In order to verify whether this is the case also in our dataset, we compute for each user the average number of tweets generated each week. For this analysis, we align all observed timelines to start at the same time (i.e., time 0 for each given user is the time of the first observed tweet of the user). Then, we average these values across all users. Please note that we restrict our analysis to the first 84 weeks, since the number of active users abruptly decreases afterwards. For the sake of a fair comparison between users, we have rescaled the weekly frequencies of each user using the mean normalization technique. This procedure yields values in the range [−1, 1], with values around zero being close to the average frequency. The results are shown in Figure 4, only for the 59 active and regular users that are fully observed3. It is clear that there is not a significant variation in the activity between first and last portion of the timelines. Hence, we do not discard a transient period for the users in our dataset. 2.3 Dataset overview The main properties of the dataset resulting from the filtering per- formed in the previous section are summarised in Table 1. With an average active life of about 8 years, all these journalists are long- time Twitter users. However, the number of tweets that they have generated during their entire life varies significantly between users. Among the tweets that we observe, an average of 68% are social, i.e., 3Please note that for partially observed users we are missing the initial portion of the timeline, so this analysis cannot be replicated. Figure 2: Tweeting volume VS active users over time an unstable ego network (we will discuss what this means in a later section). In the following, we discuss how to identify the Twitter users that should be considered for our analysis. 2.2.1 Users that have left Twitter. First, we focus on identifying users that are not actively engaged with the platform anymore. The inactive life of a user, defined as the time period between the last observed tweet and the time of downloading, is an indirect measure of inactivity. In fact, long inactive periods are a telltale sign of decreased engagement. In previous works [2], a threshold-based approach mimicking Twitter's 6-months inactivity criterion is employed: a user was con- sidered to have abandoned Twitter if her inactive life was longer than six months. However, here we argue that six months of inac- tivity may be perfectly in line with the historic behaviour of a user, without being suggestive of her having abandoned the platform. Therefore, we use a new classifier based on the concept of intertweet time, defined as the time interval between two consecutive tweets. For each journalist i, we observe a certain characteristic distribution of intertweet times (ITTi). If the inactive lifespan T inactive of user i is significantly larger than the maximum intertweet time previously observed for the user, then it is likely that the user has indeed aban- doned the platform. Specifically, we allow for a a six-months grace period (in the spirit of the considerations in [2]) and we assume < max{ITTi} + 6 months. Using a user i is still active if T inactive this classifier, 11 users are marked as having abandoned Twitter at the time we downloaded the dataset. i i 2.2.2 Regular users. While the previous classifier was concen- trating on the inactive life of a user, we now focus on the observed life, and we investigate the level of regularity in Twitter activity. Like in [3], we assume that a Twitter user is a regular user if she posts at least one tweet every 3 days (as an average frequency within each month) for at least 50% of the total number of months of their activity. If she does not, the user is classified as sporadic. In Figure 3 we combine the results of the abandonment classifier and the regularity classifier. As expected, partially observed users are generally more active and regular than fully observed ones. It is interesting to note that there are two users marked as regulars that have then stopped using Twitter. We manually checked these two users to confirm the classification and we found out that in- deed one of them had died and one had changed its Twitter handle. 3 06−12−2011Monti Reform15−02−2012Sanremo (major TV song contest)21−04−2013Boston bomber manhunt26−05−2014European elections15−11−2015Paris terrorist attacks10−11−2016Trump elected POTUS14−11−2017Italy out of World Cup010002000300001000200030002007−012007−072008−012008−072009−012009−072010−012010−072011−012011−072012−012012−072013−012013−072014−012014−072015−012015−072016−012016−072017−012017−072018−012018−07# tweets per dayUsers with active timelinesTweetsUsers15998213286fully observedpartially observedregular_abandonedregular_activesporadic_abandonedsporadic_activeregular_abandonedregular_activesporadic_abandonedsporadic_active0100200300# users Figure 4: Stationarity analysis following the definition in [2], involve forms of direct communica- tions such as replies, mentions or retweets. Among these, retweets4 are by far the most popular mode for interaction, taking up half of the social communication space. Retweets were popular also for the politicians analysed in [3], but their percentage was around 40%, with mentions being used, by and large, with roughly the same frequency. The popularity of retweets is confirmed when looking at the most popular communication mode per user (Figure 5, where indirect means tweets that are neither mentions, nor replies, nor retweets): retweets are the go-to mode for more than 50% of the users. Figure 6 shows the breakdown across the three types of social tweets, grouping users by their dominant type of tweet. It shows that retweets rank always as first or second most popular social mode, regardless of the predominant mode. Figure 6: Tweets per top activity Section 3. The average tweet frequency when excluding outliers is 4.17 tweets per day, which is still much higher than the one observed5 in politicians (between 2.6 and 3.2 depending on the dataset [3]). Figure 7: Histogram of tweet frequency Figure 5: Most popular tweeting activity Table 1 also reveals a great variability in the number of tweets per day, whose distribution is shown in Figure 7. Figure 7 shows that while most journalists post around 10-15 tweets per day, some users are clear outliers, with daily tweets well above 30. These users are marked as outliers when using standard clustering techniques such as DBSCAN on the tweet frequency. These outliers could have a significant impact on the ego network statistics, due to their intense Twitter activity, and should be studied separately. However, as shown in Figure 8, the observed timeline for these very active users is too short to satisfy the stability requirement (at least one year between the first and last observed tweets) for ego networks that has been typically used in the related literature [2]. For this reason, these users will be excluded from the analysis in 4Please note that, for the purpose of this analysis, quote tweets are treated as simple retweets. Figure 8: Observed timeline length VS average tweet fre- quency 5Please note that the comparison between our results about journalists and those in [3] about politicians is a fair one. In fact, the filtering based on user regularity and activity intensity described in Section 2.2 was also performed very similarly in [3]. More specifically, the filtering described in Section 2.2.2 is exactly the same as the one used in [3]. Our filter described in Section 2.2.1 is slightly more conservative than the one used in [3], hence it potentially retains more users that are less active. Despite this, as discussed later in the paper, we find that journalists are generally more active than politicians and generic users. 4 llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll−1.0−0.50.00.51.0020406080Weeks since first tweetAverage normalised frequency0%10%20%30%40%50%INDIRECTMENTIONREPLYRETWEETMost popular tweet type% userstop_activity: REPLYtop_activity: RETWEETtop_activity: INDIRECTtop_activity: MENTION0%20%40%60%0%20%40%60%% of observed tweetsTweet typeMENTIONREPLYRETWEET02550751000255075100Tweets/day [observed]# usersOutlierslllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0255075100050100Observed timeline [months]Average tweets/dayOutlier?llFALSETRUE Table 1: Summary statistics active life [years] 7.88 1.33 tot tweets 16,319 22,199 observed tweets 3061.34 435.06 mean sd 3 EGO NETWORK ANALYSIS We now focus our attention on the ego networks of the journalists that have been selected according to the discussion in Section 2. For each of these journalists, the strength of ego-alter ties are inferred from the frequency of direct tweets (mentions, reply, or retweets) between the ego and the alters, which is normally considered as a proxy for their emotional closeness [2, 7]. Similarly to the related literature, we define as active tie one for which the ego and the alter exchange at least one message per year. 3.1 Static ego networks The static view of an ego network is a single, aggregate snapshot of the ego and its ties. By modelling the ego-alter ties through a static ego network, we consider all the communications between the ego and the alter. This analysis provides an essential starting point for understanding the ego-alter interactions and for making quantitative comparison with other datasets studied in the related literature. Figure 9 shows the distribution of the number of alters per ego, i.e., the total number of social ties, including both active and in- active ones. When compared with what was observed in [7] for generic Twitter users, we notice that, for journalists, the number of alters per ego is about twice as large as that of regular users. This implies that journalists tend to contact significantly more alters. This is in line with journalists being prominent users that stand out among the Twitter crowd. However, as discussed before, only active relationships consume cognitive resources and thus are affected by the human cognitive constraints. For this reason, in Figure 10, we consider the active network, i.e., the ego network encompassing only relationships with contact frequency higher than one tweet per year. While the size of the active network is substantially different from that of the complete ego network, the proportional difference is maintained when comparing what we observe for journalists against the results shown in [7] for generic Twitter users6. tweets/day % social % replies % retweets % mentions 23.62 20.03 22.33 18.35 68.26 21.11 5.33 9.27 54.06 22.02 Figure 10: Histogram of active networks size Each of these active networks can be partitioned into a set of layers (also called circles), grouping the tie strength between the ego and its alters. Offline social networks typically feature four layers [18], while five layers are a common finding for OSN [7]. The optimal number of layers can be obtained through cluster analysis. Specifically, here we use the Mean Shift algorithm [5]. As shown in Figure 11, similarly to other OSN, the optimal number of circles for the egos in our datasets is five. When looking at the composition of circles (Figure 12), we obtain average values that are very close to the sizes of social groups (1.5, 5, 15, 50, and 150) predicted by Dunbar for offline social networks. While the layer sizes for OSN were found to be typically smaller than those in offline social networks [7], the journalists group seems instead to mimic very closely the offline dynamics. Specifically, the sizes of the two layers are slightly larger than in the model. Note, however, that this might depend on the specific clustering algorithm used. Similar deviations across clustering techniques have been observed also before [7]. On the other hand, the sizes of the two outermost layers are significantly larger for journalists than for generic users [7] and politicians [3]. Remarkably, the average size of the entire ego network is very close to the first empirical observation (∼ 130) that validated the social brain hypothesis and provided evidence for the reference size of 150 alters [10]. Figure 13 shows the scaling ratios between adjacent circles, con- firming the remarkable match with the characteristic value of 3 commonly found in the related literature. Figure 9: Histogram of number of alters per ego 6While the initial filtering used in [7] is different from the one discussed in this paper (Section 2.2), the comparison between the two sets of results is still meaningful. In fact, the filtering in [7] (whereby only users with an average of more than 10 interactions per month are kept) tends to retain only very active users, thus it might overestimate the social interactions of generic users. However, our results indicate that journalists tend to be even more engaged than this active subset of generic users. 5 Figure 11: Optimal number of circles per ego (red line: aver- age, blue line: median) 0.00000.00050.00100.0015010002000# alters per egop(x)0.0000.0020.0040.0060200400# alters per ego (active)p(x)02550751001234567891011Optimal number of circles# egos Figures 14 and 15 show the values of these indices in each of the five rings. They reveal very stable layers, in which the compo- sition does not change much and in which jumps between rings are very few. This is in stark contrast with the results obtained for the politicians in [3]. In fact, politicians features low stability in all rings (but especially in the inner most ones), and their jump index is high. We conjecture that journalists may use Twitter less as a leverage to win people over and more as a social communication tool. Further analyses are required to substantiate this claim. Figure 12: Distribution of circle sizes Figure 14: Average Jaccard index per ring Figure 15: Average jump index per ring 3.3 Social tweets and hashtags It is reasonable to expect the social tweets generated by journalists to be frequently topic-driven. In order to investigate whether this is the case, in this section we study the relation between alters and hashtags. In Figure 16, we show the histogram of the percentage of relationships activated by hashtag per ego. A relationship is considered activated by a hashtag if the first interaction between the ego and the alter contains a hashtag. The average in the journalists dataset is 36%, while for generic Twitter users is around 6% and for politicians is around 15% [3]. Hence, the Twitter relationships of journalists are very much information-driven. Figure 17 shows how the activation by hashtag impacts on the different rings. Ring R1 is the most affected, and this was also true for the politicians dataset studied in [3]. However, while the impact of activation-by-hashtag decreases progressively in the outer rings of politicians, it remains stable for journalists. This is again a confir- mation that journalists engage on Twitter in an information-driven way, although, as shown by Figures 14 and 15, the set of alters with which they communicate is very stable, contrarily to politicians and generic users. Figure 18 shows that there is not a significant difference in contact frequency between alters whose relationship is activated by hashtags and those for which it is not. However, relations that are activated by hashtags tend to use hashtags signif- icantly more often also in future interactions (Figure 19). Figure 13: Distribution of scaling ratios 3.2 Dynamic ego networks The dynamic analysis of ego networks focuses on their evolution over time. Specifically, snapshots of one year are considered 7, each being shifted forward by one month with respect to the previous one. For each snapshot we focus on the alters that are members of each ring, where a ring is defined as the portion of circle that excludes its inners circles. The overlapping between the members of the same ring across different snapshots is measured using the Jaccard index. The Jaccard index is obtained dividing the cardinality of the intersection set by the cardinality of the union set. The closer this index to 1, the better the overlapping. The amount of movements between rings is measured through the Jump index, which simply counts (and then averages across all alters in the ring) the number of jumps between rings. 7Hence, egos for which we observe less than two years of tweets are filtered out 6 2.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.8946.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.427.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.24134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.4818.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.34C4C5C1C2C30501001502000200400051001020304003060900.000.010.020.030.040.000.030.060.090.120.0000.0010.0020.0030.0040.0050.00.10.20.0000.0050.0100.015# alters per circlep(x)2.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.63.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.06ratio_C4_C3ratio_C5_C4ratio_C2_C1ratio_C3_C22460369036924680.00.10.20.30.40.50.00.10.20.30.40.00.10.20.30.40.00.20.40.6ratiop(x)0.000.250.500.75R1R2R3R4R5Jaccard index0.00.10.20.30.4R1R2R3R4R5Jump index Figure 16: Histogram of the percentage of relations activated by hashtags (in red: mean, in blue: mean for generic Twitter users) Figure 19: Mean number of hashtags per alter in ring and also with respect to politicians. This suggests that journalists' engagement on Twitter is mostly information-driven. ACKNOWLEDGMENTS This work was funded by the SoBigData project. The SoBigData project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 654024. Figure 17: Average percentage of relations activated by hash- tags per ring with confidence intervals Figure 18: Contact frequency per ring 4 CONCLUSIONS In this work we have studied the properties of ego networks for a set of the most popular Italian journalists. We have found that the structural patterns of their ego networks mirror those of offline social networks, even more closely than those of generic Twitter users. In particular, both the circle sizes and the circle scaling ra- tios are very close to the findings from the offline social network literature. Differently from what has been observed for politicians on Twitter, the composition of the circles is quite stable. Journal- ists stand out in terms of relationships activated by hashtags and number of hashtags per alter, both with respect to generic users 7 REFERENCES [1] Sinan Aral and Marshall Van Alstyne. 2011. The diversity-bandwidth trade-off. Amer. J. Sociology 117, 1 (2011), 90–171. [2] Valerio Arnaboldi, Marco Conti, Andrea Passarella, and Robin Dunbar. 2013. Dy- namics of personal social relationships in online social networks. In Proceedings of the first ACM conference on Online social networks - COSN '13. ACM Press, New York, New York, USA, 15–26. [3] Valerio Arnaboldi, Andrea Passarella, Marco Conti, and Robin Dunbar. 2017. Structure of Ego-Alter Relationships of Politicians in Twitter. Journal of Computer- Mediated Communication 22, 5 (2017), 231–247. [4] Lily Canter. 2015. Personalised Tweeting. Digital Journalism 3, 6 (2015), 888–907. [5] Dorin Comaniciu and Peter Meer. 2002. Mean shift: A robust approach toward fea- ture space analysis. IEEE Transactions on pattern analysis and machine intelligence 24, 5 (2002), 603–619. [6] RI Dunbar. 1998. The social brain hypothesis. Evolutionary Anthropology 9, 10 (1998), 178–190. [7] R.I.M. Dunbar, Valerio Arnaboldi, Marco Conti, and Andrea Passarella. 2015. The structure of online social networks mirrors those in the offline world. Social Networks 43 (2015), 39–47. [8] Martin Everett and Stephen P Borgatti. 2005. Ego network betweenness. Social networks 27, 1 (2005), 31–38. [9] Bruno Gonçalves, Nicola Perra, and Alessandro Vespignani. 2011. Modeling users' activity on twitter networks: Validation of dunbar's number. PloS one 6, 8 (2011), e22656. [10] Russell A Hill and Robin IM Dunbar. 2003. Social network size in humans. Human nature 14, 1 (2003), 53–72. [11] Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. 2007. Why we twitter: understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis. ACM, 56–65. [12] Nan Lin, Karen S Cook, and Ronald S Burt. 2001. Social capital: Theory and [13] Christopher McCarty. 2002. Structure in personal networks. Journal of social research. Transaction Publishers. structure 3, 1 (2002), 20. [14] Daniele Quercia, Licia Capra, and Jon Crowcroft. 2012. The Social World of Twitter: Topics, Geography, and Emotions. ICWSM 12 (2012), 298–305. [15] Frank Michael Russell, Marina A Hendricks, Heesook Choi, and Elizabeth Conner Stephens. 2015. Who Sets the News Agenda on Twitter? Journalists' posts during the 2013 US government shutdown. Digital Journalism 3, 6 (2015), 925–943. [16] Alistair Sutcliffe, Robin Dunbar, Jens Binder, and Holly Arrow. 2012. Relationships and the social brain: integrating psychological and evolutionary perspectives. British journal of psychology 103, 2 (2012), 149–168. [17] Andranik Tumasjan, Timm Oliver Sprenger, Philipp G Sandner, and Isabell M Welpe. 2010. Predicting elections with twitter: What 140 characters reveal about political sentiment. Icwsm 10, 1 (2010), 178–185. 36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%012340%25%50%75%% of relations activated by hashtagsp(x)0%10%20%30%40%12345Ring% of relations activated by #tags0204012345RingContact frequency [tweets/year]Activated by hashtag?FALSETRUE05010015012345RingMean # of hashtags per relationActivated by hashtag?FALSETRUE [18] W-X Zhou, D Sornette, R a Hill, and R I M Dunbar. 2005. Discrete hierarchical organization of social group sizes. Proceedings. Biological sciences / The Royal Society 272, 1561 (2005), 439–444. 8
1702.07752
1
1702
2017-02-24T20:45:02
A supervised approach to time scale detection in dynamic networks
[ "cs.SI", "cs.LG" ]
For any stream of time-stamped edges that form a dynamic network, an important choice is the aggregation granularity that an analyst uses to bin the data. Picking such a windowing of the data is often done by hand, or left up to the technology that is collecting the data. However, the choice can make a big difference in the properties of the dynamic network. This is the time scale detection problem. In previous work, this problem is often solved with a heuristic as an unsupervised task. As an unsupervised problem, it is difficult to measure how well a given algorithm performs. In addition, we show that the quality of the windowing is dependent on which task an analyst wants to perform on the network after windowing. Therefore the time scale detection problem should not be handled independently from the rest of the analysis of the network. We introduce a framework that tackles both of these issues: By measuring the performance of the time scale detection algorithm based on how well a given task is accomplished on the resulting network, we are for the first time able to directly compare different time scale detection algorithms to each other. Using this framework, we introduce time scale detection algorithms that take a supervised approach: they leverage ground truth on training data to find a good windowing of the test data. We compare the supervised approach to previous approaches and several baselines on real data.
cs.SI
cs
A supervised approach to time scale detection in dynamic networks Benjamin Fish∗ Rajmonda S. Caceres† February 28, 2017 7 1 0 2 b e F 4 2 ] I S . s c [ 1 v 2 5 7 7 0 . 2 0 7 1 : v i X r a Abstract For any stream of time-stamped edges that form a dynamic network, an important choice is the aggregation granularity that an analyst uses to bin the data. Picking such a win- dowing of the data is often done by hand, or left up to the technology that is collecting the data. However, the choice can make a big difference in the properties of the dynamic network. This is the time scale detection problem. In pre- vious work, this problem is often solved with a heuristic as an unsupervised task. As an unsupervised problem, it is dif- ficult to measure how well a given algorithm performs. In addition, we show that the quality of the windowing is de- pendent on which task an analyst wants to perform on the network after windowing. Therefore the time scale detection problem should not be handled independently from the rest of the analysis of the network. We introduce a framework that tackles both of these is- sues: By measuring the performance of the time scale de- tection algorithm based on how well a given task is accom- plished on the resulting network, we are for the first time able to directly compare different time scale detection algo- rithms to each other. Using this framework, we introduce time scale detection algorithms that take a supervised ap- proach: they leverage ground truth on training data to find a good windowing of the test data. We compare the super- vised approach to previous approaches and several baselines on real data. 1 Introduction Much big data mining on social and other types of networks either requires information about dynamics or is improved by such information. Incorporating temporal information can improve the efficacy and lead to more detailed analyses. As data collection becomes cheaper and easier, the rate at which the data is being collected is often orders of mag- nitude more frequent than the underlying system. The rate of the data collection process is typically a function of the technology used and not necessarily related to the evolution or dynamics of the network itself. Thus the data collection ∗University of Illinois at Chicago, Department of Mathematics, †MIT Lincoln Laboratory, Lexington, Massachussetts Statistics, and Computer Science, [email protected] process makes a choice about the bin size - also called the resolution, aggregation granularity, or time scale of the dy- namic network - that may not be the correct choice. Binning the data at courser resolutions may make it possible to dis- tinguish between noisy local temporal orderings and critical temporal orderings in the network. Indeed, the time scale of the network strongly impacts what structures and dynamics may be observed in the network [3, 12, 17]. Moreover, the choice of time scale impacts the efficacy of data mining on networks [8]. Thus for any data mining task over dynamic networks, choosing the bin size is not only important, but a necessary choice the data scientist must make, and leav- ing it up to the data collection process is not ideal. This is the problem we take up in this paper, variously called time scale detection, generating graph snapshots, oversampling correction, temporal scale inference, aggregation granularity detection, or windowing detection. We will refer to it as win- dowing to emphasize the fact that the bin sizes - or windows - may not necessarily all be the same size. This problem is marginally related to change point de- tection, which is the problem of detecting when the network changes drastically, inducing a segmentation of the sequence, and is only a matter of degrees away from windowing detec- tion, which also asks for a segmentation. Implicitly, however, change point detection assumes the network is observed at the right time scale. Typically, the windowing problem is framed as an unsu- pervised task. If the goal is data exploration and it is unclear how we will use the data in the future, then unsupervised windowing may be sufficient. On the other end of the spec- trum, if sufficient knowledge of the data is at hand, the time scale may be chosen manually to represent natural scales, such as the diurnal or weekly scales natural for dynamics among people. However, frequently, getting such domain- knowledge through a data exploration phase or otherwise may be prohibitively difficult or expensive. Moreover, we will demonstrate that the best windowing often cannot be defined independently of the analytical task. In this paper, we show that the time scale for a dynamic network depends on the task - the most appropriate choice of scale for predicting new links appearing in the network may be different than the appropriate choice for detecting change points in the network, for example. The intuition is that the information needed to predict new links is different than the 1 information needed to detect change points. This insight may appear quite intuitive, but it runs contrary to many approaches for problems typically framed as unsupervised. This informs our approach towards windowing: we set up the windowing problem as a supervised machine learning task. For example, for detecting change points, we set aside earlier training data from the network with labeled change points. We then find the right time scale for this labeled data, and apply the time scale to new data to find the change points there. In other words, the windowing algorithm takes as a parameter the desired task, such as change point detec- tion, and finds the right time scale for that task on the input data. Of course, the downside to this approach is that it re- quires training data, such as labeled change points on past data. However, we regard this as both a natural assumption and a necessary assumption: Many popular prediction and classification problems have some notion of ground truth. In addition, since the best time scale depends on the task any- way, we might as well tailor our time scale detection towards a particular goal. In this paper, we consider link prediction, attribute predic- tion, and change point detection. We use these three tasks as popular examples of tasks analysts perform on dynamic networks that have some notion of ground truth. Our contributions are as follows: In addition to giving evi- dence that the best windowing of the data is task-dependent, we, for the first time, describe a simple framework for di- rectly comparing the performance of windowing algorithms that leverages task-dependency. We also introduce window- ing algorithms that takes a supervised-machine-learning ap- proach. We compare our approach against several baselines and previous work. We demonstrate that this supervised ap- proach is often superior to other approaches, but that like all supervised approaches in machine learning, its quality may be dependent on the quality of the training data. 1.1 Previous Work In numeric time series, this problem is often termed 'seg- mentation,' and segmentation of numeric times series has a long history which is outside the scope of this work; see [10] for an overview. For dynamic networks, there has been some work related to our problem in the area of change point detection, which seeks to find points in time where the dynamic network has changed abruptly. Typical methods include using genera- tive models of dynamic networks [16] or clustering similar time slices [2]. This literature is marginally different from the problem addressed in this paper because - while finding change points do implicitly segment the dynamic network - the goal of change point detection is not necessarily to find a good representation of the network for the purpose of bin- ning each segment but rather just to find the points when the dynamic network undergoes significant change. Also related is graph compression, which tries to find a representation of the dynamic network that minimizes the bits needed to store it while simultaneously retaining suffi- cient information about the network, under the general head- ing of graph summarization algorithms. See [14] for a survey of graph summarization techniques. This approach has been applied, more generally, to multi-layer networks, dynamic or not [6]. This problem is also slightly different from ours because we do not necessarily seek a small representation, merely an accurate representation for the task at hand. Meanwhile, previous work on our problem has focused either on task-independent heuristics or methods that at- tempt to optimize for a specific metric on graphs. Caceres et al. maps the dynamic network to a time series using a metric on graphs (such as the number of triangles in each graph) and then determines time scale by finding the scale at which the time series' compression ratio and variance is balanced [21]. Soundarajan et al. determines a windowing of the data with respect to some metric (such as the exponent of the degree distribution) by measuring when that metric has converged [20]. In our view, these approaches have the downside that they require a specific metric. For a given data set or task to accomplish on a data set, it is not necessarily clear what metric to choose. Darst et al. use a parameter- free approach that seeks to find an appropriate time scale by measuring the similarity between graphs using the Jaccard index [5]. Most closely related to the approach that we take in this paper, Fish and Caceres use the quality of the per- formance of link prediction algorithms to determine the best time scale [8]. These are parameter-free methods or, relat- edly, methods that assume that there is some 'ground-truth' time scale via a generative model or the like, as in [3, 5, 8]. In this paper, we do not take this tactic because as we demon- strate, choice of time scale may be dependent on the task at hand, which functions as a parameter for the problem. 1.2 Background Consider a dynamic network over a fixed set of vertices V , represented as a stream of time-stamped edges. The goal of windowing is to segment this input stream of edges into (possibly overlapping) intervals to form a sequence of graphs H1, . . . , Hm, each graph representing all of the edges that occurred within each interval. Representing the input edge stream as a sequence of graphs G1,. . . ,GT , a window of size k is a sequence Gi, Gi+1, . . . , Gi+k−1. A window- ing is a sequence of windows {G1, . . . , Gk1},{Gk1 + 1, Gk1 + 2, . . . , Gk2}, . . . ,{Gkm−1 , . . . , GT}. In general, it is possible to also consider windows that overlap, but in this paper we focus on non-overlapping windows. The resulting sequence is H1, . . . , Hm, where Hi = ∪ki j=ki−1+1Gj. It is possible to consider other functions mapping a window to the resulting graph Hi, but we only consider the simple union in this pa- per. As a slight abuse of notation, we will refer to both the segmentation of the input graph sequence and the resulting 2 sequence H1, . . . , Hm as a windowing. If all windows have the same size w (except possibly the last window if the length of the sequence does not divide w), we refer to this as a uniform windowing and w the bin size, window size, or time scale. A window size of w = 1 repre- sents the time scale of the collection process and a window size of w = T , where T is the duration of the observed net- work, means that all temporal information is ignored. The goal of this paper is to describe and evaluate windowing al- gorithms, i.e. algorithms for finding a windowing given an input sequence of graphs. As pointed out in [8, 20, 21], too small a window size may introduce noise and lack the struc- ture necessary for analysis but too large a window size may lose important temporal information. Once we have found a windowing H1, . . . , Hm, it can now be the input for any task that operates over a dynamic net- work. We consider three popular tasks: link prediction, at- tribute prediction, and change point detection. In this paper, we consider a supervised approach: the best windowing is the windowing that maximizes the performance of the algorithm for a given task, which we will refer to as the task algorithm. This gives us a way to compare differ- ent windowing algorithms: we evaluate the performance of the windowing algorithm by evaluating the performance of the task algorithm on a test set. In general, we are given the edges of a dynamic network up to some time t as a training set, and performance is evaluated on the dynamic network from time t + 1 onwards. The windowing algorithm gets ground truth on the training set, e.g. the change points that occurred, and the task algorithm uses only the win- dowed graph sequence to conduct its analysis, say finding the change points in the test set. 2 Tasks Given a candidate windowing, we evaluate its quality by per- forming a learning task algorithm on that windowing. We then evaluate the windowing by the performance of the task algorithm when using that windowing. We consider three task algorithms: link prediction, attribute prediction, and change point detection. We treat link prediction as an online task, and attribute prediction and change point detection as offline tasks. We do this to demonstrate windowing algo- rithms on both kinds of tasks. In what follows, we describe the algorithms we use for each task and how we judge their performances. 2.1 Link prediction While there are many methods for link prediction (see [1] for a survey), the method we use is a simple scoring function that scores every pair of vertices by how likely an edge is to appear between them. In this paper, we use the Katzβ score, an efficient and well-performing score [13]. β is a damping parameter that weights shorter paths exponentially higher than longer paths in the most recent graph in the input sequence. For our experiment results, we use β = 0.005, which has been used before [8, 13]. The performance of the link prediction algorithm is eval- uated using the AUC of the precision-recall curve, as recom- mended by [23], averaged over all predictions made, one set of predictions for each graph. 2.2 Attribute prediction We use the Time Varying Relational Classifier (TVRC) algo- rithm of Sharan and Neville [19] to determine the unknown value of a binary vertex attribute. As in their work, we as- sume attributes do not change over time. The goal is then to infer the missing attribute values by taking advantage of not only the known attribute values of the vertices but also by using the temporal information in the data. Their method is a Bayesian model that takes advantage of knowledge of attributes in a vertex's neighborhood. This model uses the time stamps to weight the influence each vertex has on its neighbors. In our implementation, we use add-one smooth- ing for categorical features and a Gaussian distribution for continuous features. The goal is then to find a windowing where TVRC builds the best performing model. TVRC re- quires a kernel for weighting the importance of edges - as they suggest, we use their exponential kernel (1 − θ)t−iθ, where t is the total time, i the current time, and θ a hy- perparameter controlling the rate of decay (for the sake of simplicity, we set θ = 1/2 without also trying to optimize this parameter). We use a special form of leave-one-out testing to mea- sure the performance of TVRC. In this setting, the target attribute of one of the vertices is removed from both train- ing and testing, a model is trained with the training set, and gives a prediction for the value of the missing attribute using the test set. To make the problem harder and more realistic, instead of just removing one target attribute, we remove a whole batch of them at once, and use the trained model to predict the values of all of their target attributes. The vertex set is partitioned into batches using a batch size parameter b, and this is repeated for each batch. Once a prediction has been made for all batches, we measure the performance or TVRC as the standard AUC of the ROC curve. In link prediction, the goal is to predict the edges that are most likely to appear in the future. In the online setting, at every time step, our goal is to predict the edges that will appear in the next time step (the next step in the initial input sequence before windowing). 2.3 Change point detection We use Graphscope, from Sun et al. [22]. Graphscope detects change points by estimating the times where segmenting the graph sequence at those times maximizes compressibility. 3 Since our graphs are not bipartite, we make the necessary modifications to Graphscope so that it may be used in the non-bipartite case. In order to evaluate a change point detection algorithm, we need a single score summing up how good a set of change points are, but to the best of our knowledge no such measure has been proposed in the literature, contrary to classification tasks, which frequently use AUC or other single values to summarize quality. We will need a single score rather than, say, a precision-recall curve, not only to evaluate, but also because our supervised windowing algorithm will need a sin- gle score to directly and automatically compare the quality of different window sizes. To rectify this, we propose the following measure: Let t1, . . . , tk be the times of the ground-truth events, and s1, . . . , s(cid:96) the times of the proposed events. Let n be the length of the sequence and δ(x) the function that equals 1 if x is true and 0 otherwise. Peel and Clauset [16] propose the following notions of precision and recall: (cid:88) (cid:88) 1 (cid:96) i Precision(d) = Recall(d) = 1 k si − tj ≤ d) δ(inf j si − tj ≤ d). δ(inf i j We will define the AUC of the precision-recall curve as the normalized volume under the curve given by Precision(d) and Recall(d) as d goes from 0 to n. Consider the set of distances {si − tj : i, j} ∪ {0, n}, ordered from smallest to largest as d1 < . . . < dm, so d1 = 0 and dm = n. Then PR-AUC is defined as (di+1 − di) · Precision(di) · Recall(di). m−1(cid:88) i=1 1 n For the sake of completeness, if k = 0 or (cid:96) = 0, we define the PR-AUC to be 0. Note this is a [0, 1]-valued measure. 3 Experimental Setup We now describe how we test the performance of windowing algorithms. In the offline setting, we set aside a previous interval of the dynamic network for training, and the next interval for testing. The training interval includes ground- truth information. For example for change point detection, it includes any change points that occurred in that interval. A windowing algorithm may use this information to decide on a window size to use in the test set. A windowing algorithm, uniform or otherwise, is also allowed to see the edges in the test set to determine the windowing for the test set, but of course no ground truth information about the task. Once the test set is windowed, we perform our task on the windowed data and measure its performance, as describe in Section 2. The windowing algorithm's score is then just the score that the task algorithm received. For each data set, we 4 split it up into six consecutive intervals, and then do train- ing and testing on consecutive intervals, where the previous test set becomes the next training set, so there are five total tests1. We do this in order to promote generalizability of our results. For change point detection, we merely average the scores over each of the tests. For attribute prediction, we use pooling: we take the AUC as described in Section 2 over all vertices in all test sets, instead of averaging the individ- ual AUC's of each test set, because the population, i.e. the vertices, is the same in each test set. In the online setting, a new graph from the initial input sequence is given to the windowing algorithm, and the win- dowing algorithm must make a decision as to how to in- corporate the new graph into the windowing so far. After windowing, a prediction is made, and then the process is repeated. Since the link prediction algorithm we use only ranks the likelihood of an edge appearing rather than de- termining the number of new links, we only do this process for those time steps where at least one new edge appears. The score for the windowing algorithm is the average over all scores received for each prediction. As in the offline set- ting, we split each data set into six consecutive intervals and then do training and testing on each pair of intervals, where the testing phase is online. 4 Data sets We use five data sets: Enron, MIT Reality Mining, Badge, Hypertext09, and Haggle. We treat all of these as undirected dynamic networks. For both convenience and uniformity, we bin each of these data sets at a initial window size at a 'natural' size, i.e. a choice that a data analyst might make, such as an hour or a day. This is so that a window size of w = 1 represents a baseline representing how well a hand- chosen windowing would perform. We only consider window sizes at least as large as this baseline. Each of these are suitable for link prediction. Of these, Enron, Reality Mining, and Badge are equipped with vertex attributes in order to test attribute prediction, and of these, Enron and Reality Mining also have established change point information. 4.1 Enron This is an email network between employees of Enron Inc. from January 1999 to July 2002, during the period of Enron's market manipulation scandal and subsequent collapse [11]. We use the emails of 151 employees, where each edge is an email sent from one of those employees to another. Each vertex, representing an employee, have a binary attribute indicating whether the employee was a manager or not, and 1For Reality Mining, on change point detection, we split it into five instead of six intervals, in order to have every training set contain at least one change point. Table 1: The score in the ith row and jth column is the score for the jth task if the window size is chosen to maximize the score for the ith task. The first three columns are for the Enron data set, the last three are for the Reality Mining data set. Scores are averaged over the different intervals of the data. Link prediction Attr. prediction CP detection Link prediction Attr. prediction CP detection Enron Reality Mining Link prediction Attr. prediction CP detection 0.188 0.163 0.141 0.599 0.649 0.609 0.572 0.540 0.935 0.277 0.220 0.258 0.961 0.983 0.961 0.778 0.340 0.945 Table 2: Spearman correlation coefficients and p-values for each pair of tasks. Link prediction Attribute prediction CP detection & Attribute prediction & CP detection & Link prediction Enron Reality Mining (0.093, 0.005) (-0.050, 0.493) (0.233, 5.11e-13) (-0.188, 0.010) (-0.355, 4.19e-29) (-0.071, 0.330) fifty integer-valued attributes, which are the number of oc- currences in each employee's outgoing emails of the top fifty words used in all emails (a list of stop words were excluded from the top fifty words). The attribute we test on for at- tribute learning is whether the employee was a manager or not, which we took from [4]. We use the change points from [16], which represent times when the emails undergo substantial shifts, such as the launch of Enron online and changes in the CEO position. The initial bin size is one day. 4.2 Reality Mining This is a proximity network of 90 MIT students and faculty using data taken from cell phones from September 2004 to May 2005 (we only use data up until the end of the academic year) [7]. We use as edges both phone calls between partici- pants and whenever two participants are close to each other, detected using Bluetooth. Each of the participants filled out a survey about their cell phone usage, such as how much they use their cell phone, where they live etc., which we use as the categorical attributes for each vertex. The attribute we use for testing attribute prediction is whether they are part of the business school or the MIT Media Lab. Change points are taken from [16], which are the start and ends of vacations, semesters, etc. The initial bin size is one day. 4.3 Badge This is a proximity network of 23 employees at a data server configuration firm for a month (the name of the data set comes from the badges the employees wore to track their location at the workplace) [15]. Each edge represents when two employees are in close proximity to each other, repre- senting an interaction. Each employee was assigned a certain number of tasks, and data about these tasks was recorded, e.g. average completion time, whether they took on a dif- ficult task or not, etc. For attribute prediction, we predict whether or not they made an error in one of their tasks. The initial bin size is one hour. 4.4 Haggle Infocomm This is a proximity network consisting of interactions, recorded using Bluetooth, among attendees at an IEEE In- focomm conference over four days [18]. 41 attendees partic- ipated in this network. The initial bin size is 10 minutes. 4.5 Hypertext09 This is another proximity network of attendees at the ACM Hypertext 2009 conference, held over three days [9]. Each vertex is one of the 113 attendees, and an edge represents a interaction between two attendees that was active for at least 20 seconds. The initial bin size is 10 minutes. 5 Task dependence Ideally, it would be nice to have just one windowing algo- rithm that performs well regardless of whether your goal is link prediction, attribute prediction, change point detection, or any other task. However, we demonstrate that this does not appear to be feasible while still maximizing the perfor- mance of the task algorithm. To do this, we score each window size by the performance of each of the three task algorithms when the data set is windowed at that size, so we have a score representing the quality of the window size for each of the three tasks. Ta- ble 1 show the score for the ith task, if you chose the window size with the highest score for the jth task. (Scores are com- puted for each of the intervals as described in Section 3 and 5 the values in Table 1 are the average of the results for each interval). For example, choose the best window size for link prediction. The table shows that at that window size the other two tasks do not achieve as high a score as if you had chosen the best window size for those two tasks. This means that the windowing algorithm should choose a different win- dow size for each of the tasks in order to maximize score. This effect is not limited to just the top-scoring window size. More generally, the scores between two tasks do not positively correlate with each other, so that a higher score for a given window size on the first task does not necessarily mean a higher score for that window size on the second task. In order to demonstrate this, we use Spearman's correlation coefficient, which tests the monotonicity between two vari- ables. A negative score indicates anti-correlation, a score of 0 indicates no correlation, and a positive score indicates positive correlation. Table 2 show the correlation coefficients and their associated p-values for each pair of tasks: most of them are either negative or close to zero, indicating little correlation between the tasks. This is further evidence that the quality of window sizes depend on the task, and hence that we should use the task as supervision for windowing. 6 Windowing algorithms and baselines We now describe the windowing algorithms that we will com- pare in both the offline and online settings. So that the su- pervised algorithms we introduce remain useful for not just the three tasks we consider, but any task, our algorithms do not attempt to take advantage of the particular nature of the task and corresponding algorithm at hand. In other words, we treat the task algorithms as black boxes. However, as we show in Section 7, the supervised approaches are still able to perform well despite this self-imposed constraint. 6.1 Offline supervised algorithms Our intuition is very simple: since we know what task we want to accomplish on the test set, we use the same task algorithm to learn the window size on the training set. In the offline setting, in order to try to prevent overfitting and to make the search space smaller, we only consider uniform windowings. This allows the algorithm to be very simple: For each window size, up to the length of the training set, window the training set at that size and use that as input for the task algorithm. Measure the performance of the task al- gorithm (remember we assume we have ground truth for the training set) and use that as the score for the window size. Window the test set with the window size that received the highest score. Of course, this means running the task algo- rithm O(T ) times (where T is the length of the training set), which is not particularly efficient. However, we make the as- sumption that since this is an offline setting, this blowup in running time in the training phase is not prohibitively large. We will refer to this as the offline supervised method. Among the three tasks, the attribute prediction algorithm has an important difference, in so much as that it requires training data to build a model. We therefore need to make sure to decouple the training data for the model and the training data used to find the best window size. To do this, we split the training data into two, use the first half as the data for the model, and the second half of the training data to test out how well the model does when windowed at each window size. We do this by taking the vertices that still have the value of the target attribute and using the same process we use to test the quality of the attribute prediction on the test set: remove them in batches, build the model at each window size, and then test which value TVRC predicts on the second half of the training data. As described above, we then use the AUC as the quality of that window size. Algorithm 1 Online windowing for link prediction Parameters: Integers M and B, Link predictor L Initialize scoresw as the empty list for each new graph Gi do Let new window sizes include w for 1 ≤ w < i if length(scoresw) < M Let best window sizes include the top B window sizes by average(scoresw) for w in new window sizes, best window sizes do w (cid:101) be the windowing of Let Hw = H1, . . . , H(cid:100) i−1 G1, . . . , Gi−1 at window size w predicted links = L(Hw) Append AUC(new links in Gi, predicted links) to scoresw end for w∗ = arg maxw average(scoresw) Let Hw∗ = H1, . . . , H(cid:100) i G1, . . . , Gi at window size w∗ return L(Hw∗ ) w∗ (cid:101) be the windowing of end for 6.2 Online supervised algorithms In the online setting, we could at each time step perform a similar procedure as in the offline case, leading to O(i) runs of the task algorithm at the ith step, for a total of O(T 2) times, where T is the total length of the sequence. This will often be prohibitively expensive. We introduce an approximate online windowing algorithm to deal with this issue. We illustrate with link prediction, as a natural example of an online task. Every time we receive a new graph Gi, representing the edges that occurred in the next time step, we can test each window size w by binning the sequence so far at size w and then use the last graph in the windowed sequence to predict the edges that will appear in Gi. We then compare the 6 Table 3: Performance of each of the algorithms on five data sets with respect to link prediction. Enron Reality Mining Badge Hypertext Haggle Random Hand-picked Weighted Algorithm 1 Algorithm 1 Training only ADAGE 0.101 0.148 0.178 0.153 0.159 0.149 0.202 0.266 0.263 0.259 0.240 0.198 0.208 0.619 0.482 0.428 0.418 0.394 0.049 0.146 0.116 0.100 0.065 0.044 0.195 0.485 0.443 0.475 0.437 0.298 Table 4: Performance of each of the algorithms on three data sets with respect to attribute prediction. Table 5: Performance of each of the algorithms on two data sets with respect to change point detection. Enron Reality Mining Badge Enron Reality Mining Random Hand-picked Supervised No time Fourier Jaccard Entropy ADAGE 0.566 0.560 0.587 0.584 0.567 0.576 0.555 0.564 0.966 0.960 0.974 0.971 0.967 0.973 0.970 0.973 0.583 0.646 0.656 0.568 0.568 0.571 0.562 0.572 Random Hand-picked Supervised Fourier Jaccard Entropy ADAGE 0.660 0.700 0.649 0.657 0.649 0.709 0.766 0.609 0.643 0.490 0.405 0.361 0.891 0.356 predicted edges to the actual edges in Gi, producing an AUC score for that window size2. The window size w∗ chosen next to bin the sequence seen so far including Gi is the window size that maximizes the average of all scores for that window size so far. However, this still means testing O(i) window sizes at each time step, for a total of O(T 2) tests. To decrease the number of tests, we instead use an approx- imate version of this where only some of the window sizes are tested, as described in Algorithm 1. This online algorithm is described explicitly for link prediction, but it is worth noth- ing that the same algorithm may in principle be used for any online task. Given hyperparameters to the algorithm M and B, we test a window size if it has either been tested fewer than M times, or if the average score so far ranks it amongst the top B window sizes. The intuition behind this approach is that a window size that has been performing badly will not suddenly become the best performing win- dow size, and thus doesn't need to be tested. This requires only O(M · B · T ) total runs of the link prediction algorithm instead of O(T 2), where we think of as M and B as con- stants. In our experiments, we set M = B = 10 (We also demonstrate the effect of changing these hyperparameters in Section 7). We also test a weighted variant of Algorithm 1 (Weighted Algorithm 1) by instead using a weighted average of the scores for each window size, in order to privilege scores 2For the sake of computational efficiency, we only score pairs of vertices with non-zero degree, since the Katz score will produce a score of 0 for all other pairs. closer to the present than the past. We use an exponential weighting scheme, where the weight for the score tested on the jth graph where t graphs have been seen already is αt−j. For the purpose of our experiments, we use α = 1/2. We also consider a version of this that stops generating new scores after the training period is over, and sticks with the best window size for the training data for all future time steps (Training only). 6.3 Other windowing algorithms and baselines We compare against ADAGE, the method of Soundarajan et al. [20]. ADAGE needs a metric as a parameter, so we use the exponent of the degree distribution, which is the metric they use. We also compare against the Jaccard-index- based method (Jaccard ) of Darst et al. [5] and the entropy- based method (Entropy) of De Domenico et al. [6]. Since this method allows for graphs with any types of layers, we treat each time step as a layer and modify their method to only allow adjacent time steps to be merged. We also compare against several baselines: the first is al- ways using a window size of w = 1, which as mentioned above, represents a 'hand-chosen' value (which we will re- fer to as the hand-chosen algorithm). This represents the window size that an expert might have chosen. The second baseline is the random algorithm (Random), which chooses a random windowing of the test set. In addition, for attribute prediction, we also consider the windowing that removes all temporal information, i.e. the window size that is always 7 Figure 1: The effect of the hyperparameters B and M on quality for link prediction, where we fix B=10 and vary M , and fix M = 10 and vary B. The figure on the left is the results on the Badge data set, while the right is the results on the Reality Mining dataset. the length of the test sequence (No time). The final base- line we consider is slightly more sophisticated: Consider a time series that assigns a real value to every graph in the sequence. For any such time series, we may compute its discrete Fourier transform (DFT). For frequency f , denote by xf the amplitude of that frequency. The score we assign w is the maximum magnitude xf of any frequency in the transform such that f rounds to w. Only windows where there is such a frequency are assigned scores, and we choose the window size with the maximum score (Fourier ). In this paper, we consider the DFT under the commonly-used Han- ning window where the metric is the number of edges in each graph. This serves as a proxy for the amount of activity at any given time. The DFT of this particular time series for dynamic networks has been used before, e.g. to study the Reality Mining data set [7]. All of these algorithms can be used in the offline setting, but only ADAGE, the hand-chosen baseline, and the random baseline can be used in the online setting. 7 Results Tables 3, 4, and 5 show our results. The supervised approach does do well, but there are certainly caveats. In link predic- tion, the 'hand-picked' window size is often the best per- former, probably due to the fact that these are well-studied data sets with natural periodicities dictated by human ac- tivity, and those window sizes reflect that. However, in gen- eral, we will want to have windowing algorithms that do not rely on an analyst's knowledge of the data set: acquiring domain-specific knowledge like this can be time-consuming, expensive, or difficult. Outside of this approach, at least one of the supervised methods does the best for all of the data sets. The weighted version is the overall winner, with a caveat: like any supervised technique, overfitting is always going to be an issue. We surmise that this is why the un- weighted version outperforms the weighted version on the Haggle data set. We also test the effect of the hyperparameters B and M , shown in Figure 1. As would be expected, by increasing B or M (which increases the number of window sizes tested) performance is generally improved. This effect, however, is extremely weak on the Reality Mining data set. That and our ability to perform relatively well even for small values of B and M validates our choice to use small constant values of B and M to use for Algorithm 1 and forego any attempt to optimize their values in the course of the windowing al- gorithm. In attribute prediction, the supervised approach is the best performing algorithm, although the absolute difference over the others is sometimes rather small. On the other hand, the supervised approach does not do well for change point prediction. We believe this is due to a limitation of supervised approaches: they depend on the quality of the training data. Given the sparsity of change points, each training set contains only a very small number of change points, making it difficult to distinguish between different window sizes. This issue separates change point detection from our attribute prediction problem, which has a much greater amount of training data to work with. Our approach also reveals other differences between the three tasks. Figure 2 shows the quality of every window size on each of the first four intervals of Reality Mining (we don't use the last interval because each interval needs a sub- sequent interval for testing attribute prediction). The scores for change point detection are extremely sensitive to window size, with small differences in size making a large difference, indicating Graphscope's sensitivity to window size. TVRC, on the other hand, is much more stable under changes to window size, with link prediction falling somewhere in the middle. Such sensitivity makes it much more difficult to speed up the process by only testing some of the windows sizes instead of all of them, as we do here. We leave for future work determining if there is a way to test a fewer number of window sizes and if the choice of algorithm for a given task impacts sensitivity to window size. 8 0204060801000.510.520.530.540.550.560.570.58QualityBM51015202530350.240.250.260.270.280.290.300.310.32QualityBM Figure 2: Results for each window size on each interval of the Reality Mining data. Each line corresponds with each of the four intervals. The left figure shows the quality of each window size for link prediction, the middle for attribute prediction, and the right for change point prediction. Our supervised approach makes the basic assumption that a window size that works well in the past is more likely to work well in the future. To measure this, Figure 3 shows the difference between the two scores a window size got on con- secutive intervals, averaged over all windows and consecutive intervals. Smaller differences mean that past data reflects fu- ture data more precisely. Figure 3 shows the difference was significantly larger for change point detection than the other two tasks, indicating that this assumption (at least when using Graphscope) is violated more under this task. This serves as evidence for why the supervised approach does not perform as well on change point detection. 8 Conclusion and future work In this paper, we have given evidence that windowing is task- dependent. Recognizing this, we have provided a simple and easy-to-use framework for directly comparing the quality of windowing algorithms and moreover, introduced supervised windowing algorithms that leverage our ability to test a win- dowing. Nonetheless, we leave for future work several chal- lenges: Like any supervised machine learning, the quality of the learner depends on the quantity and quality of training data. Improving windowing algorithms in the face of envi- ronments with little training data remains an issue. Even with training data, this can be a computationally-expensive procedure if the windowing algorithm has to repeatedly in- voke an expensive task algorithm. We leave for future work finding heuristics that approximate well how a windowing will perform for a given task. We also leave for future work if performance may be improved by considering other kinds of windowings besides the non-overlapping windowings fo- cused on in this paper. Figure 3: For each task, the average difference between qual- ity of the same window size on consecutive intervals of both data sets. References [1] Mohammad Al Hasan and Mohammed J. Zaki. A sur- vey of link prediction in social networks. In Social Net- work Data Analytics, pages 243–275. Springer, 2011. [2] Michele Berlingerio, Michele Coscia, Fosca Giannotti, Anna Monreale, and Dino Pedreschi. As time goes by: Discovering eras in evolving social networks. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, pages 81–90. Springer, 2010. [3] Aaron Clauset and Nathan Eagle. Persistence and pe- riodicity in a dynamic proximity network. DIMACS Workshop on Computational Methods for Dynamic In- teraction Networks, 2007. [4] Germ´an Creamer, Ryan Rowe, Shlomo Hershkop, and Salvatore J Stolfo. Segmentation and automated so- 9 010203040Window size0.120.140.160.180.200.220.240.260.280.30Quality010203040Window size0.900.920.940.960.981.00Quality010203040Window size0.00.20.40.60.81.0QualityLink predictionAttribute predictionChange point detection0.000.050.100.150.200.25Average difference in qualityEnronReality Mining cial hierarchy detection through email network analysis. In Advances in Web Mining and Web Usage Analysis, pages 40–58. Springer, 2009. for automatically measuring organizational behavior. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 39(1):43–55, 2009. [5] Richard K. Darst, Clara Granell, Alex Arenas, Sergio G´omez, Jari Saramaki, and Santo Fortunato. Detec- tion of timescales in evolving complex systems. arXiv preprint arXiv:1604.00758, 2016. [16] Leto Peel and Aaron Clauset. Detecting change points in the large-scale structure of evolving networks. In Twenty-Ninth AAAI Conference on Artificial Intelli- gence, 2015. [6] Manlio De Domenico, Vincenzo Nicosia, Alexandre Are- nas, and Vito Latora. Structural reducibility of multi- layer networks. Nature Communications, 6, 2015. [17] Bruno Ribeiro, Nicola Perra, and Andrea Baronchelli. Quantifying the effect of temporal resolution on time- varying networks. Scientific Reports, 3:3006, 2013. [18] James Scott, Richard Gass, Jon Crowcroft, Pan Hui, Christophe Diot, and Augustin Chaintreau. CRAW- DAD dataset cambridge/haggle (v. 2009-05-29). Down- loaded from http://crawdad.org/cambridge/haggle/ 20090529, May 2009. [19] Umang Sharan and Jennifer Neville. Temporal- relational classifiers for prediction in evolving domains. In Eighth IEEE International Conference on Data Min- ing, 2008. ICDM'08, pages 540–549. IEEE, 2008. [20] Sucheta Soundarajan, Acar Tamersoy, Elias B. Khalil, Tina Eliassi-Rad, Duen Horng Chau, Brian Gallagher, and Kevin Roundy. Generating graph snapshots from streaming edge data. In Proceedings of the 25th Inter- national Conference Companion on World Wide Web, pages 109–110. International World Wide Web Confer- ences Steering Committee, 2016. [21] Rajmonda Sulo, Tanya Berger-Wolf, and Robert Gross- man. Meaningful selection of temporal resolution for dynamic networks. In Proceedings of the Eighth Work- shop on Mining and Learning with Graphs, pages 127– 136. ACM, 2010. [22] Jimeng Sun, Christos Faloutsos, Spiros Papadimitriou, and Philip S. Yu. Graphscope: parameter-free min- ing of large time-evolving graphs. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 687–696. ACM, 2007. [23] Yang Yang, Ryan N. Lichtenwalter, and Nitesh V. Chawla. Evaluating link prediction methods. Knowl- edge and Information Systems, 45(3):751–782, 2015. [7] Nathan Eagle and Alex Sandy Pentland. Reality min- ing: sensing complex social systems. Personal and Ubiq- uitous Computing, 10(4):255–268, 2006. [8] Benjamin Fish and Rajmonda S. Caceres. Handling oversampling in dynamic networks using link predic- tion. In Joint European Conference on Machine Learn- ing and Knowledge Discovery in Databases, pages 671– 686. Springer, 2015. [9] Lorenzo Isella, Juliette Stehl´e, Alain Barrat, Ciro Cattuto, Jean-Fran¸cois Pinton, and Wouter Van den Broeck. What's in a crowd? analysis of face-to-face behavioral networks. Journal of Theoretical Biology, 271(1):166–180, 2011. [10] Eamonn Keogh, Selina Chu, David Hart, and Michael Pazzani. Segmenting time series: A survey and novel approach. Data mining in Time Series Databases, 57:1– 22, 2004. [11] Bryan Klimt and Yiming Yang. The enron corpus: A new dataset for email classification research. In Euro- pean Conference on Machine Learning, pages 217–226. Springer, 2004. [12] Gautier Krings, M´arton Karsai, Sebastian Bernhards- son, Vincent D Blondel, and Jari Saramaki. Effects of time window size and placement on the structure of an aggregated communication network. EPJ Data Science, 1(1):4, 2012. [13] David Liben-Nowell and Jon Kleinberg. The link pre- diction problem for social networks. In Proceedings of the Twelfth International Conference on Information and Knowledge Management, CIKM '03, pages 556– 559, New York, NY, USA, 2003. ACM. [14] Yike Liu, Abhilash Dighe, Tara Safavi, and Danai Koutra. A graph summarization: A survey. arXiv preprint arXiv:1612.04883, 2016. [15] Daniel Olgu´ın Olgu´ın, Benjamin N. Waber, Taemie Kim, Akshay Mohan, Koji Ara, and Alex Pentland. Sensible organizations: Technology and methodology 10
1807.05571
1
1807
2018-07-15T16:21:03
Understanding the Twitter Usage of Humanities and Social Sciences Academic Journals
[ "cs.SI", "cs.DL" ]
Scholarly communication has the scope to transcend the limitations of the physical world through social media extended coverage and shortened information paths. Accordingly, publishers have created profiles for their journals in Twitter to promote their publications and to initiate discussions with public. This paper investigates the Twitter presence of humanities and social sciences (HSS) journal titles obtained from mainstream citation indices, by analysing the interaction and communication patterns. This study utilizes webometric data collection, descriptive analysis, and social network analysis. Findings indicate that the presence of HSS journals in Twitter across disciplines is not yet substantial. Sharing of general websites appears to be the key activity performed by HSS journals in Twitter. Among them, web content from news portals and magazines are highly disseminated. Sharing of research articles and retweeting was not majorly observed. Inter-journal communication is apparent within the same citation index, but it is very minimal with journals from the other index. However, there seems to be an effort to broaden communication beyond the research community, reaching out to connect with the public.
cs.SI
cs
Understanding the Twitter Usage of Humanities and Social Sciences Academic Journals Aravind Sesagiri Raamkumar Nanyang Technological University, Singapore. [email protected] Mojisola Erdt Nanyang Technological University, Singapore. [email protected] Edie Rasmussen University of British Columbia, Canada. [email protected] Yin-Leng Theng Nanyang Technological University, Singapore. [email protected] Harsha Vijayakumar Nanyang Technological University, Singapore. [email protected] ABSTRACT Scholarly communication has the scope to transcend the limitations of the physical world through social media's extended coverage and shortened information paths. Accordingly, publishers have created profiles for their journals in Twitter to promote their publications and to initiate discussions with public. This paper investigates the Twitter presence of humanities and social sciences (HSS) journal titles obtained from mainstream citation indices, by analysing the interaction and communication pat- terns. This study utilizes webometric data collection, descriptive analysis, and social network analysis. Findings indicate that the presence of HSS journals in Twitter across disciplines is not yet substantial. Sharing of general websites appears to be the key activity performed by HSS journals in Twitter. Among them, web content from news portals and magazines are highly disseminated. Sharing of research articles and retweeting was not majorly observed. Inter-journal communication is apparent within the same citation index, but it is very minimal with journals from the other index. However, there seems to be an effort to broaden communication beyond the research community, reaching out to connect with the public. KEYWORDS Social media, twitter, microblogs, journals, social network analysis, humanities, social sciences. INTRODUCTION Twitter can be considered as one of the contemporary and popular online social networks. As a micro-blogging system, it is relevant in both private and public communication spheres. Twitter is used for purposes such as updating current status, initi- ating conversations, endorsing tweet content, promoting products and even for spamming (Benevenuto, Magno, Rodrigues, & Almeida, 2010). The success of a social media platform lies in its ability to attract people from different domains and geographic locations Academicians and researchers from the scientific community are also interested in social media due to its various benefits (Sugimoto, Work, Larivière, & Haustein, 2016). Scholars have cited information dissemination as a major benefit of using Twitter (Letierce, Passant, Breslin, & Decker, 2010). It has been observed that tweets can help in predicting citations to a certain extent (Eysenbach, 2011). However, other studies advise analysts to exercise caution when using simplistic metrics such as the tweet count to evaluate research outputs (Robinson-Garcia, Costas, Isett, Melkers, & Hicks, 2017). Social media has become a valuable marketing tool for publishers to promote research articles (Thelwall, Haustein, Larivière, & Sugimoto, 2013). Publication venues such as journals and conferences use Twitter for connecting with researchers. Studies have been conducted to investigate the usage of Twitter by researchers (Holmberg & Thelwall, 2014), conferences (Lee, Yoon, Smith, Park, & Park, 2017; Parra et al., 2016) and also journals from specific disciplines (Cosco, 2015; Kelly et al., 2016; Nason et al., 2015). It has been observed that journals with social media profiles (for e.g., Twitter) had higher academic metrics (Wong, Piraquive, & Levi, 2018). However, there has been a distinct lack of studies focusing on the usage of Twitter by journals from a broader outlook i.e., journals from different disciplines. This study investigates the Twitter usage of humanities and social sciences (HSS) journals. In this study, we have concentrated on the soft sciences with a plan to compare the findings with the traditional science and engineering disciplines in future studies. The required data for this study was extracted from the Master Journal List (MJL) 1 and Twitter. Since the overall objective is 1 Master Journal List of Clarivate Analytics http://ip-science.thomsonreuters.com/mjl/ 1 to understand the usage dynamics of HSS journals in Twitter from a broader perspective, the following exploratory research questions are investigated in the study. ▪ RQ1: What types of actions on Twitter are prevalent among HSS journals? ▪ RQ2: What is the nature of Twitter conversations among the HSS journals? ▪ RQ3: What is the prevalent network structure in Twitter communication graphs of the HSS journals? ▪ RQ4: Which Twitter accounts act as hubs and authorities in the communication graphs of the HSS journals? RELATED WORK Several studies have investigated the social media usage of journals. Twitter is an important platform for journals as studies have shown that journals with Twitter accounts have higher number of tweets and citations of their articles, when compared with other journals (Ortega, 2017). Other studies have focused on the Twitter usage of journals from specific disciplines. Find- ings from these studies show that the amount of Twitter accounts varies a lot across different research areas. About 14% of dermatology journals (Amir et al., 2014), 25% of urological journals (Nason et al., 2015), 28% of radiology journals (Kelly et al., 2016), and 28% of medical journals (Cosco, 2015) were found to have Twitter accounts, compared to 44% of medical journals (Kamel Boulos & Anderson, 2014). Also, 17% of the top 10 2010 JIF journals from multiple disciplines (Kortelainen & Katvala, 2012), were found to have Twitter accounts. Some studies have focussed on the correlation of Twitter and biblio- metrics indicators. Even though there was no strong relation with the Journal Impact Factor (JIF) for urological journals (Nason et al., 2015), the authors found the Twitter presence of journals to be positively associated with the JIF in radiology journals (Kelly et al., 2016). For medical journals, it was found that journals with high JIF had a greater number of Twitter followers than others (Cosco, 2015). Besides maintaining accounts, which are often used to share news and articles, some journals have started to ask authors to create Wikipedia articles (Butler, 2008; Maskalyk, 2014), and to provide so-called tweetable abstracts that journals can use to promote papers (Darling, Shiffman, Côté, & Drew, 2013). Some journals have created online journal clubs to encourage community discussions about articles (Chan et al., 2015). Most use Twitter (Chan et al., 2015; Gardhouse, Budd, Yang, & Wong, 2017; Leung, Siassakos, & Khan, 2015; Mehta & Flickinger, 2014; Thangasamy et al., 2014), but some use other social media tools such as blogs, live videos, and podcasts (Rezaie, Swaminathan, Chan, Shaikh, & Lin, 2015; Thoma, Rolston, & Lin, 2014). Apart from journals, studies have been conducted on the Twitter usage of users at academic conferences as the main focus area. With more user participation in a Twitter network, the network structure might show a tendency to change. However, a 'tight crowd' network was consistently present in the case of the Association of Internet Researchers (AoIR) conference over the years (Lee et al., 2017). Also, the authoritative Twitter accounts did not change much even though there were changes in the conference theme every year. In a much larger study conducted with tweets from 16 computer science conferences (Parra et al., 2016), authors found that users were increasingly engaged in retweeting and sharing of web links over time. There was a drop in conversational tweets between users through the years, thereby changing the network structure to more of a broadcasting network. From a study of the tweeting behaviour of participants of the 2013 International Congress for Conservation Biology (ICCB) (Bombaci et al., 2016), it was found that the intended audiences, such as policy makers, government and non-govern- ment organizations, were rarely reached by tweets. Thus, it is questionable if tweeting at conferences is an effective strategy for promoting research to a wider audience other than the conference's research community. Based on our literature review and to the best of our knowledge, there have been no studies that report about the Twitter usage and communication network of HSS journals across multiple disciplines. The current study attempts to address this gap. METHODOLOGY Raw Data Extraction The Master Journal List (MJL) was selected as the main source to obtain journal titles for this study. Specifically, journal titles were extracted from the two major HSS indices – Arts & Humanities Citation (AHCI) and Social Science Citation Index (SSCI). The study was conducted on a corpus of 321,094 tweets extracted from 4,999 journal accounts of the two citation indices. Data collection details are provided below. MJL is generally acknowledged as one of the main sources for journal titles. Journals are included in MJL after a quality check process, thereby ensuring compliance to scientific standards. Hence, MJL can be considered as an authoritative source for journal titles across disciplines. Humanities and social sciences journals have been traditionally indexed under two indices in MJL, namely Arts & Humanities Citation (AHCI) and Social Science Citation Index (SSCI). All journal titles from the two indices AHCI and SSCI were manually downloaded. In total, 4,999 relevant journals were retrieved, including 1,769 journals from AHCI and 3,230 journals from SSCI. To examine whether the 2 extracted journals have their own Twitter accounts, we searched for their titles using the search option in Twitter. After col- lecting the Twitter accounts of the journals in August 2016, we extracted the tweets from the Twitter accounts, using the Twitter API. A maximum of 3,000 tweets were extracted for each Twitter account due to the restrictions in the basic Twitter API service. A total of 321,094 tweets were extracted for the 4,999 journals. Preparation of Data for Study Tweets with URLs The tweets which contained links to research articles were identified using a two-step process. First, the tweets containing Uniform Resource Locators (URLs) were filtered. From this filtered list, further filtering was carried out based on the presence of any one of the keywords 'doi', 'article' and 'issue' to identify the candidate tweets. Twitter Mentions and Conversations In Twitter terminology, mention is an instance of tagging/mentioning another Twitter user in a tweet. For example, if user A wants to start a discussion with user B, the "@" is used to tag user B in the tweet. It should also be noted that when a user retweets the tweet of another user, Twitter automatically adds the characters "RT @user_account" in the tweet. Hence, men- tions are naturally present in retweets. From the full extract of tweets, only the tweets containing mentions were first filtered. From the filtered tweets, the Twitter account name (Twitter handle) and the mentions data were extracted. A combination of Twitter account name and mention is usually referred to as a conversation. A single tweet could contain multiple mentions. Communication Graphs The network analysis tool Gephi was used for addressing RQ3 and RQ4. The community detection algorithm ForeAtlas2 (Jacomy, Venturini, Heymann, & Bastian, 2014) was used in Gephi to align the communities in the graphs. The nodes in the graphs were sized based on their betweenness centrality (Freeman, 1977) values. Betweenness centrality is a measure of the centrality of nodes in a graph. Communication graphs were generated with the conversations data. In these graphs, the source node is the Twitter user account while the target node is the mention. This type of graph is referred to as a directed graph since the direction of communication is from the source to the target. Two separate directed graphs were generated using the Gephi tool. After the data was loaded in Gephi, we filtered out the nodes which had a degree of 1 to avoid sparsity in the graphs. RESULTS Presence and Activities of HSS Journals in Twitter In Table 1, statistics related to the journals presence in Twitter are listed. Specifically, counts and percentages of journals and their tweets, retweets, mentions and presence of both general URLs & research article URLs in tweets. The percentage of journals with Twitter accounts is around 7% to 9% across the two indices with AHCI having the higher percentage of journals with Twitter accounts (8.99%). The low percentages indicate that a clear majority of HSS journals are yet to establish a presence in Twitter. Secondly, the presence is also affected by publication houses which are based out of countries where Twitter is banned. Retweeting is considered as one of the major activities in Twitter (Yang et al., 2010). Journals from SSCI had the highest number of retweets (23.39% of total) closely followed by AHCI (22.01% of total). Apart from retweeting, URL sharing is also one of the major activities of Twitter users (Java, Song, Finin, & Tseng, 2007). SSCI journals had a higher number of tweets with URLs (89.89% of total), followed by AHCI (86.76% of total). The presence of URLs in a tweet indicates that the journal is posting the URL of a research paper or website (e.g. news articles, blogs). The percentage of tweets containing links to research articles is not substantial (less than 15% of total), with SSCI (11.03% of total) having a better percentage than AHCI (4.98%). Entity Journals [A] Journals with Twitter Accounts [B] Extracted Tweets [C] Journals with Public Tweets [D] Retweets (RTs) [E] Tweets containing URLs [F] Tweets containing Links to Articles [G] AHCI (n) 1769 SSCI (n) 3230 159 (8.99% of A) 249 (7.71% of A) 145419 175675 159 (100% of B) 249 (100% of B) 32002 (22.01% of C) 41096 (23.39% of C) 126172 (86.76% of C) 157918 (89.89% of C) 19370 (11.03% of C) 7240 (4.98% of C) Table 1. Journals' Twitter Presence and Activities Statistics 3 Twitter Conversations In Table 2, statistics related to the conversations of HSS journals in Twitter are listed for the two indices. The number of conversations was the highest for SSCI (n=121,099) corresponding to the higher number of tweets (refer Table 1). Since only the tweets containing mentions data were considered, some of the journals had zero conversations even though tweets could have been posted by these accounts. For instance, out of the 249 journal accounts with tweets in SSCI (refer Table 1), 242 accounts had mentions data. Entity Total conversations [A] Unique journal accounts initiating conversations [B] Unique mentions [C] Conversations where mentions are AHCI journals [D] Conversations where mentions are SSCI journals [E] Unique AHCI journal mentions [F] Unique SSCI journal mentions [G] Conversations where account and mention are same [H] 13015 (12.61% of A) 14398 (11.89% of A) 16048 (13.25% of A) 230 (95.04% of B) 13812 (13.39% of A) 70 (0.06% of A) 142 (93.42% of B) 63 (0.06% of A) 18 AHCI (n) 103181 152 31040 SSCI (n) 121099 242 32819 18 Table 2. Journals' Twitter Conversations Statistics In a conversation, the mention could be any Twitter account. To ascertain the level of interaction with other journals, we identified the mentions which were journal accounts. For journals within the same index, AHCI and SSCI conversations had similar percentages (13.39% for AHCI, 13.25% for SSCI). This finding indicates that journals do not seem to be interacting with other journals in Twitter to any great degree. In fact, interactions with journals from other index is very low with percent- ages below 1%. However, most of the journals within the indices are involved in the conversations. For instance, 95.04% of all SSCI journals and 93.42% of all AHCI journals are presented as mentions in the conversations respectively. To investigate further, we iden- tified the conversations where the user account and mentions were the same. We found that these types of conversations were around the same range for both indices (11.89% for SSCI and 12.61% for AHICI of the total conversations respectively). This finding is quite understandable since there are not many benefits for journals to tag their own Twitter account in their tweets Communication Graphs Statistics of the two communication graphs generated for AHCI and SSCI journals Twitter conversations are listed in Table 3. The node count in Table 3 corresponds to the number of conversations for each index in Table 2. SSCI (n=4,656) and AHCI (n=4,280) had similar number of nodes. In the case of average degree of a node, AHCI (a=2.84) and SSCI (a=3.08) were relatively close to each other. This finding indicates that even though the number of nodes is lower in the graph, each node has more connections with other nodes in the graph. Modularity (m) in a graph is an indication of how well a graph decomposes into modular communities. A high modularity hints at a complex internal structure with multiple sub-graphs (communities) densely connected to each other in the graph. The modularity value should be analysed together with the number of resultant communities (c) and total number of nodes in the graph (n). The modularity value is almost the same for the two graphs (m=0.53 for AHCI and m=0.52 for SSCI). Resultantly, the number of communities is also comparable for AHCI (c=11) and SSCI (c=13). Metric Number of Nodes (n) Number of Edges (e) Average Degree (a) Modularity (m) Number of Communities (c) SSCI AHCI 4,280 4,656 12,194 14,353 2.84 0.53 11 3.08 0.52 13 Table 3. Journals' Communication Graphs Statistics The two graphs generated for the citation indices are illustrated in Figures 1 and 2. The node colour indicates the community to which they belong. The nodes size has been adjusted based on the betweenness centrality values of the nodes. We have added representative labels for the different communities based on the topic commonality in the profile descriptions provided in the Twitter accounts (journals). As an aid to interpret the graphs, we identified the top 20 nodes with the highest in-degrees and out-degrees respectively in Tables 4 and 5. Out-degree of a node is the number of edges where the node is the source node while in-degree is the number of edges where the node is a target node. Naturally, the nodes with the highest out-degrees will be the journal Twitter accounts while the nodes with the highest in-degrees could be of any type. Accordingly, we have listed 4 the journal titles for the nodes with the highest out-degrees while we have identified type of the nodes with highest in-degrees. Even though out-degree is an indication of the journal's outreach in Twitter, it is important to recognize the popularity of the journals within the traditional citation network. This can be achieved by comparing the degree values with the journal impact factor (JIF). We have not listed the JIF values in these tables since interpreting JIF with different disciplines is not meaningful. However, we have listed the quartiles data of the journals based on the JIF. For example, if the journal belongs to the first quartile, it is considered to be among the top 25 percentile of journals in that discipline. Therefore, the prestige of journals can be ascertained with the JIF quartiles data. For AHCI journals, JIF data is not provided in the MJL, hence JIF quartiles column is not applicable for Table 4. AHCI Graph In Figure 1, the AHCI graph is represented by multiple topics including philosophy, history, arts, architecture, film and litera- ture. Most of the Twitter accounts in this graph are related to the literature topic. Also, the communities adjacent to each other seem to be related - (1) architecture & art and (2) philosophy & history. This graph can be classified as a community clusters graph since there are multiple communities with minimal interspersed nodes. From Table 4, we observe that magazines and news portals are most frequently referenced as mentions in AHCI Twitter conversations. The top two nodes are the news portals Nytimes and Guardian, while six other nodes are of the magazine type in the top 20. However, these magazines are all within the scope of AHCI topics unlike the news portals which cover general topics. Libraries (@nypl, @ElectricLit) and museums (@metmuseum, @MusuemModernArt) are also present, thereby indicating substantial interactions with accounts outside aca- demia. Paris Review is the only journal with a high in-degree value in this list and this journal's node can be clearly identified as the biggest node in Figure 1 due to its high betweeness centrality. The top 20 in-degree nodes indicate that AHCI journals tend to interact most with news and magazine-related Twitter accounts. The top 20 out-degrees nodes comprise of mostly literature and arts journals. Figure 1. AHCI Graph 5 Top 20 Nodes with Highest In-degree Top 20 Nodes with Highest Out-degree Account Type News News Twitter Account in* 39 30 29 Missouri_Review 23 22 Social Bookmarking 22 Wasafiri1 Artforum Journal Library kenyonreview Magazine AiANews VQR Magazine Museum Art Gallery Magazine Magazine Magazine Magazine Digital Library Museum Publisher Video Sharing Email NERweb LonJournal ArchRecord BurlingtonMag 21 TheHudsonReview 20 19 18 18 18 18 18 16 16 16 Apollo_magazine 16 15 15 NOReview MassReview ARTnewsmag AD_books nybooks TheTLS TheAmScho JCLJournal Twitter Account Nytimes Guardian NewYorker Parisreview Nypl Sharethis LAReviewofBooks Metmuseum Tate LRB PoetryFound nybooks TheAtlantic ElectricLit MuseumModernArt OUPAcademic YouTube gmailcom PublishersWkly thelithub Wasafiri Journal Full Name Architectural Record Artforum International Virginia Quarterly Review Kenyon Review Hudson Review Art In America Missouri Review out+ 549 468 439 422 391 366 356 346 New England Review-Middlebury Series 269 263 258 239 232 231 225 225 205 195 192 190 Journal Of Commonwealth Literature Apollo-The International Art Magazine New Orleans Review Massachusetts Review Burlington Magazine Architectural Design Tls-The Times Literary Supplement New York Review Of Books American Scholar London Journal Magazine Not Active Note: in* refers to in-degree value; out+ refers to out-degree value Artnews Table 4. Top 20 In-degree and Out-degree Nodes in AHCI Graph SSCI Graph The SSCI graph, which has the highest number of communities (c=13) among the two graphs (refer Table 3), is illustrated in Figure 2. Interestingly, most of the communities are of different topics although the adjacent communities are related, similar to AHCI. The community related to feminism/women's studies has the largest nodes (@FeministReview, @AFSJournal) and this community is spread across other communities related to psychology and education. Similar to AHCI, this graph can also be classified as a community clusters graph since there are multiple communities and minimal interspersed nodes even though the feminism community is an exception. Among the top 20 nodes with highest in-degrees, news portals (e.g., @nytimes, @washington) and magazines (e.g., @TheEconomist, @TheAtlantic) have a significant presence as already seen with AHCI. Unlike AHCI, news portals' (n=7) presence is more than magazines (n=4). Also, the magazines are mainstream magazines and not from academic publishers. Only two journals (@TheSocReview, @SAGEsociology) are present in this top 20 in-degree nodes list. The journals in the top 20 nodes with highest out-degrees are spread across different disciplines. From the JIF quartiles data, it can be ascertained that only three journals (@AmJNurs, @ AmEthno, @ASQJournal) are from the first quartile. There are more second quartile (n=7), third quartile (n=6) and fourth quartile (n=4) journals in this list. Therefore, the outreach is performed by journals from all tiers. Also, there is no overlap among the journals in the in-degree and out-degree list. 6 Figure 2. SSCI Graph Top 20 Nodes with Highest In-degree Top 20 Nodes with Highest Out-degree Twitter Account Account Type nytimes guardian washingtonpost TheEconomist TheAtlantic WSJ News News News Magazine Magazine News raulpacheco Researcher chronicle sharethis NPR News Social Bookmarking Media Organization NewYorker HuffingtonPost TheSocReview SAGEsociology timeshighered YouTube TIME Slate Magazine News Journal Journal Magazine Video Sharing Magazine Magazine po_qu terpolv AmJNurs AFSJournal EPSRjournal in* Twitter Account 67 InternatlTheory 60 46 41 37 34 EvidencePolicy 27 BulletinAtomic 27 25 23 23 23 23 23 23 LAPerspectives 22 mgmt_learning 22 22 BASeditors AmEthno govandopp ERSjournal psychmag CMPjournal hhrjournal Editor_IES wordpressdotcom Content Management 21 socprobsjournal ConversationUK ASQJournal News 21 International Theory Corresponding Journal Title Political Quarterly Evidence & Policy Business & Society American Ethnologist Australian Feminist Studies American Journal Of Nursing Bulletin Of The Atomic Scientists Terrorism And Political Violence out+ JQ^ 3 338 3 336 1 277 2 European Political Science Review 268 4 260 2 255 4 253 2 251 2 242 1 242 3 215 2 211 4 208 3 195 3 186 2 185 3 173 4 166 2 162 1 154 Health And Human Rights Irish Educational Studies Administrative Science Quarterly Culture Medicine And Psychiatry Latin American Perspectives Management Learning Government And Opposition Ethnic And Racial Studies Psychologist Social Problems Note: in* refers to in-degree value; out+ refers to out-degree value; JQ^ refers to JIF quartile Table 5. Top 20 In-degree and Out-degree Nodes in SSCI Graph 7 DISCUSSION The presence of academic journals in Twitter is not yet substantial with AHCI having a slightly larger presence than SSCI journals. There is not much difference between the indices in terms of having a presence in Twitter. As Twitter's usage and popularity increases, more journals are expected to join the social media platform. However, the participation of journals in social media might be constrained by monetary and manpower availability factors. For the journals in this study, the retweeting frequency does not seem to exceed the general statistics reported in earlier studies (Holmberg & Thelwall, 2014) with SSCI journals having the highest percentage (23.39% of total tweets) of the two indices. In terms of URL sharing in tweets, journals exceed the sharing percentage from earlier studies (Raamkumar, Pang, & Foo, 2016). In fact, 89.89% of SSCI journals' tweets contain URLs. Even though URLs were found in most of the tweets, the percentage of tweets containing links to research articles was found to be low with AHCI being the lowest (4.98% of total tweets). The main reason could be the limited number of articles published per journal issue. For instance, most journals post a new issue every quarter and the new issue might comprise of eight to ten articles. Hence, the tweet count in such cases would obviously appear very small when compared to the total count of tweets. In Twitter, there has been an apparent lack of interpersonal communication due to the predominance of retweeting and URL sharing by users (Parra et al., 2016). Therefore, in this context, understanding the volume of interpersonal communication is important for journals. This analysis was performed by extracting the mentions data from the tweets. After filtering out the retweets in the extract, it was found that AHCI tweets contained mentions in 22% of their total tweets. When the analysis is extended to composition of the conversations, there are new insights gained from the data (refer to Table 2). In the mentions data, the accounts which are journals were identified so that the extent of inter-journal communication could be ascertained. SSCI mentions had the highest percentage of references to SSCI journals themselves at 13.25% of the total conversations. In fact, SSCI and AHCI are closer in this aspect. This indicates that the journals from these indices are communicating more with non-academic Twitter accounts than HSS journal accounts. At a consolidated level, we found a reasonable percentage of tweets containing mentions data; however, most of the mentions were not academic HSS journal accounts. This clearly shows that inter-journal communication in Twitter is not substantial across the two indices. AHCI and SSCI mentions graph structure largely resemble a community clusters network where there are multiple communities with dense intercommunication. There were a few exceptional cases such as the feminism community in SSCI which had nodes spread across a few other communities. Authoritative nodes in the mentions graphs are the Twitter accounts which are centrip- etal in nature i.e., most of the conversations are directed towards these nodes. After classifying the node type in the top 20 nodes with the highest in-degrees, it was evident that news portals such as the New York Times and Guardian along with magazines such as the NewYorker and The Atlantic were the most authoritative Twitter accounts in the two graphs. This finding underlines the influence of these sources on HSS academic journals. The presence of YouTube as an authoritative source was not surprising due to the abundance of educational/informational videos hosted by the service. Subject-specific magazines such as the New Scientist and The Economist were also prevalent in the top 20 in-degree nodes list of the two indices respectively. The minimal presence of journals in the list of authoritative nodes was a surprising finding. AHCI and SSCI had just a total of three journals combined. This finding not only shows that there are very few journals in the authoritative nodes list of the indices but also there seems to be a conscious effort among journals to propagate tweets of non-academic sources. The level of outreach was ascertained from the top 20 out-degrees nodes in the mentions graphs. These nodes are centrifugal in nature and hence, they are referred as hubs. In these top 20 lists, AHCI and SSCI had journals from different disciplines. On the question of ascertaining whether the top journals in Twitter were also top journals in the citation network, SSCI had journals from all four JIF quartiles in the top 20 list. There are a few limitations in this study. By considering journals exclusively from MJL, we might be missing some other important journals which are indexed elsewhere. By the end of 2017, Twitter increased the character count in tweets to 280 from the earlier 140 characters. Hence, users can post more descriptive content and tag more users in their tweets. Therefore, this user-interface (UI) level change could possibly alter the usage dynamics of Twitter users. CONCLUSION In this paper, our goal was to understand the Twitter usage dynamics of HSS journals sourced from the citation indices in MJL. Using a corpus of 321,094 tweets which were extracted for the 4,999 journal accounts, analysis was performed at activity, tweet composition and structural levels. The tweets of the journals from AHCI and SSCI were analysed separately. Results show that URL sharing was a major activity performed by academic journals. HSS journals seem to focus more on initiating conversations with other Twitter accounts, although most were of a non-academic nature. Inter-journal communication seemed to be largely 8 restricted to the journals within the same index. Tweets from public news portals and magazines were heavily disseminated by journal accounts, thereby identifying non-academic sources as the authoritative sources in the communication graphs of the two indices. Among the journals that initiate conversations, HSS journals irrespective of their standing in the citation network, are involved in Twitter outreach. In future studies, we plan to conduct in-depth investigations on whether the activities per- formed by HSS journals in Twitter lead to increased citations for constituent research articles. In addition, we plan to conduct similar analysis on Science Citation Index Expanded (SCIE) journals to compare the findings with this study. We hope that this study's findings are of value to publishers, researchers and social media campaign managers, who are responsible for the marketing, branding, and promotion of a journal's services on Twitter. ACKNOWLEDGMENTS The research project "Altmetrics: Rethinking And Exploring New Ways Of Measuring Research" was supported by the Na- tional Research Foundation, Prime Minister's Office, Singapore under its Science of Research, Innovation and Enterprise pro- gramme (SRIE Award No. NRF2014-NRF-SRIE001-019). REFERENCES Amir, M., Sampson, B. P., Endly, D., Tamai, J. M., Henley, J., Brewer, A. C., … Dellavalle, R. P. (2014). Social Networking Sites. JAMA Dermatology, 150(1), 56. https://doi.org/10.1001/jamadermatol.2013.6340 Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010). Detecting Spammers on Twitter. In Collaboration, Electronic messaging, Anti-abuse and Spam Conference (CEAS). Redmond, Washington. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.5340 Bombaci, S. P., Farr, C. M., Gallo, H. T., Mangan, A. M., Stinson, L. T., Kaushik, M., & Pejchar, L. (2016). Using Twitter to communicate conservation science from a professional conference. Conservation Biology, 30(1), 216–225. https://doi.org/10.1111/cobi.12570 Butler, D. (2008). Publish in Wikipedia or perish. Nature. https://doi.org/10.1038/news.2008.1312 Chan, T. M., Thoma, B., Radecki, R., Topf, J., Woo, H. H., Kao, L. S., … Lin, M. (2015). Ten Steps for Setting Up an Online 148–154. of Continuing Education the Health Professions, Journal 35(2), in Journal Club. https://doi.org/10.1002/chp.21275 Cosco, T. D. (2015). Medical journals, impact and social media: an ecological study of the Twittersphere. Canadian Medical Association Journal, 187(18), 1353–1357. https://doi.org/10.1503/cmaj.150976 Darling, E. S., Shiffman, D., Côté, I. M., & Drew, J. A. (2013). The role of Twitter in the life cycle of a scientific publication. PeerJ Inc. https://doi.org/10.7287/peerj.preprints.16v1 Eysenbach, G. (2011). Can tweets predict citations? Metrics of social impact based on Twitter and correlation with traditional metrics of scientific impact. Journal of Medical Internet Research, 13(4), e123. https://doi.org/10.2196/jmir.2012 Freeman, L. C. (1977). A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1), 35. https://doi.org/10.2307/3033543 Gardhouse, A. I., Budd, L., Yang, S. Y. C., & Wong, C. L. (2017). #GeriMedJC: The Twitter Complement to the Traditional- Format Geriatric Medicine Journal Club. Journal of the American Geriatrics Society, 65(6), 1347–1351. https://doi.org/10.1111/jgs.14920 Holmberg, K., & Thelwall, M. (2014). Disciplinary differences in Twitter scholarly communication. Scientometrics, 101(2), 1027–1042. https://doi.org/10.1007/s11192-014-1229-3 Jacomy, M., Venturini, T., Heymann, S., & Bastian, M. (2014). ForceAtlas2, a Continuous Graph Layout Algorithm for Handy e98679. Software. Gephi ONE, PLoS 9(6), Network https://doi.org/10.1371/journal.pone.0098679 Visualization Designed for the Java, A., Song, X., Finin, T., & Tseng, B. (2007). Why We Twitter: Understanding Microblogging. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis (pp. 56–65). Kamel Boulos, M. N., & Anderson, P. F. (2014). Preliminary survey of leading general medicine journals' use of Facebook and Twitter. Journal of the Canadian Health Libraries Association, 33(2), 38. https://doi.org/10.5596/c2012-010 Kelly, B. S., Redmond, C. E., Nason, G. J., Healy, G. M., Horgan, N. A., & Heffernan, E. J. (2016). The Use of Twitter by Radiology Journals: An Analysis of Twitter Activity and Impact Factor. Journal of the American College of Radiology, 13(11), 1391–1396. https://doi.org/10.1016/j.jacr.2016.06.041 9 Kortelainen, T., & Katvala, M. (2012). "Everything is plentiful-Except attention". Attention data of scientific journals on social web tools. Journal of Informetrics, 6(4), 661–668. https://doi.org/10.1016/J.JOI.2012.06.004 Lee, M. K., Yoon, H. Y., Smith, M., Park, H. J., & Park, H. W. (2017). Mapping a Twitter scholarly communication network: a case of the association of internet researchers' conference. Scientometrics, 1–31. https://doi.org/10.1007/s11192-017- 2413-z Letierce, J., Passant, A., Breslin, J., & Decker, S. (2010). Understanding how Twitter is used to spread scientific messages. In Proceedings of the WebSci10: Extending the Frontiers of Society On-Line. Raleigh, NC: US. Retrieved from http://journal.webscience.org/314/ Leung, E., Siassakos, D., & Khan, K. (2015). Journal Club via social media: authors take note of the impact of #BlueJC. BJOG: An International Journal of Obstetrics & Gynaecology, 122(8), 1042–1044. https://doi.org/10.1111/1471-0528.13440 Maskalyk, J. (2014). Modern medicine comes online: How putting Wikipedia articles through a medical journal's traditional process can put free, reliable information into as many hands as possible. Open Medicine, 8(4), e116-9. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/25426179 Mehta, N., & Flickinger, T. (2014). The Times They Are A-Changin': Academia, Social Media and the JGIM Twitter Journal Club. Journal of General Internal Medicine, 29(10), 1317–1318. https://doi.org/10.1007/s11606-014-2976-9 Nason, G. J., O'Kelly, F., Kelly, M. E., Phelan, N., Manecksha, R. P., Lawrentschuk, N., & Murphy, D. G. (2015). The emerging use of Twitter by urological journals. BJU International, 115(3), 486–490. https://doi.org/10.1111/bju.12840 Ortega, J. L. (2017). The presence of academic journals on Twitter and its relationship with dissemination (tweets) and research impact (citations). Aslib Journal of Information Management, 69(6), 674–687. https://doi.org/10.1108/AJIM-02-2017- 0055 Parra, D., Trattner, C., Gómez, D., Hurtado, M., Wen, X., & Lin, Y.-R. (2016). Twitter in Academic Events: A Study of Temporal Usage, Communication, Sentimental and Topical Patterns in 16 Computer Science Conferences. Computer Communications, 73, 301–314. https://doi.org/10.1016/j.comcom.2015.07.001 Raamkumar, A. S., Pang, N., & Foo, S. (2016). When countries become the talking point in microblogs: Study on country hashtags in Twitter. First Monday, 21(1). https://doi.org/10.5210/fm.v21i1.6101 Rezaie, S. R., Swaminathan, A., Chan, T., Shaikh, S., & Lin, M. (2015). Global Emergency Medicine Journal Club: A Social Media Discussion About the Age-Adjusted D-Dimer Cutoff Levels To Rule Out Pulmonary Embolism Trial. Annals of Emergency Medicine, 65(5), 604–13. https://doi.org/10.1016/j.annemergmed.2015.02.024 Robinson-Garcia, N., Costas, R., Isett, K., Melkers, J., & Hicks, D. (2017). The unbearable emptiness of tweeting-About journal articles. PLOS ONE, 12(8), e0183551. https://doi.org/10.1371/journal.pone.0183551 Sugimoto, C. R., Work, S., Larivière, V., & Haustein, S. (2016). Scholarly use of social media and altmetrics: a review of the literature. Retrieved from http://arxiv.org/abs/1608.08112 Thangasamy, I. A., Leveridge, M., Davies, B. J., Finelli, A., Stork, B., & Woo, H. H. (2014). International Urology Journal Club via Twitter: 12-Month Experience. European Urology, 66(1), 112–7. https://doi.org/10.1016/j.eururo.2014.01.034 Thelwall, M., Haustein, S., Larivière, V., & Sugimoto, C. R. (2013). Do Altmetrics Work? Twitter and Ten Other Social Web Services. PLoS ONE, 8(5), e64841. https://doi.org/10.1371/journal.pone.0064841 Thoma, B., Rolston, D., & Lin, M. (2014). Global Emergency Medicine Journal Club: Social Media Responses to the March 2014 Annals of Emergency Medicine Journal Club on Targeted Temperature Management. Annals of Emergency Medicine, 64(2), 207–12. https://doi.org/10.1016/j.annemergmed.2014.06.003 Wong, K., Piraquive, J., & Levi, J. R. (2018). Social media presence of otolaryngology journals: The past, present, and future. The Laryngoscope, 128(2), 363–368. https://doi.org/10.1002/lary.26727 Yang, Z., Guo, J., Cai, K., Tang, J., Li, J., Zhang, L., & Su, Z. (2010). Understanding retweeting behaviors in social networks. In Proceedings of the 19th ACM international conference on Information and knowledge management - CIKM '10 (p. 1633). New York, New York, USA: ACM Press. https://doi.org/10.1145/1871437.1871691 10
1709.03438
1
1709
2017-09-11T15:32:37
Coin-flipping, ball-dropping, and grass-hopping for generating random graphs from matrices of edge probabilities
[ "cs.SI", "cs.DM", "math.CO" ]
Common models for random graphs, such as Erd\H{o}s-R\'{e}nyi and Kronecker graphs, correspond to generating random adjacency matrices where each entry is non-zero based on a large matrix of probabilities. Generating an instance of a random graph based on these models is easy, although inefficient, by flipping biased coins (i.e. sampling binomial random variables) for each possible edge. This process is inefficient because most large graph models correspond to sparse graphs where the vast majority of coin flips will result in no edges. We describe some not-entirely-well-known, but not-entirely-unknown, techniques that will enable us to sample a graph by finding only the coin flips that will produce edges. Our analogies for these procedures are ball-dropping, which is easier to implement, but may need extra work due to duplicate edges, and grass-hopping, which results in no duplicated work or extra edges. Grass-hopping does this using geometric random variables. In order to use this idea on complex probability matrices such as those in Kronecker graphs, we decompose the problem into three steps, each of which are independently useful computational primitives: (i) enumerating non-decreasing sequences, (ii) unranking multiset permutations, and (iii) decoding and encoding z-curve and Morton codes and permutations. The third step is the result of a new connection between repeated Kronecker product operations and Morton codes. Throughout, we draw connections to ideas underlying applied math and computer science including coupon collector problems.
cs.SI
cs
COIN-FLIPPING, BALL-DROPPING, AND GRASS-HOPPING FOR GENERATING RANDOM GRAPHS FROM MATRICES OF EDGE PROBABILITIES∗ ARJUN S. RAMANI† , NICOLE EIKMEIER‡ , AND DAVID F. GLEICH§ Abstract. Common models for random graphs, such as Erdos-R´enyi and Kronecker graphs, correspond to generating random adjacency matrices where each entry is non-zero based on a large matrix of probabilities. Generating an instance of a random graph based on these models is easy, although inefficient, by flipping biased coins (i.e. sampling binomial random variables) for each possible edge. This process is inefficient because most large graph models correspond to sparse graphs where the vast majority of coin flips will result in no edges. We describe some not-entirely-well-known, but not-entirely-unknown, techniques that will enable us to sample a graph by finding only the coin flips that will produce edges. Our analogies for these procedures are ball-dropping, which is easier to implement, but may need extra work due to duplicate edges, and grass-hopping, which results in no duplicated work or extra edges. Grass-hopping does this using geometric random variables. In order to use this idea on complex probability matrices such as those in Kronecker graphs, we decompose the problem into three steps, each of which are independently useful computational primitives: (i) enumerating non-decreasing sequences, (ii) unranking multiset permutations, and (iii) decoding and encoding z-curve and Morton codes and permutations. The third step is the result of a new connection between repeated Kronecker product operations and Morton codes. Throughout, we draw connections to ideas underlying applied math and computer science including coupon collector problems. Audience. This paper is designed, primarily, for undergraduates who have some experience with mathematics classes at the level of introduction to probability, discrete math, calculus, and programming, as well as for educators teaching these classes. We try and provide pointers to additional background material where relevant – and we also provide links to various courses throughout applied math and computer science to facilitate using this material in multiple places. Our program codes are available through the github repository: https://github.com/dgleich/grass-hopping-graphs. 1. Introduction & Motivation for Fast Random Graph Generation. The utility of a random graph is akin to the utility of a random number. Random numbers, random variables, and the framework of statistical hypothesis testing provide a convenient way to study and assess whether an apparent signal or pattern extracted from noisy data is likely to be real or the result of chance. In this setting, a random variable models the null-hypothesis where the effect is due to chance alone. By way of example, testing if a standard six-sided dice is "fair" involves a random variable with a χ2 distribution. The way this test works is illustrated in Figure 1. We compare the number of times the dice rolls each number with the expected number of times under the fair hypothesis. For each outcome, such as , we compute (Measured − Expected)2/Expected. Then we sum these over all outcomes. The resulting number is a statistic called Pearson's cumulative test statistic. (In the figure, this is 4/3.) The test statistic is also a random variable because if we rolled the dice another set of times, we could get a different value. A random variable with a χ2 distribution is the behavior of this test statistic when the dice is exactly fair. ∗Funding: Partially supported by the NSF funded NSF CAREER award CCF-1149756, NSF Big data IIS-1546488, NSF Center for Science of Information STC, CCF-093937, DARPA SIMPLEX and the Sloan Foundation. †West Lafayette Jr/Sr High School, 1105 North Grant Street, West Lafayette, IN 47906, USA ‡Department of Mathematics, Purdue University, [email protected] §Department of Computer Science, Purdue University, 305 North University Avenue, West ([email protected]). Lafayette, IN 47907, USA ([email protected]). 1 Measured Expected Statistic 30 30 0 32 30 33 30 31 30 29 30 25 30 2/15 3/10 1/30 1/30 5/6 4/3 Fig. 1. An example of statistical hypothesis testing in the classic scenario with a closed form solution. Here, the closed form χ2 test works to determine if a dice is "fair". In this case, we conclude there is a 93% chance the dice is fair. For random graph models, we often have no analytic way to determine the quantities akin to the expected number or the values from the cumulative distribution function. Thus, we need to quickly generate a large number of random graphs to generate simulation based estimates instead. Aside 1. This type of analysis and methodology is called statistical hy- pothesis testing and can be extended to more complex scenarios. Esti- mating these distributions from test statistics results in studies which are fascinating in their own right. The famous p-value is the probability that a fair die would give rise to a test statistic value greater than the computed test statistics (which is 4/3). In other words, we look at the probabil- ity that a value from a χ2 distribution is bigger than 4/3. The resulting probability (p = 0.931) provides a convenient estimate of how likely the dice is to be fair. In this case, we computed the probability using an analytic description of the χ2 distribution (strictly speaking, this test involves the χ2 distribution with 5 degrees of freedom). The probability should be large if the dice is fair and small if it is unlikely to be fair. Often, the probability p = 0.05 is arbitrarily chosen as a cut-point to distinguish the two cases (p ≥ 0.05 means fair and p < 0.05 means maybe not fair), but this value should be used judiciously. Statistical hypothesis testing on graphs is largely the same (Moreno and Neville, 2013; Koyuturk et al., 2007, 2006; Milo et al., 2002). We use a random graph model as the null hypothesis. This is akin to the fair hypothesis used in the example above. Then we measure something on a real-world graph and compare what we would have expected to get on a set of random graphs. Consider, for instance, the study by Milo et al. (2002) on the presence of motifs in networks. This study defines network motifs as patterns of connectivity that are found more frequently in a network than what would be expected in a random network. In social networks such as Facebook, a common motif is a triangle. If you have two friends, then it is much more likely that your friends are also friends, which forms a triangle structure in the graph. This property does not exist in many random models of networks. One critical difference from traditional statistics, however, is that we often lack closed-form rep- resentations for the probability of many events in random graph models. There was no known expression for the number of motifs that Milo should expect unlike the case of the dice and the χ2 distribution. In fact, in the studies above, only (Koyuturk et al., 2006, 2007) had closed form solutions. Aside 2. In fact, creating ran- dom graph models with the property that they have a non-trivial num- ber of triangles is an active area of study! Recent work in this vein in- cludes Kolda et al. (2014); Newman (2009). 2 12345678910statistic0.00.20.40.60.81.0cum. dist. func. of χ25 Thus, we turn to empirical simulations. One of the easiest and most common methods to do these studies (such as Milo et al. (2002)) leverages the computer to generate hundreds or hundreds of thousands of instances of a random graph and compute their properties. In comparison with the dice example, if we had access to a dice that was guaranteed to be fair, we could have generated an empirical distribution for Pearson's cumulative test statistic by tossing the fair dice a few thousand times. Then, an estimate of the probability that the statistic is larger could be computed just by checking the number of instances where the sample was larger. To do this, we would need a fast way of tossing dice! For random graphs, it almost goes without saying that we also need this random graph gener- ation, which is also called random graph sampling, to be as fast and efficient as possible. Statistical hypothesis testing is not the only use for random graphs. There are a variety of other scenarios that also require fast sampling such as benchmarking high performance com- puters (Murphy et al., 2010) and synthetic data to evaluate algorithms (Kloumann et al., 2016). What distinguishes the statistical hypothesis test- ing scenario is that it is important to exactly sample the true random graph model. As we shall see, there are a variety of efficient methods that can slightly bias these results or may take additional effort to compute. Aside 3. Indeed, Fisher (1936) men- tions this "trivial" toss-dice-and- check idea as the basis of all rig- orous work in the area of hypothesis testing. More recently, as the power of computation has grown, others including Ernst (2004) have sug- gested renewed focus on these empir- ical and computational tests rather than analytic results. In this paper, we will explain and illustrate how to generate random graphs efficiently when the random graph model is described by a matrix of probabilities for each edge. This is admittedly a special case, but it handles some of the most widely used random graph distributions: - the Erdos-R´enyi model (§2.3), - the Kronecker model (§2.6), - the Chung-Lu model (§2.7), and - the stochastic block model (§2.8). We will pay special attention to some of the structures present in the matrices of probabilities of stochastic Kronecker graphs and how to take advantage of them to make the process go faster. Along the way, we'll see examples of a number of classic discrete structures and topics: - binomial and geometric random variables, - the coupon collector problem, - enumerating non-decreasing sequences, - unranking multiset permutations, and - Morton and Z-curves. Throughout, we are going to explain these concepts and ideas both mathematically and programmatically. We include runnable Python code in the manuscript to make it easy to follow along, see https://github.com/dgleich/grass-hopping-graphs/ for our code. 2. Random Graph Models and Matrices of Probabilities. A graph con- sists of a set of vertices V and a set of edges E, where each edge e ∈ E encodes relationships between two vertices, which is often written e = (u, v) for u, v ∈ V . We consider the more general setting of directed graphs in this paper, although we describe how all of the ideas specialize to undirected graphs in Section 2.9. A 3 random graph consists of a set of random edges between a fixed number of vertices. How should these random edges be chosen? That turns out to depend on the particular random graph model. The models we consider generate a random adjacency matrix where each entry Aij in the adjacency matrix is 0 or 1 with probability Pij for some given matrix of probabilities P . Let's dive into these details to understand exactly what this means. Aside 4. There are more general definitions of random graphs that do not impose a fixed number of vertices such as preferential attach- ment (Barab´asi and Albert, 1999), but this simple setting will serve our purposes. 2.1. The adjacency matrix. The adjacency matrix encodes the information of the nodes and edges into a matrix. For instance: if the graph is A C D B E F G , the adjacency matrix is  A B C D E F G 0 1 1 0 0 0 0 A 1 0 0 1 1 0 0 B 0 1 0 1 0 0 0 C D 0 0 1 0 1 0 1 0 0 1 0 0 0 0 E 0 0 0 1 0 0 0 F G 0 0 0 0 0 0 0  . Formally, the adjacency matrix is created by assigning each vertex v ∈ V a unique number between 1 and V often called an index. Then each edge e = (u, v) ∈ E produces an entry of 1 in the coordinate of the matrix that results in mapping u and v to their indices. That is, if i and j are the indices of u and v, then entry i, j of the matrix has value 1. All other entries of the matrix are 0. In the case above, we mapped A to index 1, B to index 2 and so on. 2.2. A random adjacency matrix as a random graph. Note that this process can go the other way as well. If we have any n-by-n matrix where each entry is 0 or 1, then we can interpret that matrix as the adjacency matrix of a graph! What we are going to do is (i) generate a random matrix with each entry being 0 or 1 and (ii) interpret that matrix as a set of random edges to give us the random graph. Aside 5. In fact, there are many as- pects of sparse matrix computations that are most easily understood by viewing a sparse matrix as a graph and computing a graph algorithm such as breadth-first search (Davis, 2006). At this point, we need to mention a distinction between directed and undirected graphs. By convention, an undirected graph has a symmetric adjacency matrix where Aij = 1 and Aji = 1 for each undirected edge. Our focus will be on generating random non-symmetric matrices A. These techniques will still apply to generating symmetric graphs, however. For instance, we can interpret a non-symmetric A as an undirected graph by only considering entries Aij where i < j (or equivalently, Aij where i > j) and then symmetrizing the matrix given one of these triangular regions. (In Matlab, this would be: T = triu(A,1); G = T+T'; in Python, it would be np.triu(A,1); G=T+T.T) We return to this point in Section 2.9. 2.3. The Erdos-R´enyi model. Perhaps the first idea that comes to mind at this point is tossing a coin to determine if an entry in the adjacency matrix should be 0 or 1. While a simple 50%-50% coin toss is suitable for randomly picking between the two, there is no reason we need 1's (the edges) to occur with the same probability 4 as 0's (the non-edges). Let p be the probability that we generate a 1 (an edge) and let Aij = 1 with probability p 0 with probability 1 − p for each i, j in an n-by-n matrix. (2.1) This model is called the Erdos-R´enyi model. It is one of the simplest types of random graphs and has n nodes where any 2 nodes have proba- bility p of being connected with a directed edge. Erdos-R´enyi graphs are traditionally constructed by considering each edge separately and using the method of coin-flipping, which will be discussed in Section 2.5. Aside 6. The Erdos-R´enyi graph as we consider it was actually proposed by Edgar Gilbert (Gilbert, 1959) at the same time at Erdos and R´enyi's famous paper (Erdos and R´enyi, 1959). Erdos and R´enyi proposed a slight variation that fixed the num- ber of edges and placed them uni- formly at random. (cid:40) (cid:40) 2.4. Random graph models as matrices of probabilities. Now, you might be wondering why we use only a single probability p for each edge in the Erdos-R´enyi model. The random graph models we study here have an entry Pij for each i, j, which is a more general setting than the Erdos-R´enyi construction: Aij = 1 with probability Pij 0 with probability 1 − Pij for each i, j in an n-by-n matrix. (2.2) Thus, if we set Pij = p, then this more general model corresponds to the Erdos-R´enyi model. Now, of course, this begs two questions. How do we choose Pij? How do we generate a random matrix A? We will describe three common random graph models that consist of a choice of Pij: the Kronecker model, the Chung-Lu model, and the stochastic block models. We will also describe the coin-flipping method of sampling a random graph at this point. However, in subsequent sections, we will show how to sample each of these models more efficiently than the coin-flipping method. random variables). 2.5. The coin-flipping method for sampling a random graph. Given the matrix of probabilities P , the easiest way to generate a random adjacency matrix where Aij is 1 with probability Pij is to explicitly simulate biased coin flips (which are also Bernoulli A pragmatic way to do this is to use a random number generator that produces a uniform distri- bution of values between 0 and 1. This is prag- matic because most computer languages include such a routine and make sure it is efficient. Given such a random value ρ, we set Aij to 1 if ρ ≤ Pij (which happens with probability Pij). An exam- ple of doing this is show in Listing 1. Note that the indices in Python range from 0 to n − 1 rather than from 1 to n as is common in mathematical descriptions of matrices. 2.6. The Kronecker model. The Kronecker random graph model results in a non-uniform but highly structured probability matrix P . It begins with a small initiator matrix K with n nodes and then enlarges it to a bigger matrix of probabilities P by taking successive Kronecker products (Chakrabarti et al., 2004; Leskovec et al., 2005, 2010). For an example suppose K is a 2 × 2 initiator matrix Aside 7. Computers typically use pseudo-random number generators which have their own fascinating field (Gentle, 2003; Knuth, 1997). K = , (2.3) (cid:20)a b (cid:21) d c 5 Listing 1 A simple code to generate a random graph by coin flipping import random import numpy as np """ Generate a random graph by coin flipping. The input is a square matrix P with entries between 0 and 1. The result is a 0 or 1 adjacency matrix for the random graph. # after this, random.random() gives a uniform [0,1] value # numpy is the Python matrix package Example: coinflip(0.25*np.ones((8,8))) # generate a random Erdos-Renyi graph """ def coinflip(P): n = P.shape[0] assert(n == P.shape[1]) # make sure we have a square input A = np.zeros_like(P) # create an empty adjacency matrix for j in range(n): for i in range(n): # fill in each entry as 1 with prob P[i,j] A[i,j] = random.random() <= P[i,j] return A where each a, b, c, d is a probability. The Kronecker product of K with itself is given by (cid:20)a · K b · K c · K d · K (cid:21) = K ⊗ K = (2.5) We use these kth Kronecker products as the matrix of probabilities for the random graph. This gives us (in general) an nk-by-nk matrix of probabilities P for an nk- node random graph. It quickly becomes tedious to write out these matrices by hand. Surprisingly, there is structure inside of this matrix of repeated Kronecker products, and we will return to study and exploit its patterns in Section 5. There are a variety of motivations for repeated Kronecker products as a graph model. On the practical side, they are extremely parsimonious and require only the entries of a small n-by-n matrix, where n would be between 2 and 5. Second, they can generate a variety of graphs of different sizes by adjusting k. Third, the graphs they produce have a number of highly skewed properties (Seshadhri et al., 2013). These reasons make the Kronecker model a useful synthetic network model for various real-world performance studies (Murphy et al., 2010). On the statistical side, Kronecker models have some of the same properties as real-world networks (Leskovec et al., 2010). As such, they provide non-trivial null models. 6  . ac ad cb ca cc cd bb ba bc bd da db dc dd aa ab (cid:125)  0.97 0.49 0.49 0.25 0.49 0.25 0.25 0.13 0.49 0.20 0.25 0.10 0.25 0.10 0.13 0.05 0.49 0.25 0.20 0.10 0.25 0.13 0.10 0.05 0.25 0.10 0.10 0.04 0.13 0.05 0.05 0.02 0.49 0.25 0.25 0.13 0.20 0.10 0.10 0.05 0.25 0.10 0.13 0.05 0.10 0.04 0.05 0.02 0.25 0.13 0.10 0.05 0.10 0.05 0.04 0.02 0.13 0.05 0.05 0.02 0.05 0.02 0.02 0.01 0.5 0.2 ], then (2.4)  . Finally, the kth Kronecker product of K is just (cid:124) K ⊗ K ⊗ . . . ⊗ K , (cid:123)(cid:122) k times which is a 2k-by-2k matrix. As a concrete example, let K = [ 0.99 0.5 (cid:20) 0.9801 0.495 0.495 0.25 (cid:21) 0.495 0.198 0.25 0.1 0.495 0.25 0.198 0.1 0.25 0.1 0.04 0.1 K⊗K = , K⊗K⊗K = 2.7. The Chung-Lu model. Recall that the degree, du, of a vertex u is just the number of edges leaving u. For example, in the graph from Section 2.1, the degrees of the nodes in alphabetical order are (2, 3, 2, 3, 1, 1, 0). Many important and interesting features of a graph are deeply connected to the degrees of the vertices (Adamic et al., 2001; Litvak et al., 2006). This fact is the motivation for the Chung-Lu random graph model. We wish to have a random graph with vertices of roughly the same degree as a network we are studying to understand if the properties we observe (in the real network) are due to the degrees or the network structure. This is almost exactly what Milo et al. (2002) did when they wanted to understand if a motif pattern was significant. In the Chung-Lu model, we need, as input, the desired degree of each vertex in the resulting random graph. For example, say we want to generate an n-by-n graph where vertex 1 has degree d1, vertex 2 has degree d2 and so on. Specifically, suppose we want an 8 vertex network with 1 node of degree 4, 1 node of degree 3, 3 nodes of degree 2, and 3 nodes of degree 1. The corresponding matrix is:  1.00 0.75 0.50 0.50 0.50 0.25 0.25 0.25 0.75 0.56 0.38 0.38 0.38 0.19 0.19 0.19 0.50 0.38 0.25 0.25 0.25 0.13 0.13 0.13 0.50 0.38 0.25 0.25 0.25 0.13 0.13 0.13 0.50 0.38 0.25 0.25 0.25 0.13 0.13 0.13 0.25 0.19 0.13 0.13 0.13 0.06 0.06 0.06 0.25 0.19 0.13 0.13 0.13 0.06 0.06 0.06 0.25 0.19 0.13 0.13 0.13 0.06 0.06 0.06  . P = This matrix results from setting didj(cid:80) k dk . Pij = (2.6) To understand why this is a good choice, let's briefly consider the expected degree of vertex i. In the adjacency matrix, we can compute the degree by taking a sum of all entries in a row. Here, we have, in expectation: E[(cid:80) j Aij] =(cid:80) j E[Aij] =(cid:80) j Pij =(cid:80) = di. (2.7) didj(cid:80) k dk j This analysis shows that, in expectation, this choice of probabilities result in a random graph with the correct degree distribution. 2.8. The stochastic block model. Another feature of real-world networks is that they have communities (Flake et al., 2000; Newman and Girvan, 2004). A community is a group of vertices that are more tightly interconnected than they are connected to the rest of the graph. Pictorially this results in a graph such as: where there are two communities: blue and red. The stochastic block model is designed to mirror this structure in a random graph. Suppose we want a random graph with two communities with n1 and n2 nodes respectively. We want there to be high probability, p, of edges within a community, and a low probability of edges between the communities, q < p. Formally, this corresponds to a probability matrix: (cid:40) Pij = p if i, j are in the same community if i, j are in different communities q , where p > q. (2.8) 7 The reason this is called the stochastic block model is that it can be written with a set of block matrices. Consider n1 = 3, n2 = 5, p = 0.7, and q = 0.1: 0.7 0.7 0.7 0.1 0.1 0.1 0.1 0.1 0.7 0.7 0.7 0.1 0.1 0.1 0.1 0.1 0.7 0.7 0.7 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7 0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7 0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7 0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7 0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7  .  P = p q q p  =  (2.9) Notice that each of the blocks is just an Erdos-R´enyi matrix. The model can be extended to an arbitrary number of subsets and the values of p and q can be varied between different subsets. In the more general case, let Qrs denote the probability of an edge between a node in the rth block and the sth block. Then the block adjacency matrix will look like:  n1 n2 n1 Q11 Q12 n2 Q21 Q22 ... ... nk Qk1 Qk2  . nk ··· Q1k . . . Qkk 2.9. Undirected graphs. The focus of our paper is on generating random graphs. To do this, we generate a random binary and non-symmetric adjacency matrix A. However, many studies on real-world data start with undirected graphs with symmetric matrices of probabilities P . Thus, we would like the ability to generate undirected graphs! We have three ways to get an undirected graph (and it's symmetric adjacency matrix) from these non-symmetric adjacency matrices. The first way has already been mentioned: take the upper or lower triangular piece of the non-symmetric matrix A and just explicitly symmetrize that. (See Section 2.4.) The second way builds upon the first way. Recall that in many scenarios discussed in the introduction, we are interested in generating a large number of random graphs from the same distribution. In this case, we note that a non-symmetric adjacency matrix A that results from a symmetric matrix P will give us two samples of a random graph! One from the lower-triangular entries and one from the upper-triangular entries. This is the easiest and most pragmatic way to proceed if you are generating multiple samples as all of the code from this paper directly applies. The third way proceeds by only generating edges in the upper-triangular region itself. For instance, in Listing 1, we could easily restrict the for loops to i < j, and set Aji = 1 whenever we set Aij = 1. This same strategy, however, will become much more complicated when we look at some of the accelerated generation schemes in subsequent sections. It is possible and it is an exercise worth exploring for those interested, but we deemed the added layer of complexity too high for this particular manuscript. Besides, the second method above is likely to be more useful in scenarios where multiple samples are needed and is also very easy to implement. 8 Fig. 2. A simple illustration of the ball-dropping procedure to generate an Erdos-R´enyi graph. "Balls" are dropped with equal probability, and wherever balls are dropped, generate an edge in the adjacency matrix. 3. Efficiently Generating Edges for Erdos-R´enyi Graphs: Ball-dropping and Grass-hopping. Recall that in an Erdos-R´enyi graph, all nodes have probability p of being connected. As previously explained, the simplest way to generate these edges involves flipping n2 weighted coins or "coin-flipping." The problem with coin-flipping is that it is extremely inefficient when generating an Erdos-R´enyi model of a real-world network. A common characteristic of real-world networks is that most pairs of edges do not exist. Just consider how many friends you have on Facebook or followers on Twitter. It is likely to be an extremely small fraction of the billions of people present on these social networks. This makes most of the resulting adjacency matrices entries equal to zero, which results in something called a sparse matrix. Coin-flipping is an expensive procedure for this scenario because it requires a coin flip for every conceivable pair of nodes given by each entry of the matrix. Our goal is something that does work proportional to the number of edges of the resulting network. Aside 8. We say a matrix is sparse if the number of zero entries is so large that it makes sense just to store information on the locations of the entries that are nonzero. 3.1. Ball-dropping. The first accelerated procedure we'll consider is what we call ball- dropping. The inspiration behind this method is that we can easily "drop a ball" into a uniform random entry in a large matrix, which results in a random edge, see figure 2. Careful and repeated use of this proce- dure will allow us to generate a random adjacency matrix where non-edges are never considered! This solves the efficiency problem that motivates our accelerated sampling procedures. The ball-dropping process, itself, is quite simple: 1. generate a uniform random integer between 1 and n for i, 2. generate a uniform random integer between 1 and n for j. The probability that we generate any entry i, j is then 1/n · 1/n = 1/n2, which is a uniform distribution over entries of the matrix. Two questions arise: (i) how many balls (or edges) do we drop and (ii) what do we do about duplicates? The solution to question (i) can be resolved by binomial random variables. The number of balls that we want to drop is given by the number of edges we will generate in an Erdos-R´enyi graph. Recall that each edge or entry in Aij is the result of a random, independent coin flip or Bernoulli trial. The total number of edges is the number of successes in these coin flips, which is exactly what a binomial random variable 9 describes. Thus, the number of edges in an Erdos-R´enyi graph is a binomial random variable with n2 trials and probability p of success. Many standard programming libraries include routines for sampling binomial random variables, which makes finding the number of balls to drop an easy calculation. That leaves question (ii): what do we do about duplicate ball drops? Suppose the sample from the binomial distribution specifies m edges. Each ball-drop is exactly the procedure described above and we make no provisions to avoid du- plicate entries. One strategy would be to ignore duplicate ball drops. While this is expedient, it samples from a different distribution over graphs than Erdos-R´enyi, since less than m unique edges will likely be generated. The alternative is to discard duplicate ball drops and continue dropping balls until we have exactly m distinct entries. This method gives the correct Erdos-R´enyi distribution, and listing 2 implements this procedure. This procedure returns the edges of a random graph instead of the adjacency matrix to support the sparse use case that motivates our accelerated study. Aside 9. The approximate distribu- tion that results from ignoring du- plicate ball drops may still be useful if the random graph were used to test system performance or in other applications where the precise dis- tribution is not required. Listing 2 A simple code to generate an Erdos-R´enyi random graph by ball dropping import random import numpy as np # numpy is the Python matrix package """ Generate a random Erdos-Renyi graph by ball-dropping. The input is: # random.randint(a,b) gives a uniform int from a to b n: the number of nodes p: the probability of an edge The result is a list of directed edges. Example: ball_drop_er(8,0.25) # 8 node Erdos-Renyi with probability 0.25 """ def ball_drop_er(n,p): m = int(np.random.binomial(n*n,p)) edges = set() while len(edges) < m: # the number of edges # store the set of edges # the entire ball drop procedure is one line, we use python indices in 0,n-1 here e = (random.randint(0,n-1),random.randint(0,n-1)) if e not in edges: edges.add(e) return list(edges) # check for duplicates # add it to the list # convert the set into a list Proof that this procedure exactly matches the Erdos-R´enyi description. We asserted above that this procedure actually generates an Erdos-R´enyi graph where each edge i, j occurs with probability p. This is easy to prove and is well-known, although proofs can be difficult to find. We follow the well-written example by Moreno et al. (2014). In order for an edge i, j to occur, it must occur after we have picked m, the number of edges from the binomial. Thus, Prob[Aij = 1] = Prob[Aij = 1 A has m edges] · Prob[A has m edges]. (3.1) m=0 The first term, Prob[Aij = 1 A has m edges] is equal to m/n2 because we are sampling without replacement. The second term Prob[A has m edges] is exactly a 10 n2(cid:88) Fig. 3. An illustration of grass-hopping. The idea with grass-hopping is that we can sample geometric random variables to move between the coin-flips that produce edges (the heads) directly and skip over all the tails. binomial distribution. Hence, Prob[Aij = 1] = (m/n2) · pm(1 − p)n2−m n2(cid:88) m=0 = (1/n2) (cid:19) (cid:18)n2 (cid:18)n2 (cid:19) m m m (cid:123)(cid:122) n2(cid:88) (cid:124) m=0 pm(1 − p)n2−m = (1/n2) · n2p = p. (3.2) (cid:125) = expectation of binomial (cid:3) The downside with this method is that we do not have a precise runtime because the algorithm continues to generate edges until the number of unique edges is exactly m. We analyze this case further in Section 3.3. 3.2. Grass-hopping. The second accelerated method we present is what we have called grass-hopping. This method is also known, but hard to find described (and we still encounter many individuals unaware of it!). The idea dates back to the 1960s (see Section 3.4). We first learned of it while studying the source code for the Boost Graph Library implementation of Erdos-R´enyi graph generation (Siek et al., 2001). The essence of the idea is that we wish to "grass-hop" from edge to edge as we conceptually (but not actually) flip all n2 coins in the coin flipping method. Note that in the real-world case, there will be many coin flips that come up as "no edge" repeated. Ideally, we'd like to "hop" over all of these flips as illustrated in Figure 3. Is such a task possible? Indeed it is. For a Bernoulli random variable with probability p, the number of consecutively failed trials can be derived from a geometric random variable. More specifically, a geometric random variable models the number of trials needed to obtain the next success in a series of coin flips with fixed probability. Thus, by sampling a geometric random variable, we can "grass-hop" from success-to-success and skip over all of the failed trials. A code implementing this is given in Listing 3. Some useful properties of geometric random variables. A geometric random vari- able is a discrete random variable parameterized by the value p, which is the success probability of the Bernoulli trial. Let X be a geometric random variable with probabil- ity p, the probability distribution function Prob[X = k] = (1 − p)k−1p. Note that this is just the probability that a coin comes up tails k − 1 times in a row before coming up heads in the last trial. The expected value of X is 1/p. A straightforward calculation provides the variance as 1−p p2 . Proof that grass-hopping is correct. The proof that grass-hopping is correct is essentially just the result that the geometric random variable models the gaps between successes. However, in the interest of exposition, we present a proof that Prob[Aij = 1] = p explicitly. In the adjacency matrix of the graph, the probability that the i, j 11 Listing 3 A simple code to generate an Erdos-R´enyi random graph by grass-hopping import numpy as np # numpy is the Python matrix package and np.random.geometric # is a geometric random variate generator """ Generate a random Erdos-Renyi graph by grass-hopping. The input is: n: the number of nodes p: the probability of an edge The result is a list of directed edges. Example: grass_hop_er(8,0.25) # 8 node Erdos-Renyi with probability 0.25 """ def grass_hop_er(n,p): edgeindex = -1 gap = np.random.geometric(p) edges = [] while edgeindex+gap < n*n: # we label edges from 0 to n^2-1 # first distance to edge edgeindex += gap src = edgeindex // n dst = edgeindex - n*src edges.append((src,dst)) gap = np.random.geometric(p) # generate the next gap # check to make sure we have a valid index # increment the index # use integer division, gives src in [0, n-1] # identify the column return edges cell will have an edge can be calculated by adding the probabilities of all sequences of hops that land on that cell. Let (cid:96) be the index of the i, j cell in the linear order from 0 to n2 − 1 used in the code. The probability that Aij = 1 is then the probability that the sequence of hops lands on (cid:96) or equivalently, is simply a series of geometric random variables whose sum is equal to (cid:96) + 1. (Here, we have an off-by-one change because the indices range from 0 to n2 − 1 but the sums of gaps range from 1 to n2.) From the total probability theorem, the probability that an edge will be generated is the sum of the probabilities of all length-k hop paths where k goes from 1 to (cid:96)+1. Prob[A(cid:96) = 1] = Prob[A(cid:96) = 1 in 1 hop] + Prob[A(cid:96) = 1 in 2 hops] + ··· + Prob[A(cid:96) = 1 in (cid:96) + 1 hops] (3.3) There are a number of ways to land on index l by k hops. For example, here are two different length k = 4 hops landing on index l = 13: -1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 -1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 Let q = 1 − p. Notice that the probability of the first path is (cid:124)(cid:123)(cid:122)(cid:125) (q2p) hop 1 (cid:124)(cid:123)(cid:122)(cid:125) (q2p) hop 2 (cid:124)(cid:123)(cid:122)(cid:125) (q3p) hop 3 (cid:124)(cid:123)(cid:122)(cid:125) (q3p) hop 4 = q10p4. The probability of the second path is (p)(q3p)(qp)(q6p) = q10p4. The fact that these two are equal is not a coincidence. In fact, the probability of a hop path with k hops landing on ((cid:96)+1) is the same for any such path! There are(cid:0) (cid:96) overall probability of a hop path with k hops landing on ((cid:96) + 1) is(cid:0) (cid:96) (cid:1) such paths, and so the (cid:1)q(cid:96)−k+1pk−1p, where again q = 1 − p. We see this formally by observing that any hop path is a series of geometric random variables each with distribution Prob[X = x] = qx−1p. k−1 k−1 12 Furthermore, all hop-paths with the same number of hops have the same probability of occurring because any sequence of k geometric random variables will be an arrangement of ((cid:96) − k + 1) q's and k p's, where we will assert that the last letter is a p. Thus, the number of length k hop-paths can be generated using binomial coefficients for the number of ways to arrange ((cid:96) − k + 1) q's and k − 1 p's. On substituting these binomial coefficient probability expressions into (3.3): Prob[A(cid:96) = 1] = (cid:80)(cid:96)+1 (cid:124) k=1 (cid:0) (cid:96) k−1 (cid:1)q(cid:96)−k+1pk−1 (cid:125) (cid:123)(cid:122) binomial expansion of (p + q)(cid:96) · p = p. (3.4) Notice we are left with the binomial expansion of (p + q)(cid:96) = 1 multiplied by p. (cid:3) The runtime of this procedure is exactly O(E) where E is the number of edges output because for each instance of the loop, we generate one distinct edge. (This assumes a constant-time routine to generate a geometric random variable and an appropriate data-structure to capture their results.) 3.3. Comparing ball-dropping to grass-hopping with coupon collectors. Both ball-dropping and grass-hopping produce the correct distribution, but our next question concerns their efficiency. For grass-hopping, this was easy. For ball-dropping, note that we need to drop at least m balls to get m edges. But we haven't yet discussed how many duplicate entries we expect. Intuitively, if n is very large and p is small, then we would expect few duplicates. Our goal is a sharper analysis. Specifically, how many times do we have to drop balls in order get exactly m distinct edges? This is a variation on a problem called the coupon collector problem. The classic coupon collector problem is that there are m coupons that an individual needs to collect in order to win a contest. Each round, the individual receives a random coupon with equal probability. How many rounds do we expect before the individual wins? A closely related analysis to what we present shows that we expect the game to run for m log m rounds. In our variation of the coupon collector's problem, we must find the expected number of draws needed to obtain m unique objects (these are edges) out of a set of n2 objects (these are entries of the matrix) where we draw objects with replacement. This can be analyzed as follows based on a post from math.stackexchange.com (Yu, 2012). Let X be the random variable representing the number of draws needed to obtain the mth unique object. Let Xi be a random variable representing the number of trials needed to obtain the ith unique object given that i−1 unique objects have already been drawn. Then, E[X] = E[X1]+E[X2]+. . .+E[Xm]. Each random variable Xi is geomet- rically distributed with p = 1 − i−1 n2 because the probability of drawing a new object is simply the complement of the chance of drawing an object that has already been drawn. Using the expected value of a geometric random variable, we obtain E[Xi] = n2 n2−i+1 . n2−i+1 . This can be rewritten in terms of harmonic sums. The harmonic sum, Hn, is defined as the sum of the reciprocals of the first n integers: n . Consequently, E[X] = n2(Hn2 − Hn2−m). The harmonic partial sums i ≈ log(n + 1) + γ (Pollack, 2015). Thus, E[X] =(cid:80)m Hn =(cid:80)n can be a approximated as follows: Hn =(cid:80)n (cid:82) n i=1 This approximation is derived from the left hand Riemann sum approximation for the integral of 1 x dx. The difference between the Riemann 1 sum, which represents the harmonic sum, and the integral, is the Euler-Mascheroni constant, γ. the Euler- is 10. Here, Aside Mascheroni approximately 0.57721. constant, i=1 i=1 n2 γ, 1 1 13 (cid:80)∞ i −(cid:82) ∞ 1 1 Fig. 4. At left, the number of random draws that the ball-dropping and grass-hopping procedures must make as a function of p, normalized by the expected number pn2. At right, the same data, but zoomed into the region where p < 0.1. For this figure, n = 1000, and we show the 1% and 99% percentiles of the data in the region. The orange line plots the expected ratio 1 p log( 1 1−p ). 1 x = γ. After substituting in this i=1 approximation, the expected number of draws, E[X], simplifies to n2[log(n2)−log(n2− m)]. To get a better expression, we need a value of m. Recall that m is sampled from a binomial whose expectation is n2p. Using m = n2p simplifies the expression to: E[X] = n2 log 1 1−p . In Problem 1, we show that p−1 log 1 1−p . Thus, the extra work involved is p−1 log 1 1−p ≥ 1 with a removable singularity at p = 0. 1−p = mp−1 log 1 Consequently, ball-dropping always takes more random samples than grass-hopping. The difference between these two becomes considerable as p gets larger as show in Figure 4. Large values of p. At this point, we should make the following observation. There is little reason to run ball-dropping once p gets large. This is for two reasons. First, if p is any value like 0.1, then we would expect 0.1n2 "edges", in which case we might as well do coin-flipping because it talks almost the same amount of time. So we generally expect p to scale O(1/n) or 1/nγ for γ < 1, such as γ = 1/2. In the models we will consider, however, there are often cases where p does get large in small regions. Once p > 0.5, then we actually expect most edges to be present in the graph. In which case it's more computationally efficient to use ball-dropping to determine which edges are missing instead of which edges are present. 3.4. Literature on efficient Erdos-R´enyi generation: leap-frogging. The idea of using a geometric distribution to grass-hop through the probabilities has been known since the 1960s (Fan et al., 1962). In this original literature, it was called a "leap-frog" procedure. But this is still not widely known and not always widely implemented – despite this point being mentioned over a decade ago by Batagelj and Brandes (2005), where it was called a geometric method. More recently, Hagberg and Lemons (2015) discuss the idea, but simply describe it as sampling from a waiting-time distribution. 14 0.00.10.20.30.40.50.60.70.80.9edge probability value0.81.01.21.41.61.82.02.22.42.6total draws over expected draws p/n2ball-droppinggrass-hoppingexpected0.000.020.040.060.080.10edge probability value0.800.850.900.951.001.051.101.151.20total draws over expected draws p/n2ball-droppinggrass-hoppingexpected 4. Chung-Lu and Stochastic Block Models: Unions of Erdos-R´enyi graphs. Thus far, we have only studied fast methods for Erdos-R´enyi graphs. The same techniques, however, apply to Chung-Lu and Stochastic Block Model graphs as well, because these probability matrices are unions of Erdos-R´enyi blocks. This is immediate for the stochastic block model because that model defines a set of small regions. For instance, it is easy to use our Erdos-R´enyi subroutines to create a two block stochastic block model as the following code illustrates. """ Generate edges for a stochastic block model with two blocks. n1 and n2 are the sizes of the two blocks and p is the within group probability and q is the between group probability. Example: sbm(20,15,0.5,0.1) # 20 nodes in group 1, 15 nodes in group 2, ... """ def sbm2(n1,n2,p,q): edges = grass_hop_er(n1,p) edges.extend( [ (i+n1,j+n1) for i,j in grass_hop_er(n2,p) ]) edges.extend( [ (i,j+n1) for i,j in grass_hop_er(max(n1,n2),q) if i < n1 and j < n2]) edges.extend( [ (i+n1,j) for i,j in grass_hop_er(max(n1,n2),q) if i < n2 and j < n1]) return edges # generate the n1-by-n1 block # n2-by-n2 block This program has a runtime that scales with the number of edges in the graph. (where total-degree =(cid:80) For Chung-Lu graphs, the situation is slightly more intricate. The example Chung- Lu probability matrix P from Section 2.7 has 8 nodes, 16 different probabilities, and 64 total entries in the probability matrix. It turns out that the number of distinct probabilities is given by the number of distinct degrees. That example had four distinct degrees: 4, 3, 2, 1. Since the probability of each matrix entry is Pij = didj/total-degree i di is just a constant), then if there are t distinct degrees, we will have t2 distinct probabilities in P . This corresponds with t2 Erdos-R´enyi blocks. This can be justified most easily if the vector of degrees d is sorted. Let d[1] be the first degree in sorted order and d[2] be the next, and so on. Then the entire vector is: d = [ d[1] d[1] ··· d[1] d[2] d[2] ··· d[2] ··· d[t] d[t] ··· d[t] ]. (4.1) (cid:125) (cid:124) (cid:123)(cid:122) (cid:125) (cid:124) (cid:123)(cid:122) n1 times n2 times nt times It does not matter if the vector is sorted in increasing or decreasing order and many of the values of ni may be 1. Let ρ = total-degree. The resulting matrix P now has a clear block Erdos-R´enyi structure: (cid:124) (cid:123)(cid:122)  (cid:125)  . P = n1 n2 nt n1 d[1]d[1] ρ d[2]d[1] ρ ... n2 d[1]d[2] ρ d[2]d[2] ρ ... ··· . . . nt d[1]d[t] ρ d[t]d[1] ρ d[t]d[2] ρ d[t]d[t] ρ (4.2) (Note that a very careful implementation can use(cid:0)t (cid:1) Erdos-R´enyi blocks.) The first We leave an implementation of this as a solved exercise at the conclusion of this paper. 2 reference we are aware of to this algorithm for Chung-Lu graphs is Miller and Hagberg (2011). Direct Ball-dropping for Chung-Lu and Stochastic Block Models.. It turns out that there are equivalent procedures to ball dropping for both Chung-Lu and and Stochastic 15 Block Models. We've deferred these to the problem section (Problems 3, 6) where we explain some of the intuition behind the differences and some of the advantages and disadvantages. Both methods need to deal with the same type of duplicate entries that arise in ball-dropping for simple Erdos-R´enyi models, however this setting is far more complicated as the different probability values can result in regions where there will be many duplicates. These can be discarded to easily generate a slightly biased graph. This is what is done in the Graph500 benchmark, for example (Murphy et al., 2010). On the other hand, the number of Erdos-R´enyi blocks grows quadratically for (cid:1) for Chung-Lu and k2 for the block model. Thus, in the case where both models: (cid:0)t there are a large number of blocks, there are some non-trivial considerations as far as when grass-hopping would be preferable to ball-dropping. As an example, Hagberg and Lemons (2015) shows a technique that generalizes Chung-Lu and enables efficient sampling in this scenario. 2 5. Fast Sampling of Kronecker Graphs via Grass-hopping. As far as we are aware, a ball-dropping procedure or coin-flipping procedure was the standard method to sample a large Kronecker graph until very recently. Ball dropping methods often generated many duplicate edges in hard to control ways (Gro er et al., 2011). In practice, these duplicates were often ignored to generate approximate distributions that are usable in many instances (Murphy et al., 2010). As previously mentioned, coin-flipping could never scale to large graphs. This situation changed when Moreno et al. (2014) showed that a "small" number of Erdos-R´enyi blocks were hiding inside the structure of the Kronecker matrix. We will walk through a new presentation of these results that makes a number of connections to various subproblems throughout discrete mathematics. The key challenge is identifying the entries of the matrix where the Erdos-R´enyi blocks occur. This was simple for both Chung-Lu and the stochastic block model, but it is the key challenge here. We are not going to discuss ball dropping procedures for Kronecker graphs because those are widely discussed elsewhere and it would be a diversion, but we strongly encourage interested readers to study both Chakrabarti et al. (2004) and Seshadhri et al. (2013). 5.1. Kronecker graphs as unions of Erdos-R´enyi. And why grass-hopping is hard! You might be wondering what makes this problem hard once we exhibit that Kronecker graphs are unions of Erdos-R´enyi regions. Looking at the matrix P from Section 2.6 shows that there are some repeated probabilities. (Figure 5 shows a guide to where the probabilities are the same.) However, it seems as if they are scattered and not at all square like they were in the Chung-Lu and Stochastic Block Model cases. There is a larger example in Figure 6 that shows what a single region looks like for a 64-by-64 matrix. This seems to imply that it is extremely difficult to take advantage of any Erdos-R´enyi subregions. Moreover, it is unclear how many such regions there are. If there are many such regions that are all small, then it will not help us to sample each region quickly (even if we can!). We are going to address both of these questions: (i) How many Erdos-R´enyi regions are there? and (ii) How can each region be identified? More specifically, let the initiator matrix K be n-by-n, and let k be the number of Kronecker terms, so there are nk nodes in the graph. In the remainder of Section 5, we show the following results: (cid:1) regions, which is asymptotically O(kn2−1). • Question (i). There are(cid:0)k+n2−1 This is important because it means that the number of regions grows more k 16 slowly than as the number of nodes nk, enabling us to directly enumerate the set of regions and keep an efficient procedure. (Section 5.2) • Question (ii). The regions are easy to identify in a multiplication table view of the problem and the regions have a 1-1 correspondence with length k non-decreasing sequences of elements up to n2. (Section 5.4) • Question (ii). We can randomly sample in the multiplication table view by • Question (ii). We can map between the multiplication table view and the unranking multiset permutations. (Section 5.5) repeated Kronecker products via Morton codes. (Section 5.6) 5.2. The number of Erdos-R´enyi regions in a Kronecker matrix. Con- sider the result of taking a Kronecker product of a matrix K with itself. In the 2 × 2 case with K =(cid:2) a b (cid:3), then c d aa ab ac ad cb ca cc cd  . bb ba bd bc da db dc dd K ⊗ K = (5.1) Note that all combinations of symbols a, b, c, d occur between the Kronecker product. This result holds generally. Consequently, we can identify a length-k string of the . . . ⊗ K. If K is n × n, then there symbols a, b, c, d with each entry of P = K ⊗ k terms are (n2)k such strings. The feature we are trying to exploit here is that the string aba results in the same probability as aab and baa, and hence we want to count the number of these distinct probabilities. An appropriate mathematical object here is the multiset. In a multiset, we have a set of items, along with a multiplicity, but where the order of items is irrelevant. So the strings aab and aba would both correspond to the multiset where a occurs twice and b occurs once. The cardinality of this multiset is 3. Consequently, the number of unique . . . ⊗ K is equivalent to the number of distinct multisets we probabilities in K ⊗ k terms can derive from the n2 symbols in K where each multiset has cardinality k. A famous and well-known result in counting follows. Recall that (cid:0)n (cid:1) is the number of distinct sets of cardinality k that can be drawn from a set of n items. The generalization to multisets is called "multichoose" and k = the number of multisets of cardinality k with n items (5.2) (cid:18)(cid:18)n (cid:19)(cid:19) (cid:19) . k (cid:18)n + k − 1 Consequently, there are(cid:0)(cid:0)n2 = k k matrix for a Kronecker graph. The right hand side of this can be derived from a stars and bars argument (see, for instance, Wikipedia). (cid:1) Erdos-R´enyi regions in the probability (cid:1)(cid:1) =(cid:0)k+n2−1 k Recall that for large networks, we are expecting the network to be sparse, and so we expect the number of edges generated to be about the same size as the number of nodes. This expression, at the moment, is worrisome because there are nk nodes in a Kronecker graph and so we'd like there to be fewer Erdos-R´enyi regions than there are nodes. If this isn't the case, then just looking at all regions would result in more work than we would do generating edges within each region. 17 Fig. 5. For a Kronecker graph with a 2 × 2 initiator matrix K = [ 0.99 0.5 been "⊗-powered" three times to an 8 × 8 probability matrix, see equation (2.5), the marked cells illustrate the regions of identical probability that constitute an Erdos-R´enyi piece. Here, we have used symmetry in K to reduce the number of regions. b d 0.5 0.2 ] =(cid:2) a b (cid:3) that has Fig. 6. For a Kronecker graph with a 2×2 initiator matrix K =(cid:2) a b (cid:3) that has been "⊗-powered" six times (k = 6) to an 64 × 64 probability matrix, the marked cells illustrate one Erdos-R´enyi piece that corresponds to the probability abcdab. c d We now show three results that will guarantee that there are fewer Erdos-R´enyi regions than nodes of the graph for sufficiently large values of k. The first result is that there are at most (e + 1)k regions for a large enough k, which gives our result when e + 1 ≤ n. The second is that if n = 2 or n = 3 there are at most 2k or 3k regions when k ≥ 10. The third is (cid:1) is O(kn2−1) asymptotically, which means that the number of regions Aside 11. We are using big-O no- tation here to understand what hap- pens for large values of k when n is considered a fixed constant. that(cid:0)n2+k−1 k 18 aaadddaababbaadabdbbbbddbbdaddabcdab asymptotically grows much more slowly than the number of nodes. Once k ≥ e(n2 − 1), then we have at most (e + 1)k regions. Result 1. By Sterling's approximation for combinations: (cid:0)a (cid:1) ≤ ( ea Substituting the expression for the number of regions yields: (cid:0)k+n2−1 (cid:1) ≤ ( e(k+n2−1) (cid:1) ≤ 2k when k Result 2. For n = 2, we will show by induction that (cid:0)k+n2−1 (cid:1), so when k = 7,(cid:0)k+3 (cid:1) = 120, 2k = 128, and becomes large. Note(cid:0)k+n2−1 (cid:1) ≤ 2k+1. assuming it holds true for k. Substituting k + 1, we need to show that(cid:0)k+4 120 < 128. For our inductive step we must show that our inequality holds true for k + 1 (cid:1) =(cid:0)k+n2−1 b )b (Das, 2017). )k. n2−1 k k k k 3 b 3 Expanding the left hand side, (cid:18)k + 4 (cid:19) 3 (k + 4)(k + 3)(k + 2) 3! (cid:18)k + 1 (cid:19) · (k + 4)(k + 3)(k + 2) 3! = = k + 1 k + 1 k + 4 k + 1 = 3 ≤ 2 · 2k = 2k+1 k k (cid:81)9 k+1 ≤ 2. The last statement assumes k ≥ 2, so k+4 our inductive step we must show that our inequality holds true for k + 1 assuming it The same strategy works for n = 3 to show that(cid:0)k+n2−1 becomes large. When k = 10,(cid:0)k+8 holds true for k. Substituting k + 1 into our inequality, we need to show(cid:0)k+9 inductive assumption that(cid:0)k+8 Result 3. Finally, we note that(cid:0)k+n2−1 (cid:1) ≤ 3k for n = 3 when k (cid:1) = 43758, 3k = 59049, and 43758 < 59349. For (cid:1) ≤ 3k+1, (cid:1) ≤ 3k. Thus, we obtain k+9 (cid:1) = (k+n2−1)! ) because n is a constant. If we use the simple upper-bound (k+n2−1)! ≤ (k + n2 − 1)n2−1 and then take logs, we have: (n2 − 1) log(k + n2 − 1). The concavity of log gives the subadditive property log(a + b) ≤ log(a) + log(b) when a, b ≥ 2. So (n2 − 1) log(k + n2 − 1) ≤ (n2 − 1) log(k) + (n2 − 1) log(n2 − 1). Exponentiating now yields O(kn2−1). k+1 allows us to use our k+1 ≤ 3 which is true when ≤ 3k · 3. Multiplying the LHS by k+1 or equivalently k ≥ 3. k!(n2−1)! = O( (k+n2−1)! i=2 k+i k! k! 8! k 8 8 We now have the results that show there are sufficiently few Erdos-R´enyi regions in a Kronecker graph, and so our grass-hopping procedure could successfully be applied to each region. This resolves question (i). We now turn to question (ii). 5.3. The strategy for grass-hopping on Kronecker graphs: Multiplica- tion tables and Kronecker products. In order to find the Erdos-R´enyi regions in a Kronecker graph easily, we need to introduce another structure: the multiplication table. Let v be the vector(cid:2)a b c d(cid:3)T , then  . (5.3) av bv cv dv v ⊗ v = 19 This object can be reshaped into reshape(v ⊗ v) = For those accustomed to the mixed-product property of Kronecker products, this result is just vec(vvT ) = v ⊗ v. The vec operator is a useful tool that converts a matrix into a vector by stitching the column vectors of a matrix together: bb cb bc cc bd ba ca cd da db dc dd aa ab ac ad   a (cid:21)(cid:19) = d c b d (cid:18)(cid:20)a b vec c (5.4) (5.5) The reason this is called a multiplication table is that it is exactly the multiplication table you likely learned in elementary school when a = 1, b = 2, c = 3, d = 4, . . .. To get some sense of where this is going, compare (5.4) to (5.1) and notice that all the same entries occur, but they are just reorganized. The idea with a multiplication table is that we can keep going: reshape(v ⊗ v ⊗ v) = . (5.6) More generally, a k-dimensional multiplication table arises from reshape(v ⊗ v ⊗ ··· ⊗ v ). (cid:124) (cid:123)(cid:122) k times (cid:125) (5.7) Here's how the multiplication table view helps us: it is easy to find the Erdos-R´enyi regions in a multiplication table! Consider the entry aab. This occurs in cells (1, 1, 2), (1, 2, 1), and (2, 1, 1). These are exactly the three permutations of the multiset with two 1s and one 2. However, that result does not do us any good without the following fact: the entries of the k-dimensional multiplication table with v = vec(K) can be mapped 1-1 to entries of the repeated Kronecker product matrix K ⊗ K ⊗ ··· ⊗ K . More specifically, we show that (cid:124) (cid:125) k times vec(K ⊗ K ⊗ ··· ⊗ K ) = M n,k vec(K) ⊗ vec(K) ⊗ ··· ⊗ vec(K) (5.8) (cid:123)(cid:122) (cid:123)(cid:122) k times (cid:124) (cid:123)(cid:122) k times (cid:125) (cid:124) (cid:125) where M n,k is a permutation matrix based on a Morton code. This mapping is illustrated in Figure 7 and Figure 8. We will explain exactly what is in that figure in subsequent sections, but we hope it helps provide a visual reference for the idea of mapping between the Kronecker information and the multiplication table. These two results, together with the small number of regions result from Section 5.2, enable the following strategy to grass-hop on an Kronecker graph efficiently. Grass- hop independently in each region of the the multiplication table and then map the multiplication table entries back to the Kronecker matrix. More programmatically: 20 daadabdacdaddbadbbdbcdbddcadcbdccdcdddaddbddcdddcaacabcaccadcbacbbcbccbdccaccbcccccdcdacdbcdccddbaababbacbadbbabbbbbcbbdbcabcbbccbcdbdabdbbdcbddaaaaabaacaadabaabbabcabdacaacbaccacdadaadbadcadd """ Generate a Kronecker graph via grass-hopping. The input K is the Kronecker initiator matrix and the the value k is the number of levels. Example: grass_hop_kron([[0.99,0.5],[0.5,0.2]], 3) """ def grass_hop_kron(K,k): n = len(K) # get the number of rows v = [K[i][j] for j in xrange(n) for i in xrange(n)] # vectorize by cols edges_mult = [] for r in regions(v,k): # for each region of the mult. table edges_mult.extend(grass_hop_region(r, v)) # get edges in mult. table edges_kron = [] for e in edges_mult: # map edges from mult. table to kron edges_kron.append(map_mult_to_kron(e, n)) return edges_kron The goal of the next three subsections is to write the each of the functions: regions (Section 5.4), grass_hop_region (Section 5.5), and map_mult_to_kron (Section 5.6). Once we have these pieces, we will be able to efficiently grass-hop through a Kronecker graph! 5.4. Enumerating all Erdos-R´enyi regions. Recall that each of the distinct probabilities that occur in P = K ⊗ k terms . . . ⊗ K can be identified with a multiset of size k from a collection of n2 objects (Section 5.2). Our task is to enumerate all of these multisets. Here, we note that each multiset can be identified with a non- decreasing sequence of length k where the symbols are 0, 1, . . . , n2 − 1. For instance, when n = 2, k = 3, these sequences are [0,0,0], [0,0,1], [0,0,2], [0,0,3], Let v = vec((cid:2) a b c d [0,1,3], [0,2,2], [0,1,1], [0,1,2], (cid:3)) = [ a c b d ]T . The sequence [0, 2, 2], then, refers to the probability [0,2,3], [0,3,3], [1,1,1], [1,1,2], [1,1,3], [1,2,2], [1,2,3], [1,3,3], [2,2,2], [2,2,3], [2,3,3], [3,3,3]. v(1)v(3)v(3) = abb. At this point, we are starting to mix programmatic indexes (0, . . . , n2 − 1) with the mathematical indices (1, . . . , n2). Our goal is not to be confusing, but rather to ensure that the discussion in the text matches the programs more precisely from this point forward. As justification, we hope it is easy to see that each non-decreasing sequence of length k corresponds with a multiset of cardinality k. (For instance, [0, 2, 2, 3] corresponds to one 0, two 2s, and one 3.) The other direction, that each multiset can be represented as a non-decreasing sequence, is also straightforward. Given a multiset of elements from 0 to n2 − 1 with k total elements, place them into a sequence with repetitions in sorted order. So if we had two 5s, three 1s, and one 2, we would get the sequence [1, 1, 1, 2, 5, 5, 5]. This sequence is non-decreasing and so we can do this for any multiset. Thus, we have justified that the length k non- decreasing sequences are in 1 − 1 correspondence with the Erdos-R´enyi regions. We now continue with the problem of computationally enumerating non-decreasing sequences. Aside 12. One note, there could be fewer Erdos-R´enyi regions due to duplicated probability values. We are assuming here that the values in K are distinct. For remainder of this section, k will represent the length of the sequence, and m will represent the largest entry + 1 that is valid in the sequence in order to match the code precisely. In the previous example, k = 4 and m = 4. Our code for this task is implemented in the subroutine regions in Listing 4. It begins with the first sequence: [0, 0, 0, 0] and iteratively steps through all of them via the function next_region. 21 The function next_region handles scenarios exemplified by the following three cases [0, 1, 1, 2] → [0, 1, 1, 3] [1, 3, 3, 3] → [2, 2, 2, 2] [3, 3, 3, 3] → [−1,−1,−1,−1] easy spill spill and done. (5.9) Recall that Python indexes from 0. This next_region update works by incrementing the last, or k−1th, entry of the sequence to the next value. In the easy case, this results in [0, 1, 1, 2] → [0, 1, 1, 3]. In the spill case, we get [1, 3, 3, 3] → [1, 3, 3, 4]. We check for these cases by examining the value of this last element again. If it is any value < m, then we are in the easy case and there is nothing left to do. However, if the last value is equal to m, then we need to handle the spill. In the spill scenario, we recursively ask for next non-decreasing sequence for all but the last element. In our example, this call produces next_update([1, 3, 3], 4), which yields [1, 3, 3] → [2, 2, 2]. At this point, cur = [2, 2, 2, 4]. Because the sequence must be non-decreasing, we set the last element (currently at 4) to be the first value possible. This is given by the second-to-the-last element (2) after the prefix is updated the value is incremented by 1. And so, this update produces [1, 3, 3, 3] → [2, 2, 2, 2]. The final case is if the array had length 1, then there is no prefix to update. In this case, we simply flag this scenario by introducing a −1 sentinel value. This sentinel value propagates through the array. Listing 4 Code to update a non-decreasing sequence representing a subregion to the next non-decreasing sequence def next_region(cur, m): k = len(cur) cur[k-1] += 1 if cur[k-1] == m: # increment the last element # if there is spill if len(cur) > 1: # there is an array cur[0:k-1] = next_region(cur[0:-1],m) # recur on prefix cur[k-1] = cur[k-2] # update suffix else: cur[k-1] = -1 # singleton, no room left! return cur """ Generate the set of Erdos-Reyni regions in a Kronecker graph where v = vec(K), and k = number of levels. Each region gives indices into v that produce a distinct Erdos-Reyni probability. Example: regions([0.99,0.5,0.5,0.2],3) """ def regions(v,k): m = len(v) rval = [] cur = [ 0 for _ in xrange(k) ] # initialize the regions to zero while cur[0] != -1: rval.append(list(cur)) # make a copy next_region(cur, m) return rval Proof that regions and update work. The following is a sketch of a proof that next_region gives the next region in lexicographic order. First, for arrays of length 1, this is true because at each step we increment the element up until we generate the −1 termination symbol. We now inductively assume it is true for arrays of length < k. When next_region runs on an array of length k, then either we increment the last element, in which case we have proven the result or the last element is already n − 1. If the last element is already n − 1, then we generate the next element in lexicographic 22 order in the prefix array, which is of length k − 1, and this occurs via our induction hypothesis. Finally, note that the last element of the updated prefix has the same value as our suffix. 5.5. Grass-hopping within an Erdos-R´enyi region in the Multiplication Table: Unranking multiset permutations. Given an Erdos-R´enyi subregion, we now turn to the problem of how to grass-hop within that region in the multiplication table. Let v be a length m vector, which is vec(K), and consider the k-dimensional multiplication table M . The entry (i, j, . . . , l) in the multiplication table is simply equal to the product v(i)v(j) . . . v(l). In other words (5.10) M (i, j, . . . , (cid:96)) = v(i)v(j)··· v((cid:96)) , k total terms (cid:124) (cid:123)(cid:122) (cid:125) where v(i) is the ith entry in the vector v. Recall from section 5.4 that each Erdos- R´enyi subregion exactly corresponds with a length k non-decreasing sequence. Let r be the length k non-decreasing sequence that labels the current region. In the multiplication table, this region corresponds to the element M (r1 + 1, r2 + 1, . . . , rk + 1) = v(r1 + 1)v(r2 + 1)··· v(rk + 1). (5.11) (Note that we index the region programmatically, but the vector entries mathematically, hence, the addition of 1.) The locations in the multiplication table in which this Erdos-R´enyi subregion occurs are the distinct permutations of the sequence r. For example r = [0, 1, 1, 1] → [0, 1, 1, 1], [1, 0, 1, 1], [1, 1, 0, 1], [1, 1, 1, 0] r = [0, 1, 2, 2] → [0, 1, 2, 2], [0, 2, 1, 2], [0, 2, 2, 1], [1, 0, 2, 2], [1, 2, 0, 2], [1, 2, 2, 0], [2, 0, 1, 2], [2, 0, 2, 1], [2, 1, 0, 2], [2, 1, 2, 0], [2, 2, 0, 1], [2, 2, 1, 0]. (5.12) All of these entries have exactly the same probability because the multiplication operation in (5.11) is associative. Consequently, it is easy to find the regions of the multiplication table that share the same probability. What is not entirely clear at this point is how we use this with a grass-hopping procedure. In grass-hopping, we move around indices of the Erdos-R´enyi region in hops. How can we hop from the element [0, 2, 1, 2] to [2, 0, 1, 2]? The answer arises from an the ranking and unranking perspective on combinatorial enumeration (Bonet, 2008). For a complex combinatorial structure, such as multiset permutations, we can assign each permutation a rank from 0 to the total number of objects minus one. Thus, in second example in (5.12) we have [0, 1, 2, 2] → 0 [0, 2, 1, 2] → 1 ... [2, 2, 1, 0] → 11 (5.13) This rank is based on the lexicographic order of the objects. Lexicographic order is exactly the same order you'd expect things to be in based on your experience with traditional sequences of numbers. The permutation [2, 1, 0, 2] occurs before [2, 2, 0, 1] 23 for the same reason we say 2102 is before 2201 in order. Unranking is the opposite process. Given an integer between 0 and the total number of objects minus one, the unranking problem is to turn that integer into the combinatorial object. Hence, unrank→ [1, 2, 0, 2]. 4 (5.14) More generally, given the initial sequence r = [0, 1, 2, 2], and any integer between 0 and 11, the unranking problem is to turn that integer into the sequence with that rank in lexicographic order. This is exactly what we need in order to do grass-hopping on multiset permutations. We grass-hop on the integers between 0 and the total number of multiset permu- tations −1. The total number of multiset permutations is given by the the formula: m! a1!a2! . . . ak! (5.15) where ai is the number of times the ith element appears and m is the cardinality of the multiset. (See the permutation page on Wikipedia for more details) At a high level, the unrank algorithm (Listing 5) takes as input a multiset permutation in non-decreasing form represented as an array, as well as an index or "rank" of the desired permutation. The algorithm is recursively defined and simply returns the original array if the input rank is 0 as the base case. In the other case, the algorithm searches for the first element of the multiset permutation. (The details of this search are below.) Once it finds the first element, then it recurs on the remainder of the sequence after removing that element. To make this code somewhat efficient, we maintain a counter representation of the multiset. This counts the number of times each element occurs in the multiset and keeps a sorted set of elements. For the multiset [0, 1, 2, 2], the counter representation is: keys = [0, 1, 2] and mset = (5.16) (cid:124) (cid:123)(cid:122) (cid:125) sorted elements 0 → 1 1 → 1 2 → 2 The functions ndseq_to_counter and counter_to_ndseq convert between the counter and sequence representations. The function num_multiset_permutations returns the number of permutations of a given multiset via (5.15). For our example, [0, 1, 2, 2], equa- tion (5.15) is equal to 12, which matches our direct enumeration in (5.13). The main algorithm is unrank_mset_counter, which takes as input the counter representation of the multiset as well as the "rank" index. The objective of unrank_mset_counter is to find the first element of the permutation in lexicographic order. We examine the sorted elements in the keys array in order. For each element, we tentatively remove it by decreasing its count in mset and then we count the number of multiset permutations with the remaining elements. For our running example, this yields: [0, 1, 2, 2] → starts with 0 and ends with a permutation of [1, 2, 2] = 3 starts with 1 and ends with a permutation of [0, 2, 2] = 3 starts with 2 and ends with a permutation of [0, 1, 2] = 6. (5.17) We interpret this output as follows. Let the desired rank be R. There are three permutations which start with a zero, and they correspond to the first three ranks 0, 24 1, or 2. So if R < 3, in that case we can recurse and unrank the permutation with sequence [1, 2, 2] and exactly the same rank R. If the rank is 3, 4, or 5, then the permutation starts with 1 and we can recurse and unrank the permutation of [0, 2, 2] with rank R − 3. Finally, if the rank is 6, . . . , 11, then the permutation starts with 2 and we can recurse and unrank the permutation of [0, 1, 2] with rank R − 6. These recursions yield the suffix that we return. Listing 5 Unranking a multiset permutation # unrank takes as input: # - C: a multiset represented by a list # - n: the lexicographic rank to find # and returns the nth permutation of C in # lexicographic order. # # Examples: # unrank([0,1,1,3], 0) returns [0,1,1,3] # unrank([0,1,1,3], 1) returns [0,1,3,1] # unrank([0,1,1,3], 2) returns [0,3,1,1] def num_multiset_permutations(mset): count = factorial(sum(mset.values())) for k in mset.keys(): count = count//factorial(mset[k]) return count def unrank_mset_counter(mset,keys,n): if n==0: # easy if rank == 0 return counter_to_ndseq(mset,keys) for s in keys: # else find prefix key from math import factorial def ndseq_to_counter(seq): mset = {} for c in seq: # get a value with a default # of zero if it isn't there mset[c] = mset.get(c,0)+1 return mset, sorted(mset.keys()) mset[s] -= 1 # decrease count of s # determine number of prefixes with s place = num_multiset_permutations(mset) if place > n: # then the first element is s if mset[s] == 0: # remove the key keys.remove(s) # if the count is 0 suffix = unrank_mset_counter( mset, keys, n) # recurse! # append s suffix.insert(0, s) return suffix def counter_to_ndseq(mset,keys): else: # here it does not start with s seq = [] for k in keys: # keys in sorted order # append k mset[k] times for v in xrange(mset[k]): seq.append(k) return seq mset[s] += 1 # restore the count n -= place # update search offset raise(ValueError("rank too large")) def unrank(seq,n): mset,keys = ndseq_to_counter(seq) return unrank_mset_counter(mset,keys,n) 5.6. Mapping from the Multiplication Table to the Kronecker graph: Morton codes. In this section we prove a novel connection between repeated Kro- necker product graph matrices and Morton codes that was mentioned in equation 5.8. But first, some background on Morton codes! Morton codes or Z-order codes are a neat primitive that arise in a surprising diversity of applications. Relevant details of these applications are beyond the scope of our tutorial, but they include high-performance computing (Bulu¸c et al., 2009), database search, and computer graphics (see Wikipedia for references on these). When Morton codes and Z-order are used in the context of matrices, the term refers to a specific way to order the matrix elements when they are represented as a data array with a single index. Common strategies to accomplish this include row and column major order, that order elements by rows or columns, respectively. Morton codes adopt a recursive, hierarchical pattern of indices. Here are four different ways to organize 25 Listing 6 Grass-hopping in an Erdos-R´enyi region of a Kronecker product matrix import numpy as np # use np.random.geometric for the geometric random variables # grass_hop_region takes as input # - r: the region to be sampled represented by a non-decreasing array # - v: the initiator matrix represented as a n^2-by-1 column vector # and returns a list of edges represented by indexes in mult. table # Example: v = [0.99,0.5,0.5,0.2]; grass_hop_region(regions(v,3)[2], v) def grass_hop_region(r,v): # p is the common prob value of the region p = multtable(r,v) n = num_multiset_permutations(ndseq_to_counter(r)[0]) # total size of region edges_mult = [] i = -1 gap = np.random.geometric(p) while i+gap < n: # the initially empty list of edges # starting index of the grass-hopping # the first hop # check to make sure we haven't hopped out # increment the current index i += gap edges_mult.append(unrank(r,i)) # add the gap = np.random.geometric(p) # generate the next gap return edges_mult # multtable takes as input: # - r: an array with k elements specifying a cell in the multiplication table # - v: the initiator matrix represented as a n^2-by-1 column vector # and returns the value at the specified location in the multiplication table def multtable(r,v): final = 1.0 for val in r: final *= v[val] return final the 16 values in a 4-by-4 matrix  (cid:124) 1 5 9 3 2 0 7 6 4 8 10 11 12 13 14 15 Row Major Order (cid:123)(cid:122)  (cid:125)  (cid:124)  (cid:125) 8 9 12 0 4 13 1 5 2 6 10 14 3 7 11 15 (cid:123)(cid:122)  (cid:124) 1 3 9 5 4 0 7 6 2 8 12 13 10 11 14 15 Row Morton Order (cid:123)(cid:122)  (cid:125)  (cid:124) 8 9 10 0 2 11 1 3 4 6 12 14 5 7 13 15 (cid:123)(cid:122)  (cid:125) Column Major Order Column Morton Order The name "Z-curve" comes from the description of the row Morton order, which enumerates the first 2-by-2 block in a "Z" shape, and then recursively repeats that in growing 2-by-2 blocks. For the general Morton code, notice the recursive pattern as well. We are going to use column Morton orders in this paper. More specifically, a Morton code refers to the method used to generate the linear index from the row and column, or the inverse map, which takes a linear Morton index and produces the row and column in the matrix MortonEncode(i, j) → I ∈ [0, n2 − 1] MortonDecode(I) → (i, j) ∈ [0, n − 1]2. (5.18) At this point, we've fully switched to programmatic indices as otherwise the confu- sion between the codes and the text would become extreme. Matrices and vectors, now, are indexed from 0 as well. In the previous 4-by-4 example of the orders, MortonEncode(1, 2) = 9, and MortonDecode(7) = (3, 1). (Our row and column in- dices start at zero if these numbers seem off by one!) The encoding and decoding procedures work on bit-strings for the respective numbers. In fact, the procedure is surprisingly elegant: take the bit-strings for the row and column index and interleave 26 Fig. 7. The Morton decoding process of a 2nd power Kronecker graph. The decoding process takes the lexicographic index of a probability sequence and maps it to 2-dimensional (i, j) indices by a z-order curve. In (a) and (c), the probability sequences are indexed directly in lexicographic order. Writing the index in base 2 and separating every other digit yields the row and column indices for each permutation as seen in (b). The placing of permutations in the matrix that arises is the same as that of the 2nd power Kronecker matrix (d). The ordering of the lexicographic indexes in (b) is a z-shaped fractal pattern (Follow the ordering of the numbers from 0 − 15.) the digits. For example, let's say we want to encode the numbers 1 and 2 into a single value. First, we convert both numbers into base 2: 1 → 012 and 2 → 102. Next we interleave the digits starting from the column: 1 0 0 1 1 0 0 1 The resulting code 10012 = 9: the desired Morton index. To decode a Morton index into the row and column numbers, we simply reverse the process. We consider 7 with it's base-2 representation: 01112 and divide the digits into two groups, alternating every binary digit: 0 1 1 1 0 1 1 1 This gives a column index of 1 and a row index of 3. Now, suppose we consider the Morton code as map between two linear indices: the column Morton order and the column major order. This is easy to build if we are given a MortonDecode function because we can quickly move from the row and column values to the linear index in column major order. (In case this isn't clear, given the row r and column c indices, the column major index is r + cn where n is the number of rows of the matrix.) The result is a permutation [0, n2 − 1] → [0, n2 − 1]: 0 → 0 4 → 2 1 → 1 5 → 3 2 → 4 6 → 6 7 → 7 3 → 5 8 → 8 9 → 9 10 → 12 11 → 13 27 12 → 10 13 → 11 14 → 14 15 → 15 . (5.19) This permutation induces a permutation matrix M :  1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1  (5.20) The essence of our final primitive is that this Morton map translates between the multiplication table and the Kronecker product as illustrated in Figure 7. In this case, we have validated the case of equation (5.8) vec(K ⊗ K) = (cid:124) (cid:123)(cid:122) (cid:125) M(cid:124)(cid:123)(cid:122)(cid:125) (cid:124) [vec(K) ⊗ vec(K)] (5.21) (cid:123)(cid:122) (cid:125) Kronecker matrix in column-major MortonDecode to column-major linear index from multiplication table where K is two-by-two. We prove this statement in full generality shortly. More generally, Morton codes can be defined with respect to any base. We illustrate a case of equation (5.8) in Figure 8 where K is 3 × 3 and k = 3. Suppose, in the multiplication table, we generate an edge at index 329. The value 329 in base 3 is 1100123. The resulting MortonDecode is 1 1 0 0 1 2 1 0 1 1 0 2 which gives a column index of 1 · 32 + 1 = 10 and a row-index of 1 · 32 + 2 = 11. Looking up this entry in the Kronecker matrix (Figure 8, upper right), yields a value of eaf . Checking back in the multiplication table (Figure 8, upper left) shows that entry 329 corresponds to entry eaf as well! (Note that given the base 10 value 329 we can determine its value in the multiplication table by doing a base 9 decode. Indeed, 32910 = 4059, which gives a multiset index of [4, 0, 5] corresponding to the values v(5) = e, v(1) = a, v(6) = f .) Returning to the problem of generating a random Kronecker graph, recall that equation (5.8) gave us a way of mapping from elements of the multiplication table to elements of the Kronecker matrix. This relationship, then, provides a computational tool to determine where an arbitrary element of the multiplication table generated by grass hop region occurs in the Kronecker matrix itself, providing the final piece of the fast Kronecker sampling methodology. The code that maps indices of the multiplication table through Morton codes to the Kronecker indices is given in Listing 7. This code assumes that equation (5.8) is correct, which we will prove in the next section. In the code, the index in the multiplication table is converted into a single linear index. This conversion is just a base n2 to base 10 conversion. Next, the linear index is MortonDecoded in base n. The decoding proceeds by assigning the least significant digit to the row index, then the next digit to the column, the next digit to the row, and so on. The most-significant digit then goes to the column value. What remains is the proof that equation (5.8) is correct, which we tackle in the next section. 28 Listing 7 Mapping multiplication table indices to row and column indices of the Kronecker matrix """ Map a multi-index from the mult. table table to a row and column in the Kronecker matrix. The input is: mind: the multi-index for the mult table n: the size of the initiator matrix K Example: map_mult_to_kron([1,3],2) map_mult_to_kron([4,0,7],3) # = (10,11) # = (3,1) """ def map_mult_to_kron(mind,n): I = multiindex_to_linear(mind,n*n) return morton_decode(I,n) def multiindex_to_linear(mind,n2): I = 0 base = 1 for i in xrange(len(mind)-1,-1,-1): I += mind[i]*base base *= n2 return I def morton_decode(I,n): row = 0 rowbase = 1 col = 0 colbase = 1 i = 0 while I > 0: digit = I%n I = I // n if i%2 == 0: row += rowbase*digit rowbase *= n else: col += colbase*digit colbase *= n i += 1 return (row,col) 29 Fig. 8. The connection between the multiplication table and a repeated Kronecker matrix with a 3 × 3 matrix K with k = 3. This gives a 9 element vector v and a 9 × 9 × 9 multiplication table for a 27 × 27 matrix of probabilities. 30 (a) Mulitplication Table(c) Lexicographic RanksMorton EncodeMorton Decode Fig. 8. (continued) 31 0003 0013 0023 0103 0113 0123 0203 0213 0223 1003 1013 1023 1103 1113 1123 1203 1213 1223 2003 2013 2023 2103 2113 2123 2203 2213 222 3 0003 0013 0023 0103 0113 0123 0203 0213 0223 1003 1013 1023 1103 1113 1123 1203 1213 1223 2003 2013 2023 2103 2113 2123 2203 2213 222 300030013002301030113012302030213022310031013102311031113112312031213122320032013202321032113212322032213222300030013002301030113012302030213022310031013102311031113112312031213122320032013202321032113212322032213222 3(b) Kronecker Matrix(d) Kronecker IndicesMorton EncodeMorton Decode tation. In this section, we will prove (5.8) via the following theorem. 5.7. The proof of the Multiplication Table to Kronecker matrix permu- Theorem 5.1. Let K be a n × n matrix and v = vec(K) be the column-major representation of K. Consider an element in the multiplication table with index (r1, r2, . . . , rk). Let I be the lexicographic index of the element (r1, . . . , rk). Then the base n Morton decoding of I provides the row and column indices of an element in (cid:124) v ⊗ v ⊗ ··· ⊗ v k terms (cid:125) (cid:124) K ⊗ K ⊗ ··· ⊗ K k terms (cid:123)(cid:122) (cid:123)(cid:122) (cid:125) (cid:124) with the same value. If we convert the row and column indices provided by Morton into a column-major index, then we can build a permutation matrix M n,k in order to write: vec(K ⊗ K ⊗ ··· ⊗ K ) = M n,k(v ⊗ v ⊗ ··· ⊗ v (cid:123)(cid:122) k terms (cid:125) ). (cid:124) (cid:123)(cid:122) k terms (cid:125) Proof. To state the proof concisely, let K⊗k = K ⊗ k terms . . . ⊗ K, and v⊗k be the same. In the proof, we will just show that the Morton code for I gives the correct row and column indices for K⊗k. The resulting permutation matrix follows by converting those row and column indices to a column-major index and building the full permutation matrix. We will prove this statement by induction on the power of the Kronecker product, k. Base case. When k = 1, K⊗k = K is simply the initiator matrix. Consequently, the theorem reads vec(K) = M n,1v. But the length 1 Morton code is simply the row and column index in column major order, and so this result follows because the map M n,1 is the identity. Inductive step overview. We will prove our statement inductively by calculating the new row and column values in two ways: first by recursively defining the row and column values using a "zooming" argument, and second by applying the Morton decoding process on a recursively defined lexicographic index, Ik+1. The following figure shows an illustrative overview of how we will show the result in general. t o b a s e 1 0 b a s e N 2 Lexicographical Index I MortonDecode Multiplication Table Index 'Zooming', Backward-Mapping (i, j) row and column location Inductive step formal. Assume M n,k correctly maps between v⊗k and K⊗k. More specifically, this means we can find the row and column index (Rk, Ck) for a given index of the multiplication table (r1, r2, . . . , rk). Let (r1, r2, . . . , rk, rk+1) be the multiplication table index for an entry of v⊗k+1 Then notice that (r1, r2, . . . , rk) corresponds to an index in v⊗k. By assumption, the Morton code correctly gives the correct row and column values in K⊗k: Rk and Ck. 32 Note that the structure of the K⊗k+1 is:  K1,1K⊗k K1,2K⊗k K2,1K⊗k K2,2K⊗k ... ...  ··· K1,nK⊗k ··· K2,1K⊗k . . . ··· Kn,nK⊗k ... (5.22) Kn,1K⊗k Kn,2K⊗k Then the row value for (r1, r2, . . . , rk, rk+1) Rk+1 = Rk + (rk+1 mod n)nk. (5.23) The reasoning for this is as follows. The size of the previous iteration's matrix is nk. When we incorporate the new value rk+1, we move to one of the n2 areas (of dimension nk by nk) of the Kronecker matrix where (r1, r2, . . . , rk) is the suffix. The specific row of the region can be found by simply taking the last multiplication table index rk+1 mod n, which corresponds to looking up the row index for rk+1 in column-major order. The same reasoning can be translated to find the column index, jk+1. (cid:106) rk+1 (cid:107) n Ck+1 = Ck + nk (5.24) By taking the floor of rk+1 divided by n, we know the column index of the value for rk+1. We call this procedure backward-mapping or zooming because we use the inductive step to zoom into the right cell. Now, we must show that the Morton decoding process arrives at the same updated row and column values. First we will calculate the lexicographic index of our length k + 1 multiplication table index. A given multiplication table index (r1, r2, . . . , rk) has a lexicographic index Ik. When we move to the next Kronecker power, we incorporate the value rk+1. We can determine the new lexicographic index Ik+1 using Ik and rk+1. Ik+1 = Ik + rk+1(n2) k (5.25) This relationship arises because the lexicographic index can be calculated by converting our multiplication table index from base n2 to base 10. The last value rk+1 will occupy k the place value at the front of linearized index, i.e. (n2) . Now we must show that Morton decoding correctly maps Ik+1 to Rk+1 and Ck+1. Using the division and remainder theorem on rk+1 divided by n in equation (5.25) results in rk+1 = (cid:98) rk+1 n (cid:99)n + (rk+1 mod n) Substituting this representation into (5.25) yields Ik+1 = (cid:98) rk+1 n (cid:99)n2k+1 + (rk+1 mod n)n2k + Ik n (cid:99) and (rk+1 mod Thus, the last two digits that Morton decoding will find here are (cid:98) rk+1 n), because these correspond to the final terms in a base n representation of Ik+1. Consequently, Morton decoding of Ik+1 is equivalent to decoding Ik and appending the digits (rk+1 mod n) and (cid:98) rk+1 n (cid:99) to the beginning of the new row and column digit-strings respectively. This completes our proof because equation (5.27) gives precisely the row and column values found in equations (5.23) and (5.24). Note that this proof actually suggests a more straightforward way to generate the row and column indices of the Kronecker matrix entries, see Problem 13 for more information. 33 (5.26) (5.27) 6. Problems and Pointers. We completed our major goal, which was to estab- lish a new link between Morton codes and repeated Kronecker products and described how that result is useful in efficiently generating a Kronecker graph. While we have not focused on producing the most efficient implementation possible (see Problem 13 for a non-trivial improvement), we did focus on a procedure that only does a small amount of additional work per edge and is faster than ball-dropping procedures that have dominated the experimental landscape. Our work builds strongly upon the work of Moreno et al. (2014), and highlights new connections to classic problems in combinatorics including ranking and unrank- ing (Bonet, 2008). Indeed, the ranking and unranking perspective has a tremendous amount to offer for ever more complicated models of graphs. For instance, the original specification of the Erdos-R´enyi graph due to Erdos and R´enyi (1959) was a random choice of graphs with n vertices and m edges. It is straightforward to sample such an object in the ranking and unranking perspective. To each graph, we associate a binary string of length(cid:0)n such a string, first generate a random number between 0 and(cid:0)(n first number is 0 or 1. There are(cid:0)(n (cid:0)(n (cid:1), which represents the strictly upper-triangular region of an (cid:1) − 1, then unrank (cid:1) choices where the leading value is a 0 and (cid:1) and then (cid:1) choices where it is a 1, so we test if our number is larger than(cid:0)(n that random number in lexicographic order. This procedure follows by testing if the adjacency matrix. This binary string must have exactly m ones. To randomly generate 2)−1 m 2) m 2)−1 m 2 2)−1 m−1 assign the first digit. This process can be repeated to deterministically generate the string. This process could then be optimized by incorporating strategies to improve the speed and efficiency (Bonet, 2008). We conclude our manuscript by (i) reviewing the major timeline of the literature, (ii) pointing out some strongly related work that falls outside of our specific scope, and (iii) providing some follow-up problems. tics (Fan et al., 1962) 6.1. Recap of major literature. • 1959: Erdos-R´enyi paper (Erdos and R´enyi, 1959) with m fixed edges • 1959: Gilbert's model for G(n, p) (Gilbert, 1959) • 1962: Paper on grass-hopping or leap-frogging for sequential trials in statis- • 1983: Stochastic block model proposed (Holland et al., 1983) • 2002: Chung-Lu graphs proposed (Chung and Lu, 2002) • 2004: RMAT, Kronecker predecessor, proposed (Chakrabarti et al., 2004) • 2005: Kronecker graphs proposed (Leskovec et al., 2005) • 2005: Grass-hopping for Erdos-R´enyi graphs (Batagelj and Brandes, 2005) • 2011: Observation on Erdos-R´enyi blocks in Chung-Lu (Miller and Hagberg, • 2013: Observation on Erdos-R´enyi blocks in Kronecker (Moreno et al., 2014) 6.2. Pointers to more complex graph models. The models we consider here are not considered state of the art, although they are often used as synthetic examples due to their simplicity and ubiquity. In this section, we provide a few references to more intricate models that could be considered state of the art. We've attempted to limit our discussion to the most strongly related literature. A full survey of random graph models is well beyond our scope. BTER, Kolda et al. (2014) The block-two-level Erdos-R´enyi (BTER) graph models a collection of Erdos-R´enyi subgraphs akin to the diagonal blocks of a stochastic block models. However, it also includes a degree constraint that better models 2011) 34 real-world networks. mKPGM, Moreno et al. (2010) Another model of interest is called the mixed Kro- necker Product Graph Model (mKPGM), which is a generalization of the Kronecker model, but allows for more variance that you may expect in real world populations of networks. The main difference in this model from the standard Kronecker model that we explored, is that it is based on realizing an adjacency matrix at stages of the Kronecker product calculation. This corre- sponds to increasing or zeroing probabilities in the final Kronecker product, e.g. P = A(cid:96) ⊗ (K ⊗ ··· k − (cid:96) terms ··· ⊗ K) where A(cid:96) is a realization of an (cid:96)-level Kronecker graph with K. Random Kernel Graph, Bollob´as et al. (2007) This models a general, but spe- cific, structure for P , where Pi,j = min(f (vi, vj)/n, 1) and f is a kernel function with a few special properties, and vi = i/n for each vertex. The Chung-Lu model can be expressed in this form and there is an efficient sampling algorithm due to (Hagberg and Lemons, 2015). Multifractal networks, Palla et al. (2010) These are a continuous generalization of the Kronecker matrix models we consider here and generate a network based on a function P (x, y) where x and y are in [0, 1], but also where P (x, y) is the result of repeated convolution of a generator (akin to repeated Kronecker products, see the paper for details). With the resulting measure P (x, y), we draw random coordinates vi for each node in [0, 1] and generate a graph where Pij = P (vi, vj). There are strong relationships among these classes of models. We conjecture that this idea of grass-hopping can be extended to all of these random graph models, and more generally, all random graph generation mechanisms that have a small number of parameters and computationally efficient strategies to compute the probability of a given edge. (For an nk vertex Kronecker graph, there are n2 parameters and each probability can be computed in k steps.) 6.3. Problems. For the following problems. We will post solutions or solution sketches in the online supplemental materials for our manuscript. However, we encourage readers to solve them individually! Problem 1 (Easy). When we were comparing ball-dropping to grass-hopping for sampling Erdos-R´enyi graphs, we derived that an approximate count for the number of edges used in ball-dropping is: m log(1/(1 − p))/p. First show that the term log(1/(1 − p))/p has a removable singularity at p = 0 by showing that limp→0 log(1/(1− p))/p = 1. Second, show that log(1/(1 − p))/p > 1 if p > 0. Solution. We need to use L'Hopital's rule for the first question, in which was we get (1/(1 − p))/1 for the ratio of derivatives. This clearly tends to 1. For the second part, we take the Taylor series of log(1/(1 − p)), which is p + p2/2 + p3/3 + . . .. This is always at least p when p > 0. (Note, that, indeed, this series divided by p gives (cid:88) 1 + p/2 + p2/3 + . . .) Problem 2 (Easy). Implement a grass-hopping scheme for Chung-Lu as described in Section 4. Solution. Note that this code uses the method grass hop er from listing 3. """Create a Chung-Lu graph via grass-hopping Note this routine is only for pedagogical use as It can be improved in many ways. Example: chung_lu_grasshop([5,1,1,2,2,1])""" def chung_lu_grasshop(d): 35 # sort d with a permutation # http://stackoverflow.com/questions/7851077/how-to-return-index-of-a-sorted-list dperm = sorted(range(len(d)), key=lambda k: d[k]) # build regions n = 0 regions = [] while n < len(dperm): first = n deg = d[dperm[n]] while n < len(dperm)-1 and d[dperm[n+1]] == deg: n += 1 regions.append((first,n)) # grasshop within regions vol = sum(d) edges = [] for ri in xrange(len(regions)): for rj in xrange(len(regions)): rowinds = regions[ri] # start/end of row regions colinds = regions[rj] # start/end of col region p = d[dperm[rowinds[0]]]*d[dperm[colinds[0]]]/vol rowsize = rowinds[1] - rowinds[0] + 1 colsize = colinds[1] - colinds[0] + 1 er_edges = grass_hop_er(max(rowsize, colsize), p) edges.extend( [ (i+rowinds[0], j+colinds[0]) for i,j in er_edges if i < rowsize and j < colsize ] ) # build inverse permutation to re-permute edge indices iperm = [0 for _ in dperm] # inverse permutation for i,j in enumerate(dperm): iperm[j] = i # reverse permute edges return [ (iperm[e[0]], iperm[e[1]]) for e in edges ] (cid:88) Problem 3 (Easy). While we considered coin-flipping, ball-dropping, and grass- hopping for Erdos-R´enyi, we did not do so for some of the other models. Of these, the Chung-Lu ball-dropping procedure is perhaps the most interesting. Recall how ball-dropping works for Erdos-R´enyi. We determine how many edges we expect the graph to have. Then we drop balls into random cells until we obtain the desired number of edges. The way we dropped them was so that every single entry of the matrix was equally likely. The procedure for Chung-Lu works in a similar manner, but we won't select each cell equally likely. For simplicity, we describe it using the exact expected number of edges. Note that the expected number of edges in a Chung-Lu graph is just (cid:88) (cid:88) (cid:88) (cid:88) E[ Aij] = E[Aij] = di, (cid:88) i i j i j i di. We will ball-drop until we have m edges. where we used the result of equation (2.7) in order to introduce di. Let m =(cid:80) The goal of each ball-drop is to pick cell (i, j) with probability didj/(cid:80) draw an entry out of this list, then the probability of getting i is exactly di/(cid:80) k,l dkdl. This forms a valid probability distribution over cells. The difference from equation (2.6) is subtle, but meaningful. Also note that each di is an integer. So to sample from this distribution, what we do is build a list where entry i occurs exactly di times. If we k dk. Your first task is to show that if we draw two entries out of this list, sampling with 36 replacement, the probability of the two drawn entries being i and j is: (cid:88) didj/ dkdl. k,l This sampling procedure is easy to implement. Just build the list and randomly pick an entry! Your problem is then: • show that the probability we computed above is correct • implement this procedure on the computer akin to the Python codes we've seen • prepare a plot akin to Figure 2 for the Chung-Lu graphs as you vary the properties of the degree distribution. probability di/(cid:80) Solution. If we draw two samples from the list. The draws are independent, so the probability of the event is the product of each draw's probability. Each occurs with k dk. So if we saw i and then j, this even occurs with probability di(cid:80) dj(cid:80) · k dk k dk didj(cid:80) k,(cid:96) dkdl = """ Build a list where entry i occurs d[i] times. """ def build_list(d): L = [] for i in xrange(len(d)): L.extend( [i for _ in xrange(d[i])] ) return L """Create a Chung-Lu graph via ball-dropping. Note this routine is only for pedagogical use as It can be improved in many ways. Example: chung_lu_ball_drop([5,1,1,2,2,1])""" def chung_lu_ball_drop(d): M = sum(d) L = build_list(d) edges = set() dups = 0 while len(edges) < M: src = L[random.randint(0,len(L)-1)] dst = L[random.randint(0,len(L)-1)] if (src,dst) not in edges: edges.add((src,dst)) else: dups += 1 return (list(edges), dups) . (cid:88) Problem 4 (Easy). In Section 4, we wrote a short code using grass_hop_er to generate a two-block stochastic block model (2SBM). In that short code, we generated larger Erdos-R´enyi blocks for the off-diagonal blocks then necessary and only included edges if they fell in a smaller region. This inefficiency, which is severe if n1 (cid:29) n2 can be addressed for a more general grass_hop_er function. Implement grass_hop_er for an m × n region and rewrite the short two-block stochastic block model to use this more general routine to avoid the inefficiency Solution. def grass_hop_er(m,n,p): edgeindex = -1 # we label edges from 0 to n^2-1 37 gap = np.random.geometric(p) edges = [] while edgeindex+gap < m*n: # first distance to edge edgeindex += gap src = edgeindex // n dst = edgeindex - n*src edges.append((src,dst)) gap = np.random.geometric(p) # generate the next gap # check to make sure we have a valid index # increment the index # use integer division, gives src in [0, n-1] # identify the column return edges def sbm2(n1,n2,p,q): edges = grass_hop_er(n1,n1,p) # generate the n1-by-n1 block edges.extend( [ (i+n1,j+n1) for i,j in grass_hop_er(n2,n2,p) ]) # n2-by-n2 block edges.extend( [ (i,j+n1) for i,j in grass_hop_er(n1,n2,q) ]) # n1-by-n2 block edges.extend( [ (i+n1,j) for i,j in grass_hop_er(n2,n1,q) ]) # n2-by-n1 block return edges (cid:88) Problem 5 (Easy). Suppose that you have the following function implemented: """ Generate a general stochastic block model where the input is: ns: a list of integers for the size of each block (length k). Q: a k-by-k matrix of probabilities for the within block sizes. """ def sbm(ns, Q) Describe how you could implement a program to generate a Chung-Lu graph that makes a single call to sbm. Solution. Recall from section 4 that we can arrange the nodes of our graph in increasing degree order, which forms a block structure. Sort the nodes in this way, and set ns = [n1, . . . , nk], where ni is the number of degrees with the ith largest unique in Qij. Then run the sbm procedure on this output. (cid:88) degree. Store the values d[i]d[j] ρ Problem 6 (Medium, Partially-solved). Implement and evaluate a ball-dropping procedure for the stochastic block model. To determine the number of edges, use the result about the number of edges in an Erdos-R´enyi block and apply it to each block. To run ball-dropping, first pick a region based on the probability of Q, (hint, you can do this with binary search and a uniform random variable) then pick within that Erdos-R´enyi block. Solution. We are going to sketch a solution and outline some interesting di- rections to take as far as extending. The solution involves sampling an entry at random based on the probabilities in Q. This can be done with a routine such as those described here: http://stackoverflow.com/questions/4437250/ choose-list-variable-given-probability-of-each-variable. Then, once you have the region of Q, you ball-drop like in Erdos-R´enyi. This assumes there is no structure in Q. A more interesting case is where there is structure in Q. For instance, where there is a single within group probability p and a single between group proba- bility q such that Q = (p − q)I + qeeT or Qij = p if i = j and Qij = q if i (cid:54)= j, and where all the sizes of each group are equal. In this case, you can first choose if the ball will go into the diagonal or non-diagonal region. Then conditional on that choice, pick an element of Q. Then do an Erdos-R´enyi ball-drop within the region of P that (cid:88) corresponds to an element of Q. Problem 7 (Medium). Write an implementation to generate a stochastic block model graph using grass_hop_er as a sub-routine. Solution. 38 #Generate a general stochastic block model using grass-hopping where the input is: # # def sbm_er(ns, Q): ns: a list of integers for the size of each block (length k). Q: a k-by-k matrix of probabilities for the within block sizes. edges = []; for i in range(len(ns)): for j in range(len(ns)): #loop through each block m=ns[i]; n=ns[j]; #find m x n size of block row_loc=0; for k in range(i): row_loc+=ns[k]; #locate row of top left corner of block col_loc=0; for l in range(j): col_loc+=ns[l]; #locate column of top left corner of block for e in grass_hop_er(m,n,Q[i][j]): #find edges edges.append([e[0]+row_loc,e[1]+col_loc]); #add edges updated with top left corner return edges; (cid:88) Problem 8 (Easy). Extend all the programs in this tutorial to have proper input validation so that they throw easy-to-understand errors if the input is invalid. (For instance, Erdos-R´enyi graphs need the p input to be a probability.) Problem 9 (Medium). In the paper, we worked out the number of Erdos-R´enyi regions for a Kronecker graph assuming that the probabilities in K were non-symmetric. But in Figure 5, we showed the Erdos-R´enyi regions where the matrix K was symmetric. Determine a tight closed form expression for the number of Erdos-R´enyi regions when K is symmetric. Solution. Note that the kth Kronecker power of K contains all length-k permu- tations of the probabilities contained in K. Thus, it suffices to count the number of unique probabilities in K and apply the same stars-and-bars technique shown in 5.2. The number of unique values in an n x n symmetric matrix is equivalent to the number of values in the upper-triangular matrix: (cid:0)n+1 (cid:0)(n+1 (cid:1). In order to count the number of length-k sequences of these values, we apply the stars-and-bars formula and attain (cid:88) 2 )+k−1 2 (cid:1) k Problem 10 (Hard). It turns out that Erdos-R´enyi's original proposal for graphs and what we now call Erdos-R´enyi graphs are different! What Erdos and R´enyi (1959) actually proposed was: generate a random adjacency matrix with exactly m non-zeros, where m is specified. This is what we do in the ball-dropping procedure for generating Erdos-R´enyi graphs, but m is chosen from a binomial distribution to emulate the number of entries that result from coin-flips. (cid:88) Solution. Test Problem 11 (Easy). Implement a simple-change to ball_drop_er that will generate non-edges when p > 0.5 and filter the list of all edges. Our own solution to this involves adding four lines. (But we used a few pieces of python syntactic sugar – the point is that it isn't a complicated idea.) Compare the run times of this approach with the standard ball-dropping approach Solution. def ball_drop_er(n,p): if p > 0.5: nonedges = ball_drop_er(n,1-p) alledges = set((i,j) for i in xrange(n) for j in xrange(n)) 39 return list(alledges.difference(nonedges)) m = int(np.random.binomial(n*n,p)) # the number of edges edges = set() # store the set of edges while len(edges) < m: # the entire ball drop procedure is one line, we use python indices in 0,n-1 here e = (random.randint(0,n-1),random.randint(0,n-1)) if e not in edges: # check for duplicates edges.add(e) # add it to the list return list(edges) (cid:88) Problem 12 (Medium). In section 5.2, we showed that the number of subregions is on the order of O(kn2−1). There are many ways to arrive at this result. Using Stirling's approximation for combinations, find a different way to count the number of subregions. Stirling's Approximation: log n! = n log n − n + 1 Solution. The number of subregions is given by (cid:0)n2+k−1 (cid:0)(n2+k−1)! (cid:1), which expands to (cid:1). Taking the log of our expression allows us separate out the components k +(n2−1)(log(n2+k−1)−1)+ 1 (n2−1)!k! of the combination and arrive at: log(n2 + k − 1)! − log(n2 − 1)! − log(k!). Now we can substitute in Stirling's approximation for each log k! term and simplify arriving at:k log n2+k−1 . Note that our simplification process is made easier by eliminating all constant terms (those with no k). Using L'Hopital's Rule, it can be found that limk → inf k log n2+k−1 = n2 − 1. Furthermore, at the limit, 1 goes to 0. Thus, we can simplify our expression further to (n2 − 1) log n2 + k − 1. Exponentiating this expression yields (n2 + k − 1)(n2 − 1), which is O(k(n2 − 1) as desired. (cid:88) 2 log n2+k−1 2 log(2π) + n 2 log n2+k−1 k 2 log n + 1 k k k Problem 13 (Medium). Note that in the proof of Theorem 5.1, we began by showing that the multiset region could be easily decoded into the row and column index of the entry in the Kronecker matrix. Adapt our programs to use this insight to avoid computing the linear multiindex index returned by multiindex_to_linear. Solution. set letters represented as numbers e.g. [0,1,3,1] s: an array (edge probability sequence) consisting of a # backward_map takes as input # # # # and returns the corresponding row or column index of the # probability sequence in the kronecker product graph matrix def backward_map(s,n): n: the size of the n x n initiator matrix row=0 col=0 # we want to "zoom" further into the matrix for each # value of our cell for i, r in enumerate(s): length = len(s)-i; row += (r mod n) * math.pow(n,length-1); col += int(r/n) * math.pow(n,length-1); return [row,col]; (cid:88) Problem 14 (Easy). When we were unranking multisets, we would compute the number of multisets that started with a digit as the prefix and then enumerate the number of such sets. We used this to identify the first digit of the unranked set. Double-check that we didn't miss any possibilities by summing 40 Solution. The number of multiset permutations is given by Removing an instance of the first letter results in (k−1)!r0 the sum of all permutations with one digit removed as follows: i=0 ri! (cid:81)n2 . In general, we can compute (6.1) (6.2) (6.3) (6.4) k!(cid:81)n2 i=0 ri! n2(cid:88) (k − 1)!rj i=0 ri! (cid:81)n2 n2(cid:88) = (cid:81)n2 (k − 1)!rj i=0 ri! rj j=1 n2(cid:88) j=1 It suffices to show that j=1 k!(cid:81)n2 i=0 ri! Canceling common terms yields k = This is true because the sum of all rj, the count of each letter, is just the length of (cid:88) the multiset. Problem 15. Easy Determine the number of operations involved in each of the components of the procedure to generate a Kronecker graph. Solution. regions: In listing 4, every region is visited and the updateregion method is performed. U pdateregion requires k calculations in the worst case because we must spill over to every index in the region. Thus, our complexity is O(numberofregions· k). grass hop region: From viewing 5.5, the number of operations is on the order of the number of edges, E times the number of operations in the unrank algorithm. Unranking requires k2 calculations bringing our total count to O(Ek2). mult to kron: determining the linear index takes 2k calculations because we simply have to loop through all the elements in our multiset index and make 2 calculations in the loop. Morton Decoding takes 10k calculations because we must loop through 2k (cid:88) digits and do 5 calculations in each iteration. 12k calculations is O(k). Problem 16 (Research level with appropriate generality). Another view of Theorem 5.1 is that we have a permutation induced by different two different rep- resentations of the same number. More specifically, the multi-index representation is in base n2, which we convert to base n, and then interleave digits to build a row and column representation. Hence, there are two equivalent representations of the number in base 10. This hints at a far more general set of permutations based on this type of digit interchange and base-conversion. As an example, the stride permutation can be expressed as: represent a number from [0, n2 − 1] in base n. This gives a two-digit representation. Swap the digits and convert back to [0, n2 − 1]. This gives a permutation matrix that exactly corresponds with what is called a stride permutation, which is closely related to the matrix transpose and the difference between row and column major order. The research problem is to generalize these results. Possible directions include: can any permutation matrix be expressed in this fashion? If not, can you exhibit one and characterize the class of permutations possible? 41 REFERENCES L. A. Adamic, R. M. Lukose, A. R. Puniyani, and B. A. Huberman. Search in power-law networks. Physical Review E, 64 (4), 2001. doi:10.1103/physreve.64.046135. Cited on page 7. A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286 (5439), pp. 509–512, 1999. doi:10.1126/science.286.5439.509. Cited on page 4. V. Batagelj and U. Brandes. Efficient generation of large random networks. Physical Review E, 71 (3), 2005. Cited on pages 14 and 34. B. Bollob´as, S. Janson, and O. Riordan. The phase transition in inhomogeneous random graphs. Random Structures & Algorithms, 31 (1), pp. 3–122, 2007. doi:10.1002/rsa.20168. Cited on page 35. B. Bonet. Efficient algorithms to rank and unrank permutations in lexicographic order. AAAI- workshop on Search in AI and Robotics, 2008. Cited on pages 23 and 34. A. Buluc¸, J. T. Fineman, M. Frigo, J. R. Gilbert, and C. E. Leiserson. Parallel sparse matrix- vector and matrix-transpose-vector multiplication using compressed sparse blocks. In Proceedings of the Twenty-first Annual Symposium on Parallelism in Algorithms and Architectures, pp. 233–244. 2009. doi:10.1145/1583991.1584053. Cited on page 25. D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-MAT: A recursive model for graph mining. In Proceedings of the 2004 SIAM International Conference on Data Mining, pp. 442–446. 2004. doi:10.1137/1.9781611972740.43. Cited on pages 5, 16, and 34. F. Chung and L. Lu. Connected components in random graphs with given expected degree sequences. Annals of Combinatorics, 6 (2), pp. 125–145, 2002. doi:10.1007/PL00012580. Cited on page 34. S. Das. A brief note on estimates of binomial coefficients. 2017. Accessed February 9, 2017. Cited on page 19. T. A. Davis. Direct methods for sparse linear systems, SIAM, 2006. Cited on page 4. P. Erdos and A. R´enyi. On random graphs i. Publicationes Mathematicae, 6, pp. 290–297, 1959. Cited on pages 5, 34, and 39. M. D. Ernst. Permutation methods: A basis for exact inference. Statist. Sci., 19 (4), pp. 676–685, 2004. doi:10.1214/088342304000000396. Cited on page 3. C. T. Fan, M. E. Muller, and I. Rezucha. Development of sampling plans by using sequential (item by item) selection techniques and digital computers. Journal of the American Statistical Association, 57 (298), pp. 387–402, 1962. Cited on pages 14 and 34. R. A. Fisher. "the coefficient of racial likeness" and the future of craniometry. The Journal of the Royal Anthropological Institute of Great Britain and Ireland, 66, pp. 57–63, 1936. Cited on page 3. G. W. Flake, S. Lawrence, and C. L. Giles. Efficient identification of web communities. In Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 150–160. 2000. doi:10.1145/347090.347121. Cited on page 7. J. E. Gentle. Random Number Generation and Monte Carlo Methods, Springer New York, 2003. doi:10.1007/b97336. Cited on page 5. E. N. Gilbert. Random graphs. Ann. Math. Statist., 30 (4), pp. 1141–1144, 1959. doi:10.1214/ aoms/1177706098. Cited on pages 5 and 34. C. Gro er, B. D. Sullivan, and S. Poole. A mathematical analysis of the r-mat random graph generator . Networks, 58 (3), pp. 159–170, 2011. doi:10.1002/net.20417. Cited on page 16. A. Hagberg and N. Lemons. Fast generation of sparse random kernel graphs. PLoS One, 2015. Cited on pages 14, 16, and 35. P. W. Holland, K. B. Laskey, and S. Leinhardt. Stochastic blockmodels: First steps. Social Networks, 5 (2), pp. 109–137, 1983. doi:10.1016/0378-8733(83)90021-7. Cited on page 34. I. M. Kloumann, J. Ugander, and J. Kleinberg. Block models and personalized PageRank . Proceedings of the National Academy of Sciences, 114 (1), pp. 33–38, 2016. doi:10.1073/pnas. 1611275114. Cited on page 3. D. E. Knuth. The Art of Computer Programming, Volume 2 (3rd Ed.): Seminumerical Algorithms, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1997. Cited on page 5. T. G. Kolda, A. Pinar, T. Plantenga, and C. Seshadhri. A scalable generative graph model with community structure. SIAM Journal on Scientific Computing, 36 (5), pp. C424–C452, 2014. doi:10.1137/130914218. Cited on pages 2 and 34. M. Koyuturk, A. Grama, and W. Szpankowski. Assessing significance of connectivity and conservation in protein interaction networks. In Research in Computational Molecular Biology, pp. 45–59. Springer Berlin Heidelberg, 2006. doi:10.1007/11732990_4. Cited on page 2. M. Koyuturk, W. Szpankowski, and A. Grama. Assessing significance of connectivity and conservation in protein interaction networks. Journal of Computational Biology, 14 (6), pp. 747–764, 2007. doi:10.1089/cmb.2007.R014. Cited on page 2. 42 J. Leskovec, D. Chakrabarti, J. Kleinberg, and C. Faloutsos. Realistic, mathematically tractable graph generation and evolution, using kronecker multiplication. In Knowledge Discovery in Databases: PKDD 2005, pp. 133–145. Springer Berlin / Heidelberg, 2005. doi:10.1007/ 11564126_17. Cited on pages 5 and 34. J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker graphs: An approach to modeling networks. Journal of Machine Learning Research, 11, pp. 985–1042, 2010. Cited on pages 5 and 6. N. Litvak, W. Scheinhardt, and Y. Volkovich. In-degree and PageRank of web pages: Why do they follow similar power laws? arXiv, 2006. Cited on page 7. J. C. Miller and A. Hagberg. Algorithms and Models for the Web Graph, chapter Efficient Generation of Networks with Given Expected Degrees. Springer Berlin Heidelberg, 2011. Cited on pages 15 and 34. R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Net- work motifs: Simple building blocks of complex networks. Science, 298 (5594), pp. 824– 827, 2002. arXiv:http://science.sciencemag.org/content/298/5594/824.full.pdf, doi: 10.1126/science.298.5594.824. Cited on pages 2, 3, and 7. S. Moreno, S. Kirshner, J. Neville, and S. V. N. Vishwanathan. Tied kronecker product graph models to capture variance in network populations. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1137–1144. 2010. doi:10.1109/ALLERTON.2010.5707038. Cited on page 35. S. Moreno and J. Neville. Network hypothesis testing using mixed kronecker product graph models. In 2013 IEEE 13th International Conference on Data Mining, pp. 1163–1168. 2013. doi:10.1109/ICDM.2013.165. Cited on page 2. S. Moreno, J. J. Pfieffer, J. Neville, and S. Kirshner. A scalable method for exact sampling from kronecker family models. IEEE International Conference on Data Mining (ICDM), 2014. Cited on pages 10, 16, and 34. R. C. Murphy, K. B. Wheeler, B. W. Barrett, and J. A. Ang. Introducing the graph 500. Cray User's Group, 2010. Cited on pages 3, 6, and 16. M. E. J. Newman. Random graphs with clustering. Phys. Rev. Lett., 103, p. 058701, 2009. doi:10.1103/PhysRevLett.103.058701. Cited on page 2. M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Phys. Rev. E, 69 (2), p. 026113, 2004. doi:10.1103/PhysRevE.69.026113. Cited on page 7. G. Palla, L. Lov´asz, and T. Vicsek. Multifractal network generator . Proceedings of the National Academy of Sciences, 107 (17), pp. 7640–7645, 2010. arXiv:http://www.pnas.org/content/ 107/17/7640.full.pdf+html, doi:10.1073/pnas.0912983107. Cited on page 35. P. Pollack. Euler and the partial sums of the prime harmonic series. Elem. Math, 70, pp. 13–20, 2015. Cited on page 13. C. Seshadhri, A. Pinar, and T. G. Kolda. An in-depth analysis of stochastic kronecker graphs. J. ACM, 60 (2), pp. 13:1–13:32, 2013. doi:10.1145/2450142.2450149. Cited on pages 6 and 16. J. G. Siek, L.-Q. Lee, and A. Lumsdaine. The Boost Graph Library: User Guide and Reference Manual, Addison-Wesley Professional, 2001. Cited on page 11. E. Yu. http://math.stackexchange.com/questions/247569, 2012. Accessed January 4, 2017. Cited on page 13. Acknowledgements. We thank Sebastian Moreno for mentioning the original problem during his thesis defense and providing an excellent starting point, as well as Jennifer Neville. Along the way, we received helpful feedback from Eric Chi and C. Seshadhri. Finally, we wish to thank all of our research team and especially Caitlin Kennedy for a careful read. This project was supported in part by NSF CAREER CCF-1149756, IIS-1422918, IIS-1546488, and the NSF Center for the Science of Information STC CCF-093937. Gleich's work was also supported by the DARPA SIMPLEX program and the Sloan Foundation. 43
1607.02334
1
1607
2016-07-08T12:18:03
Betweenness centrality profiles in trees
[ "cs.SI", "physics.soc-ph" ]
Betweenness centrality of a vertex in a graph measures the fraction of shortest paths going through the vertex. This is a basic notion for determining the importance of a vertex in a network. The k-betweenness centrality of a vertex is defined similarly, but only considers shortest paths of length at most k. The sequence of k-betweenness centralities for all possible values of k forms the betweenness centrality profile of a vertex. We study properties of betweenness centrality profiles in trees. We show that for scale-free random trees, for fixed k, the expectation of k-betweenness centrality strictly decreases as the index of the vertex increases. We also analyze worst-case properties of profiles in terms of the distance of profiles from being monotone, and the number of times pairs of profiles can cross. This is related to whether k-betweenness centrality, for small values of k, may be used instead of having to consider all shortest paths. Bounds are given that are optimal in order of magnitude. We also present some experimental results for scale-free random trees.
cs.SI
cs
Betweenness centrality profiles in trees Benjamin Fish1(cid:63), Rahul Kushwaha1, and Gyorgy Tur´an1,2 1 Department of Mathematics, Statistics, and Computer Science, 2 MTA-SZTE Research Group on Artificial Intelligence, Szeged University of Illinois at Chicago Abstract. Betweenness centrality of a vertex in a graph measures the fraction of shortest paths going through the vertex. This is a basic no- tion for determining the importance of a vertex in a network. The k- betweenness centrality of a vertex is defined similarly, but only consid- ers shortest paths of length at most k. The sequence of k-betweenness centralities for all possible values of k forms the betweenness centrality profile of a vertex. We study properties of betweenness centrality profiles in trees. We show that for scale-free random trees, for fixed k, the expectation of k-betweenness centrality strictly decreases as the index of the vertex increases. We also analyze worst-case properties of profiles in terms of the distance of profiles from being monotone, and the number of times pairs of profiles can cross. This is related to whether k-betweenness centrality, for small values of k, may be used instead of having to consider all shortest paths. Bounds are given that are optimal in order of magnitude. We also present some experimental results for scale-free random trees. 1 Introduction The study of large networks uses many graph parameters measuring properties of vertices, groups of vertices, or the whole network. Some, like connectivity, are classical concepts. Others, like the Bavelas centrality index [3], come from appli- cations in sociology and psychology. Still others, like k-betweenness centrality, to be discussed in this paper, have been introduced recently, partly motivated by efficiency considerations. Several of these notions have mostly been studied experimentally, but they also raise many questions for theoretical study. We consider some problems of this kind. A basic property of a vertex in a network is its centrality. Possible definitions are surveyed by Borgatti and Everett [6] and Brandes and Erlebach [8]. One intuition is that a vertex is central if it lies on many shortest paths. A popular formalization, introduced by Anthonisse [1] and Freeman [15], is betweenness centrality, measuring the fraction of shortest paths going through the vertex. Betweenness centrality has many applications, for example in examining "trade (cid:63) Contact author: [email protected]. Benjamin Fish was funded in part by Army Re- search Office grant #66497-NS. routes between medieval cities" where "the cities with high betweenness central- ity have opportunities for amassing wealth and exerting control that other cities would not have" [6,20]. Even though betweenness centrality can be computed in polynomial time using all-pairs shortest paths algorithms, for large networks it is important to reduce the running times. Algorithms are discussed, for example, in Brandes [7], Eppstein and Wang [13], and Riondato and Kornaropoluos [21]. In this paper, we will focus on the behavior of betweenness centrality in trees. The distribution of path lengths in trees has been studied before, for example by Faudree et al. [14], Chaudhary and Gordon [11], Gordon and McDonnell [16], and Dankelmann [12]. Riondato and Kornaropoulos [21] give bounds on the VC- dimension of shortest paths of length at most k in arbitrary graphs, which is relevant for determining the sample size needed by approximation algorithms. The notion of k-betweenness centrality, introduced by Borgatti and Everett [6], differs from betweenness centrality in that shortest paths are restricted to length at most k. In applications, shorter paths may be more important in determin- ing the centrality of a vertex. Shorter paths may also give more information about the centrality of vertices, e.g., when two vertices have the same centrality when not restricted to shorter paths. In addition, considering only short paths can have computational advantages as well: considering only short paths may increase the locality of the computation, which can make computing faster and easier. An experimental study of k-betweenness centrality, and other bounded ver- sions of centrality measures, is given by Pfeffer and Carley [19]. They consider the following general requirements: 1) computing the bounded versions should be similar to the unbounded version, 2) the bounded versions should approxi- mate the unbounded one and 3) the bounded versions should converge to the unbounded one when the bound parameter grows. As an illustration, [19] shows k-betweenness centralities in a tree displaying the required properties. Approx- imation and convergence are used in an informal sense in [19]; in their exam- ple k-betweenness centralities converge to betweenness centrality monotonically from below. Experiments of [19] on random graphs also support the claim that k-betweenness centrality has "good" properties. The experiments of [19] motivate a theoretical study of k-betweenness cen- trality. We ask to what degree does the bounded version of betweenness cen- trality (i.e. k-betweenness centrality) approximate the unbounded version, and more generally, to what degree does k-betweenness centrality approximate (cid:96)- betweenness centrality for k smaller than (cid:96)? If smaller values of k approximate the larger values well, then we may safely consider only short paths in the graph. We consider the maximum size of the gap between the k-betweenness central- ity and the betweenness centrality. However, even if the k-betweenness centrality approximates the betweenness centrality poorly, in some applications this might not matter. For example, we might wish to rank vertices by their centrality [21], begging the following question: Is the vertex ranking by betweenness centrality preserved under k-betweenness centrality? Failing that, will the k-betweenness centrality increase or decrease as k increases? Let BCk(v) be the k-betweenness centrality of a vertex v in a graph G. The betweenness centrality profile, or, for simplicity, the profile of v is the sequence B(v) = (BC2(v), BC3(v), . . . , BCd(v)), where d is the diameter of G. To answer the above questions we introduce the notions of dips and crossings in profiles. Informally, a dip in a profile is non-monotonic segment of the profile, and a cross- ing between two profiles is a segment where the comparison of the two profiles switches. If there are many crossings, than rankings on k-betweenness centrality are unreliable, and if there are many dips, then estimates as to whether the k- betweenness centrality will increase or decrease as k increases will be unreliable. The k-betweenness centralities are properties which, with increasing k, tran- sition from being local to being global. The general, informal conclusion of [19] is that this transition from local to global is smooth. Properties of profiles provide quantifiable information about this transition. In what follows we refer to results indicating a smooth transition as "positive", and to results showing pathologies in this transition as "negative". For instance, profiles in a path have no dips and do not cross, indicating a completely smooth transition. Trees with many dips and crossings represent a non-smooth transition. In this paper we consider probabilistic and worst-case properties of profiles. We restrict our attention to trees. Trees are a natural first case to consider as there is exactly one shortest path between any two vertices. We consider preferential attachment, or scale-free, random trees [2]. We con- sider this model due to its popularity and its ability to model vertices that act as 'hubs,' those vertices that are much more central than the rest of the vertices. Scale-free trees were studied in the 1990's under the name plane-oriented re- cursive trees (see, e.g., Mahmoud [18] and Smythe and Mahmoud [22]). Results on path lengths in scale-free trees are given by Bollob´as and Riordan [4] (see also Szab´o et al. [23]). Recent work includes studies of the influence of the seed graph on the limiting distribution of the maximum degree (Bubeck et al. [10]), algorithms identifying the root node of a scale-free tree (Bubeck et al. [9]), and the persistence of a centroid (a vertex minimizing the maximal subtree when chosen as the root) in a scale-free tree (Jog and Loh [17]). 1.1 Results We give a positive result for scale-free trees. We show that for fixed k, the expectation of k-betweenness centrality strictly decreases as the index of the vertex increases, i.e., for every k and vertices v < w it holds that E[BCk(v)] > E[BCk(w)]. This result can be viewed as giving evidence that k-betweenness centrality is "well-behaved" for random trees. The proof is based on a formula of Bollob´as and Riordan [5] (see also Bollob´as and Riordan [4]) for the probability of the presence of a fixed subgraph in a scale-free tree. Proving stronger positive results on the distribution of k-betweeness centralities, even for trees, seems to be an interesting open problem. Extending the results to general graphs may not be easy; as far as we know, the results of Bollob´as and Riordan [4] have not been extended to the general case either. We also prove negative results by studying worst-case behavior: how many dips and crossings can profiles have? We consider worst-case results in order to bound the behavior of all profiles. We also make some simple observations on the worst-case approximation properties of betweenness centrality by k-betweenness centralities (Proposition 7). It is noted that there are trees where the k-betweenness centralities of a vertex can be much smaller, resp., much larger, than the betweenness centrality of the same vertex, holding for all possible values of k, resp., for k up to a small constant multiple of the diameter. It follows that there is no constant-factor approxima- tion guarantee when using k-betweenness centrality to approximate betweenness centrality. As the diameter is always an upper bound to the number of dips and cross- ings, we consider proving lower bounds for the number of dips and crossings in terms of this quantity. Theorem 10 shows that there are trees of diameter d with some vertex having Ω(d) dips in its profile. The construction is simple, but the choice of the parameters and the analysis requires careful computation as the dips are small. Theorem 11 gives trees of diameter d with a pair of vertices such that their profiles cross each other Ω(d) many times. In particular, it follows from these results that the worst-case behavior of dips and crossings for general graphs can be achieved with trees already. The paper is structured as follows. In Section 2 we give the basic definitions and in Section 2.1 we discuss the case of paths. Approximation is considered in Section 2.2. Scale-free trees are discussed in Section 3. Then lower bounds on the number of dips and crossings are given in Sections 4, resp., 5. Finally, experimental results are mentioned in Section 6. 2 Preliminaries We consider undirected graphs with unweighted edges. The length of a path is the number of its edges. The degree of s is denoted by deg(s) and the distance between s and t is denoted by (cid:96)(s, t). The diameter of a graph, denoted by d, is the maximum of the distances (cid:96)(s, t). The set of vertices having distance at most k from v, not including v, is denoted by N k v . Let δst be the number of distinct shortest paths between s and t. For v (cid:54)= s, t, let δst(v) be the number of distinct shortest paths between s and t that pass through v. The normalized betweenness centrality of a vertex v is n(n − 1) − 2E · (cid:88) 2 BC(v) = δst(v) δst . s<t, 2≤(cid:96)(s,t) Normalization (division by the number terms in the sum, i.e., the number of nonadjacent pairs) ensures that betweenness centrality is [0, 1]-valued. (This version of the definition is undefined when the graph is complete, so we define the betweenness centrality of any vertex in the complete graph as 0.) Definition 1 The normalized k-betweenness centrality of a vertex v is · (cid:88) s<t, 2≤(cid:96)(s,t)≤k δst(v) δst . (cid:80) BCk(v) = 2 i − deg(i)) i(N k Here, similarly to the general case, one normalizes by dividing with the number of terms in the sum, i.e., the number of pairs of vertices s, t where 2 ≤ (cid:96)(s, t) ≤ k. In this paper, we drop the term "normalized" and simply refer to it as k- betweenness centrality. If k is the diameter then the k-betweenness centrality of a vertex is its betweenness centrality. If the graph is a tree then BCk(v) is simply the fraction of shortest paths of length between 2 and k which contain v as an interior vertex (the interior vertices of a path are all vertices that are not endpoints). For example, the center of a star has 2-betweenness centrality 1. We refer to the number of shortest paths of length between 2 and k containing v as an interior vertex as Pk(v), and the total number of paths of length between 2 and k as Pk. Also, we refer to the number of shortest paths of length exactly k containing v as an interior vertex as pk(v), and similarly the total number of shortest paths of length exactly k as pk. Definition 2 The profile of a vertex v ∈ G is B(v) = (BC2(v), BC3(v), . . . , BCd(v)). We use the following definition for measuring non-monotonicity. Definition 3 (Dip in a profile) Given a profile B(v), an interval BCi(v), BCi+1(v), . . . , BCj(v) is a dip if it can be partitioned into two intervals, the first of which is monotoni- cally non-increasing and the second of which is monotonically non-decreasing, but the entire interval is neither monotonically non-increasing nor non-decreasing. A profile has q dips if there are q disjoint intervals that are dips. Note that if a profile has q dips then at least q entries must be changed to make it monotonic (increasing or decreasing), thus in this sense it is q-far from being monotonic. The following definition is about comparing two profiles. Definition 4 (Crossing) Profiles B(u) and B(v) have m crossings if there ex- ist indices i1 < . . . < im+1 (2 ≤ is ≤ d) where for all such indices, BCis (u) (cid:54)= BCis(v) and the values alternate order (so if BCis(u) < BCis (v) then BCis+1(u) > BCis+1(v) and vice versa). As an illustration, consider the example in Figure 1 below. The diameter of this tree is 6, so a profile consists of the k-betweenness centralities for k = 2 through k = 6. The profile of the four leaves is the all zero vector as no paths contain them as an internal vertex. The profiles of v5, v5 v6 v7 v1 v2 v3 v4 Fig. 1. Example tree Fig. 2. The profiles of vertices v1, v2, v3, v4, and v5 from Figure 1, in the order v4, v3, v2, v5, v1 from top to bottom. v6, and v7 are the same, so we omit the latter two and plot the other five profiles in Figure 2. Note that the profiles of v1 and v5 are not monotonic, but the rest of the vertices do have monotonic profiles. It is also interesting to note that BC(v1) = BC(v5), but BCk(v1) ≤ BCk(v5) for all k. If short paths are considered more relevant then it may be reasonable to consider v5 as having a higher centrality than v1. Thus, in this case the profiles give useful extra information in addition to betweenness centrality. On the other hand, the profiles of v2 and v5 cross at k = 4. In this case, based on the profiles, one might qualify the judgement using betweenness centrality alone that v2 is more central than v5. 2.1 Paths We begin the discussion of k-betweenness centralities of trees by considering the simplest nontrivial case, that of paths. It is relatively easy to find examples of trees where the vertices' profiles behave well. As a first example, we consider 23456k0.00.10.20.30.40.50.60.70.80.9Normalized k-betweenness centrality simple paths, where the relevant quantities are easily calculated explicitly. The profiles of vertices in simple paths neither have dips nor crossings: Proposition 5 In every simple path, profiles are monotonically increasing as k increases and pairs of paths do not cross. Proof. A path of length n has n− (cid:96) + 1 subpaths of length (cid:96), i.e., p(cid:96) = n− (cid:96) + 1. Label the vertices 0 through n− 1 along the path. A subpath of length (cid:96) starting at vertex j < i includes i if and only if its other end is past the vertex i but it is not past the last vertex, i.e., if i − j + 1 ≤ (cid:96) ≤ n − j, or equivalently i + 1 − (cid:96) ≤ j < n − (cid:96) + 1. It then follows that if (cid:96) ≤ i, there are (cid:96) − 1 subpaths including i of length (cid:96), i.e., p(cid:96)(i) = (cid:96) − 1. Similarly, if i < (cid:96) ≤ n + 1 − i then p(cid:96)(i) = i. Finally, if (cid:96) > n + 1 − i then p(cid:96)(i) = n − (cid:96) + 1. Therefore p(cid:96)(i)/p(cid:96) is monotonically increasing in (cid:96) and so (cid:80)k (cid:80)k (cid:96)=2 p(cid:96)(i) (cid:96)=2 p(cid:96) BCk(i) = is monotonically increasing in k. It also follows that p(cid:96)(i) is monotonically in- creasing in i, so Pk(i) is also monotonically increasing in i. Thus profiles do not cross. For the sake of completeness, we now give the exact values of the k-betweenness centralities, which may be proved by examining the proof above. It also may be viewed as a warm-up for the direct calculations of k-betweenness centralities in Theorems 10 and 11. Corollary 6 Let i be the ith vertex of a simple path of length n, for 0 ≤ i ≤ (cid:98) n 2(cid:99). For 2 ≤ k ≤ n, the number of paths of length at most k containing vertex i is  (cid:1) (cid:0)k (cid:1) + i(k − i) (cid:0)i (cid:0)i (cid:1) + i(n − 2i + 1) + (n + 1)(k − n + i − 1) (cid:1) −(cid:0)k+1 +(cid:0)n+2−i (cid:1) 2 2 2 2 2 Pk(i) = if k ≤ i if i < k ≤ n + 1 − i otherwise and the k-betweenness centrality of a path of length n at vertex i is BCk(i) = 2.2 Approximation k(n + 1) − n −(cid:0)k+1 (cid:1) . Pk(i) 2 Lower bounds are proven by constructing sequences of trees where profiles behave badly. As a first simple example we consider approximation properties. A broom Hmn consists of a path of length m with n leaves attached to an endpoint. A double broom Kmn consists of a path of length m with n leaves attached to both endpoints. Double brooms and the middle vertex show that k-betweenness centralities can be much smaller than betweenness centrality for every k smaller than the diameter. Brooms and the center vertex show that k- betweenness centralities can be much larger than betweenness centrality, as long as k is at most a small constant fraction of the diameter. Thus k-betweenness centralities in the corresponding ranges cannot be guaranteed to approximate betweenness centrality within a constant factor. Proposition 7 a) For every  > 0 there is a d0 such that for every d ≥ d0 there is a tree T of diameter d and a vertex v in T such that for all k < d it holds that BCk(v) BCd(v) < . b) For every C > 0 there is d0 and  > 0 such that for every d ≥ d0 there is a tree T of diameter d and a vertex v in T such that for every k ≤  · d it holds that BCk(v) BCd(v) > C. Proof (Proposition 7 (a)). Consider the double broom Kmn, where m is even, and let v be the middle vertex on the path of length m. The diameter is d = m+2. If k < d then no paths between two leaves have length at most k and go through v, no matter whether the leaves are attached to the same endpoint of the central path of the broom, or to different endpoints. Thus counting pairs of leaves attached to the same, resp. to different, endpoints, we get (cid:18)m + 2n (cid:19) 2 Pk(v) ≤ − n(n − 1) − n2 ≤ 2mn + m2 + n. The total number of paths of length at most k include paths between neighbors of same endpoint thus Pk ≥ n2. Paths between leaves attached to different endpoints do go through v thus Pd(v) ≥ n2. Thus for some constant K depending on  if n ≥ K · m then BCk(v) BCd(v) = Pk(v) · Pd Pk · Pd(v) ≤ (2mn + m2 + n) · (m + 2n)2 n4 < . Proof (Proposition 7 (b)). Consider the broom Hmn, shown in Figure 3, and let v be the endpoint with the leaves attached. The diameter is d = m + 1. Now we can estimate the relevant quantities as follows. Looking at the neighbors of v it (cid:1). The total number of paths of length at most k can follows that Pk(v) ≥(cid:0)n+1 be estimated as 2 Pk ≤ (cid:18)n + 1 (cid:19) 2 + kn + 2km. This counts paths between the neighbors of v, paths between a neighbor of v and one of the k vertices of the path nearest to v, and at most k vertices for each of the m vertices on the path. The number of paths going through v is m n ··· ... v Pd(v) = (cid:0)n+1 2 Fig. 3. Hmn (cid:1) + mn, counting paths between the leaf neighbors of v, resp., between a leaf neighbor of v and a vertex on the path. Thus BCk(v) BCd(v) = Pk(v) · Pd Pk · Pd(v) ≥ (cid:0)n+1 (cid:1)(cid:0)m+n+1 (cid:1) (cid:1) + kn + 2km)((cid:0)n+1 2 2 2 ((cid:0)n+1 2 (cid:1) + mn) . Now let n = δ · m and assume k ≤ δ2 · m. The numerator is Θ(δ2(1 + δ)2m4) = Θ(δ2m2). The denominator is upper bounded by substituting the maximal value for k, and then we get Θ((δ2m2 + 2δ3m2 + 2δ2m2) · (δ2m2 + 2δm2)) = Θ(δ3m4). Thus choosing a sufficiently small δ the statement follows. 3 Scale-free random trees A scale-free random tree (also called a preferential attachment tree, correspond- ing to the case m = 1 in the general preferential attachment model) is formed by adding vertices one at a time. In the beginning there is a single vertex with degree 1 (corresponding to a "virtual edge"). The new vertex will be connected to one old vertex, and the probability of being connected to a particular old vertex is proportional to the current degree of that vertex (thus, with t vertices in the tree already, the sum of the degrees is 2t − 1). We will call the vertices {1, . . . , n}. Vertex v is earlier than vertex w when v < w, so that if v < w then v was added to the tree earlier than w. Call the tree formed after n vertices have been added Tn. Bollob´as and Riordan [4] give asymptotic results for the distribution of length-k paths in the scale-free trees, including that all but o(n2) of the paths are of length Θ(log n). Their work is based on a formula for the probability of the scale-free tree Tn containing a given subgraph [5]. If the subgraph is a path then the formula simplifies [4]. Let P be a path in Tn and let a and b be the endpoints of P , assuming, without loss of generality, that a < b. Let c be the least common ancestor of a and b in the path, where a = c is possible (where the least common ancestor is the least vertex c such that a < c and b < c). Finally, let L be the set of vertices v of P such that c < v < a and R the set with a < v < b. Thus the set of interior vertices of P is {c}∪ L∪ R. The tuple (a, b, c, L, R) does not completely determine the path: an element of L may either be on the path from a to c or from c to b. Nevertheless, the probability that the path is in Tn depends only on (a, b, c, L, R). Lemma 8 (Bollob´as and Riordan [4]) Given a path P , let a, b, c, L, and R be as above. Then the probability that P is in Tn, written q(a, b, c, L, R), is (cid:40) 2 2c−1 · (cid:81) (cid:81) (cid:81) (cid:81)b (cid:81)b q(a, b, c, L, R) = 1 2b−2 i∈L 1 2i−1 2b−2 1 i∈R i∈R 1 2i−2 2i−2 1 if a (cid:54)= c 2t−2 2t−3 2t−2 2t−3 if a = c. t=a+1 t=a+1 We use this lemma to show that the sequence of the expected values of the k-betweeness centralities in scale-free random trees do not cross. Theorem 9. Let v and w be nodes in Tn such that v < w. Then for all 2 ≤ k < n it holds that E[BCk(v)] > E[BCk(w)]. Proof. The normalization factor for both centralities is the same, so BCk(v) > BCk(v + 1) if and only if Pk(v) > Pk(v + 1). Therefore it suffices to show that E[pk(v)] > E[pk(v + 1)]. E[pk(v)] = (cid:80) (1) The case where v + 1 = n is trivial, so assume 0 ≤ v ≤ n − 2. It holds that P(cid:51)v p(a, b, c, L, R), where the sum is over all possible paths of length k containing v as an interior vertex. Inequality (1) is proved by con- structing an injective map f from the set of paths of length k containing v + 1 as an interior vertex into the set of paths of length k containing v as an interior vertex such that for every path P it holds that P[f (P ) ∈ Tn] ≥ P[P ∈ Tn] and for some paths the inequality is strict. Consider a path P containing v + 1 as an interior vertex. If v is an interior vertex of P as well then f (P ) = P . If P is not a vertex of P then f (P ) is obtained by replacing v + 1 with v, i.e., neighbors of v + 1 become neighbors of v and v + 1 is deleted. The only remaining case to consider is when v is an endpoint of P . It has to be the case then that v = a, and v + 1 belongs to the subpath between c and b. In order to construct f (P ), we delete v + 1 from the subpath, and add it as a parent of v. Thus v + 1 becomes the vertex a in f (P ) and v becomes an interior vertex on the path from c to a in f (P ). Note that the in-degree of c in f (P ) is 2, even if it had in-degree 1 in P . We now define f more formally. In view of (1), it suffices to show how f acts on the tuple (a, b, c, L, R) corresponding to the path P :  f (a, b, c, L, R) := (a, b, c, L, R) if v is interior in P, if v (cid:54)∈ P and v + 1 = c, (a, b, v, L, R) (a, b, c, L, R ∪ {v} \ {v + 1}) if v (cid:54)∈ P and v + 1 ∈ R, (a, b, c, L ∪ {v} \ {v + 1}, R) if v (cid:54)∈ P and v + 1 ∈ L, (v + 1, b, v,∅, R \ {v + 1}) if v = a = c, (v + 1, b, c, L ∪ {v}, R \ {v + 1}) if v = a (cid:54)= c. Abusing notation slightly, we will then define f (P ) as the natural path that corresponds with the tuple f (a, b, c, L, R), where a given vertex in L under P stays on the subpath between a and b in f (P ) and vice versa (and a vertex v added to L stays on the side corresponding to the removed v + 1). Note that not all of these six cases (which we will call (1) through (6) in descending order) exist for all values of v and k. For the injectivity of f note that the mapping preserves the path length. It follows directly from the definition that the mapping is injective within each case of the definition. Paths obtained in the different cases have (1) v + 1 as an interior vertex, (2), (3), (4) do not contain v + 1, (5), (6) contain v + 1 as an endpoint. Cases (2), (3), (4) are distinguished by v being the root, in R and in L. Cases (5), (6) are distinguished by v + 1 being a parent of the root or not. It remains to show that P[f (P ) ∈ Tn] ≥ P[P ∈ Tn] and inequality holds in some cases. The intuition is that under f the set of vertices in the path stay the same or get smaller, e.g. v + 1 is removed in favor of v, and that a path whose vertices are earlier is more likely. The relation between P[f (P ) ∈ Tn] and P[P ∈ Tn] can be calculated explicitly using Lemma 8. For example, in the second case (v (cid:54)∈ P and v + 1 = c), Lemma 8 gives q(a, b, v, L, R) = 2v + 1 2v − 1 q(a, b, v + 1, L, R) > q(a, b, v + 1, L, R). In the last case (v = a (cid:54)= c), again using Lemma 8 we get q(v + 1, b, c, L ∪ {v}, R \ {v + 1}) 1 (cid:89) b(cid:89) 2 = 2c − 1 · 1 2b − 2 · 2v 2v − 1 2t − 2 2t − 3 (cid:89) i∈L 2i − 1 i∈R 1 2i − 2 t=a+2 = q(v, b, c, L, R).  The other cases are similar: q(a, b, c, L, R) = q(a, b, c, L, R) q(a, b, v, L, R) = 2v+1 2v−1 q(a, b, c, L, R) q(a, b, c, L, R ∪ {v} \ {v + 1}) = 2v q(a, b, c, L ∪ {v} \ {v + 1}, R) = 2v+1 q(v + 1, b, v,∅, R \ {v + 1}) = 2 · q(a, b, c, L, R) q(v + 1, b, c, L ∪ {v}, R \ {v + 1}) = q(a, b, c, L, R) if v is interior in P, if v (cid:54)∈ P and v + 1 = c, 2v−2 q(a, b, c, L, R) if v (cid:54)∈ P and v + 1 ∈ R, 2v−1 q(a, b, c, L, R) if v (cid:54)∈ P and v + 1 ∈ L, if v = a = c, if v = a (cid:54)= c. 1 2 i j j v ... ... j ··· ... ... ··· ··· ··· ... ... ··· Fig. 4. Gij Thus E[pk(v)] ≥ E[pk(v + 1)]. Strict inequality comes from noticing that in some cases P[f (P ) ∈ Tn] > P[P ∈ Tn] (namely the cases where v (cid:54)∈ P or v = a = c) or noticing that f is not surjective. However, some of these cases do not always exist for all values of v and k. If v ≤ n − k, then certainly the case where v = a = c exists. This implies this case exists for v = 1 because k ≤ n− 1. Otherwise, for 2 ≤ v ≤ n− 2, we show that f is not surjective: Consider the path n, w1, . . . ws, v, ws+1, . . . , wk−3, 1, v + 1 for any appropriate s. Here a = v + 1, b = n, and c = 1. This path cannot be in the image of f : v + 1 is in this path, but it is not an interior vertex, v (cid:54)= c, and L = ∅. On the other hand, no path f (P ) satisfies each of these properties, but this path has v as an interior vertex, completing the proof. 4 Dips In this section we show that profiles in trees can be arbitrarily far from mono- tonic, in the sense that a profile may have many dips. One difficulty in proving such a result is that a large number of length-k paths not containing a vertex v - which contributes to a decrease in its k-betweenness centrality compared to previous values - affects the normalization terms for other (cid:96)-betweenness cen- tralities. This means constructing a tree so that a given dip occurs may interfere with v having other dips in its profile. The following theorem shows that this barrier is not insurmountable. Theorem 10. For any integer i ≥ 1, there is a tree G of diameter Θ(i) and a vertex v in G such that the profile of v has Ω(i) dips. Proof (Outline). For any i, j > 0 let Gij be the tree shown in Figure 4. It consists of a 'central' path of length i(j + 1) + 2, with 2i simple paths adjoined to the central path, each of length j (which we will refer to as the 'branches'). Two of these paths are adjoined to vertex (cid:96) on the central path, for every (cid:96) = 3 mod j + 1 (where (cid:96) = 0 refers to one of the leaves of the central path, (cid:96) = 1 its Table 1. Values of Pk for Gij 2 j2 − 3j − 1 Pk k r(j + 1) + 2 r2(− 9 i(−6j2 + 16j − 7) − 3j2 + 15j − 17 r(j + 1) + 3 Pr(j+1)+2 + (9j − 3)(i − r) + 6j − 18 r(j + 1) + 4 Pr(j+1)+3 + (9j − 3)(i − r) + 6j − 25 2 ) + r(9ij2 + 6ij + i + 6j2 − 23 2 j + 17 2 ) + neighbor, etc.) The tree has diameter ij + i + j − 1 (as long as j ≥ 3). The vertex that we show has Ω(i) dips is the vertex (cid:96) = 1. Call this vertex v. for 2 ≤ r ≤ i − 1: We show that for an appropriately chosen fixed constant j the following holds BCr(j+1)+2(v) > BCr(j+1)+3(v) < BCr(j+1)+4(v). (2) This yields i − 1 dips in the profile, which suffices. It is straightforward to calculate the number of paths through v, because all paths through v start at the vertex l = 0 and end at each of the other vertices except for v itself: Pr(j+1)+2(v) = r(3j + 1) + 1, Pr(j+1)+3(v) = r(3j + 1) + 2, and Pr(j+1)+4(v) = r(3j + 1) + 5. We omit the calculations for Pk, which are calculated in a manner similar to the manner Pk is calculated in the proof of Lemma 6. The number of such length-k paths is counted by counting the number of paths that are 1) along the central path, 2) on two of the branches, or 3) on only one of the branches. By direct calculation, we get that the values of Pk needed are as given by Table 1 when j ≥ 5. when j = 5 for all 2 ≤ r ≤ i − 1. This explicit calculation of the values of Pk and Pk(v) yields that (2) holds A more complete enumeration of the calculations may be found in the ap- pendix. Note that the number of dips in this proof is not only asymptotically as large as possible in the diameter, but also in the number of vertices, since these trees have Θ(i) vertices. 5 Crossings In this section we analyze the number of crossings between two profiles. The number of crossings of two profiles does not depend on whether normalization is used or not - thus examining crossings avoids the issue of normalization. Theorem 11. For any integer (cid:96) ≥ 1, there is a tree T of diameter Θ((cid:96)) with vertices u and v whose profiles cross Ω((cid:96)) times. ... A0 u ··· ··· 2(cid:96) ··· v ··· A1 ... 2i − 1 ··· 2(cid:96) − 3 B0 ··· Ai ... ··· A(cid:96)−1 Fig. 5. T(cid:96) ··· ··· B1 ... ··· 2i ··· Bi 2(cid:96) − 2 ... ··· B(cid:96)−1 Proof. For each (cid:96) ≥ 1, we build a tree T(cid:96) with vertices u and v as shown in Figure 5, where the number of leaves in the sets Ai and Bi will be determined shortly. This tree consists of a simple path of length 2(cid:96) between u and v and (cid:96) brooms attached to each. The tree is constructed so that paths of length 2i that include u (as an interior vertex) can reach the set Ai−1 of vertices as depicted (as exterior vertices), but that paths of length 2i through v cannot reach the set Bi−1 of vertices. Let ai = Ai and bi = Bi. We then choose ai−1 so that BC2i(u) > BC2i(v), and similarly we choose bi−1 so that BC2i+1(v) > BC2i+1(u). This gives us 2(cid:96) − 1 crossings when 1 ≤ i ≤ (cid:96) − 1. We will start, for 2 ≤ k ≤ 2(cid:96) + 1, by upper and lower bounding pk(u) and pk(v) as a function of the ai's and bi's. Certainly, since the path between u and v is length 2(cid:96), all paths containing u do not contain v and vice-versa (as internal nodes). So we can upper bound pk(u) as the square of the number of vertices within distance k−1 of u on both the path between u and v and the subtree of u, ignoring that paths can't start and end at the same vertex (this approximation will be easily sufficient for our needs.) We show the following holds: aj + ((cid:96) + 1)(k − 1) . (3) j=0 Since the leaves of the a(cid:98) k 2 (cid:99)−1 edges as depicted are length no more than k − 1 from u, there is at least one path through u of length k, so certainly 2 (cid:99)−1. On the subtree of u, at distance j from u, there are either pk(u) > a(cid:98) k aj + k − 1 vertices or k vertices, depending on the parity of j. Thus there are no (cid:98) k 2 (cid:99)−1(cid:88) a(cid:98) k 2 (cid:99)−1 < pk(u) < 2 more than a total of(cid:80)(cid:98) k 2 (cid:99)−1 aj + (cid:96)(k− 1) vertices. Including the additional k− 1 vertices on the path between u and v, this yields an upper bound on the number of paths of length no more than k containing u as given on the right-hand side of equation (3). Similarly, we get the following for pk(v): j=0 (cid:100) k 2 (cid:101)−2(cid:88) j=0 2 b(cid:98) k 2 (cid:99)−1 < pk(v) < bj + ((cid:96) + 1)(k − 1) . (4) Now we choose each ai and bi inductively, ensuring that BC2i(u) > BC2i(v) and BC2i+1(v) > BC2i+1(u). In the base case, for k = 2, where we will define 2 −1 = a0, we will need BC2(u) > BC2(v). BC2(u) = p2(u) > ak and the a k degree of v is (cid:96) + 1, so it suffices to set ak =(cid:0)(cid:96)+1 (cid:1). want to show that BCk(u) > BCk(v). BCk(u) =(cid:80)k 2 −1. BCk(v) =(cid:80)k For arbitrary even k, a0, . . . , a k 2 −2 and b0, . . . , b k 2 a k i=2 pi(v), and from the right-hand side of (4), it suffices to notice that each pi(v) from this sum is upper-bounded by a function of (cid:96) and 2 −2; for convenience call the sum over all pi(v) of these upper bounds b0, . . . , b k sk. Thus it suffices to set a k 2 −2 are already defined. We + i=2 pi(u) > 2 2 −2 j=0 aj (cid:16)(cid:80) k (cid:17) 2 −1 such that (cid:16)(cid:80) k−1 Similarly, for arbitrary odd k, a0, . . . , a k−1 2 −2 are already defined and we want to show that BCk(u) < BCk(v). And similarly, we know and BCk(u) is upper-bounded by a function s(cid:48) that BCk(v) > 2 of (cid:96) and a0, . . . , a k−1 2 −1 and b0, . . . , b k−1 2 −1 2 −1. So we set b k−1 2 −1 such that j=0 bj k 2 −2(cid:88) k j=0 aj. a k 2 −1 ≥ sk − 2 (cid:17) s(cid:48)  . bj 2 −2(cid:88) k−1 j=0 b k−1 2 −1 ≥ 1 2 k − 2 Hence constructing ai and bi for all i ≤ (cid:96)−1 yields the desired 2(cid:96)−1 crossings. The bound of Ω((cid:96)) crossings is worst possible in order of magnitude as a function of the diameter, but unlike in the construction in Theorem 10, the diameter is not linear in the number of vertices n. Indeed, T(cid:96) has O((cid:96)2(cid:96) ) vertices, which yields Ω(log log n) crossings. We leave for future work if it is possible to increase the number of crossings as a function of n. 6 Experiments Theorem 9 shows that the profiles of expected betweenness centralities do not cross, but it does not imply results on the expected number of crossings or the Fig. 6. Clockwise, from top left: the estimated probability that B(1) and B(2) have no crossings as the number of vertices n increases, the estimated probability that B(i) and B(i + 1) have no crossings as i increases, the estimated probability that B(i) is monotone, as i increases, and the estimated probability that B(1) is monotone, as n increases. probability that there is at least one crossing. Towards results of this kind, we give experimental results that give initial evidence for the behavior of profiles in scale-free random trees in terms of crossings and dips. We give here some examples of experiments performed with scale-free trees and discuss the problems suggested by these experiments. In Figure 6 (top left), we estimate the probability that there are no crossings between the profiles of the first two vertices. We also show the results for fixed n (we use n = 250) but between vertices i and i+1 as i increases (top right) and results for the likelihood of monotonicity - i.e. no dips - of a vertex (bottom). In each experiment, each value is averaged over 5000 independent trials. As n increases the likelihood of there being no dips in the profile of vertex 1 (bottom left) or no crossings between the profiles of vertex 1 and 2 (top left) actually decreases (where small deviations are likely due to sampling error). This is indication that profiles in large trees may be more likely to behave badly. In 050100150200250n0.870.880.890.900.910.920.93Percent without a cross01020304050i0.40.50.60.70.80.9Percent without a cross050100150200250n0.8650.8700.8750.8800.8850.8900.8950.900Percent monotone01020304050i0.840.850.860.870.880.890.900.91Percent monotone that context, the worst-case results discussed in Sections 4 and 5 may provide useful information. On the other hand, the likelihood of having no crossings and being monotonic as the vertex i increases for fixed n (again, we use n = 250) looks very different (top right and bottom right of Figure 6). After initial decreases, the likelihood of being monotonic and not having crossings increases as i increases. This implies that having crosses and dips may be limited to earlier vertices and that vertices close to leaves do not behave similarly to our worst-case results. We leave a more precise analysis of which vertices in scale-free trees behave badly for future work. 7 Remarks and future work In this paper we studied k-betweenness centrality by considering properties of the betweenness centrality profiles of trees, motivated by experimental results of Pfeffer and Carley [19]. We showed that for scale-free random trees it holds that if v < w then E[BCk(v)] > E[BCk(w)]; thus the profile of the expected betweenness centralities of an earlier vertex dominates the profile of the expected betweenness centralities of a later vertex. We also show, in the worst case, that there are profiles of vertices in trees where the number of crossings and dips is proportional to the diameter, which is always an upper bound. This means that in the worst case it suffices to consider trees; vertices' profiles in trees may behave as non-smoothly as vertices' profiles in any graph. Smoothness is an important property for understanding how the structure of local neighborhoods of a graph generalize to the entire graph. However, our work demonstrates that in the worst case vertices' profiles may be very non-smooth and that smoothness assumptions will not hold in general, opening up for future work questions on establishing more precise bounds on how severe departures from smoothness may be. For example, is it possible to construct examples where many vertices in the same tree have profiles all with many dips or crossings? More generally, to what degree is non-smooth behavior an isolated problem where any dips or crossings are very small or short-lived? We also leave as an open problem further results on the expected behavior of profiles in scale-free trees, such as determining the number of crosses, say, between the root and the next vertex, as n goes to infinity. Our preliminary experimental results, described in the previous section, provide some information towards this type of question. Problems about crossings tend to be easier than problems about dips, as the former do not have to deal with a normalization term. Our experimental results, however, give a starting point towards, say, determining the expected number of dips in a profile. Our result for the scale-free random trees is based on the work of Bollob´as and Riordan [5,4]; their other results in [4] may be relevant in this context. Both earlier techniques and results, e.g. Smythe and Mahmoud [22], and more recent results, e.g. Bubeck et al. [10,9] and Jog and Loh [17], form an emerging picture of scale-free trees and may be useful for future work. References 1. J.M. Anthonisse. The rush in a directed graph. Stichting Mathematisch Centrum. Mathematische Besliskunde, pages 1 -- 10, 1971. 2. Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence of scaling in random networks. Science, 286(5439):509 -- 512, 1999. 3. Alex Bavelas. A mathematical model for group structures. Human Organization, 7(3):16 -- 30, 1948. 4. B´ela Bollob´as and Oliver Riordan. Shortest paths and load scaling in scale-free trees. Physical Review E, 69(3):036114, 2004. 5. B´ela Bollob´as and Oliver M. Riordan. Mathematical results on scale-free random In S. Bornholdt and H. G. Schuster, editors, Handbook of Graphs and graphs. Networks, pages 1 -- 34. Wiley-VCH, 2002. 6. Stephen P. Borgatti and Martin G. Everett. A graph-theoretic perspective on centrality. Social Networks, 28(4):466 -- 484, 2006. 7. Ulrik Brandes. A faster algorithm for betweenness centrality. Journal of Mathe- matical Sociology, 25(2):163 -- 177, 2001. 8. Ulrik Brandes and Thomas Erlebach, editors. Network Analysis: Methodological Foundations, volume 3418 of Lecture Notes in Comp. Sci. Springer, 2005. 9. S´ebastien Bubeck, Luc Devroye, and G´abor Lugosi. Finding Adam in random growing trees. CoRR, abs/1411.3317, 2014. 10. S´ebastien Bubeck, Elchanan Mossel, and Mikl´os Z. R´acz. On the influence of the seed graph in the preferential attachment model. CoRR, abs/1401.4849, 2014. 11. Sharad Chaudhary and Gary Gordon. Tutte polynomials for trees. Journal of Graph Theory, 15(3):317 -- 331, 1991. 12. Peter Dankelmann. On the distance distribution of trees. Discrete Applied Math- ematics, 159(10):945 -- 952, 2011. 13. David Eppstein and Joseph Yannkae Wang. Fast approximation of centrality. In Proc. 12th Symp. Discrete Algorithms, pages 228 -- 229. ACM and SIAM, Jan. 2001. 14. R.J. Faudree, C.C. Rousseau, and R.H. Schelp. Theory of Path Length Distribu- tions I. Discrete Mathematics, 6(1):35 -- 52, 1973. 15. Linton C. Freeman. A set of measures of centrality based on betweenness. Sociom- etry, pages 35 -- 41, 1977. 16. Gary Gordon and Eleanor McDonnell. Trees with the same degree sequence and path numbers. Discrete Mathematics, 147(1):297 -- 300, 1995. 17. Varun Jog and Po-Ling Loh. Analysis of centrality in sublinear preferential at- tachment trees via the CMJ branching process. CoRR, abs/1601.06448, 2016. 18. Hosam M. Mahmoud. Distances in random plane-oriented recursive trees. Journal of Computational and Applied Mathematics, 41(1):237 -- 245, 1992. 19. Jurgen Pfeffer and Kathleen M. Carley. k-centralities: Local approximations of global measures based on shortest paths. In Proceedings of the 21st International Conference Companion on World Wide Web, pages 1043 -- 1050. ACM, 2012. 20. Forrest R. Pitts. The medieval river trade network of Russia revisited. Social Networks, 1(3):285 -- 292, 1979. 21. Matteo Riondato and Evgenios M. Kornaropoulos. Fast approximation of between- In Proceedings of the 7th ACM International ness centrality through sampling. Conference on Web Search and Data Mining, pages 413 -- 422. ACM, 2014. 22. Robert T. Smythe and Hosam M. Mahmoud. A survey of recursive trees. Theory of Probability and Mathematical Statistics, (51):1 -- 28, 1995. 23. G´abor Szab´o, Mikko Alava, and J´anos Kert´esz. Shortest paths and load scaling in scale-free trees. Physical Review E, 66(2):026101, 2002. Appendix A Dips In the proof of Theorem 10, we omitted the calculation of Pk for Gij, which we return to in this section. Specifically, we show that pk, the number of paths of exactly length k, is as given in Table 2, for all 2 ≤ r ≤ i − 1 and j ≥ 5 (if j < 5 then not all of these cases are distinct): Table 2. Values of pk for Gij pk k 3ij + 4i + 1 k = 2 3ij + 7i k = 3 i(3j + 3) + (3k − 5)(i − 1) + 6 4 ≤ k ≤ j + 1 k(3i − 9) + i(3j − 6) + 6j + 21 j + 2 ≤ k ≤ j + 4 k(3i − 9) + i(3j − 6) + 6j + 23 j + 5 ≤ k ≤ 2j k(−4i + 1) + i(17j + 1) − 14j + 13 k = 2j + 1 k(−4i − 1) + i(17j + 9) − 10j + 9 2j + 2 ≤ k ≤ 2j + 3 −9k + i(9j − 3) + 6j + 12r + 9 r(j + 1) + 2 ≤ k ≤ r(j + 1) + 3 r(j + 1) + 4 ≤ k ≤ (r + 1)j + r − 1 −9k + i(9j − 3) + 6j + 12r + 11 (r + 1)j + r ≤ k ≤ (r + 1)j + r + 1 k(4i − 3 − 4r) + i(−3 + 5j − 4rj − 4r) + j(−2r + 4r2) + 6r + 4r2 + 11 k(−4i − 3 + 4r) + i(4rj + 13j + 4r + 5) + j(−4r2 − 10r) − 4r2 − 2r + 9 k = (r + 1)j + r + 2 The number of such length-k paths are counted by counting the number of paths that are 1) along the central path, 2) on two of the branches, and 3) on only one of the branches. For brevity's sake, we will show just the cases when k = 2 and the cases when r(j + 1) + 2 ≤ k ≤ (r + 1)j + r − 1. The other cases are similar. We use two simple facts: There are m− k + 1 subpaths of length k ≤ m along a path of length m, and for a fixed path of length m, there are k − m + 1 paths of length k ≥ m that contain the fixed path as a subpath. First we show that there are 3ij + 4i + 1 length k = 2 paths. The length of the central path is i(j + 1) + 2, so there are i(j + 1) + 2 − k + 1 such subpaths of length k. Otherwise a length k path must intersect either two branches that attach to the same vertex or only one of those branches. There are i pairs of branches, each inducing a path of length 2j, so there are i(2j− k + 1) such paths. Else the length k path intersects only one branch. For each branch, there are two paths that intersect that branch but do not intersect another branch: the path can go to the 'left' or 'right', giving us a total of 4i such paths. Summing up, we get 3ij + 4i + 1 paths. The other cases we consider are the two cases are (as given above) when r(j + 1) + 2 ≤ k ≤ (r + 1)j + r − 1, for which we will need j ≥ 5. The length of the central path is i(j + 1) + 2, so there are i(j + 1) + 2− k + 1 such subpaths of length k. Otherwise, a path of length k intersects one of the branches in at least one edge. Paths can, of course, only intersect at most two different branches. Since k > 2j, these branches cannot attach to the central path at the same vertex. Then branches are at integer multiples of j + 1 apart. So a length k path is too short to reach between branches that are r + 1 apart (we say the branches are 0 apart when they are attached to the same vertex, etc.) because then the vertices at which the branches attach are distance (r + 1)(j + 1) from each other, but k ≤ (r + 1)j + r − 1. Similarly, the branches cannot be as close as r − 1 apart. Thus there are only two cases for the paths that intersect at exactly two branches: the branches are either r − 1 apart or r apart. There are 4(i− (r − 1)) pairs of branches r− 1 apart, and the path induced by the two branches and the central path is length (r + 1)j + r − 1, so there are a total of 4((r + 1)j + r − k)(i − r + 1) length k paths in this case. (Note in this case all such paths of length k auto- matically include all of the appropriate edges of the central path.) Otherwise, the branches are r apart. However, now not all length k paths along the path induced by the branches contain the part of the induced path along the cen- tral path. Here we use the second simple fact as mentioned above: the length of the central path that all the length k paths must include is r(j + 1), but they must include at least one vertex from each of the branches as well, so there are k − r(j + 1) + 1− 2 such paths. Now there are 4(i− r) pairs of branches r apart, yielding a total of 4(k − r(j + 1) − 1)(i − r) such paths. Finally, there are the length k paths that intersect only one branch. A path starting on a branch has two directions along the central path where its end can lie. There are j vertices along a branch where the vertex can start, and 2(i − r) such branches if the paths goes to the 'right' and 2(i − (r + 1)) going to the 'left' for which no length k path is too long. There are two more branches in either direction at which length k paths can start, for which it is straightforward to verify that there are 2((r + 1)j + r − 1 − k + 1) going to the 'right' end, and   2(j + r(j + 1) + 3 − k + 1) if k > r(j + 1) + 3, if k = r(j + 1) + 3, if k = r(j + 1) + 2 2j 2j + 2 paths going to the 'left' end. Thus we get the two cases as listed above, for r(j + 1) + 2 ≤ k ≤ r(j + 1) + 3 and for r(j + 1) + 4 ≤ k ≤ r(j + 1) + r − 1. Using these numbers, we can now calculate Pk =(cid:80)k given in Table 3. Table 3. Values of Pk for Gij (cid:96)=2 p(cid:96), yielding the values 2 j2 − 3j − 1 Pk k r(j + 1) + 2 r2(− 9 i(−6j2 + 16j − 7) − 3j2 + 15j − 17 r(j + 1) + 3 Pr(j+1)+2 + (9j − 3)(i − r) + 6j − 18 r(j + 1) + 4 Pr(j+1)+3 + (9j − 3)(i − r) + 6j − 25 2 ) + r(9ij2 + 6ij + i + 6j2 − 23 2 j + 17 2 ) + Counting the number of paths through v is much easier. Since v has only one vertex on its left, Pk(v) is just the number of vertices to its right that are within distance k. Specifically, this gives us  Pr(j+1)+2(v) = r(3j + 1) + 1, Pr(j+1)+3(v) = r(3j + 1) + 2, Pr(j+1)+4(v) = r(3j + 1) + 5. Plugging in these values and the values from Table 3, we get that for j = 5 and for all 2 ≤ r ≤ i − 1, Pr(j+1)+2(v) Pr(j+1)+2 > Pr(j+1)+3(v) Pr(j+1)+3 < Pr(j+1)+4(v) Pr(j+1)+4 . as needed. That is, BC6r+2(v) > BC6r+3(v) < BC6r+4(v) for all 2 ≤ r ≤ i − 1 in Gi,5, Note that the number of dips we get, namely i − 2 dips, is not only asymp- totically as large as possible in the diameter, but also in the number of vertices, since the trees Gi,5 have Θ(i) vertices.
1606.08518
3
1606
2019-03-04T07:31:18
Stability of SIS Spreading Processes in Networks with Non-Markovian Transmission and Recovery
[ "cs.SI", "math.PR", "physics.soc-ph", "q-bio.PE" ]
Although viral spreading processes taking place in networks are often analyzed using Markovian models in which both the transmission and the recovery times follow exponential distributions, empirical studies show that, in many real scenarios, the distribution of these times are not necessarily exponential. To overcome this limitation, we first introduce a generalized susceptible-infected-susceptible (SIS) spreading model that allows transmission and recovery times to follow phase-type distributions. In this context, we derive a lower bound on the exponential decay rate towards the infection-free equilibrium of the spreading model without relying on mean-field approximations. Based on our results, we illustrate how the particular shape of the transmission/recovery distribution influences the exponential rate of convergence towards the equilibrium.
cs.SI
cs
Stability of SIS Spreading Processes in Networks with Non-Markovian Transmission and Recovery Masaki Ogura, Member, IEEE, and Victor M. Preciado, Member, IEEE 1 9 1 0 2 r a M 4 ] I S . s c [ 3 v 8 1 5 8 0 . 6 0 6 1 : v i X r a Abstract -- Although viral spreading processes taking place in networks are often analyzed using Markovian models in which both the transmission and the recovery times follow exponential distributions, empirical studies show that, in many real scenarios, the distribution of these times are not necessarily exponential. To overcome this limitation, we first introduce a generalized susceptible-infected-susceptible (SIS) spreading model that allows transmission and recovery times to follow phase-type distribu- tions. In this context, we derive a lower bound on the exponential decay rate towards the infection-free equilibrium of the spreading model without relying on mean-field approximations. Based on our results, we illustrate how the particular shape of the transmission/recovery distribution influences the exponential rate of convergence towards the equilibrium. I. INTRODUCTION U NDERSTANDING the dynamics of spreading processes in complex networks is a challenging problem with a wide range of practical applications in epidemiology and pub- lic health [3], information propagation in social networks [21], or cyber-security [40]. During the last decade, significant progress has been made towards understanding the relationship between the topology of a network and the dynamics of spreading processes taking place over the network (see [28], [37] for recent surveys). A common approach to investigate this relationship is by modeling spreading processes using net- worked Markov processes, such as the networked susceptible- infected-susceptible (SIS) model [46]. Based on these Marko- vian models, it is then possible to find an explicit relationship between epidemic thresholds and network eigenvalues in static topologies [18], [36], [46], [48], as well as in multilayer [10], [42], time-varying [29], [35], and adaptive [23], [30] networks. Markovian models also allow us to design optimal strategies for containment of spreading processes taking place in static [39], uncertain [13], and temporal [31] networks. A consequence of using Markovian models in the analysis of spreading processes is that both transmission times (i.e., the time it takes for an infection to be transmitted from an infected node to one of its neighbors) and recovery times (i.e., the time it takes for an infected node to recover) follow exponential distributions. However, empirical studies show that, in many real networks, the distribution of transmission and recovery times are not necessarily exponential. For ex- ample, the transmission time of messages in Twitter, or news M. Ogura is with the Division of Information Science, Nara Insti- tute of Science and Technology, Ikoma, Nara 630-0192, Japan. E-mail: [email protected] V. M. Preciado is with the Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA 19104, USA. E-mail: [email protected] in other social media outlets, follows (approximately) a log- normal distribution [21], [47]. In the context of human contact networks, the transmission of various infectious diseases [4], [7], [17], [26], or the time it takes to recover from the influenza virus [44] are often non-exponential. Since realistic transmission and recovery times often follow non-exponential distributions, it is of practical importance to understand the role of these distributions on the dynamics of the spread. In this direction, the authors in [47] illustrated, via numerical simulations, that non-exponential transmission times can have a substantial effect on the dynamics of the spread. Motivated by this study, several approximative meth- ods for quantifying the steady-state fraction of infected nodes have been proposed in the literature. In this direction, the authors in [5] analyzed spreading processes with general trans- mission and recovery times using mean-field approximations. In [16], [25], simple but yet analytically solvable spreading models with non-exponential transmission times were studied. Moment-closure approximations for analyzing spreading pro- cesses with non-exponential transmission and recovery times were proposed in [19], [38]. Under the assumption that re- covery times follow an exponential distribution, the analytical framework in [43] enables us to reduce non-exponentially distributed transmission times into exponentially distributed counterparts without changing the steady-state of the spread. The authors in [27] used a mean-field approximation to derive stability conditions for the infection-free equilibrium of a spreading process with three compartments and non- Markovian transition dynamics. However, their conditions are either conservative or guarantees only the local stability of the infection-free equilibrium. In this paper, we propose a tractable but rigorous approach to analyze the transient of SIS spreading processes over arbitrary networks with general (non-exponential) transmission and recovery times. In this direction, we first introduce the generalized networked SIS (GeNeSIS) model, which allows for transmission and recovery times following arbitrary phase-type distributions (see, e.g., [2]). Defined as the exit time of time- homogeneous Markov processes, phase-type distributions form a dense family in the space of positive-valued distributions [9]. Therefore, the GeNeSIS model allows to theoretically analyze arbitrary transmission and recovery times within an arbitrary accuracy [2]. We are particularly interested in quantifying the exponential decay rate of the spread towards the infection-free equilibrium; in other words, to eradicate the viral spreading process. The key tool used in our derivations is a vectorial representation of phase-type distributions, which we use to bound the exponential decay rate towards the infection-free 2 equilibrium in the stochastic dynamics of the GeNeSIS model. This paper is organized as follows. In Section II, we introduce elements of graph theory and stochastic differential equations with Poisson jumps. In Section III, we describe a generalized SIS model over networks with arbitrary trans- mission and recovery times. In Section IV, we provide a vectorial representation of the GeNeSIS model, which we use in Section V to analyze the exponential decay rate towards the infection-free equilibrium. We validate the effectiveness of our results via numerical simulations in Section VI, where we also illustrate the effect of non-exponential transmission/recovery times in the dynamics of the spread. II. MATHEMATICAL PRELIMINARIES Let R and N denote the set of real numbers and positive integers, respectively. For a positive integer n, define [n] = {1, . . . ,n}. For a real function f , let f (t−) denote the limit of f from the left at time t. We let In and On denote the n×n identity and zero matrices. By 1p and 0p, we denote the p-dimensional vectors whose entries are all ones and zeros, respectively. A real matrix A (or a vector as its special case) is said to be nonnegative, denoted by A ≥ 0, if A is nonnegative entry-wise. The notation A ≤ 0 is understood in the obvious manner. For a square matrix A, the maximum real part of its eigenvalues, called the spectral abscissa of A, is denoted by η(A). We say that A is Metzler if the off-diagonal entries of A are all non-negative. It is easy to see that, if A is Metzler, then eAt ≥ 0 for every t ≥ 0. The Kronecker product [15] of two matrices A and B is denoted by A⊗ B, and the Kronecker sum of two square matrices A ∈ Rp×p and B ∈ Rq×q is defined by A⊕ B = A⊗ Iq + Ip ⊗ B. Given a collection of n matrices A1, . . . ,An having the same number of columns, the matrix obtained by stacking the matrices in vertical (A1 on top) is denoted by col(A1, . . . ,An). An undirected graph is a pair G = (V,E ), where V = {1, . . . ,n} is the set of nodes, and E ⊂ V × V is the set of edges, consisting of distinct and unordered pairs {i, j} for i, j ∈ V. We say that a node i is a neighbor of j (or that i and j are adjacent) if {i, j} ∈ E. The set of neighbors of node i is denoted by Ni. The adjacency matrix of G is defined as the n× n matrix whose (i, j)-th entry is 1 if and only if nodes i and j are adjacent, 0 otherwise. We let P(·) denote the probability of events. The expectation of a random variable is denoted by E[·]. A Poisson counter [6, Chapter 4] of rate λ > 0 is denoted by Nλ . In this paper, we extensively use a specific class of stochastic differential equations with Poisson jumps, described below. For each fi : R × R → R be a continuous function, Nλi i ∈ [m], let be a Poisson counter, and κi be a continuous-time, real, and stationary stochastic process defined over the probability space Ω. All the above stochastic processes are assumed to be independent of each other. Then, we say that a real and right-continuous function x is a solution of the stochastic differential equation dx = m ∑ i=1 fi(x(t),κi(t))dNλi, (1) if x is constant on any interval where none of the counters Nλ1, . . ., Nλm jumps, and x(t) = x(t−) + fi(x(t−),κi(t)) when Nλi jumps at time t. This definition can be naturally extended to the vector case. Below, we present two lemmas for this class of stochastic differential equations. The first lemma states a version of Ito's formula: Lemma II.1. Assume that x is a solution of (1). Let g be a real continuous function. Then, y(t) = g(x(t)) is a solution of the stochastic differential equation m dy = ∑ i=1 i.e., y satisfies [g (x(t) + fi (x(t),κi(t)))− g(x(t))]dNλi, y(t) = y(t−) + g(cid:0)x(t−) + fi(x(t−),κi(t))(cid:1) − g(x(t−)), if the Poisson counter Nλi jumps at time t and is constant over any interval in which none of the counters Nλ1, . . . ,Nλm jumps. Proof. Assume that the counter Nλi jumps at time t. Since x is the solution of the stochastic differential equation (1), it fol- lows that y(t)− y(t−) = g (x(t−) + fi(x(t−),κi(t)))− g(x(t−)), as desired. We also state the following lemma concerning the expecta- tion of the solution to the stochastic differential equation (1): Lemma II.2. Assume that x is a solution of the functions f1, . . ., fm are affine with respect to the second variable, then d dt E(cid:2) fi(x(t),E[κi(t)])(cid:3)λi. E[x(t)] = (1). If (2) m ∑ i=1 Proof. By the assumption, for each i ∈ [m] we can take real functions fi,1 and fi,2 such that fi(a,b) = fi,1(a) + b fi,2(a) for every a,b ∈ R. Let t ≥ 0 and h > 0 be arbitrary. We have the following three possibilities: (i) no counter jumps on the time interval [t,t +h]; (ii) exactly one counter jumps in the interval; or (iii) more than one counter jumps in the interval. The first case happens with probability 1− (λ1 +··· +λm)h +o(h). For the second case, for each i ∈ [m], one and the only one counter Nλi jumps on the time interval [t,t +h] with probability λih + o(h). In this case we have x(t + h) = x(t) + fi(x(t),κi(τ)) = x(t) + fi,1(x(t)) + κi(τ) fi,2(x(t)) for some τ ∈ [t,t + h] and, therefore, E[x(t + h)] = E[x(t)] + E[ fi,1(x(t))] + E[κi(τ)]E[ fi,2(x(t))] = E[x(t)] + E(cid:2) fi(x(t),E[κi(t)])(cid:3) because κi is a stationary stochastic process. Finally, the third case occurs with probability o(h). Summarizing, we have shown that E(cid:2) fi(x(t),E[κi(t)])(cid:3)λi, E[x(t + h)]− E[x] h = o(h) h + m ∑ i=1 which proves (2) in the limit of h → 0. III. SIS MODEL WITH GENERAL TRANSMISSION AND RECOVERY TIMES The aim of this section is to introduce the generalized networked susceptible-infected-susceptible (GeNeSIS) model, which will allow us to analyze the effect of non-exponential transmission and recovery times in the spreading dynamics. A. Generalized Networked SIS Model We start by giving a brief overview of the standard SIS model (see, e.g., [28], [37]). Let G = (V,E ) be an undirected and unweighted graph with n nodes. In the SIS model, at a given (continuous) time t ≥ 0, each node can be in one of two possible states: susceptible or infected. If a neighbor of node i is infected, then this neighbor can infect node i with an instantaneous rate βi, where βi > 0 is called the transmission rate of node i. Therefore, while being infected, the neighbor attempts to infect node i with the inter-event times following an exponential distribution of rate βi. On the other hand, when a node i is infected, it can randomly transition to the susceptible state with an instantaneous rate δi > 0, called the recovery rate of node i. This implies that the time it takes for an infected node i to recover follows an exponential distribution of rate δi. Before we introduce the generalized networked susceptible- infected-susceptible (GeNeSIS) model, we introduce the fol- lowing notations. We describe the state of a node i ∈ V by a {0,1}-valued continuous-time stochastic process, denoted by zi = {zi(t)}t∈R. We say that node i is susceptible (respectively, infected) at time t if zi(t) = 0 (respectively, zi(t) = 1). We assume that the function zi is continuous from the right for all i ∈ [n]. Under this assumption, we say that node i be- comes infected (respectively, becomes susceptible) at time t if zi(t−) = 0 and zi(t) = 1 (respectively, zi(t−) = 1 and zi(t) = 0). It is assumed that all nodes are susceptible before time t = 0, i.e., zi(t) = 0 for t < 0. We now introduce the GeNeSIS model as follows. Definition III.1. We say that the family z = {zi}i∈[n] of stochastic processes is a generalized networked susceptible- infected-susceptible model (GeNeSIS model, for short) if there exist a subset V0 ⊂ [n], as well as random variables 0 = τ ji 0 (t) < τ ji 1 (t) < ··· , and ρi(t) > 0 satisfying the following conditions for all i ∈ [n], j ∈ Ni, and t ≥ 0: a) Node i becomes infected at time t = 0 if and only if i ∈ V0, i.e., V0 is the initially infected subset. b) Assume that node i becomes infected at time t. Then, node i remains infected during the time interval [t,t + ρi(t)) and becomes susceptible at time t +ρi(t), i.e., the random variable ρi(t) is the recovery time of node i; c) If node i becomes infected at time t, then, until its recovery, the node attempts to infect node j ∈ Ni at times {t + τ ji k (t)}k∈N, i.e., if node j is susceptible at k (t) for any k ∈ N, then node j becomes time t + τ ji infected. 3 k (t)−τ ji the random increments {τ ji Remark III.2. We call k (t) − τ ji k−1(t)} j∈Ni,t≥0,k∈N the transmission times of node i, since the difference τ ji k−1(t) represents the time between in- fection attempts from an infected node i towards a neighboring node j. Note that, when all the recovery and transmission times follow exponential distributions, the GeNeSIS model recovers the standard networked SIS model described at the beginning of this subsection. Notice that the origin (i.e., zi = 0 for all i ∈ V) is an absorbing state of the GeNeSIS dynamics. In what follows, we will refer to the origin as the infection-free equilibrium. The aim of this paper is to quantify the transient dynamics of the generalized SIS model according to the following definition: Definition III.3. The exponential decay rate of the GeNeSIS model is defined by log∑n i=1 E[zi(t)] . t limsup t→∞ Since the sum ∑n λ = − sup V0⊂[n] i=1 E[zi(t)] equals the expected number of infected nodes at time t, the decay rate λ quantifies how fast the infectious spreading process dies out in the network (in average). Besides quantifying the impact of contagious spreading processes over networks [12], [20], [47], the ex- ponential decay rate has been used as a standard tool for measuring the performance of strategies aiming to contain epidemic outbreaks [1], [13], [39], [48]. We further remark that, although exponential distributions are not necessarily appropriate for modeling realistic transmission and recovery times as discussed in the Introduction, the exponential decay rate is still a valid quantity for measuring the spreading capability of epidemic processes. B. Phase-type Transmission and Recovery Times In this paper, we consider the GeNeSIS model with trans- mission and recovery times following phase-type distribu- tions [2]. In what follows, we briefly describe this class of probability distributions. Consider a time-homogeneous Markov process x in continuous-time with p +1 (p ∈ N) states (also called phases) such that the states 1, . . . , p are transient and the remaining state p + 1 is absorbing. The infinitesimal generator of the process is then necessarily of the form (cid:20)T (3) where T ∈ Rp×p is an invertible Metzler matrix with non- positive row-sums. Let(cid:20)φ (cid:21) b = −T 1p, (cid:21) b 0 0 , denote the initial distribution of the Markov process x, i.e., 0 (φ ∈ Rp) ∈ Rp+1 (cid:40) φm, m ∈ [p], 0, m = p + 1. P(x(0) = m) = Then, the time to absorption into the state p + 1 is a random variable following a phase-type distribution, which we denote 4 by the pair (φ ,T ). In the rest of the paper, we make the follow- ing assumption on the distribution of (random) transmission and recovery times in the GeNeSIS model: Assumption III.4. Transmission and recovery times of all nodes follow phase-type distributions (φ ,T ) and (ψ,R), re- spectively. The class of phase-type distributions include various dis- tributions of theoretical and practical interests. For example, if we choose the parameters p = 1, T = −β , and φ = 1, then the phase-type distribution (φ ,T ) equals an exponential distribution with mean 1/β . A phase-type distribution can also represent various classes of distributions including the Erlang, Coxian, and hyper-exponential distributions [8]. Furthermore, it is known that the set of phase-type distributions is dense in the set of positive-valued distributions [9]. Therefore, it is possible to approximate an arbitrary distribution by a phase- type distribution within any given accuracy. Moreover, there are efficient numerical algorithms for finding the parame- ters of an approximating phase-type distribution [2]. Hence, under Assumption III.4, the GeNeSIS model allows us to efficiently approximate realistic spreading processes having non-Markovian transmission and recovery distributions. IV. VECTORIAL REPRESENTATIONS The aim of this section is to introduce a vectorial repre- sentation of the GeNeSIS model under Assumption III.4. We start our exposition by providing a vectorial representation of an arbitrary phase-type distribution (Subsection IV-A), and then present a vectorial representation of the GeNeSIS model (Subsection IV-B) that shall be used in Section V for analyzing the decay rate of the spreading model. A. Vectorial Representation of Phase-Type Distributions In what follows, we use the following notation: For m,m(cid:48) ∈ [p], let Emm(cid:48) denote the p × p matrix whose entries are all zeros, except for its (m,m(cid:48))-th entry being one. Also, let em denote the m-th vector of the canonical basis in Rp (i.e., all the entries of em are zeros, except for the m-th entry being one). Finally, given a probability distribution φ on [p], we say that an Rp-valued random variable x follows the distribution φ, denoted by x ∼ φ, if P(x = em) = φm for every m ∈ [p]. By identifying the state space of the underlying Markov process by the set of vectors {e1, . . . ,ep,0}⊂ Rp, the following proposition allows us to represent the phase-type distribution as the exit time (see [34, p. 117]) of a vectorial stochastic differential equation: Proposition IV.1. Let (φ ,T ) be a phase-type distribution having p +1 phases (i.e., T ∈ Rp×p) and define the vector b ∈ Rp as in (3). Consider the Rp-valued stochastic differential equation with random initial condition x(0) ∼ φ. Then, the random variable ρ = min{t > 0: x(t) = 0} = min{t > 0: ∃m ∈ [p] such that x(t−) = em, and Nbm jumps at time t} (5) follows (φ ,T ). Proof. A detailed investigation of the differential equation (4) shows that the solution x of (4) is a Markov process with state space {e1, . . . ,ep,0} ⊂ Rp and infinitesimal generator given by (3). This fact specifically shows that the second equality in (5) is true. Furthermore, since x(0) follows the probability distribution φ, the time to absorption of the stochastic process x into the absorbing state 0 follows the phase-type distribution (φ ,T ). This completes the proof of the proposition. The stochastic differential equation (4) shall be used for describing phase-type recovery events in the proof of our first main result (Theorem V.2). On the right-hand side of the stochastic differential equation (4), the first term represents the transitions between non-absorbing states, while the second term represents the transitions into the absorbing state. In order to derive stochastic differential equations for trans- mission events, we appropriately modify the second term in the stochastic differential equation (4) and derive a vectorial representation for renewal sequences (see, e.g., [6, Chapter 9]) whose inter-renewal times follow a phase-type distribution: Proposition IV.2. Let (φ ,T ) be a phase-type distribution. Let eφ = {eφ (t)}t≥0 be independent and identically distributed random variables such that eφ (t) follows the distribution φ for all t ≥ 0. Consider the Rp-valued stochastic differential equation dx = p ∑ m=1 p ∑ m(cid:48)=1 (Em(cid:48)m − Emm)xdNTmm(cid:48) + p ∑ m=1 (eφ (t)e(cid:62)m − Emm)xdNbm (6) with a random initial state x(0) following the distribution φ. Define τ0 = 0 and let 0 < τ1 < τ2 < ··· be the (random) times at which x(t−) = em and the counter Nbm jumps for some m ∈ [p]. Then, the increments {τk −τk−1}k∈N are independent and identically distributed random variables following (φ ,T ). Proof. Since the stochastic differential equation given in the proposition is equivalent to the one in Proposition IV.1 on the time interval [0,τ1), the random variable τ1 has the same probability distribution as the random variable ρ defined in (5) and, therefore, follows the phase-type distribution (φ ,T ) by Proposition IV.1. Furthermore, by the definition of τ1, there exists an m ∈ [p] such that x(τ1) = (eφ (τ1)e(cid:62)m − Emm)x(τ−1 ) + x(τ−1 ) = eφ (τ1), which follows φ. Therefore, by the same argument as above, we see that the random increment τ2 − τ1 also follows (φ ,T ). An induction completes the proof. dx = p ∑ m=1 p ∑ m(cid:48)=1 (Em(cid:48)m − Emm)xdNTmm(cid:48) − p ∑ m=1 EmmxdNbm, (4) Using Propositions IV.1 and IV.2 as the machinery for describing phase-type recovery and transmission events, in the next subsection we present a set of vectorial stochastic differ- ential equations for describing the whole GeNeSIS spreading model. B. Vectorial Representation of the Generalized SIS Model In this subsection, we use Propositions IV.1 and IV.2 to provide a vectorial representation of the GeNeSIS model under Assumption III.4. Let A = [ai j]i, j be the adjacency matrix of the graph G. Define the vectors b and d by (3) and d = −R1q ∈ Rq, γ and Ni respectively. For (cid:96), (cid:96)(cid:48) ∈ [q], let F(cid:96)(cid:96)(cid:48) denote the q × q matrix whose entries are all zeros, except for its ((cid:96), (cid:96)(cid:48))-th entry being one. Also, let f(cid:96) denote the (cid:96)-th vector in the canonical basis of Rq. Finally, for i, j ∈ [n] and γ > 0, we let Ni j γ denote independent Poisson counters with rate γ. The next theorem is the first main result of this paper: Theorem IV.3. For each i ∈ [n] and j ∈ Ni, {e ji φ (t)}t≥0 and f i cally distributed random variables such that f i ψ (t) ∼ ψ φ = ψ (t)}t≥0 be independent and identi- ψ = { f i e ji φ (t) ∼ φ , for all t ≥ 0. Let x ji and yi be, respectively, the Rp- and Rq- valued stochastic processes satisfying the following stochastic differential equations: let e ji dx ji = p p + ∑ m=1 p ∑ m=1 ∑ ∑ (Em(cid:48)m − Emm)x ji dN ji Tmm(cid:48) m(cid:48)=1 φ e(cid:62)m − Emm)x ji dN ji (e ji yi (cid:96) dNi d(cid:96) φ (1− 1(cid:62)q yi) + e ji bm q − x ji ∑ q (cid:96)=1 q n ∑ k=1 aik p ∑ m=1 m dNik xik bm, (7) (cid:96)=1 dyi = − yi ∑ (F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))yi dNi R(cid:96)(cid:96)(cid:48) (cid:96)(cid:48)=1 q ∑ yi (cid:96) dNi d(cid:96) conditions satisfy(cid:40) where for an initially infected subset V0 ⊂ [n], the initial ψ (1− 1(cid:62)q yi) m dNik xik bm, ∑ m=1 ∑ k=1 + f i (8) aik (cid:96)=1 n p x ji(0) ∼ φ , yi(0) ∼ ψ, if i ∈ V0, x ji(0) = 0p, yi(0) = 0q, otherwise. (9) Then, the generalized networked SIS model in Definition III.1 with transmission and recovery times following, respectively, phase-type distributions (φ ,T ) and (ψ,R) can be equivalently described as the family of stochastic processes z = {zi}n i=1, where zi(t) = 1(cid:62)q yi(t) (10) for all t ≥ 0 and i ∈ [n]. The representations of the GeNeSIS model as the set of stochastic differential equations (7) and (8) allows us to analyze the model via symbolic computations, as will be illustrated in Section V. Before proceeding to the proof of Theorem IV.3, we provide an intuitive explanation of the 5 theorem. As is shown in Corollary IV.5 below, the variable x ji is related to spread of the infection from an infected node i to a susceptible node j, while yi controls the recovery process of node i. Specifically, on the right-hand side of the differential equation (7), the first two terms have the same structure as in (6) and correspond to renewal sequences of transmissions. The third and fourth terms represent the recovery and infection of node i, respectively. Similarly, on the right-hand side of the differential equation (8), the first two terms correspond to the phase-type recovery and have almost the same structure as in (4), while the remaining last term is related to the infection of the node i. In order to prove Theorem IV.3, we first state the following lemma. Lemma IV.4. The following statements are true for all i ∈ [n], j ∈ Ni, and t ≥ 0: 1) 1(cid:62)p x ji(t) = 1(cid:62)q yi(t). 2) x ji(t) ∈ {0p,e1, . . . ,ep}. 3) yi(t) ∈ {0q, f1, . . . , fq}. Proof. To prove the first statement, fix i ∈ [n] and j ∈ Ni, and let ε = 1(cid:62)p x ji − 1(cid:62)q yi. From (7) and (8), we obtain that ∑ dε = ε q (cid:96) dNi yi d(cid:96) . (cid:96)=1 This equation implies that ε is constant over [0,∞) because ε(0) = 0. Therefore, we have ε(t) = ε(0) = 0 for every t ≥ 0, completing the proof of the first statement. Let us prove the second and third statements. Notice that x ji and yi are piecewise constant since they are the solutions of the stochastic differential equations (7) and (8). Moreover, their values can change only when one of the Poisson counters in the stochastic differential equations jumps. Finally, if we let U = {0p,e1, . . . ,ep}, V = {0q, f1, . . . , fq}, then, (9) shows x ji(0) ∈ U and yi(0) ∈ V . Therefore, it is sufficient to show that the jump of any Poisson counter leaves the sets U and V invariant. R(cid:96)(cid:96)(cid:48) , Ni , N ji Tmm(cid:48) , and N ji t > 0 be arbitrary and assume that x ji(t−) ∈ U Let and yi(t−)∈V . The stochastic differential equations (7) and (8) have the following five different types of Poisson counters: bm, Ni Nik bm. Careful investigations of the d(cid:96) stochastic differential equations (7) and (8) show that any of these counters leave the sets U and V invariant as follows. For example, when Nik x ji(t) =x ji(t−) + e ji bm jumps at time t, we have that φ (t)(1− 1(cid:62)q yi(t−))aikxik if 1(cid:62)q yi(t−) = 1, aik = 0, or xik otherwise. m(t−) = 0, m(t−) x ji(t−), e ji φ (t), (cid:40) = (11) 6 Also, yi(t) = yi(t−) + f i (cid:40) = yi(t−), f i ψ (t), ψ (t)(1− 1(cid:62)q yi(t−))aikxik if 1(cid:62)q yi(t−) = 1, aik = 0, or xik otherwise. m(t−) m(t−) = 0, (12) Therefore, this jump leaves U and V invariant. Similarly, when Ni d(cid:96) jumps at time t, we obtain (cid:40) (cid:40) x ji(t) = x ji(t−)− x ji(t−)yi if yi (cid:96)(t−) 0, x ji(t−), otherwise, (cid:96)(t−) = 1, = yi(t) = yi(t−)− yi(t−)yi if yi (cid:96)(t−) (cid:96)(t−) = 1, 0, yi(t−), otherwise. = (13) (14) and hence x ji(t) ∈ U. We also have yi(t) ∈ V because The cases of other counters can be analyzed in a similar manner and, therefore, the proofs are omitted. The next corollary of Lemma IV.4 clarifies the roles of the variables x ji, yi and the various Poisson counters in the stochastic differential equations (7) and (8). Corollary IV.5. The following statements are true for every i ∈ [n], j ∈ Ni, and t ≥ 0: 1) Node i attempts to infect node j at time t, if and only if, x ji m(t−) = 1 and N ji jumps at time t for some m ∈ [p]. bm 2) Node i becomes susceptible at time t, if and only if, yi (cid:96)(t−) = 1 and Ni jumps at time t for some (cid:96) ∈ [q]. d(cid:96) Proof. From the proof of Lemma IV.4, the value of zi = 1(cid:62)p x ji = 1(cid:62)q yi can change from zero to one when and only when a counter Nik bm jumps. Therefore, from equations (11) and (12), we see that node i becomes infected at time t ≥ 0, if and only if, zi(t−) = 0, node i is adjacent to node k, xik m(t−) = 1, and Nik bm jumps at time t for some m ∈ [p]. Therefore, node k attempts to infect node i at time t if and only if xik m(t−) = 1 and Nik bm jumps at time t for some m ∈ [p], as desired. Similarly, we see that the value of zi can change from one to zero when and only when a counter Ni jumps. Therefore, d(cid:96) equations (13) and (14) imply that node i becomes susceptible at time t if and only if yi jumps at time t for some (cid:96) ∈ [q], showing the second assertion of the corollary. (cid:96)(t−) = 1 and the counter Ni d(cid:96) Now we are ready to prove Theorem IV.3. Proof of Theorem IV.3. We prove that the family of stochastic processes z = {zi}n i=1, defined by (7) -- (10), satisfies items a)-c) in Definition III.1, as well as Assumption III.4. Item a) is true by the given initial conditions. Let us prove item b). Assume that node i becomes infected at time t ≥ 0; hence, we have that either t = 0 or t > 0. In this proof, we only consider the case t = 0, as the other case can be proved in a similar way. Let ρ be the earliest time at which yi(ρ) = 0q. Then, on the time interval [0,ρ), the stochastic differential equation (8) is equivalent to dyi = q ∑ (cid:96)=1 q ∑ (cid:96)(cid:48)=1 (F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))yi dNi R(cid:96)(cid:96)(cid:48) − q ∑ (cid:96)=1 F(cid:96)(cid:96)yi dNi d(cid:96) (cid:96) = F(cid:96)(cid:96)yi. Moreover, the vector yi(0) follows the since yiyi distribution ψ. Therefore, by Proposition IV.1, we see that ρ follows the phase-type distribution (ψ,R), proving item b) in Definition III.1 under Assumption III.4 for t = 0. A similar discussion using Proposition IV.2 shows that the family of stochastic processes z satisfies item c) in Definition III.1 under Assumption III.4. This completes the proof of the theorem. Before presenting our analysis of the decay rate in the next section, we state another corollary of Lemma IV.4: Corollary IV.6. The family of stochastic processes ξ = {x ji,yi}i∈[n], j∈Ni, (15) where x ji and yi are the solutions of the stochastic differential equations (7) and (8), is a Markov process. Moreover, the states of ξ are all transient except for the absorbing state α at which x ji = 0 and yi = 0 for all i∈ [n] and j ∈Ni. Furthermore, the size of the state space of ξ equals Nξ = n ∏ i=1 (1 + pNiq), where Ni denotes the size of the neighbor set Ni. Proof. A careful investigation of the proof of Lemma IV.4 shows the first and the second claims. The third claim is an immediate consequence from the constraint 1(cid:62)p x ji(t) = 1(cid:62)q yi(t) that was proved in Lemma IV.4. V. DECAY RATE ANALYSIS In this section, we use our previous results to bound the exponential decay rate of the GeNeSIS model under Assump- tion III.4. We begin by presenting a characterization of the decay rate in terms of the eigenvalues of a matrix whose size grows exponentially with respect to the model parameters. To overcome the difficulty of computing the eigenvalues of a very large matrix, we then present an alternative bound on the decay rate based on the representation of the GeNeSIS model as the stochastic differential equations (7) and (8). Throughout this section, we consider the GeNeSIS model with transmission and recovery times following, respectively, phase-type distributions (φ ,T ) and (ψ,R) (i.e., satisfying As- sumption III.4). The following proposition illustrates the com- putational difficulty in computing the exponential decay rate of the GeNeSIS model: Proposition V.1. Let Q ∈ RNξ×Nξ be the transition rate matrix of the Markov process ξ (see (15) for the definition of ξ ), and let r < 0 be the maximum real part of the non-zero eigenvalues of Q. Then, the exponential decay rate of the GeNeSIS model is given by λ = −r. Proof. Since ξ (t) (cid:54)= α if and only if at least one node is infected at time t, we have the inequality n ∑ i=1 E[zi(t)] ≤ P(ξ (t) (cid:54)= α) ≤ E[zi(t)] for all i ∈ [n] and t ≥ 0. Therefore, the exponential decay is determined by that of the rate of the GeNeSIS model function P(ξ (t) (cid:54)= α) of t. By Corollary IV.6, a basic argument on Markov processes (see [46] for the case of exponential transmission and recover times) shows that i) if λ < −r, there exists a constant C > 0 such that P(ξ (t) (cid:54)= α) ≤ Ce−λt for all t and any initial state ξ (0), and ii) if λ > −r, there exists an initial state of ξ such that the function P(ξ (t) (cid:54)= α) cannot be bounded from above by the exponential function Ce−λt for any value of C. These observations immediately prove the claim of the proposition. Proposition V.1 yields the exact value of the decay rate, since the proposition uses the transition rate matrix of the whole Markov process ξ that exactly describes the GeNeSIS model. However, Proposition V.1 is not easily applicable in practice because the dimension Nξ of the matrix Q grows exponentially as Nξ ≥ n ∏ i=1 (pNiq) = p2mqn, (16) where m denotes the number of the edges in the network. The following theorem overcomes this computational difficulty by providing a lower bound on the growth rate in terms of the eigenvalues of a matrix whose size grows linearly with respect to the parameters in the GeNeSIS model. Theorem V.2. Define the (npq)× (npq) matrix A = (φb(cid:62))⊗A⊗ (ψ1(cid:62)q ) +Inp⊗R(cid:62) + (T(cid:62) +φb(cid:62))⊗Inq, (17) where A is the adjacency matrix of the graph G and the vector b is defined in (3). Then, λ ≥ −η(A), (18) where η(A) is the spectral abscissa of A. Before providing a proof of Theorem V.2, we below present a series of corollaries of the theorem. The proofs of the corollaries are straightforward and, therefore, omitted. The first corollary gives a bound on the decay rate of the GeNeSIS model with exponential transmission times and phase-type recovery times. Corollary V.3. Assume that the transmission times follow an exponential distribution with mean 1/β . Define the (nq)×(nq) matrix Aβ = β A⊗ (ψ1(cid:62)q ) + In ⊗ R(cid:62) Then, the decay rate satisfies λ ≥ −η(Aβ ). The next corollary deals with the dual case with phase-type transmission times and exponential recovery times. Corollary V.4. Assume that the recovery times follow an exponential distribution with mean 1/δ . Define the (np)×(np) matrix 7 Aδ = (φb(cid:62))⊗ A + (T(cid:62) + φb(cid:62))⊗ In − δ Inp. Then, the decay rate satisfies λ ≥ −η(Aδ ). As the special case of Theorem V.2, as well as Corollar- ies V.3 and V.4, we can prove the following bound on the decay rate of the standard SIS model: Corollary V.5 ([12], [39]). Assume that the transmission and recovery times follow exponential distributions with means 1/β and 1/δ , respectively. Define the n× n matrix Aβ ,δ = β A− δ In. Then, the decay rate satisfies λ ≥ −η(Aβ ,δ ). The above corollaries suggest an intuitive understanding of the terms in the matrix A defined in (17). Comparing the expressions of the matrices Aδ and Aβ ,δ , we see that the role of the exponential transmission rate β is played by the p× p matrix φb(cid:62) in the case of phase-type transmission times. On the other hand, the second term of the matrix Aδ , namely, (T(cid:62) + φb(cid:62))⊗ In, can be understood as a correction term that arises independently of the topology of the network. Similarly, comparing the matrices Aβ and Aβ ,δ , we see that the second term In ⊗ R(cid:62) of the matrix Aβ represents the effect of phase- type recoveries. On the other hand, we can understand the matrix ψ1(cid:62)q as a correction term resulting from using phase- type recovery times. We now give the proof of Theorem V.2. Proof of Theorem V.2. Combining equations (7) and (8), we obtain the following Rp+q-valued stochastic differential equa- tion Then, we apply Ito's formula in Lemma II.1 using the function to obtain the following Rpq-valued stochastic differential equa- tion (after tedious, but simple, algebraic manipulations) (cid:20)x ji (cid:21) yi d dN ji Tmm(cid:48) (cid:35) dNik bm. dN ji bm R(cid:96)(cid:96)(cid:48) q p + + + p p = (cid:96) (cid:96) 0nq (cid:21) (cid:96)=1 q ∑ dNi dNi d(cid:96) 0nq 0np ∑ m=1 p ∑ m=1 q ∑ (cid:20) (Em(cid:48)m − Emm)x ji (cid:20) (cid:21) ∑ m(cid:48)=1 (e ji φ e(cid:62)m − Emm)x ji (cid:20) (cid:21) (cid:21) (cid:20) ∑ (F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))yi (cid:96)(cid:48)=1 −x jiyi (cid:34) −yiyi ∑ aik m=1 (cid:21)(cid:19) (cid:18)(cid:20)x ji (cid:0)(Em(cid:48)m − Emm)⊗ Iq (cid:0)(e ji = w ji = x ji ⊗ yi (cid:1)w ji dN ji (cid:1)w ji dN ji φ e(cid:62)m − Emm)⊗ Iq (cid:96)=1 n ∑ k=1 e ji φ (1− 1(cid:62)q yi)xik ψ (1− 1(cid:62)q yi)xik f i m m yi + bm g Tmm(cid:48) dw ji = p ∑ m(cid:48)=1 p ∑ m=1 p ∑ m=1 + (cid:0)Ip ⊗ (F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))(cid:1)w ji dNi R(cid:96)(cid:96)(cid:48) (cid:96)w ji)dNi d(cid:96) 8 + + + q ∑ (cid:96)=1 q ∑ (cid:96)=1 n ∑ k=1 q ∑ (cid:96)(cid:48)=1 (−yi ∑ m=1 p aik(e ji φ ⊗ f i ψ )(1− 1(cid:62)pqw ji)(e(cid:62)m ⊗ 1(cid:62)q )wik dNik bm. (19) For brevity, we omit the details of this derivation. Define ω ji(t) = E[w ji(t)] for t ≥ 0. Then, using Lemma II.2, from (19) we can derive the Rpq-valued differential equation dω ji dt = (cid:104) +(cid:0)Ip ⊗ (R(cid:62) + D)(cid:1)(cid:105) (T(cid:62) + B)⊗ Iq + (φb(cid:62) − B)⊗ Iq p ω ji − (Ip ⊗ D)ω ji ∑ m=1 ∑ k=1 bm n (aikωik)− ε ji, (20) + (φ ⊗ ψ)(e(cid:62)m ⊗ 1(cid:62)q ) where B and D are the n × n diagonal matrices having the diagonals b1, . . . ,bn and d1, . . . ,dn, respectively, and the Rpq-valued function ε ji is defined by ε ji(t) = n ∑ k=1 p ∑ m=1 bmaik(φ ⊗ ψ)E[1(cid:62)pqw ji(t)(e(cid:62)m ⊗ 1(cid:62)q )wik(t)] (21) for every t ≥ 0. Now, for every i ∈ [n], we take an arbitrary ji ∈ Ni. We then define the function ωi by ωi = ω jii, as well as the Rnpq-valued function ω = col(ω1, . . . ,ωn). Notice that, from (19), for each i ∈ [n], all the stochastic processes in the set {w ji} j∈Ni follow the same stochastic differential equation and, therefore, present the same proba- bility distribution. This implies that ωi = ω ji for every j ∈ Ni. Therefore, we can rewrite the last summation appearing in (20) as ∑n k=1 aikωk = (Ai ⊗ Ipq)ω, where Ai denotes the i-th row of the adjacency matrix A. Then, from (11), it follows that k=1 aikωik = ∑n (cid:16) (cid:17) (cid:17) (cid:16) T(cid:62) ⊗ Iq + Ip ⊗ R(cid:62) + (φb(cid:62))⊗ Iq Ai ⊗ (φb(cid:62))⊗ (ψ1(cid:62)q ) + ωi ω − ε jii. dωi dt = Defining ε = col(ε j11, . . . ,ε jnn), we obtain the differential equation dω dt = A(cid:48)ω − ε, for the matrix A(cid:48) = In ⊗ (T(cid:62) ⊗ Iq + Ip ⊗ R(cid:62) + (φb(cid:62))⊗ Iq) + A⊗ (φb(cid:62))⊗ (ψ1(cid:62)q ). Since A(cid:48) is Metzler, we have that eA(cid:48)t ≥ 0 for every t ≥ 0. Also, since both x ji(t) and yi(t) are nonnegative for all i ∈ [n], j ∈ Ni, and t ≥ 0, we have that ε(t) ≥ 0 for every t ≥ 0. Therefore, it follows that ω(t) = eA(cid:48)tω(0)− (cid:90) t 0 eA(cid:48)(t−τ)ε(τ)dτ ≤ eA(cid:48)tω(0). This inequality implies that ω(t) converges to zero as t → ∞ with a decay rate at least −η(A(cid:48)) since ω(t) ≥ 0 for all t ≥ 0. On the other hand, for each i ∈ [n] and j ∈ Ni, we have 1(cid:62)pqw ji(t) = (1(cid:62)p x ji(t))(1(cid:62)q yi(t)) = 1(cid:62)q yi(t) = zi(t) from Lemma IV.4. Therefore, we have E[zi(t)] = 1(cid:62)pqω ji(t), which shows the exponentially fast convergence of E[zi(t)] towards zero with a decay rate at least −η(A(cid:48)). This completes the proof of the inequality (18) since A(cid:48) and A are similar. Remark V.6. Unlike the necessary and sufficient condition in Proposition V.1, the condition in Theorem V.2 is only sufficient. This conservatism arises from ignoring the higher- order term ε ji in (21). The inclusion of these higher-order terms into the analysis (see, e.g., [33], [41]) would allow us to reduce the conservatism, at the cost of increasing the dimension of the matrix A . VI. NUMERICAL SIMULATIONS In this section, we illustrate the effectiveness of our re- sults with numerical simulations in a real social network having n = 247 nodes and 940 edges. We focus on log- normal transmission and recovery times, which are observed in empirical studies, including information spread on online social networks [11], [45] and human epidemiology [22], [26]. In our simulations, we illustrate the effect of using exponential distributions to model transmission and recovery times that, in reality, follow log-normal distributions. In particular, we analyze how using standard Markovian models with expo- nential rates induce errors in the computation of the decay rate. Furthermore, we are also interested in how the variances of log-normal distributions, which cannot be incorporated into the standard Markovian model, affect the decay rates. For this purpose, we use the following four distributions to model transmission and recovery times in the GeNeSIS model: (i) the exponential distribution with mean µ (and, hence, variance µ2); (ii) the log-normal distribution with mean µ and variance µ2; (iii) the log-normal distribution with mean µ and variance 2µ2; and (iv) the log-normal distribution with mean µ and variance 4µ2. In order to analyze the decay rate of the GeNeSIS model whose transmission and recovery times follow one of these four distributions, we first approximate the three log-normal distributions in (ii) -- (iv) using phase-type distributions (as described in Section III) having p = 10 phases. Fig. 1 shows the probability density functions of the (exact) log-normal dis- tributions, as well as the fitted phase-type distributions, when the value of the parameter µ is in the range [0.5 : 0.1 : 1.5]. We notice that, since the inequality (16) shows that the size of the exact state transition matrix satisfies Nξ > 102127, it is not practical to use Proposition V.1 to compute the exact decay rate. Using the proposed phase-type distributions, we apply Theorem V.2 to analyze the decay rate of the GeNeSIS 9 Fig. 1. Approximations by phase-type distributions. Solid: Probability density functions of the log-normal distributions for µ in the range [0.5 : 0.1 : 1.5]. Dashed: Probability density functions of phase-type distributions. The darker the colors of the plots, the smaller the values of µ. Fig. 2. Lower bound −η(A) on the exponential decay rate of generalized SIS model. Horizontal axes: µ. Vertical axes: µ divided by the spectral radius of the graph. The white region corresponds to unstable epidemics; the darker the region, the faster the epidemics converges toward the infection-free equilibrium. model when the transmission/recovery times follow one of the four distributions described above. We compute the decay rate −η(A) for each one of the possible sixteen combinations of transmission/recovery distributions when µ is in the range [0.5 : 0.05 : 1.5]. In the subfigures of Fig. 2, we include contour plots of the decay rates for these sixteen cases. In the figure, the values of the decay rates are indicated by different colors. The darker the color, the faster the epidemics converges to the infection-free equilibrium. We remark that, even though the four distributions used in our simulations have the same mean, the resulting GeNeSIS models exhibit different decay rates. We can furthermore observe that the variances of the distributions used to model transmission and recovery times can dramatically affect the de- cay rate of the GeNeSIS model, as was previously indicated by numerical simulations [47] and mean-field approximations [5]. For a fixed recovery distribution (i.e., for a fixed column in the table in Fig. 2), the colored region (indicated by black solid lines) shrinks as we increase the variance of the log-normal distribution modeling the transmission times (see rows 2 to 4 in Fig. 2). From this observation, we see that the heavier the tail of the transmission distribution, the slower the extinction 9(a)Log-normaldistributions(solidlines)withmeanµandvarianceµ2,andtheirphase-typeapproximations(dashedlines).(b)Log-normaldistributions(solidlines)withmeanµandvariance2µ2,andtheirphase-typeapproximations(dashedlines).(c)Log-normaldistributions(solidlines)withmeanµandvariance4µ2,andtheirphase-typeapproximations(dashedlines).Fig.1.Approximationsbyphase-typedistributions.Solid:Probabilitydensityfunctionsofthelog-normaldistributionsforµintherange[0.5:0.1:1.5].Dashed:Probabilitydensityfunctionsofphase-typedistributions.Thedarkerthecolorsoftheplots,thesmallerthevaluesofµ.9(a)Log-normaldistributions(solidlines)withmeanµandvarianceµ2,andtheirphase-typeapproximations(dashedlines).(b)Log-normaldistributions(solidlines)withmeanµandvariance2µ2,andtheirphase-typeapproximations(dashedlines).(c)Log-normaldistributions(solidlines)withmeanµandvariance4µ2,andtheirphase-typeapproximations(dashedlines).Fig.1.Approximationsbyphase-typedistributions.Solid:Probabilitydensityfunctionsofthelog-normaldistributionsforµintherange[0.5:0.1:1.5].Dashed:Probabilitydensityfunctionsofphase-typedistributions.Thedarkerthecolorsoftheplots,thesmallerthevaluesofµ.0.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.5-9-8-7-6-5-4-3-2-101a)Exponentialrecoverytimeswithmeanµb)Log-normalrecoverytimeswithmeanµandvarianceµ2c)Log-normalrecoverytimeswithmeanµandvariance2µ2d)Log-normalrecoverytimeswithmeanµandvariance4µ21)Exponentialtransmissiontimeswithmeanµ2)Log-normaltransmissiontimeswithmeanµandvarianceµ23)Log-normaltransmissiontimeswithmeanµandvariance2µ24)Log-normaltransmissiontimeswithmeanµandvariance4µ2012345678Fig.2.Lowerbound−η(A)ontheexponentialdecayrateofgeneralizedSISmodel.Horizontalaxes:µ.Verticalaxes:µdividedbythespectralradiusofthegraph.Thewhiteregioncorrespondstounstableepidemics;thedarkertheregion,thefastertheepidemicsconvergestowardtheinfection-freeequilibrium.modelwhenthetransmission/recoverytimesfollowoneofthefourdistributionsdescribedabove.Wecomputethedecayrate−η(A)foreachoneofthepossiblesixteencombinationsoftransmission/recoverydistributionswhenµisintherange[0.5:0.05:1.5].InthesubfiguresofFig.2,weincludecontourplotsofthedecayratesforthesesixteencases.Inthefigure,thevaluesofthedecayratesareindicatedbydifferentcolors.Thedarkerthecolor,thefastertheepidemicsconvergestotheinfection-freeequilibrium.Weremarkthat,eventhoughthefourdistributionsusedinoursimulationshavethesamemean,theresultingGeNeSISmodelsexhibitdifferentdecayrates.Wecanfurthermoreobservethatthevariancesofthedistributionsusedtomodeltransmissionandrecoverytimescandramaticallyaffectthede-cayrateoftheGeNeSISmodel,aswaspreviouslyindicatedbynumericalsimulations[47]andmean-fieldapproximations[5].Forafixedrecoverydistribution(i.e.,forafixedcolumninthetableinFig.2),thecoloredregion(indicatedbyblacksolidlines)shrinksasweincreasethevarianceofthelog-normaldistributionmodelingthetransmissiontimes(seerows2to4inFig.2).Fromthisobservation,weseethattheheavierthetailofthetransmissiondistribution,theslowertheextinctionFig.2.Lowerbound−η(A)ontheexponentialdecayrateofgeneralizedSISmodel.Horizontalaxes:µ.Verticalaxes:µdividedbythespectralradiusofthegraph.Thewhiteregioncorrespondstounstableepidemics;thedarkertheregion,thefastertheepidemicsconvergestowardtheinfection-freeequilibrium.modelwhenthetransmission/recoverytimesfollowoneofthefourdistributionsdescribedabove.Wecomputethedecayrate−η(A)foreachoneofthepossiblesixteencombinationsoftransmission/recoverydistributionswhenµisintherange[0.5:0.05:1.5].InthesubfiguresofFig.2,weincludecontourplotsofthedecayratesforthesesixteencases.Inthefigure,thevaluesofthedecayratesareindicatedbydifferentcolors.Thedarkerthecolor,thefastertheepidemicsconvergestotheinfection-freeequilibrium.Weremarkthat,eventhoughthefourdistributionsusedinoursimulationshavethesamemean,theresultingGeNeSISmodelsexhibitdifferentdecayrates.Wecanfurthermoreobservethatthevariancesofthedistributionsusedtomodeltransmissionandrecoverytimescandramaticallyaffectthede-cayrateoftheGeNeSISmodel,aswaspreviouslyindicatedbynumericalsimulations[47]andmean-fieldapproximations[5].Forafixedrecoverydistribution(i.e.,forafixedcolumninthetableinFig.2),thecoloredregion(indicatedbyblacksolidlines)shrinksasweincreasethevarianceofthelog-normaldistributionmodelingthetransmissiontimes(seerows2to4inFig.2).Fromthisobservation,weseethattheheavierthetailofthetransmissiondistribution,theslowertheextinction9(a)Log-normaldistributions(solidlines)withmeanµandvarianceµ2,andtheirphase-typeapproximations(dashedlines).(b)Log-normaldistributions(solidlines)withmeanµandvariance2µ2,andtheirphase-typeapproximations(dashedlines).(c)Log-normaldistributions(solidlines)withmeanµandvariance4µ2,andtheirphase-typeapproximations(dashedlines).Fig.1.Approximationsbyphase-typedistributions.Solid:Probabilitydensityfunctionsofthelog-normaldistributionsforµintherange[0.5:0.1:1.5].Dashed:Probabilitydensityfunctionsofphase-typedistributions.Thedarkerthecolorsoftheplots,thesmallerthevaluesofµ.0.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.5-9-8-7-6-5-4-3-2-101a)Exponentialrecoverytimeswithmeanµb)Log-normalrecoverytimeswithmeanµandvarianceµ2c)Log-normalrecoverytimeswithmeanµandvariance2µ2d)Log-normalrecoverytimeswithmeanµandvariance4µ21)Exponentialtransmissiontimeswithmeanµ2)Log-normaltransmissiontimeswithmeanµandvarianceµ23)Log-normaltransmissiontimeswithmeanµandvariance2µ24)Log-normaltransmissiontimeswithmeanµandvariance4µ2012345678Fig.2.Lowerbound−η(A)ontheexponentialdecayrateofgeneralizedSISmodel.Horizontalaxes:µ.Verticalaxes:µdividedbythespectralradiusofthegraph.Thewhiteregioncorrespondstounstableepidemics;thedarkertheregion,thefastertheepidemicsconvergestowardtheinfection-freeequilibrium.modelwhenthetransmission/recoverytimesfollowoneofthefourdistributionsdescribedabove.Wecomputethedecayrate−η(A)foreachoneofthepossiblesixteencombinationsoftransmission/recoverydistributionswhenµisintherange[0.5:0.05:1.5].InthesubfiguresofFig.2,weincludecontourplotsofthedecayratesforthesesixteencases.Inthefigure,thevaluesofthedecayratesareindicatedbydifferentcolors.Thedarkerthecolor,thefastertheepidemicsconvergestotheinfection-freeequilibrium.Weremarkthat,eventhoughthefourdistributionsusedinoursimulationshavethesamemean,theresultingGeNeSISmodelsexhibitdifferentdecayrates.Wecanfurthermoreobservethatthevariancesofthedistributionsusedtomodeltransmissionandrecoverytimescandramaticallyaffectthede-cayrateoftheGeNeSISmodel,aswaspreviouslyindicatedbynumericalsimulations[47]andmean-fieldapproximations[5].Forafixedrecoverydistribution(i.e.,forafixedcolumninthetableinFig.2),thecoloredregion(indicatedbyblacksolidlines)shrinksasweincreasethevarianceofthelog-normaldistributionmodelingthetransmissiontimes(seerows2to4inFig.2).Fromthisobservation,weseethattheheavierthetailofthetransmissiondistribution,theslowertheextinction 10 of the spreading process, as was numerically confirmed in [47]. We also observe that for a fixed transmission distribution (i.e., for a fixed row in the table), the colored region remains almost unaltered as we increase the variance of the distribution mod- eling the recovery time, confirming the validity of the mean- field analysis in [5] for the case of exponential transmission times. We can furthermore observe that the exponential decay rate −η(A) increases more abruptly inside the region as we decrease this variance as indicated by steeper gradients. The above observations illustrate the effectiveness of the proposed framework for analyzing the decay rate of epidemics in networks with non-Poissonian transmission and/or recovery distributions. VII. CONCLUSION In this paper, we have analyzed the dynamics of an SIS model of spreading over arbitrary networks with phase-type transmission and recovery times. Since phase-type distribu- tions form a dense family in the space of positive-valued dis- tributions, our results allow to theoretically analyze arbitrary transmission and recovery times within an arbitrary accuracy. In this context, we have derived conditions for this generalized spreading model to converge towards the infection-free equi- librium (i.e., to eradicate the spread) with a given exponential decay rate. We have specifically provided a transient analysis of the stochastic spreading dynamics over arbitrary networks without relying on mean-field approximations. Our results illustrate that the particular shape of the transmission/recovery distribution heavily influences the exponential decay rate of the convergence towards the infection-free equilibrium. Through numerical simulations, we have specifically observed that our results allow to theoretically confirm some observations previously obtained by numerical simulations and mean-field approximations. A possible direction for future research is considering time- varying (temporal) networks [14], [24] in which transmis- sion and recovery events follow non-Poissonian distributions. Another interesting research direction is developing an opti- mal resource allocation strategy for non-Markovian epidemic spreading processes. Although we can find in the literature various research efforts [1], [13], [32], [39], [48] for designing containment methodologies for networked epidemic spreading processes, many of them are based on decay rates that are derived under the Markovian assumption on transmission and recovery events. In this direction, it is of practical interest to investigate how the non-Markovianity of spreading dynamics alters the optimal allocation strategies that have been investi- gated in the literature. REFERENCES [1] J. Abad Torres, S. Roy, and Y. Wan, "Sparse resource allocation for linear network spread dynamics," IEEE Transactions on Automatic Control, vol. 62, no. 4, pp. 1714 -- 1728, 2017. [2] S. Asmussen, O. Nerman, and M. Olsson, "Fitting phase-type distribu- tions via the EM algorithm," Scandinavian Journal of Statistics, vol. 23, no. 4, pp. 419 -- 441, 1996. [3] N. T. J. Bailey, The Mathematical Theory of Infectious Diseases and its Applications. Griffin, 1975. [4] S. P. Blythe and R. M. Anderson, "Variable infectiousness in HFV transmission models," Mathematical Medicine and Biology, vol. 5, no. 3, pp. 181 -- 200, 1988. [5] E. Cator, R. van de Bovenkamp, and P. Van Mieghem, "Susceptible- infected-susceptible epidemics on networks with general infection and cure times," Physical Review E, vol. 87, no. 6, p. 062816, 2013. [6] E. C¸ inlar, Introduction to Stochastic Processes. Prentice-Hall, 1975. [7] G. Chowell and H. Nishiura, "Transmission dynamics and control of Ebola virus disease (EVD): a review," BMC Medicine, vol. 12, no. 1, p. 196, 2014. [8] C. Commault and S. Mocanu, "Phase-type distributions and representa- tions: Some results and open problems for system theory," International Journal of Control, vol. 76, no. 6, pp. 566 -- 580, 2003. [9] D. R. Cox, "A use of complex probabilities in the theory of stochastic processes," Mathematical Proceedings of the Cambridge Philosophical Society, vol. 51, no. 02, pp. 313 -- 319, 1955. [10] F. Darabi Sahneh, C. Scoglio, and P. Van Mieghem, "Generalized epidemic mean-field model for spreading processes over multilayer complex networks," IEEE/ACM Transactions on Networking, vol. 21, no. 5, pp. 1609 -- 1620, 2013. [11] C. Doerr, N. Blenn, and P. Van Mieghem, "Lognormal infection times of online information spread." PLoS ONE, vol. 8, no. 5, p. e64349, 2013. [12] A. Ganesh, L. Massouli´e, and D. Towsley, "The effect of network topology on the spread of epidemics," in 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005, pp. 1455 -- 1466. [13] S. Han, V. M. Preciado, C. Nowzari, and G. J. Pappas, "Data-driven network resource allocation for controlling spreading processes," IEEE Transactions on Network Science and Engineering, vol. 2, no. 4, pp. 127 -- 138, 2015. [14] P. Holme, "Modern temporal network theory: a colloquium," The Euro- pean Physical Journal B, vol. 88, no. 9, p. 234, 2015. [15] R. Horn and C. Johnson, Matrix Analysis. Cambridge University Press, 1990. [16] H.-H. Jo, J. I. Perotti, K. Kaski, and J. Kert´esz, "Analytically solvable model of spreading dynamics with non-Poissonian processes," Physical Review X, vol. 4, no. 1, p. 011041, 2014. [17] M. J. Keeling and B. T. Grenfell, "Understanding the persistence of measles: Reconciling theory, simulation and observation," Proceedings of the Royal Society B: Biological Sciences, vol. 269, no. 1489, pp. 335 -- 343, 2002. [18] A. Khanafer, T. Bas¸ar, and B. Gharesifard, "Stability of epidemic models over directed graphs: A positive systems approach," Automatica, vol. 74, pp. 126 -- 134, 2016. [19] I. Z. Kiss, G. Rost, and Z. Vizi, "Generalization of pairwise models to non-Markovian epidemics on networks," Physical Review Letters, vol. 115, no. 7, p. 078701, 2015. [20] A. Lajmanovich and J. A. Yorke, "A deterministic model for gonorrhea in a nonhomogeneous population," Mathematical Biosciences, vol. 28, no. 1976, pp. 221 -- 236, 1976. [21] K. Lerman and R. Ghosh, "Information contagion: An empirical study of the spread of news on Digg and Twitter social networks," in Fourth International AAAI Conference on Weblogs and Social Media, 2010, pp. 90 -- 97. [22] E. Limpert, W. A. Stahel, and M. Abbt, "Log-normal distributions across the sciences: keys and clues," BioScience, vol. 51, no. 5, pp. 341 -- 352, 2001. [23] V. S. Mai, A. Battou, and K. Mills, "Distributed algorithm for suppress- ing epidemic spread in networks," IEEE Control Systems Letters, vol. 2, no. 3, pp. 555 -- 560, 2018. [24] N. Masuda and R. Lambiotte, A Guide to Temporal Networks. World Scientific Publishing, 2016. [25] B. Min, K.-I. Goh, and I.-M. Kim, "Suppression of epidemic outbreaks with heavy-tailed contact dynamics," Europhysics Letters, vol. 103, no. 5, p. 50002, 2013. [26] H. Nishiura and M. Eichner, "Infectiousness of smallpox relative to disease age: estimates based on transmission network and incubation period," Epidemiology and Infection, vol. 135, no. 07, pp. 1145 -- 1150, 2007. [27] C. Nowzari, M. Ogura, V. M. Preciado, and G. J. Pappas, "A general class of spreading processes with non-Markovian dynamics," in 54th IEEE Conference on Decision and Control, 2015, pp. 5073 -- 5078. [28] C. Nowzari, V. M. Preciado, and G. J. Pappas, "Analysis and control of epidemics: A survey of spreading processes on complex networks," IEEE Control Systems, vol. 36, no. 1, pp. 26 -- 46, 2016. 11 PLACE PHOTO HERE Victor M. Preciado received the PhD degree in electrical engineering and computer science from the Massachusetts Institute of Technology, in 2008. He is currently an associate professor of electrical and systems engineering with the University of Penn- sylvania, where he is a member of the Networked and Social Systems Engineering (NETS) program, the Warren Center for Network and Data Sciences, and the Applied Math and Computational Science (AMCS) program. He is a recipient of the 2017 National Science Foundation Faculty Early Career Development (CAREER) Award and the 2018 Outstanding Paper Award from the IEEE Control Systems Magazine. His main research interests lie at the intersection of big data and network science; in particular, in using innovative mathematical and computational approaches to capture the essence of complex, high-dimensional dynamical systems. Relevant applications of this line of research can be found in the context of socio-technical networks, brain dynamical networks, healthcare operations, biological systems, and critical technological infrastructure. [29] M. Ogura and V. M. Preciado, "Stability of spreading processes over time-varying large-scale networks," IEEE Transactions on Network Science and Engineering, vol. 3, no. 1, pp. 44 -- 57, 2016. [30] -- -- , "Epidemic processes over adaptive state-dependent networks," Physical Review E, vol. 93, p. 062316, 2016. [31] -- -- , "Optimal Containment of Epidemics in Temporal and Adaptive Springer, 2017, pp. Networks," in Temporal Networks Epidemiology. 241 -- 266. [32] -- -- , "Optimal design of switched networks of positive linear systems via geometric programming," IEEE Transactions on Control of Network Systems, vol. 4, no. 2, pp. 213 -- 222, 2017. [33] -- -- , "Second-order moment-closure for tighter epidemic thresholds," Systems & Control Letters, vol. 113, pp. 59 -- 64, 2018. [34] B. Øksendal, Stochastic Differential Equations. Springer, 2003. [35] P. E. Par´e, C. L. Beck, and A. Nedic, "Epidemic processes over time- varying networks," IEEE Transactions on Control of Network Systems, vol. 5, no. 3, pp. 1322 -- 1334, 2018. [36] P. E. Par´e, J. Liu, C. L. Beck, B. E. Kirwan, and T. Bas¸ar, "Analysis, estimation, and validation of discrete-time epidemic processes," IEEE Transactions on Control Systems Technology, 2018. [37] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani, "Epidemic processes in complex networks," Reviews of Modern Physics, vol. 87, no. 3, pp. 925 -- 979, 2015. [38] L. Pellis, T. House, and M. J. Keeling, "Exact and approximate moment closures for non-Markovian network epidemics," Journal of Theoretical Biology, vol. 382, pp. 160 -- 177, 2015. [39] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J. Pappas, "Optimal resource allocation for network protection against spreading processes," IEEE Transactions on Control of Network Systems, vol. 1, no. 1, pp. 99 -- 108, 2014. [40] S. Roy, M. Xue, and S. K. Das, "Security and discoverability of spread dynamics in cyber-physical networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1694 -- 1707, 2012. [41] N. A. Ruhi, C. Thrampoulidis, and B. Hassibi, "Improved bounds on the epidemic threshold of exact SIS models on complex networks," in 55th IEEE Conference on Decision and Control, 2016, pp. 3560 -- 3565. [42] A. Santos, J. M. F. Moura, and J. M. F. Xavier, "Bi-virus SIS epidemics over networks: Qualitative analysis," IEEE Transactions on Network Science and Engineering, vol. 2, no. 1, pp. 17 -- 29, 2015. [43] M. Starnini, J. P. Gleeson, and M. Bogun´a, "Equivalence between Non- Markovian and Markovian dynamics in epidemic spreading processes," Physical Review Letters, vol. 118, 2017. [44] T. Suess, U. Buchholz, S. Dupke, R. Grunow, M. An der Heiden, A. Hei- der, B. Biere, B. Schweiger, W. Haas, and G. Krause, "Shedding and transmission of novel influenza virus A/H1N1 infection in households- Germany, 2009," American Journal of Epidemiology, vol. 171, no. 11, pp. 1157 -- 1164, 2010. [45] P. Van Mieghem, N. Blenn, and C. Doerr, "Lognormal distribution in the digg online social network," The European Physical Journal B, vol. 83, pp. 251 -- 261, 2011. [46] P. Van Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1 -- 14, 2009. [47] P. Van Mieghem and R. van de Bovenkamp, "Non-Markovian infection spread dramatically alters the susceptible-infected-susceptible epidemic threshold in networks," Physical Review Letters, vol. 110, no. 10, p. 108701, 2013. [48] Y. Wan, S. Roy, and A. Saberi, "Designing spatially heterogeneous strategies for control of virus spread," IET Systems Biology, vol. 2, no. 4, pp. 184 -- 201, 2008. PLACE PHOTO HERE Masaki Ogura received the B.Sc. degree in Engi- neering and M.Sc. degree in Informatics from Kyoto University, and the Ph.D. degree in Mathematics from Texas Tech University. He was a Postdoctoral Researcher with the Department of Electrical and Systems Engineering at the University of Pennsyl- vania. He is currently an Assistant Professor with the Division of Information Science, Nara Institute of Science and Technology, Japan. His research interests include network science, dynamical sys- tems, and convex optimizations with applications to epidemic control, consensus formation, and product development processes.
1909.00543
1
1909
2019-09-02T04:41:15
On Privacy of Socially Contagious Attributes
[ "cs.SI", "physics.soc-ph" ]
A commonly used method to protect user privacy in data collection is to perform randomized perturbation on user's real data before collection so that aggregated statistics can still be inferred without endangering secrets held by individuals. In this paper, we take a closer look at the validity of Differential Privacy guarantees, when the sensitive attributes are subject to social influence and contagions. We first show that in the absence of any knowledge about the contagion network, an adversary that tries to predict the real values from perturbed ones, cannot achieve an area under the ROC curve (AUC) above $1-(1-\delta)/(1+e^\varepsilon)$, if the dataset is perturbed using an $(\varepsilon,\delta)$-differentially private mechanism. Then, we show that with the knowledge of the contagion network and model, one can do significantly better. We demonstrate that our method passes the performance limit imposed by differential privacy. Our experiments also reveal that nodes with high influence on others are at more risk of revealing their secrets than others. The performance is shown through extensive experiments on synthetic and real-world networks.
cs.SI
cs
On Privacy of Socially Contagious Attributes Aria Rezaei, Jie Gao Stony Brook University {arezaei,jgao}@cs.stonybrook.edu 9 1 0 2 p e S 2 ] I S . s c [ 1 v 3 4 5 0 0 . 9 0 9 1 : v i X r a Abstract -- A common approach to protect users privacy in data collection is to perform random perturbations on user's sensitive data before collection in a way that aggregated statistics can still be inferred without endangering individual secrets. In this paper, we take a closer look at the validity of Differential Privacy guarantees, when sensitive attributes are subject to social contagion. We first show that in the absence of any knowledge about the contagion network, an adversary that tries to predict the real values from perturbed ones, cannot train a classifier that achieves an area under the ROC curve (AUC) above 1 − (1 − δ)/(1 + eε), if the dataset is perturbed using an (ε, δ)-differentially private mechanism. Then, we show that with the knowledge of the contagion network and model, one can do substantially better. We demonstrate that our method passes the performance limit imposed by differential privacy. Our experiments also reveal that nodes with high influence on others are at more risk of revealing their secrets than others. Our method's superior performance is demonstrated through extensive experiments on synthetic and real-world networks. I. INTRODUCTION The last decade has witnessed the exponential growth of data collection practices. While access to large-scale data has fueled the unprecedented power to solve problems previously thought impossible, it also imposes a great risk on the privacy of individuals in this new environment. A common policy is to consider individual data items to be sensitive, while knowledge of aggregated statistics on a population is not. For example, the fact that a person has a certain disease is considered sensitive, while it is safe to release the percentage of people with that disease within a population. This model has been the founda- tion of the popular differential privacy (DP) framework [1], in which individual entries are sensitive but queries on aggregated knowledge are answered with the guarantee that an adversary cannot use the answers to accurately infer individual data items. In this paper we examine the interplay of personally sensitive data in a social environment. It has been widely recognized that social interactions shape the landscape of individual attributes -- infectious diseases spread through social interactions and contacts; behavior changes such as obesity [2], exercising [3], or decision making processes such as voting [4] or charity donation [5] are contagious. Due to the ubiquity of online social platforms in recent years, information about social ties and social interaction has become available. Such data can be available to the public with little effort (e.g.: professional affiliation on public web pages or friendship networks in public social networks such as Twitter), or can be mined through other means such as human mobility traces [6]. So the question we ask is: how safe are people's sensitive attributes in a socially connected world? Our Contribution. In this paper we answer this question by proposing a novel attack to users' sensitive attributes using information on social network connectivity, despite the fact that attributes are protected by DP mechanisms. Suppose that the individuals participate in a survey in which they are asked about the sensitive attribute X with value 0 or 1. The goal of the survey is to learn the aggregated percentage of population who report "1". Since the participants may not trust the data collector, they use a randomized perturbation mechanism M to report data zi = M(xi). A simple scheme for M is to flip a coin. If head, report 1 or 0 at random, otherwise report the true value. After aggregating the perturbed reports, one can approximate the true statistics by removing certain biases introduced by M. For example, if there are p fraction in the population whose attributes are 1, the perturba- tion mechanism leads to a total fraction of 1/4+p/2 reporting 1. From this, one can solve for p. Meanwhile, knowing zi is not enough to accurately determine xi -- such protection can be formulated by differential privacy guarantee. Pr[M(x) = z] ≤ eε Pr[M(x(cid:48)) = z] + δ, (1) the best classifier from an attacker, without information of the social ties and the contagion models, has the Area Under the ROC Curve (AUC) at most 1−(1−δ)/(eε +1). • Next, we propose a method to infer the original sensitive values {xi}, using the contagion model, the network structure, the perturbation mechanism M and the noisy reported values {zi}. This requires understanding how the real values correlate by accurately modeling the way they are produced by a contagion process. In prior work, contagions are ignored in modeling correlation between individual values, which results in models that are too simplistic to reflect real-world phenomena. In contrast, our model incorporates the network structure and contagion model directly into our calculations. We proceed in two phases. First, we find the probabilistic effectors -- a probability αv that each node v is an initiator Now assume that the attacker knows the social connections between individuals in the survey as well as the contagion model (how this attribute spreads through the social ties). We propose an attack that exploits this information to infer the initial state {xi}, with a performance bound exceeding that which is guaranteed by DP. More accurately, we show • For any perturbation mechanism M that guarantees (ε, δ)-differential privacy, i.e., ∀z, x (cid:54)= x(cid:48), of a contagion that results in observed {zi}. Next we run the contagion model forward from the probabilistic seeds to estimate {xi}. • Our experiments on both synthetic and real-world net- works show that our method can achieve an AUC value higher than the limit imposed by DP, weakening its guarantee as a result. This also means that the social network information, while not sensitive itself, can in- deed be exploited to infer sensitive knowledge. We also observe that nodes with high influence over others are more vulnerable to such attacks. In what follows, we first present the background and related work on DP and its many variants along with prior work on social influence and contagions. We then report the theoretical upper bound on the performance of a binary classification with differential privacy protection, when there is no knowledge of the contagion network. This is followed by our attack leveraging social network structure and contagion model. We report the results of our experiments at the end. II. BACKGROUND AND RELATED WORK Contagion Models: Many attributes are socially contagious. The way that these attributes spread in a social network is described via contagion models. A few models have received great attention in the literature. In the Linear Threshold model each edge has a weight that represents the influence between nodes, and nodes are activated when the sum of influence receiving from their neighbors exceeds a threshold randomly selected from [0, 1]. Independent Cascade model assumes that each node u, upon acivation, has one chance to activate each of its neighbors, with different probabilities. This differs from prior work on virus contagion such as SI (susceptible-Infected) where activated node continuously try to activate their inactive neighbors in time-synchronous rounds. Recently there has been growing attention in General Threshold model [7] (first proposed by Granovetter [8]) and Complex Contagions, where infection requires a specific number of infected neighbors [9], [10]. In this work we mainly use the Linear Threshold model and discuss possible extensions in the last section. Data Privacy: The most widely adopted privacy model is the model of differential privacy (DP) [1], which imposes con- straints on publishing aggregate information about a database such that the privacy impact on individual entries is limited. Specifically, a randomized algorithm A that takes a dataset as input is said to have (ε, δ)-differential privacy, if for all datasets D1 and D2 that differ on a single entry, and all subsets S of the image of A: Pr[A(D1) ∈ S] ≤ eε Pr[A(D2) ∈ S]+δ. The probability is taken over the randomness of the algorithm. The original DP model does not explicitly specify the ramifications of the presence of correlation between data points, which could be accessible from outside. In fact, it is proved that when the data is assumed to be correlated, the privacy guarantees provided by DP becomes weaker [11]. This issue is acknowledged in a number of later definitions that try to address it. For example, inferential privacy [12] captures the largest possible ratio between the posterior and prior beliefs about an individual's data, after observing the results of a computation on a database. Here the data items may not be independent and the correlation is captured by a prior belief on the data items. In adversarial privacy [13], domain experts could plug in various data generating distributions and the goal is to protect the presence/absence of a tuple in the data set. The most general definition is PufferFish privacy [11], where one explicitly specifies the set of secrets to protect, how they shall be protected (by specifying indistinguishable pairs), how data evolve or are generated (e.g., are data items correlated), and what extra knowledge the potential attackers have. These definitions add to the complexity of DP and, as a result, we have yet to see any of them being as widely adopted as DP. Our work could be considered as a motivation to devise mechanisms that explicitly incorporate contagion models into their privacy protection guarantees. In an age when activities are shared online and individuals interact with each other more as each day passes, is not unimaginable that an adversary might have access to social information that can jeopardize individuals' secrets. We propose a concrete attack that beats DP guarantees. Since many attributes shared by humans are socially correlated, this work reopens many of the problems studied under traditional DP setting (with no explicit assumption on data correlation and generation processes) and forces us to inspect new methods that can endure higher levels of scrutiny. Analyzing Social Contagions and Finding Effectors: Our attack is closely related to analyzing social contagions, in particular the two problems of influence maximization and finding roots of contagion. it Influence maximization is initially studied in [14]: how to pick k initial seeds such that the number of nodes eventually infected is maximized. It is an NP-hard problem but could be approximated up to 1 − 1/e, if one can have an oracle for computing the influence of a set of seeds S -- the (expected) number of nodes infected with seed set S. Obviously one can run simulations to estimate the influence of a seed set. Computing the exact influence of a node can be done in linear time on a DAG but is #P-hard on a general graph [15]. A heuristic to speed-up the algorithm is to utilize local simple structures, such as local DAGs, to estimate the influence of a node [15]. Alternatively, Borgs et al. [16] proposed to use the reverse cascades to estimate influence, picking nodes that more frequently appear in cascades simulated in reverse direction. Given the current activation state of a contagion in a social network, the k-effector problem is to find the most likely k effectors (initiators of contagions) You can see that influence maximization is a special case of this problem where all nodes are activated in the end. The k-effector problem is NP- hard for general graphs or even a DAG, but is solvable in polynomial time by dynamic programming on trees [17]. For general graphs, a heuristic algorithm [18] is to extract the most probable tree (which is NP-hard) and run the optimal algorithm on that tree. Finding effectors is also extensively studied for the Susceptible-Infected (SI) propagation model [19], [20]. Privacy of Social Networks and Attributes: Our work is different from previous work on protecting social network privacy, which assumes that the social network graph itself is private data and network-wide statistics (e.g., degree dis- tribution) is released [21]. We assume that the social network structure is publicly available and only the socially contagious attributes are sensitive. Links between individuals in a social network can be telling. For instance, Kifer and Machanavajjhala [22] show that future social links can be predicted from the number of inter- community edges by assuming that network evolution follows some particular model. Somewhat similar to our work, Song et al. [23] considered flu infection -- estimating how many people get flu while preventing the status of any particular in- dividual being revealed. To avoid the intricate details of social contagion, they assume an overly simplistic model where all nodes in the same connected component are correlated and in each component, all pairs of nodes are equally correlated. In our work, we assume a contagion model that is aligned with established literature on contagion and social influence. III. PROBLEM DEFINITION For a population of n individuals, let xi be a sensitive binary attribute for individual i, xi ∈ {0, 1}, and denote by X the set of all values (cid:104)x1,··· , xn(cid:105). We assume that this attribute is contagious and propagates over a directed network G(V, E) following the Linear Threshold cascade model. In this model, each edge has a weight w(u, v) ∈ (0, 1] which represents the influence that node u exerts on node v. Each node also has a threshold λv which is selected uniformly at random from (0, 1]. If the sum of influence from infected in- going neighbors goes beyond λv, v becomes activated in the next round. Assuming that the set of activated nodes, A, is not empty at time 0, we can build it iteratively at every step via the following rule: A ← A ∪(cid:8)v ∈ V \ A : w(u, v) ≥ λv (2) (cid:88) (cid:9). u∈Nin(v)∩A Here Nin(v) is the set of neighbors with edges pointing to v (i.e., imposing influence on v). The process proceeds until A stops growing. Imagine that these individuals participate in a survey in which they are each asked about their sensitive attribute xi. The goal of this survey is to calculate some aggregate statistic, e.g., the percentage of individuals having attribute 1. To avoid revealing their secrets, they could use a randomized perturbation mechanism, M : {0, 1} → {0, 1}, and use the resulting values to answer the survey. The observed answer of participants is the sequence (cid:104)z1,··· , zn(cid:105), denoted by Z, where zi = M(xi). Assume that M guarantees (ε, δ)-DP, i.e., ∀z, x (cid:54)= x(cid:48) : Pr[M(x) = z] ≤ eε Pr[M(x(cid:48)) = z] + δ. In this paper we want to examine two problems: • What is the performance of the best classifier, using only information in Z and M, to infer the true values X? (3) • If we also know the contagion network G and the conta- gion model, can we perform better? In other words, how much more information is revealed by knowing the social structure and the way this sensitive attribute propagates in the network? The difference from the answer to the earlier question is the loss of privacy. IV. LIMITATIONS OF BINARY CLASSIFICATION WITH DIFFERENTIAL PRIVACY To show that the presence of the underlying contagion network provides essential information that can pose a real threat to privacy, we study the limits of binary classification given only the reported values (Z) and the randomization parameters of M. This is a fair assumption since the real values, X, are never disclosed but Z is, and M is known to all participants. A classifier scores and subsequently ranks the participants based on their likelihood of having x = 1. We measure the success of such ranking by the probability that a randomly selected sample with x = 1 (a positive sample) is ranked higher than a randomly selected sample with x = 0 (a negative sample). This is known to be the area under the receiver operating characteristic curve (ROC curve) in an unsupervised classification problem, namely the AUC value [24]. Theorem 1. Any classification attempt by an adversary, having access to only Z and M, will have an Area Under the ROC Curve (AUC) at most 1 − (1 − δ)/(eε + 1). Recall that the ROC curve of a classifier is plotting the true positive rate (TPR) against the false positive rate (FPR) at various threshold settings. AUC can be understood as the probability that the classifier ranks R1 higher than R0, denoted by P (R1 > R0), where R1 (R0) is a randomly chosen positive (negative) sample, with x = 1 (x = 0). Suppose we take a positive (negative) sample x (x(cid:48)) and the perturbation mechanism M produces a perturbed value z (z(cid:48)). Let's denote Pr(M(x) = z) by P (x )z) for brevity. Let S1 and S0 be two distributions over (−∞, +∞) from which a score is drawn, if z = 1 or z = 0 respectively. For the perturbed value z, z(cid:48), the classifier chooses a score s, s(cid:48) from Sz, Sz(cid:48) respectively and the ranking is produced based on the scores. Denote by γ(z, z(cid:48)) the probability that s is higher than s(cid:48), i.e., Pr[s > s(cid:48)s ∼ Sz, s(cid:48) ∼ Sz(cid:48)]. Obviously, Pr[s = s(cid:48)s ∼ Sz, s(cid:48) ∼ Sz(cid:48)] = 1 − γ(z, z(cid:48)) − γ(z(cid:48), z). Then we can write P (R1 > R0) as (Section 2 of (cid:88) P (1 )z) P (0 )z(cid:48))(cid:0)P (s > s(cid:48)) + [25]): P (s = s(cid:48))(cid:1). 1 2 z,z(cid:48)∈{0,1} Continuing the above, we have: P (R1 > R0) = = = P (1 )z) P (0 )z(cid:48)) (cid:88) (cid:88) (cid:18) 1 + γ(z, z(cid:48)) − γ(z(cid:48), z) P (1 )z) P (0 )z(cid:48))(cid:0)γ(z, z(cid:48)) − γ(z(cid:48), z)(cid:1) + z,z(cid:48) 1 2 z,z(cid:48) P (1 )1) P (0 )0) − P (0 )1) P (1 )0) (cid:17)· (cid:16) 2 (cid:19) 1 2 γ(1, 0) − γ(0, 1) 1 (4) 2 Observation 1. Let γ∗ be the one maximizing AUC, i.e., arg maxγ P (R1 > R0). Then, γ∗(1, 0) = 1, if + 2 P (1 )1) P (0 )0) > P (1 )0) P (0 )1) (5) and 0 otherwise. The above is clear from the right hand side of (4). This shows that an optimal AUC is achieved by a deterministic classification rule based solely on the condition in Observa- tion 1. Corollary 1. Bayesian inference achieves optimal AUC. Proof. By Bayes' rule we have: P (0 )z) = P (z) − P (1 )z) P (x = 1) . P (x = 0) Using the above, we can substitute P (0 )1) and P (0 )0) in (5). After canceling out phrases from both sides, we have: P (1 )1) P (z = 0) P (x = 0) P (x = 1, z = 1) P (1 )0) P (z = 1) P (x = 0) P (x = 1, z = 0) > > P (x = 1)P (z = 1) P (x = 1 z = 1) > P (x = 1z = 0). P (x = 1)P (z = 0) The proof is symmetrical for the reverse inequality. We can now prove Theorem 1. Without loss of generality, we assume that the condition in Lemma 1 holds, we can then further simplify (4) as below: 1 2 P (1 )1) + P (0 )0) − 1 Pr(R1 > R0) = (cid:16) (cid:17) 1 2 P (1 )1) + P (0 )0) + 2 By the ε-DP guarantees we have: = P (1 )1) + eεP (0 )0) ≤ eε + δ P (0 )0) + eεP (1 )1) ≤ eε + δ, As a result, we have: Pr(R1 > R0) ≤ 1 − 1 − δ 1 + eε . Thus, Theorem 1 is proved. Note that the bound is realized if the inequalities in Equation (3) become equality. This theorem shows that if this bound is significantly surpassed, the guarantee of ε-DP no longer holds. V. ALGORITHM A. Objective Function The goal is to infer P (xv = 1) for all v. We denote this probability by xv throughout this paper (note the difference between x and x). To do this, we first find the initial seeds of contagion, then calculate the corresponding xv. Our solution is hence an arrangement of probabilities of each node v being initially active, denoted by αv. Rather than a fixed number of most likely seeds, we seek to find a distribution of initial seeds that are likely to produce the observed Z. This is shown to significantly boost our performance. We now define the main objective for our problem. Definition 1 (Symmetric Difference). Given two instances of reports, Z1 and Z2, we define their Symmetric Difference by: D(Z1, Z2) = Z1 \ Z2 + Z2 \ Z1. (9) Let α be an assignment of the initial activation proba- bilities. Suppose that C is the distribution of all possible cascades, C, and R is the distribution of all possible reports, Z = (z1,··· , zn). Then, the expected symmetric difference between Z and the originally observed values, Z, will be as below: D( Z, Z) Pr( Z)D( Z, Z) (cid:105) (cid:88) (cid:88) v∈V Z∼R E(cid:104) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) C∼C C∼C v∈V v = = = = = v∈V Pr(C) Pr(zv (cid:54)= zv C) Pr(zv (cid:54)= zv xv = x) Pr(xv = x C) (cid:88) (cid:88) (cid:0)P (1 )∼zv) − P (0 )∼zv)(cid:1)xv + P (0 )∼zv) Pr(zv (cid:54)= zv xv = x) Pr(xv = x) x∈{0,1} x∈{0,1} (10) (6) (7) (8) as f = E(cid:2)D( Z, Z)(cid:3) and find an α that minimizes f. Since In the above ∼zv = 1 − zv, and the last line is due to Pr(xv = 0) = 1 − xv. We define our objective function P (0 )∼zv) is a constant, we can further simplify f as f = cvxv s.t. 0 ≤ xv ≤ 1, (11) (cid:88) v∈V where cv = P (1 )∼zv) − P (0 )∼zv). B. Bounds on X Suppose that X∗ = (x∗ 1,··· , x∗ n) are the real attribute values. Theorem 2. Let P (z) be the fraction of vertices reporting 1 and c = P (1 )1) − P (0 )1), P (x) = P (z) − P (0 )1) c . Then, with high probability1: (cid:88) (cid:114) (cid:12)(cid:12)(cid:12)(cid:12) ≤ x∗ v log n 2nc2 . (12) n (cid:12)(cid:12)(cid:12)(cid:12) P (x) − 1 (cid:88) Proof. We can treat P (z) as the mean of n random variables, representing individual acts of reporting 0 or 1. The expected value of P (z) can be written as: = 1 n vP (1 )1) + (1 − x∗ x∗ (13) Since 0 ≤ zv ≤ 1 and each individual report is independent of others, we can apply Chernoff's bound. By using (13) we have: v)P (0 )1) . (cid:105) E(cid:104) P (z) (cid:34)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 n Pr (cid:88)(cid:16) (cid:35) ≤ e−2n2 , (14) x∗ vP (1 )1) + (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥  (cid:17) − P (z) (cid:12)(cid:12)(cid:12)(cid:12) ≥ (cid:48)(cid:21) (cid:88) x∗ v (1 − x∗ v)P (0 )1) (cid:20)(cid:12)(cid:12)(cid:12)(cid:12) P (x) − 1 Using the definition of P (x) in (14), we have: Pr (15) Recall that c = P (1 )1) − P (0 )1). The probability above is asymptotically zero when: n . ≤ e−2n(cid:48) 2c2 (cid:114) (cid:48) = log n 2nc2 (16) The value of P (z) can be estimated from data by {v ∈ V : zv = 1} /n. We can now update our objective func- tion to accommodate this new constraint: cvxv (cid:88) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 (cid:88) v∈V v∈V n (cid:114) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤ log n 2nc2 , (17) xv − P (x) α = arg min α s.t., 0 ≤ xv ≤ 1, Although our solution finds soft probabilities (xv ∈ [0, 1]) instead of discrete values (xv ∈ {0, 1}), our experiments show that having this constraint can increase the accuracy of inferred values, especially when the amount of added noise is not extremely high (DP's ε is not extremely low). C. Modelling Contagion With α, we want to derive a formula for xv, the probability that node v is active in the end. Computing the influence of contagion given a fixed α can be done in linear time for a DAG, using the following formula: (Lemma 3 [15]). xv = αv + (1 − αv) w(u, v)xu. (18) (cid:88) u∈Nin(v) Since the original graph G is not necessarily a DAG, we find local DAGs containing nodes who impose high influence. In 1If limn→∞ P (a) = 1, a happens with high probability. this way, we try to benefit from the structural simplicity of DAGs, while losing minimal information. The approach of using local structures to approximate the influence in a general graph has been widely used in prior works in the context of influence maximization [15], [26], [27]. Algorithm 1 Local DAG with target t. (Algorithm 3 [15]) Require: G(V, E), Node t, η: Threshold for Inf, Nmax: Max allowed nodes. 0, Inf(t, t) = 1. Ensure: Dt(Vt, Et): The DAG around node v. 1: Initialization: Vt = ∅, Et = ∅, ∀v ∈ V : Inf(v, t) = 2: while maxv∈V \Vt Inf(v, t) ≥ η and Vt ≤ Nmax do 3: 4: 5: 6: 7: end for 8: 9: end while 10: return Dt(Vt, Et) u ← arg maxv∈V \Vt Inf(v, t) Et ← Et ∪ {(u, v) v ∈ Nout(u) ∩ Vt} Vt ← Vt ∪ u for v ∈ Nin(u) do (cid:46) Neighbors' Inf is updated. Inf(v, t) += w(v, u) Inf(u, t) Algorithm 1 starts by the DAG Dt containing only t. We then calculate the influence of each node v on t, which is the activation probability of t if only v was initially active and influence would only spread through nodes already in Dt. This is denoted by Inf(v, t). At each step, the node outside of Dt with highest Inf(.) is added to Dt along with its outgoing edges that connect to nodes already in Dt. This is to ensure that the final Dt is a DAG. We then update the influence of incoming neighbors of v that are not yet in Dt. There can be two stopping criteria to the growing process: (1) When the influence of the most influential node falls below a threshold η, or (2) the number of nodes in Dt grows bigger than a maximum allowed number, Nmax. If implemented using an efficient priority queue for Inf(v, t) values, Algorithm 1 runs in O(Et log Et) time. Among nodes in Dt, the local activation probability, xt(v), is as below: xt(v) = αv + (1 − αv) w(u, v)xt(u). (19) (cid:88) u∈Nin(v)∩Vt Note that xt(t) is the probability that t is activated only through nodes that are most influential on it and, as a result, can be considered to be a reasonable approximations of xt. Our experiments show that this approach in selecting DAGs is essential to achieving high-quality results, and superior to alternative approaches. Now we can move on to optimizing the objective function f in Equation (11). More specifically, we need to find ∂f for all ∂αv v. Chen et al. have established that in a DAG, there is a linear relationship between xt(t) and xt(v) for all v ∈ Vt [15]. The linear factor, which is equal to ∂xt(t) ∂xt(v) is computed as below: ∂xt(t) ∂xt(v) = u∈Nout(v)∩Vt w(v, u)(1 − αu) ∂xt(t) ∂xt(u) . (20) (cid:88) We can compute the above for all nodes v ∈ Dt by initially setting ∂xt(t) ∂xt(t) as 1 and then going through nodes in reverse topological order. Finding this ordering and computing the partial gradients each takes O(Et) time. Next, we find gradients of f based on each αv. Let Iv = {t ∈ V : v ∈ Vt}. Then, by taking the gradient of (11) and applying the chain rule we can write: (cid:88) (cid:88) t∈Iv t∈Iv ct ∂xt(t) ∂αv ct ∂xt(t) ∂xt(v) ∂f ∂αv = = = (cid:88) 1 − (cid:88) t∈Iv ct ∂xt(t) ∂xt(v) ∂xt(v) ∂αv xt(u)w(u, v) u∈Nin(v)∩Vt  . (21) The last line is produced by taking a derivative of (19) by αv. Since αv does not have any effect on the activation probability of predecessors of v in any DAG, we can treat the summation on the right side of (19) as a constant with respect to αv. Calculating this summation is possible by dynamic programming when nodes are visited in their topological ordering. Computing values in (21) and (20) for all DAGs has a collective runtime of O((cid:80)Et). VI. EXPERIMENTS In this section, we test our method on both synthetic and real-world networks. We demonstrate that our proposed con- straints in Section V-B and greedily retrieved DAGs described in Section V-C play a key role in maintaining a high quality for our results. We also investigate attributes that can indicate how vulnerable nodes are to such attacks, namely in-degree, out-degree and PageRank. A. Methods We tested the following methods in our experiments: 1) CO-DAG: Our main method, which optimizes our ob- jective subject to the constraints in (17) using DAGs retrieved by Algorithm 1. 2) O-DAG: Similar to CO-DAG, but without enforcing the constraint on(cid:80) xv/n. 3) CO-RND: To show that our selected DAGs are essen- tial to the high quality of our results, we repeat the experiments with a method similar to CO-DAG but with DAGs that grow by adding random neighbors of nodes already in the DAG, until the number of nodes reaches a threshold Nmax. 4) O-RND: Similar to CO-RND, but without enforcing the constraint on(cid:80) xv/n. 5) Lappas+ [17]: The algorithm to find k-effectors, when k is known beforehand. Note that by knowing k, this method has access to more information compared to others. 6) Bayesian: Simple Bayesian inference as described in Corollary 1. B. Datasets We now introduce the datasets used in our experiments. Synthetic Networks: We use 4 types of randomly generated networks: 1) Core-Periphery [28]: A random network where nodes in a periphery are loosely connected to a dense center. These networks are generated as Kronecker graphs [29] with matrix parameter [0.9, 0.5; 0.5, 0.3]. 2) Erdos-Renyi: A random network in which all possible edges have equal probability p to appear. We set p such that the expected out-degree of every node will be 5. 3) Power-law: A network with a power-law degree distri- bution where f (x) ∝ x−γ. We set γ = 1 to produce a degree sequence and ran configuration model [30] to obtain a network. 4) Hierarchical [31]: Random hierarchies generated as to Kronecker graphs with matrix parameter [0.9, 0.1; 0.1, 0.9]. set We generate networks with 500 nodes, remove from it self-loops and nodes having both in and out-degrees less than 3 (except for Hierarchical networks). We assign random influence weights in the according to Section V.A of [15]: Random numbers between (0, 1] are assigned to edges, then incoming links to each node is normalized to sum to 1. TABLE I: Real-world networks. Network GrQc HepTh Amazon Videos Amazon DVDs #Nodes #Edges 2,422 4,909 1,598 9,488 21,842 38,704 8,402 55,146 Real-world Networks: We also test our method on real-world networks that have been extensively studied in the context of influence maximization before (Table I): two co-authorship networks GrQc and HepTh [32] and two co-purchase networks in Amazon, one containing videos and the other DVDs [33], [34]. C. Experiment Setting We simulate 10 cascades for each generated network. For each simulated cascade, we choose a specific number of initially active nodes (seed nodes) at random. These numbers are selected in a way that makes it easier to produce cascades of reasonable size in the networks (with at least 1/4 and at most 3/4 of all nodes). For Hierarchical networks, 50 and for the rest of synthetic networks 5 seed nodes were chosen. For real-world networks, we selected 5% of nodes at random since the networks' size greatly varied. We then simulate a cascade using the triggering set approach in Theorem 4.6 of [14]: Each edge (u, v) is kept with probability w(u, v) and tossed otherwise. Then, any node reachable from any of the seed nodes is deemed active. To produce differentially private perturbations for the final xv values, we choose the Randomized Response (RR) mecha- TABLE II: AUC values of 7 methods for 3 values of β across all networks. Note that (1) our method outperforms others in almost all cases and (2) Lappas+ fails to pass the upper bound in almost all cases, despite having access to more information. c i t e h t n y S d l r o w - l a e R Network Core-Periphery Erdos Renyi Power-law Graph Hierarchical GrQc HepTh Amazon Videos Amazon DVDs β 0.1 0.3 0.5 0.7 0.9 0.1 0.3 0.5 0.7 0.9 0.1 0.3 0.5 0.7 0.9 0.1 0.3 0.5 0.7 0.9 0.1 0.3 0.5 0.7 0.9 0.1 0.3 0.5 0.7 0.9 0.1 0.3 0.5 0.7 0.9 0.1 0.3 0.5 0.7 0.9 ε Upper Bound Bayesian CO-DAG O-DAG CO-RND O-RND Lappas+ 0.201 0.619 1.099 1.735 2.944 0.201 0.619 1.099 1.735 2.944 0.201 0.619 1.099 1.735 2.944 0.201 0.619 1.099 1.735 2.944 0.201 0.619 1.099 1.735 2.944 0.201 0.619 1.099 1.735 2.944 0.201 0.619 1.099 1.735 2.944 0.201 0.619 1.099 1.735 2.944 0.550 0.650 0.750 0.850 0.950 0.550 0.650 0.750 0.850 0.950 0.550 0.650 0.750 0.850 0.950 0.550 0.650 0.750 0.850 0.950 0.550 0.650 0.750 0.850 0.950 0.550 0.650 0.750 0.850 0.950 0.550 0.650 0.750 0.850 0.950 0.550 0.650 0.750 0.850 0.950 0.550 0.648 0.751 0.847 0.951 0.545 0.659 0.752 0.851 0.949 0.545 0.646 0.745 0.850 0.949 0.540 0.652 0.753 0.852 0.949 0.554 0.644 0.744 0.849 0.951 0.553 0.658 0.751 0.849 0.950 0.554 0.649 0.747 0.849 0.950 0.551 0.652 0.750 0.851 0.952 0.575 0.716 0.833 0.904 0.967 0.571 0.704 0.806 0.897 0.967 0.590 0.715 0.813 0.890 0.959 0.602 0.730 0.821 0.893 0.964 0.577 0.720 0.833 0.908 0.973 0.584 0.733 0.831 0.917 0.972 0.598 0.748 0.854 0.919 0.975 0.576 0.735 0.830 0.906 0.963 0.597 0.708 0.803 0.870 0.955 0.555 0.699 0.791 0.874 0.948 0.609 0.713 0.805 0.883 0.948 0.584 0.711 0.803 0.883 0.961 0.576 0.718 0.834 0.892 0.960 0.579 0.716 0.825 0.893 0.958 0.604 0.748 0.836 0.899 0.962 0.584 0.739 0.829 0.897 0.957 0.568 0.689 0.802 0.887 0.965 0.553 0.678 0.781 0.876 0.960 0.580 0.689 0.801 0.884 0.939 0.577 0.699 0.808 0.887 0.960 0.564 0.683 0.798 0.892 0.971 0.568 0.698 0.793 0.884 0.962 0.584 0.706 0.828 0.906 0.974 0.567 0.699 0.806 0.894 0.957 0.587 0.699 0.793 0.868 0.957 0.564 0.685 0.781 0.870 0.955 0.587 0.700 0.795 0.876 0.953 0.591 0.724 0.796 0.881 0.963 0.561 0.685 0.797 0.878 0.965 0.566 0.703 0.793 0.876 0.962 0.585 0.714 0.812 0.894 0.967 0.570 0.707 0.802 0.886 0.941 0.614 0.657 0.695 0.706 0.711 0.527 0.571 0.587 0.611 0.620 0.586 0.672 0.701 0.743 0.753 0.534 0.573 0.612 0.669 0.756 N/A* N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A * Due to the large size of real-world networks, performing experiments with Lappas+ was not viable. nism [35]. Given a value x ∈ {0, 1} an RR mechanism works as below: x, with probability β; 1, with probability (1 − β)/2; 0. with probability (1 − β)/2. RR(x) = (22) where β is a parameter that determines the rate by which respondents report the true value x. A RR mechanism with pa- rameter β is a DP mechanism with ε = log ((1 + β)/(1 − β)). To do the inference, we need to extract DAGs for each node. For random DAGs (used in O-RND and CO-RND), we use the average number of nodes in their corresponding greedy DAGs (used in O-DAG and CO-DAG) as node capacity. To optimize (17), we use ALGLIB2 library. 2ALGLIB (www.alglib.net), Sergey Bochkanov D. Going Above the Bound In Section III we proved that, without extra information about the contagion, it is impossible to achieve an AUC higher than 1 − (1 − δ)/(1 + eε) on binary attributes perturbed by a (ε, δ)-DP mechanism. Here, we test this guarantee after the contagion graph is known to an adversary. For 5 values of RR's β we perform inference using methods described in Section VI-A and report the resulting AUC scores, the corresponding ε and theoretical upper bounds in Table II. the AUC scores for Bayesianis close to the theoretical upper bound. Further- more, note that in almost all cases CO-DAG achieves the highest AUC score and inall cases the value is beyond the AUC upper bound with DP guarantees. For the medium range of β this difference becomes significant. We also observe that in cases where β is extremely low and the perturbed data As expected, we observe that Fig. 1: Impact of maximum allowed nodes (Nmax) in each DAG on increase in AUC scores relative to Nmax = 3. Fig. 2: Impact of threshold on Inf, η on increase in AUC scores relative to η = 0.01. Fig. 3: The correlation between E[Acc] and from top to bottom (1) out-degree, (2) in-degree, and (3) PageRank. on(cid:80) xv/n when the added noise becomes too big. It is also cases, dropping the greedy DAGs or the constraint on(cid:80) xv/n worth noting that our method's capability to go beyond the bound does not come trivially, since Lappas+ fails to do so in all but one cases, even as it receives more information as input (number of seeds, k). Finally, notice that in virtually all is exremely noisy, O-DAG tends to outperform CO-DAG. We believe that this is due to the deteriorating quality of the bound hurts performance. E. Impacts of DAG's size on Inference Quality We now test the impact of changing η (the threshold on nodes' influence) or Nmax (maximum allowed nodes) of DAGs on the quality of inferred values. We iterate over an increasing Nmax with a fixed RR's β across 4 synthetic networks. Since we are interested in the change in resulting AUC scores and not their absolute values, we move each resulting curve so that their starting points would land on 0.00. Similarly for η, we start from η = 0.01 and exponentially grow the threshold to 0.64 while β is fixed. To make it easier to observe the change in AUC scores, we 036912151821242730Nmax0.000.020.040.060.08AUC IncreaseCore-Periphery036912151821242730Nmax0.000.010.020.030.040.050.06Erdos Renyi036912151821242730Nmax0.020.000.020.040.060.08Power-law036912151821242730Nmax0.000.020.040.06Hierarchicalbeta = 0.1beta = 0.3beta = 0.5beta = 0.7beta = 0.91021010.000.020.040.06AUC IncreaseCore-Periphery1021010.000.010.020.030.040.05Erdos Renyi1021010.040.020.000.020.040.06Power-law1021010.000.010.020.030.040.050.06Hierarchicalbeta = 0.1beta = 0.3beta = 0.5beta = 0.7beta = 0.9 Fig. 4: The correlation between out-degree (x-axis) and E[Acc]. Each column represents experiments with the same β. collocate the ending point of all curves on 0.00. The results for Nmax and η are depicted in Figures 1 and 2 respectively. Intuitively, one might expect that larger DAGs will always lead to more accurate results, albeit with some additional computational cost. This is almost true in both experiments. Interestingly, in some of the networks when the perturbation is minimal (β = 0.9, ε = 2.94), the quality actually drops as DAGs grow larger. This means that having a more selective DAG, with more restrictive criteria, can sometimes yield better results. F. Who is More Vulnerable? The AUC value describes the effectiveness of our inference algorithm but does not provide details on individual vertex level. Here we look into attributes that can indicate a node's vulnerability to such an inference attack. Without access to ground truth values of xv, finding the best cutoff threshold of xv for classification is not possible. As an alternative, we calculate the expected accuracy of a single node's inferred value if the threshold θ is selected at random from [0, 1]: E[Acc] = Eθ∼[0,1] [I(xv = 1)xv + I(xv = 0)(1 − xv)] , (23) where I(·) is an indicator function. Note that we are not interested in the absolute values of E[Acc], but the relative difference between different nodes, in order to compare nodes' vulnerability to our attack. We tested 3 node attributes related to the centrality and importance of a node in a complex network: (1) (Weighted) Out-degree, (2) (Weighted) In-degree, and (3) PageRank [36]. We limit our visualizations to Core-Periphery networks due to limited space. Results are similar for the other 3 networks. We test 9 values of β = {0.1, 0.2,··· , 0.9} and infer the real values using CO-DAG. In Figure 3 the resulting E[Acc] for each node v is plotted against the 3 metrics mentioned above along with correlation analysis printed on each plot. Each column contains plots with a similar β value, printed on the top. Among the 3 metrics, two of them (in-degree and PageRank) show a negative correlation, while a strong correlation is observed between E[Acc] and out-degree which grows even stronger as β is increased and the added noise becomes minimal. A reasonable explanation is that when v has a high impact on many nodes in the network, it essentially sends signals of its true value to those nodes during the spread of the contagion. These signals, each insignificant on its own, can collectively reveal the true value of xv to a great extent. Of course, these signals only grow stronger when the amount of added noise to each report is reduced as β grows bigger. In contrast, there might be many signals on the influence received by a node with a high in-degree, but without that influence spreading around, we only have the report by that node as a single indicator of its true value which is masked well by conventional privacy protection techniques. We repeat this experiment on other synthetic networks to see if we observe similar results. In Figure 4, E[Acc] is plotted against out-degree of all nodes for β between 0.1 and 0.9. A similar trend is visible across all 4 types of network, with different intensity. In the 3 networks where the distribution of influence is skewed, namely Core-Periphery, Power-law and Hierarchical, the correlation is strong. Moreover, as β increases and the added noise become smaller, the correlation grows stronger. In Erdos-Renyi networks, where degrees are distributed more evenly, the difference in E[Acc] among nodes is minor and as a result, the correlation is weaker. Notice that in Hierarchical network, this unequal distribution of influence reaches its extreme point, where the majority of the nodes are leaves, with no impact on others, while a handful of nodes at Core-PeripheryErdos-RenyiPower-lawHierarchical the top influence many others. This radical difference leads to a constant unbalance between E[Acc] of the two groups across all values of β. VII. CONCLUSION AND FUTURE WORK In this work, we provide further evidence that a privacy- protecting measure that is oblivious to socially contagious properties of attributes is unlikely to provide guarantees in practice as advertised. There are two obvious directions for future research: 1) design a privacy protection mechanism that is aware of the contagious property of some attributes and employs models of contagions in its design; Our method can be used to test if that method succeeds. 2) extend the results to other contagion models. Notice that the extension to any progressive contagion model (where active nodes stay active) with a differentiable formula (e.g, Independent Cascade model) is easily possible. However, ideas specific to those models are required for efficient implementation and model design. ACKNOWLEDGEMENT Aria Rezaei and Jie Gao acknowledge support through NSF DMS-1737812, NSF CNS-1618391 and NSF CCF-1535900. REFERENCES [1] C. Dwork and A. Roth, "The algorithmic foundations of differential privacy," Found. Trends Theor. Comput. Sci., vol. 9, no. 3 -- 4, pp. 211 -- 407, 2014. [2] E. Cohen-Cole and J. M. Fletcher, "Is obesity contagious? social networks vs. environmental factors in the obesity epidemic," J. Health Econ., vol. 27, no. 5, pp. 1382 -- 1387, Sep. 2008. [3] J. Hamari and J. Koivisto, ""working out for likes": An empirical study on social influence in exercise gamification," Comput. Human Behav., vol. 50, pp. 333 -- 347, Sep. 2015. [4] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. I. Kramer, C. Marlow, J. E. Settle, and J. H. Fowler, "A 61-million-person experiment in social influence and political mobilization," Nature, vol. 489, no. 7415, pp. 295 -- 298, Sep. 2012. [5] J. Meer, "Brother, can you spare a dime? peer pressure in charitable solicitation," J. Public Econ., vol. 95, no. 7, pp. 926 -- 941, Aug. 2011. [6] D. Wang, D. Pedreschi, C. Song, F. Giannotti, and A.-L. Barabasi, "Human mobility, social ties, and link prediction," in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, Aug. 2011, pp. 1100 -- 1108. [7] J. Gao, G. Ghasemiesfeh, G. Schoenebeck, and F.-Y. Yu, "General threshold model for social cascades: Analysis and simulations," in Pro- ceedings of the 2016 ACM Conference on Economics and Computation, Jul. 2016, pp. 617 -- 634. [8] M. S. Granovetter, "The strength of weak ties," Am. J. Sociol., vol. 78, no. 6, pp. 1360 -- 1380, 1973. [9] D. Centola and M. Macy, "Complex contagions and the weakness of long ties," Am. J. Sociol., vol. 113, no. 3, pp. 702 -- 734, Nov. 2007. [10] G. Ghasemiesfeh, R. Ebrahimi, and J. Gao, "Complex contagion and the weakness of long ties in social networks: Revisited," in Proceedings of the Fourteenth ACM Conference on Electronic Commerce, 2013, pp. 507 -- 524. [11] D. Kifer and A. Machanavajjhala, "Pufferfish: A framework for mathe- matical privacy definitions," ACM Trans. Database Syst., vol. 39, no. 1, pp. 3:1 -- 3:36, Jan. 2014. [12] A. Ghosh and R. Kleinberg, "Inferential privacy guarantees for differ- entially private mechanisms," Mar. 2016. [13] V. Rastogi, M. Hay, G. Miklau, and D. Suciu, "Relationship privacy: Output perturbation for queries with joins," in Proceedings of the Twenty-eighth ACM SIGMOD-SIGACT-SIGART Symposium on Princi- ples of Database Systems, 2009, pp. 107 -- 116. [14] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the spread of influence through a social network," in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, 2003, pp. 137 -- 146. [15] W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization in social networks under the linear threshold model," in 2010 IEEE International Conference on Data Mining, Dec. 2010, pp. 88 -- 97. [16] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier, "Maximizing social influence in nearly optimal time," in Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, Dec. 2013, pp. 946 -- 957. [17] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding effectors in social networks," in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 2010, pp. 1059 -- 1068. [18] W. Luo, W. P. Tay, and M. Leng, "Identifying infection sources and regions in large networks," IEEE Trans. Signal Process., vol. 61, no. 11, pp. 2850 -- 2865, Jun. 2013. [19] H. T. Nguyen, P. Ghosh, M. L. Mayo, and T. N. Dinh, "Multiple infection sources identification with provable guarantees," in Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, Oct. 2016, pp. 1663 -- 1672. [20] B. A. Prakash, J. Vreeken, and C. Faloutsos, "Spotting culprits in epi- demics: How many and which ones?" in 2012 IEEE 12th International Conference on Data Mining, Dec. 2012, pp. 11 -- 20. [21] C. Task and C. Clifton, "A guide to differential privacy theory in social network analysis," in 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Aug. 2012, pp. 411 -- 417. [22] D. Kifer and A. Machanavajjhala, "No free lunch in data privacy," in Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, 2011, pp. 193 -- 204. [23] S. Song, Y. Wang, and K. Chaudhuri, "Pufferfish privacy mechanisms for correlated data," in Proceedings of the 2017 ACM International Conference on Management of Data, 2017, pp. 1291 -- 1306. [24] T. Fawcett, "An introduction to roc analysis," Pattern recognition letters, vol. 27, no. 8, pp. 861 -- 874, 2006. [25] J. A. Hanley and B. J. McNeil, "The meaning and use of the area under a receiver operating characteristic (roc) curve." Radiology, vol. 143, no. 1, pp. 29 -- 36, 1982. [26] C. Wang, W. Chen, and Y. Wang, "Scalable influence maximization for independent cascade model in large-scale social networks," Data Mining and Knowledge Discovery, vol. 25, no. 3, pp. 545 -- 576, 2012. [27] A. Goyal, W. Lu, and L. V. Lakshmanan, "Simpath: An efficient algorithm for influence maximization under the linear threshold model," in 2011 IEEE 11th international conference on data mining, 2011, pp. 211 -- 220. [28] M. Gomez-Rodriguez, J. Leskovec, and A. Krause, "Inferring networks of diffusion and influence," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 5, no. 4, p. 21, 2012. [29] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahra- mani, "Kronecker graphs: An approach to modeling networks," Journal of Machine Learning Research, vol. 11, no. Feb, pp. 985 -- 1042, 2010. [30] M. E. Newman, "The structure and function of complex networks," SIAM review, vol. 45, no. 2, pp. 167 -- 256, 2003. [31] A. Clauset, C. Moore, and M. E. Newman, "Hierarchical structure and the prediction of missing links in networks," Nature, vol. 453, no. 7191, p. 98, 2008. [32] J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graph evolution: Den- sification and shrinking diameters," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, no. 1, p. 2, 2007. [33] J. Leskovec, L. A. Adamic, and B. A. Huberman, "The dynamics of viral marketing," ACM Transactions on the Web (TWEB), vol. 1, no. 1, p. 5, 2007. [34] A. Rezaei, B. Perozzi, and L. Akoglu, "Ties that bind: Characterizing classes by attributes and social ties," in Proceedings of the 26th Interna- tional Conference on World Wide Web Companion, 2017, pp. 973 -- 981. [35] S. L. Warner, "Randomized response: A survey technique for eliminating evasive answer bias," Journal of the American Statistical Association, vol. 60, no. 309, pp. 63 -- 69, 1965. [36] L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation ranking: Bringing order to the web." Stanford InfoLab, Tech. Rep., 1999.
1610.08597
1
1610
2016-10-27T03:21:49
Word Embeddings to Enhance Twitter Gang Member Profile Identification
[ "cs.SI", "cs.CL", "cs.CY", "cs.IR" ]
Gang affiliates have joined the masses who use social media to share thoughts and actions publicly. Interestingly, they use this public medium to express recent illegal actions, to intimidate others, and to share outrageous images and statements. Agencies able to unearth these profiles may thus be able to anticipate, stop, or hasten the investigation of gang-related crimes. This paper investigates the use of word embeddings to help identify gang members on Twitter. Building on our previous work, we generate word embeddings that translate what Twitter users post in their profile descriptions, tweets, profile images, and linked YouTube content to a real vector format amenable for machine learning classification. Our experimental results show that pre-trained word embeddings can boost the accuracy of supervised learning algorithms trained over gang members social media posts.
cs.SI
cs
Word Embeddings to Enhance Twitter Gang Member Profile Identification Sanjaya Wijeratne [email protected] Lakshika Balasuriya [email protected] Derek Doran Amit Sheth [email protected] [email protected] Kno.e.sis Center, Wright State University, Dayton, Ohio, USA. 6 1 0 2 t c O 7 2 ] I S . s c [ 1 v 7 9 5 8 0 . 0 1 6 1 : v i X r a Abstract Gang affiliates have joined the masses who use social media to share thoughts and actions publicly. Interestingly, they use this public medium to express re- cent illegal actions, to intimidate oth- ers, and to share outrageous images and statements. Agencies able to unearth these profiles may thus be able to antici- pate, stop, or hasten the investigation of gang-related crimes. This paper inves- tigates the use of word embeddings to help identify gang members on Twitter. Building on our previous work, we gen- erate word embeddings that translate what Twitter users post in their profile descriptions, tweets, profile images, and linked YouTube content to a real vector format amenable for machine learning classification. Our experimental results show that pre-trained word embeddings can boost the accuracy of supervised learning algorithms trained over gang members' social media posts. 1 Introduction Street gangs are defined as "a coalition of peers, united by mutual interests, with identifiable leadership and internal organization, who act collectively to conduct illegal activity and to control a territory, facility, or enterprise" [Mil92]. They promote criminal activities such as drug trafficking, assault, robbery, and threat- ening or intimidating a neighborhood [20113]. To- day, over 1.4 million people, belonging to more than 33,000 gangs, are active in the United States [20111], of which 88% identify themselves as being members of a street gang1. They are also active users of so- cial media [20111]; according to 2007 National As- sessment Center's survey of gang members, 25% of individuals in gangs use the Internet for at least 4 hours a week [20007]. More recent studies report ap- proximately 45% of gang members participate in on- line offending activities such as threatening, harass- ing individuals, posting violent videos or attacking someone on the street for something they said on- line [DP11, PDJ15]. They confirm that gang members use social media to express themselves in ways similar to their offline behavior on the streets [PEB13]. Despite its public nature, gang members post on so- cial media without fear of consequences because there are only few tools law enforcement can presently use to surveil social media [WDSD15]. For example, the New York City police department employs over 300 de- tectives to combat teen violence triggered by insults, dares, and threats exchanged on social media, and the Toronto police department teaches officers about the use of social media in investigations [pol13]. From of- fline clues, the officers monitor just a selected set of social media accounts which are manually discovered and related to a specific investigation. Thus, devel- oping tools to identify gang member profiles on social media is an important step in the direction of using machine intelligence to fight crime. To help agencies monitor gang activity on so- cial media, our past work investigated how features from Twitter profiles, including profile text, profile images, tweet text, emjoi use, and their links to YouTube, may be used to reliably find gang member profiles [BWDS16]. The diverse set of features, chosen to combat the fact that gang members often use local terms and hashtags in their posts, offered encourag- ing results. In this paper, we report our experience in 1The terms 'gang' and 'street gang' will henceforth be used interchangeably. 1 integrating deep learning into our gang member pro- file classifier. Specifically, we investigate the effect of translating the features into a vector space using word embeddings [MSC+13]. This idea is motivated by the recent success of word embeddings-based methods to learn syntactic and semantic structures automatically when provided with large datasets. A dataset of over 3,000 gang and non-gang member profiles that we pre- viously curated is used to train the word embeddings. We show that pre-trained word embeddings improve the machine learning models and help us obtain an F 1- score of 0.7835 on gang member profiles (a 6.39% im- provement in F 1-score compared to the baseline mod- els which were not trained using word embeddings). This paper is organized as follows. Section 2 dis- cusses the related literature and frames how this work differs from other related works. Section 3 discusses our approach based on word embeddings to identify gang member profiles. Section 4 reports on the evalu- ation of the proposed approach and the evaluation re- sults in detail. Section 5 concludes the work reported while discussing the future work planned. 2 Related Work Researchers have begun investigating the gang mem- bers' use of social media and have noticed the impor- tance of identifying gang members' Twitter profiles a priori [PEB13, WDSD15]. Before analyzing any tex- tual context retrieved from their social media posts, knowing that a post has originated from a gang mem- ber could help systems to better understand the mes- sage conveyed by that post. Wijeratne et al. developed a framework to analyze what gang members post on social media [WDSD15]. Their framework could only extract social media posts from self identified gang members by searching for pre-identified gang names in a user's Twitter profile description. Patton et al. developed a method to collect tweets from a group of gang members operating in Detroit, MI [Pat15]. How- ever, their approach required the gang members' Twit- ter profile names to be known beforehand, and data collection was localized to a single city in the coun- try. These studies investigated a small set of manually curated gang member profiles, often from a small geo- graphic area that may bias their findings. In our previous work [BWDS16], we curated what may be the largest set of gang member profiles to study how gang member Twitter profiles can be automati- cally identified based on the content they share online. A data collection process involving location neutral keywords used by gang members, with an expanded search of their retweet, friends and follower networks, led to identifying 400 authentic gang member profiles on Twitter. Our study discovered that the text in their tweets and profile descriptions, their emoji use, their profile images, and music interests embodied by links to YouTube music videos, can help a classifier distinguish between gang and non-gang member pro- files. While a very promising F 1 measure with low false positive rate was achieved, we hypothesize that the diverse kinds and the multitude of features em- ployed (e.g. unigrams of tweet text) could be amenable to an improved representation for classification. We thus explore the possibility of mapping these features into a considerably smaller feature space through the use of word embeddings. Previous research has shown word embeddings- based methods can significantly improve short text classification [WXX+16, LZZ15]. For example, Lille- berget et al. showed that word embeddings weighted by tf -idf outperforms other variants of word embed- ding models discussed in [LZZ15], after training word embedding models on over 18,000 newsgroup posts. Wang et al. showed that short text categorization can be improved by word embeddings with the help of a neural network model that feeds semantic cliques learned over word embeddings in to a convolutions neural network [WXX+16]. We believe our corpus of gang and non-gang member tweets, with nearly 64.6 million word tokens, could act as a rich resource to train word embeddings for distinguishing gang and non-gang member Twitter users. Our investigation differs from other word embeddings-based text classi- fication systems such as [WXX+16, LZZ15] due to the fact that we use multiple feature types including emo- jis in tweets and image tags extracted from Twitter profile and cover images in our classification task. 3 Word Embeddings A word embedding model is a neural network that learns rich representations of words in a text corpus. It takes data from a large, n-dimensional 'word space' (where n is the number of unique words in a corpus) and learns a transformation of the data into a lower k-dimensional space of real numbers. This transfor- mation is developed in a way that similarities between the k-dimensional vector representation of two words reflects semantic relationships among the words them- selves. These semantics are not captured by typical bag-of-words or n-gram models for classification tasks on text data [MYZ13, MSC+13]. Word embeddings have led to the state-of-the-art results in many sequential learning tasks [LBH15]. In fact, word embedding learning is an important step for many statistical language modeling tasks in text pro- cessing systems. Bengio et al. were the first ones to introduce the idea of learning a distributed represen- tation for words over a text corpus [BDVJ03]. They 2 learned representations for each word in the text cor- pus using a neural network model that modeled the joint probability function of word sequences in terms of the feature vectors of the words in the sequence. Mikolov et al. showed that simple algebraic operations can be performed on word embeddings learned over a text corpus, which leads to findings such as the word embedding vector of the word "King" − the word em- bedding vectors of "Man" + "Woman" would results in a word embedding vector that is closest to the word embedding vector of the word "Queen" [MYZ13]. Re- cent successes in using word embeddings to improve text classification for short text [WXX+16, LZZ15], encouraged us to explore how they can be used to improve gang and non-gang member Twitter profile classification. Word embeddings can be performed under differ- ent neural network architectures; two popular ones are the Continuous Bag-of-Words (CBOW) and Continu- ous Skip-gram (Skip-gram) models [MCCD13]. The CBOW model learns a neural network such that given a set of context words surrounding a target word, it predict a target word. The Skip-gram model differs by predicting context words given a target word and by capturing the ordering of word occurrences. Recent improvements to Skip-gram model make it better able to handle less frequent words, especially when negative sampling is used [MSC+13]. 3.1 Features considered Gang member tweets and profile descriptions tend to have few textual indicators that demonstrate their gang affiliations or their tweets/profile text may carry acronyms which can only be deciphered by others in- volved in gang culture [BWDS16]. These gang-related terms are often local to gangs operating in neigh- borhoods and change rapidly when they form new gangs. Consequently, building a database of keywords, phrases, and other identifiers to find gang members na- tionally is not feasible. Instead, we use heterogeneous sets of features derived not only from profile and tweet text but also from the emoji usage, profile images, and links to YouTube videos reflecting their music prefer- ences and affinity. In this section, we briefly discuss the feature types and their broad differences in gang and non-gang member profiles. An in-depth explanation of these feature selection can be found in [BWDS16]. 1. Tweet text: In our previous work, we ob- served that gang members use curse words nearly five times more than the average curse words use on Twitter [BWDS16]. Further, we noticed that gang members mainly use Twitter to discuss drugs and money using terms such as smoke, high, hit, money, got, and need while non-gang mem- bers mainly discuss their feelings using terms such as new, like, love, know, want, and look. 2. Twitter profile description: We found gang member profile descriptions to be rife with curse words (nigga, fuck, and shit) while non-gang members use words related to their feelings or in- terests (love, life, music, and book). We noticed that gang members use their profile descriptions as a space to grieve for their fallen or incarcer- ated gang members as about 12% of gang member Twitter profiles used terms such as rip and free. 3. Emoji features: We found that the fuel pump emoji was the most frequently used emoji by gang members, which is often used in the context of selling or consuming marijuana. The pistol emoji was the second most frequently used emoji, which is often used with the police cop emoji in an 'emoji chain' to express their hatred towards law enforce- ment officers. The money bag emoji, money with wings emoji, unlock emoji, and a variety of the angry face emoji such as the devil face emoji and imp emoji were also common in gang members' but not in non-gang members' tweets. 4. Twitter profile and cover images: We no- ticed that gang members often pose holding or pointing weapons, seen in a group fashion which displays a gangster culture, show off graffiti, hand signs, tattoos, and bulk cash in their profile and cover images. We used Clarifai web service2 to tag the profile and cover images of the Twitter users in our dataset and used the image tags returned by Clarifai API to train word embeddings. Tags such as trigger, bullet, and worship were unique for gang member profiles while non-gang member images had unique tags such as beach, seashore, dawn, wildlife, sand, and pet. 5. YouTube videos: We found that 51.25% of the gang members in our dataset have a tweet that links to a YouTube video. Further, we found that 76.58% of the shared links are related to hip-hop music, gangster rap, and the culture that sur- rounds this music genre [BWDS16]. Moreover, we found that eight YouTube links are shared on average by a gang member. The top 5 terms used in YouTube videos shared by gang members were shit, like, nigga, fuck, and lil while like, love, peopl, song, and get were the top 5 terms in non- gang members' video data. 2http://www.clarifai.com/ 3 3.2 Classification approach Figure 1 gives an overview of the steps to learn word embeddings and to integrate them into a classifier. We first convert any non-textual features such as emoji and profile images into textual features. We use Emoji for Python3 and Clarifai services, respectively, to con- vert emoji and images into text. Prior to training the word embeddings, we remove all the seed words used to find gang member profiles and stopwords, and per- form stemming across all tweets and profile descrip- tions. We then feed all the training data (word wt in Figure 1) we collected from our Twitter dataset to Word2Vec tool and train it using a Skip-gram model with negative sampling. When training the Skip-gram model, we set the negative sampling rate to 10 sample words, which seems to work well with medium-sized datasets [MSC+13]. We set the context word window to be 5, so that it will consider 5 words to left and right of the target word (words wt−5 to wt+5 in Fig- ure 1). This setting is suitable for sentences where average sentence length is less than 11 words, as is the case in tweets [HTK13]. We ignore the words that occur less than 5 times in our training corpus. We investigated how well the local language has been captured by the word embedding models we trained. We used the 'most similar' functionality of- fered by Word2Vec tool to understand what the model has learned about few gang-related slang terms which are specific to Chicago area. For example, we ana- lyzed the ten most similar words learned by the word embedding model for the term BDK (Black Desciples Killers). We noticed that out of the 10 most similar words, five were names of local Chicago gangs, which are rivals of the Black Disciples Gang, two were dif- ferent syntactic variations of BDK (bdkk, bdkkk) and the other three were different syntactic variations of GDK (gdk, gdkk, gdkkk). GDK is a local gang slang for 'Gangster Disciples Killer' which is used by rivals of Gangster Disciples gang to show their hatred towards them. We found similar results for the term GDK. Out of the ten most similar words, six were showing hatred towards six different Gangster Disciples gangs that op- erate in Chicago area. We believe that those who used the term GDK to show their hatred towards Gangster Disciples gangs might be also having rivalry with the six gangs we found. We obtain word vectors of size 300 from the learned word embeddings. To represent a Twitter profile, we retrieve word vectors for all the words that appear in a particular profile including the words appear in tweets, profile description, words extracted from emoji, cover and profile images converted to textual formats, and words extracted from YouTube video comments and 3https://pypi.python.org/pypi/emoji/ Figure 1: Classifier Training with Word Embeddings. descriptions for all YouTube videos shared in the user's timeline. Those word vectors are combined to compute the final feature vector for the Twitter profile. To combine the word vectors, we consider five different methods. Letting the size of a word vector be k = 300, for a Twitter profile p with n unique words and the vector of the ith word in p denoted by wip, we compute the feature vector for the Twitter profile Vp by: 1. Sum of word embeddings Vpsum . This is the sum the word embedding vectors obtained for all words in a Twitter profile: n(cid:88) i=0 Vpsum = wip 2. Mean of word embeddings Vpavg . This is the mean of the word embedding vectors of all words found in a Twitter profile: Vpavg = 1/n wip n(cid:88) i=0 n(cid:88) n(cid:88) 3. Sum of word embeddings weighted by term frequency Vpsum(count). This is each word embed- ding vector multiplied by the word's frequency for the Twitter profile: Vpsum(count) = wip.cip i=0 where cip is the term frequency for the ith word in profile p. 4. Sum of word embeddings weighted by tf -idf Vpsum(tf−idf ). This is each word vector multiplied by the word's tf -idf for the Twitter profile: Vpsum(tf−idf ) = wip.tip i=0 where tip is the tf -idf value for the ith word in profile p. 4 Represent Training Examples using Word EmbeddingsClassifier TrainingWord VectorsSkip-gram model implemented in Word2Vec TargetWord from TwitterOutput ProjectionInput # of Words in Tweets Profiles Emoji Videos Images Total Gang Members 3,825,092 3,348 732,712 554,857 10,162 Non-gang Members 45,213,027 21,182 3,685,669 10,459,235 73,252 Total 49,038,119 24,530 4,418,381 11,014,092 83,414 5,126,171 59,452,365 64,578,536 Table 1: Dataset Statistics. 5. Mean of word embeddings weighted by term frequency Vpavg(sum(count)). This is the mean of the word embedding vectors weighted by term frequency: n(cid:88) Vpavg(sum(count)) = 1/n wip.cip i=0 4 Evaluation We evaluate the performance of using word embed- dings to discover gang member profiles on Twitter. We first discuss the dataset, learning algorithms and baseline comparison models used in the experiments. Then we discuss the 10-fold cross validation experi- ments and the evaluation matrices used. Finally we present the results of the experiments. 4.1 Evaluation setup We consider a dataset of curated gang and non-gang members' Twitter profiles collected from our previous work [BWDS16]. It was developed by querying the Followerwonk Web service API4 with location-neutral seed words known to be used by gang members across the U.S. in their Twitter profiles. The dataset was fur- ther expanded by examining the friends, follower, and retweet networks of the gang member profiles found by searching for seed words. Specific details about our data curation procedure are discussed in [BWDS16]. Ultimately, this dataset consists of 400 gang mem- ber profiles and 2,865 non-gang member profiles. For each user profile, we collected up to most recent 3,200 tweets from their Twitter timelines, profile description text, profile and cover images, and the comments and video descriptions for every YouTube video shared by them. Table 1 provides statistics about the number of words found in each type of feature in the dataset. It includes a total of 821,412 tweets from gang members and 7,238,758 tweets from non-gang members. To build the classifiers we used three different learning algorithms, namely Logistic Regression (LR), Random Forest (RF), and Support Vector Machines (SVM). We used version 0.17.1 of scikit-learn5 machine learning library for Python to implement the classi- fiers. An open source tool of Python, Gensim [ RS10] was used to generate the word embeddings. We com- pare our results with the two best performing systems reported in [BWDS16] which are the two state-of-the- art models for identifying gang members in Twitter. Both baseline models are built from a random forest classifier trained over term frequencies for unigrams in tweet text, emoji, profile data, YouTube video data and image tags. Baseline Model(1) considers all 3,285 gang and non-gang member profiles in our dataset. Baseline Model(2) considers all Twitter profiles that contain every feature type discussed in Section 3.1. Because a Twitter profile may not have every feature type, baseline Model(1) represents a practical scenario where not every Twitter profile contains every type of feature. However, we compare our results to both baseline models and report the improvements. 4.2 10-fold cross validation We conducted 10-fold cross validation experiments to evaluate the performance of our models. We used all Twitter profiles in the dataset to conduct exper- iments on the five methods we used to combine word embedding vectors. For each of the five vector com- bination methods (as mentioned in Section 3.2), we trained classifiers using each learning algorithm we considered. In each fold, the training set was used to generate the word vectors, which were then used to compute features for both the training set and test set. For each 10-fold cross validation experiment, we report three evaluation metrics for the 'gang' (positive) and 'non-gang' (negative) classes, namely, the Precision = tp/(tp + f p), Recall = tp/(tp + f n), and F 1-score = 2 ∗ (P recision ∗ Recall)/(P recision + Recall), where tp is the number of true positives, f p is the number of false positives, tn is the number of true negatives, and f n is the number of false negatives. We report these metrics for the 'gang' and 'non-gang' classes separately because of the class imbalance in the dataset. 4.3 Experimental results Table 2 presents 10-fold cross validation results for the baseline models (first and second rows) and our word embeddings-based models (from third row to seventh row). As mentioned earlier both baseline models use a random forest classifier trained on term frequencies of unigram features extracted from all feature types. The two baseline models only differs on the training data filtering method used, which is based on the avail- ability of features in the training dataset as described 4https://moz.com/followerwonk/bio 5http://scikit-learn.org/stable/index.html 5 Model Classifier Gang Non-Gang Precision Recall F 1-score Precision Recall F 1-score Vpsum Vpavg Vpsum(count) Baseline Model(1) RF Baseline Model(2) RF LR RF SVM LR RF SVM LR RF SVM LR RF SVM LR RF SVM Vpavg(sum(count)) Vpsum(tf−idf ) 0.8792 0.8961 0.6007 0.7412 0.5929 0.8394 0.7627 0.8405 0.6768 0.7484 0.5656 0.7901 0.7979 0.7352 0.8490 0.7657 0.7921 0.6374 0.6994 0.7045 0.7085 0.7728 0.5789 0.7439 0.7217 0.6699 0.7346 0.7180 0.7078 0.7074 0.6810 0.7327 0.7443 0.7194 0.7364 0.7755 0.6459 0.7213 0.6559 0.6824 0.7501 0.7740 0.6681 0.7386 0.6267 0.7438 0.7470 0.6952 0.7835 0.7519 0.7500 0.9507 0.9575 0.9576 0.9596 0.9661 0.9442 0.9650 0.9624 0.9537 0.9631 0.9594 0.9595 0.9598 0.9557 0.9634 0.9650 0.9615 0.9881 0.9873 0.9346 0.9659 0.9116 0.9850 0.9675 0.9807 0.9540 0.9648 0.9212 0.9742 0.9746 0.9628 0.9815 0.9678 0.9735 0.9690 0.9720 0.9458 0.9626 0.9369 0.9641 0.9662 0.9715 0.9537 0.9639 0.9395 0.9667 0.9671 0.9589 0.9723 0.9663 0.9674 Table 2: Classification Results Based on 10-Fold Cross Validation. in [BWDS16]. The baseline Model(1) uses all profiles in the dataset and has a F 1-score of 0.7364 for 'gang' class and 0.9690 for 'non-gang' class. The baseline Model(2) which only uses profiles that contain each and every feature type has a F 1-score of 0.7755 for 'gang' class and F 1-score of 0.9720 for 'non-gang' class. Vector sum is one of the basic operations we can perform on word embedding vectors. The random forest classifier performs the best among vector sum- based classifiers where logistic regression and SVM classifiers also perform comparatively well (Vpsum ). Using vector mean (Vpavg ) improves all classifier re- sults and SVM classifier trained on the mean of word embeddings achieves very close results to the baseline Model(2). Multiplying vector sum with correspond- ing word counts for each word in word embeddings degrades the classifier accuracy for correctly identify- ing the positive class (Vpsum(count)). When we multi- ply words by their corresponding tf -idf values before taking the vector sum, we again observe an increase in the classifiers' accuracy (Vpsum(tf−idf )). We achieve the best performance by averaging the vector sum weighted by term frequency (Vpavg(sum(count))). Here we multiply the mean of the word embeddings by count of each word, which beats all other word embeddings- based models and the two baselines. In this setting, lo- gistic regression classifier trained on word embeddings performs the best with a F 1-score of 0.7835. This is a 6.39% improvement in performance when compared to the baseline Model(1) and a 1.03% improvement in performance when compared to baseline Model(2). Overall, out of the five vector operations that we used to train machine learning classifiers, four gave us classi- fier models that beat baseline Model(1) and two vector based operations gave us classifier models that either achieved very similar results to baseline Model(2) or beat it. This evaluation demonstrates the promise of using pre-trained word embeddings to boost the ac- curacy of supervised learning algorithms for Twitter gang member profile classification. 5 Conclusion and Future Work This paper presented a word embeddings-based ap- proach to address the problem of automatically iden- tifying gang member profiles on Twitter. Using a Twitter user dataset that consist of 400 gang mem- ber and 2,865 non gang member profiles, we trained word embedding models based on users' tweets, pro- file descriptions, emoji, images, and videos shared on Twitter (textual features extracted from images, and videos). We then use the pre-trained word em- bedding models to train supervised machine learning classifiers, which showed superior performance when compared to the state-of-the-art baseline models re- ported in the literature. We plan to further extend our work by building our own image classification sys- tem specifically designed to identify images commonly shared by gang members such as guns, gang hand signs, stacks of cash and drugs. We would also like to experiment with automatically building dictionar- ies that contain gang names and gang-related slang us- ing crowd-sourced gang-related knowledge-bases such as HipWiki6. We also want to experiment with us- ing such knowledge-bases to train word embeddings to understand whether having access to gang-related knowledge could boost the performance of our models. 6http://www.hipwiki.com/Hip+Hop+Wiki 6 Finally, we would like to study how we can further use social networks of known gang members to identify new gang member profiles on Twitter. [MCCD13] T. Mikolov, K. Chen, G. Corrado, and J. Dean. Efficient estimation of word rep- resentations in vector space. CoRR, 2013. Acknowledgements [Mil92] We are grateful to Sujan Perera and Monireh Ebrahimi for thought-provoking discussions on the topic. We acknowledge partial support from the National Science Foundation (NSF) award: CNS- 1513721: "Context-Aware Harassment Detection on Social Media" and National Institutes of Health (NIH) award: MH105384-01A1: "Modeling Social Behavior for Healthcare Utilization in Depression". Any opin- ions, findings, and conclusions/recommendations ex- pressed in this material are those of the author(s) and do not necessarily reflect the views of the NSF or NIH. References W. B. Miller. Crime by youth gangs and groups in the United States. US Dept. of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Pre- vention Washington, DC, 1992. [MSC+13] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed repre- sentations of words and phrases and their compositionality. In Proc. of NIPS 2013, pages 3111–3119. 2013. [MYZ13] T. Mikolov, W. Yih, and G. Zweig. Lin- guistic regularities in continuous space word representations. In Proc. of ACL NAACL, 2013, pages 746–751, June 2013. [20007] Survey of Gang Members Online Habits and Participation (2007) Survey results reported at the i-SAFE Annual Internet Safety Education Review Meeting Carls- bad, California. National Assessment Cen- ter, 2007. [Pat15] [PDJ15] [20111] 2011 National Gang Threat Assessment Issued Emerging Trends. 2011. [20113] National Gang Report. 2013. [PEB13] [BDVJ03] Y. Bengio, R. Ducharme, P. Vincent, and C. Janvin. A neural probabilistic language model. J. Mach. Learn. Res., 3:1137–1155, March 2003. [BWDS16] L. Balasuriya, S. Wijeratne, D. Doran, and A. Sheth. Finding street gang mem- bers on twitter. In Technical Report, Wright State University, 2016. [pol13] [DP11] S. Decker and D. Pyrooz. Leaving the gang: Logging off and moving on. coun- cil on foreign relations, 2011. [ RS10] [HTK13] Y. Hu, K. Talamadupula, and S. Kamb- hampati. Dude, srsly?: The surprisingly formal nature of twitter's language. In ICWSM, 2013. [LBH15] [LZZ15] Y. LeCun, Y. Bengio, and G. Hinton. Deep learning. Nature, 521(7553):436– 444, 2015. J. Lilleberg, Y. Zhu, and Y. Zhang. Sup- port vector machines and word2vec for text classification with semantic features. In Proc. of IEEE ICCI*CC, 2015, pages 136–140, July 2015. 7 D. U. Patton. Gang violence, crime, and substance use on twitter: A snapshot of gang communications in detroit, Jan 2015. S. H. Decker, D. C. Pyrooz, and R. K. Moule Jr. Criminal and routine ac- tivities in online settings: Gangs, offend- ers, and the internet. Justice Quarterly, 32(3):471–499, 2015. D. U. Patton, R. D. Eschmann, and D. A. Butler. Internet banging: New trends in social media, gang violence, masculinity and hip hop. Computers in Human Be- havior, 29(5):A54 – A59, 2013. Social media and tactical considerations for law enforcement. Technical report, United States Office of Community Ori- ented Policing Services and United States Department of Justice, 2013. R. Rehurek and P. Sojka. Software Frame- work for Topic Modelling with Large Cor- pora. In Proc. of LREC, 2010, pages 45– 50, Valletta, Malta, May 2010. [WDSD15] S. Wijeratne, D. Doran, A. Sheth, and J. L. Dustin. Analyzing the social media footprint of street gangs. In Proc. of IEEE ISI, 2015, pages 91–96, May 2015. [WXX+16] P. Wang, B. Xu, J. Xu, G. Tian, C. Liu, and H. Hao. Semantic expansion using word embedding clustering and convolu- tional neural network for improving short text classification. Neurocomputing, 174, Part B:806 – 814, 2016.
1708.01236
2
1708
2018-04-18T12:56:07
Multiscale mixing patterns in networks
[ "cs.SI", "physics.data-an", "physics.soc-ph" ]
Assortative mixing in networks is the tendency for nodes with the same attributes, or metadata, to link to each other. It is a property often found in social networks manifesting as a higher tendency of links occurring between people with the same age, race, or political belief. Quantifying the level of assortativity or disassortativity (the preference of linking to nodes with different attributes) can shed light on the factors involved in the formation of links and contagion processes in complex networks. It is common practice to measure the level of assortativity according to the assortativity coefficient, or modularity in the case of discrete-valued metadata. This global value is the average level of assortativity across the network and may not be a representative statistic when mixing patterns are heterogeneous. For example, a social network spanning the globe may exhibit local differences in mixing patterns as a consequence of differences in cultural norms. Here, we introduce an approach to localise this global measure so that we can describe the assortativity, across multiple scales, at the node level. Consequently we are able to capture and qualitatively evaluate the distribution of mixing patterns in the network. We find that for many real-world networks the distribution of assortativity is skewed, overdispersed and multimodal. Our method provides a clearer lens through which we can more closely examine mixing patterns in networks.
cs.SI
cs
Multiscale mixing patterns in networks Leto Peel,1, 2, ∗ Jean-Charles Delvenne,1, 3, † and Renaud Lambiotte4, ‡ 1ICTEAM, Universit´e catholique de Louvain, Louvain-la-Neuve, B-1348, Belgium 2naXys, Universit de Namur, Namur, B-5000, Belgium 3CORE, Universit´e catholique de Louvain, Louvain-la-Neuve, B-1348, Belgium 4Mathematical Institute, University of Oxford, Oxford, UK Assortative mixing in networks is the tendency for nodes with the same attributes, or metadata, to link to each other. It is a property often found in social networks manifesting as a higher tendency of links occurring between people with the same age, race, or political belief. Quantifying the level of assortativity or disassortativity (the preference of linking to nodes with different attributes) can shed light on the organisation of complex networks. It is common practice to measure the level of assortativity according to the assortativity coefficient, or modularity in the case of categorical metadata. This global value is the average level of assortativity across the network and may not be a representative statistic when mixing patterns are heterogeneous. For example, a social network spanning the globe may exhibit local differences in mixing patterns as a consequence of differences in cultural norms. Here, we introduce an approach to localise this global measure so that we can describe the assortativity, across multiple scales, at the node level. Consequently we are able to capture and qualitatively evaluate the distribution of mixing patterns in the network. We find that for many real-world networks the distribution of assortativity is skewed, overdispersed and multimodal. Our method provides a clearer lens through which we can more closely examine mixing patterns in networks. Networks are used as a common representation for a wide variety of complex systems, spanning social [1–3], biological [4, 5] and technological [6, 7] domains. Nodes are used to represent entities or components of the system and links between them used to indicate pairwise inter- actions. The link formation processes in these systems are still largely unknown, but the broad variety of ob- served structures suggest that they are diverse. One ap- proach to characterise the network structure is based on the correlation, or assortative mixing, of node attributes (or "metadata") across edges. This analysis allows us to make generalisations about whether we are more likely to observe links between nodes with the same characteristics (assortativity) or between those with different ones (dis- assortativity). Social networks frequently contain posi- tive correlations of attribute values across connections [8]. These correlations occur as a result of the complemen- tary processes of selection (or "homophily") and influ- ence (or "contagion") [9]. For example, assortativity has frequently been observed with respect to age, race and social status [10], as well as behavioural patterns such as smoking and drinking habits [11, 12]. Examples of disas- sortative networks include heterosexual dating networks (gender), ecological food webs (metabolic category), and technological and biological networks (node degree) [13]. It is important to note that just as correlation does not imply causation, observations of assortativity are insuf- ficient to imply a specific generative process for the net- work. The standard approach to quantifying the level of as- ∗ [email protected][email protected][email protected] FIG. 1. Local assortativity of gender in a sample of Facebook friendships [14]. Different regions of the graph exhibit strik- ingly different patterns, suggesting that a single variable, e.g. global assortativity, would provide a poor description of the system. sortativity in a network is by calculating the assortativ- ity coefficient [13]. Such a summary statistic is useful to capture the average mixing pattern across the whole net- work. However, such a generalisation is only really mean- ingful if it is representative of the population of nodes in the network, i.e., if the assortativity of most individuals is concentrated around the mean. But when networks are heterogeneous and contain diverse mixing patterns, a single global measure may not present an accurate de- scription. Furthermore it does not provide a means for quantifying the diversity or identifying anomalous or out- lier patterns of interaction. Quantifying diversity and measuring how mixing may vary across a network becomes a particularly perti- 2 FIG. 2. Five networks (top) of n = 40 nodes and m = 160 edges with the same global assortativity rglobal = 0, but with different local mixing patterns as shown by the distributions of rmulti (bottom). nent issue with modern advances in technology that have enabled us to capture, store and process massive- scale networks. Previously social interaction data was collected via time-consuming manual processes of con- ducting surveys or observations. For practical reasons these were often limited to a specific organisation or group [1, 2, 15, 16]. Summarising the pattern of as- sortative mixing as a single value may be reasonable for these small-scale networks that tend to focus on a single social dimension (e.g., a specific working environ- ment or common interest). Now, technology such as on- line social media platforms allow for the automatic col- lection of increasingly larger amounts of social interac- tion data. For instance, the largest connected compo- nent of the Facebook network was previously reported to account for approximately 10% of the global popula- tion [17]. These vast multi-dimensional social networks present more opportunities for heterogeneous mixing pat- terns, which could conceivably arise, for example, due to differences in demographic and cultural backgrounds. Figure 1 shows, using the methods we will introduce, an example of this variation in mixing on a subset of nodes in the Facebook social network [14]. A high variation in mixing patterns indicates that the global assortativity may be a poor representation of the entire population. To address this issue, we develop a node-centric measure of the assortativity within a local neighbourhood. Vary- ing the size of the neighbourhood allows us to interpolate from the mixing pattern between an individual node and its neighbours to the global assortativity coefficient. In a number of real-world networks we find that the global as- sortativity is not representative of the collective patterns of mixing. I. MIXING IN NETWORKS Currently the standard approach to measure the propensity of links to occur between similar nodes is to use the assortativity coefficient introduced by New- man [13]. Here we will focus on undirected networks and categorical node attributes, but assortativity and the methods we propose naturally extend to directed net- works and scalar attributes (see Appendix A & B). The global assortativity coefficient rglobal for categori- cal attributes compares the proportion of links connect- ing nodes with same attribute value, or type, relative to the proportion expected if the edges in the network were randomly rewired. The difference between these pro- portions is commonly known as modularity Q, a mea- sure frequently used in the task of community detec- tion [18]. The assortativity coefficient is normalised such that rglobal = 1 if all edges only connect nodes of the same type (i.e., maximum modularity Qmax) and rglobal = 0 if the number of edges is equal to the expected number for a randomly rewired network in which the total number of edges incident on each type of node is held constant. The global assortativity rglobal is given by [13] (cid:80) g egg −(cid:80) 1 −(cid:80) g a2 g rglobal = Q Qmax = g a2 g , (1) (cid:80) h egh =(cid:80) in which egh is half the proportion of edges in the network that connect nodes with type yi = g to nodes with type yj = h (or the proportion of edges if g = h) and ag = i∈g ki/2m is the sum of degrees (ki) of nodes with type g, normalised by twice the number of edges, m. 78 2 0 0 080 0 0 27838 22020 02020 0 23878 2 0 0 080 0 0 27838 2 0 0 080 0 0 2381020202010202010201078 2 0 0 080 0 0 27838 2 0 0 080 010201078 2 0 0 080 0 0 2781020 0 01080 0102010 (cid:88) We calculate egh as: (cid:88) normalisation constant Qmax = 1 −(cid:80) 1 2m egh = i:yi=g j:yj =h where Aij is an element of the adjacency matrix. The g ensures that the assortativity coefficient lies in the range −1 ≤ r ≤ 1 (see Appendix C). g a2 Aij , (2) 3 graph. A simple random walker at node i jumps to node j by selecting an outgoing edge with equal probability, Aij and, in an undirected network, the stationary proba- ki bility πi = ki/2m of being at node i is proportional to its degree. Then, every edge of the network is traversed in each direction with equal probability πi = 1/2m. In this context, a key observation is that we can equivalently rewrite (2) as, Aij ki (cid:88) (cid:88) egh = πi Aij ki , (3) A. Local patterns of mixing i:yi=g j:yj =h The summary statistic rglobal describes the average mixing pattern over the whole network. But as with all summary statistics there may be cases where it provides a poor representation of the network e.g., if the network contains localised heterogeneous patterns. Figure 2 il- lustrates an analogy to Anscombe's quartet of bivariate datasets with identical correlation coefficients [19]. Each of the five networks in the top row have the same number of nodes (n = 40) and edges (m = 160) and have been constructed to have the same rglobal with respect to a bi- nary attribute, indicated by a cross (c) or a diamond (d). All five networks have mcc + mdd = 80 edges between nodes of the same type and mcd = 80 edges between nodes of different types, such that each has rglobal = 0. Local patterns of mixing are formed by splitting each of the types {c, d} further into two equally sized subgroups {c1, c2, d1, d2}. The middle row depicts the placement of edges within and between the four subgroups. Distribut- ing edges uniformly between subgroups creates a network with homogeneous mixing [Fig. 2(a)]. We propose a local measure of assortativity r((cid:96)) that captures the mixing pattern within the local neighbour- hood of a given node of interest (cid:96). Trivially one could calculate the local assortativity by adjusting (1) to only consider the immediate neighbours of (cid:96). However, taking this approach can encounter problems. For nodes with low degree, we would be calculating assortativity based only on a small sample, providing a potentially poor es- timate of the node's mixing preference. And when all of (cid:96)'s neighbours are of the same type, then we would assign r((cid:96)) = ∞ because 1 −(cid:80) g a2 g = 0. We face similar issues in time-series analysis when we wish to interpret how a noisy signal varies over time. Di- rect analysis of the series may be more descriptive of the noise process than the underlying signal we are interested in. Averaging over the whole series provides an accurate estimate of the mean, but treats all variation as noise and ignores any important trends. A common solution to this problem is to use a local filter such as the exponential weighted moving average, in which values further in time from the point of interest are weighted less. We adopt a similar strategy in calculating the local assortativity. To make the connection with time-series analysis concrete, we define a random time-series where each value is the attribute yi of a node i visited in a random walk on the which is the total probability that a simple random walker will jump from a node with type g to one with type h. We can then interpret the global assortativity of the network as the autocorrelation (with time lag of 1) of this random time-series (see Appendix D for details). Global assortativity counts all edges in the network equally just as the stationary random walker visits all edges with equal probability. To create our local mea- sure of assortativity we instead reweight the edges in the network based on how local they are to the node of inter- est, (cid:96). We do so by replacing the stationary distribution π in (3) with an alternative distribution over the nodes w(i; (cid:96)), (cid:88) (cid:88) i:yi=g j:yj =h egh((cid:96)) = w(i; (cid:96)) Aij ki , (4) value ν((cid:96)) = (cid:80) and compare the proportion of links between nodes of the same type in the local neighbourhood to the global g(egg((cid:96)) − egg). Then we can calculate the local assortativity as the deviation from the global assortativity: (cid:33) (cid:32) (cid:88) (cid:88) egg −(cid:88) ν((cid:96)) + g g (egg((cid:96)) − a2 g) . a2 g (5) (6) 1 Qmax 1 r((cid:96)) = = Qmax g All that remains is to define a distribution w(i; (cid:96)). We choose the well-known personalised PageRank vec- tor, the stationary distribution wα(i; (cid:96)) of a simple ran- dom walk, modified so that at each time step we re- turn to the node of interest (cid:96) with probability (1 − α) [Fig. 3(a)]. In the special case of a network consisting of nodes linked in a line, wα(i; (cid:96)) corresponds to an ex- ponential distribution [Fig. 3(b)] and is analogous to the previously mentioned exponential filter commonly used in time-series analysis. The personalised PageRank vec- tor is an intuitive choice given its role in local community detection [20] and connections to the stochastic block model [21]. It is however, not the only way to define a local neighbourhood (e.g., a number of graph kernels may be suitable [22]), but we leave exploration of other neighbourhood functions for future work. 4 FIG. 3. Example of the local assortativity measure for categorical attributes. (A) assortativity is calculated (as in (1)) according to the actual proportion of links in the network connecting nodes of the same type relative to the expected proportion of links between nodes of the same type, (B) the nodes in the network are weighted according to a random walk with restart probability of 1−α, (C) an example of the local assortativity applied to a simple line network with two types of nodes: yellow or green. The blue bars show the stationary distribution (w(i; (cid:96))) of the random walk with restarts at (cid:96) for different values of α. Underneath each distribution the nodes in the line network are coloured according to their local assortativity value. We can now calculate a local assortativity rα((cid:96)) for each node and use α to interpolate from the trivial lo- cal neighbourhood assortativity (α = 0, the random walker never leaves the initial node) to the global as- sortativity (α = 1, the random walker never restarts) r1((cid:96)) = rglobal [Fig. 3(c)]. We can also view this lo- cal assortativity as a (normalised) autocovariance of the random time-series of node attributes, defined as before but now generated by a stationary random walker with restarts and only when traversing edges of the original network. B. Choice of α We can use α to interpolate from the global measure at α = 1 to the local measure based only on the neighbours of (cid:96) when α = 0. As previously mentioned, either ex- treme can be problematic, r1 is uniform across network, while r0 may be based on a small sample (particularly in the case of low degree nodes) and therefore subject to overfitting. Moreover, both extremes are blind to the possible existence of coherent regions of assortativity in- side the network, as r1 considers the network as a whole while r0 considers the local assortativities of the nodes as independent entities. To circumvent these issues, we consider calculating the assortativity across multiple scales by calculating a "mul- tiscale" distribution wmulti by integrating over all possi- ble values of α [23], (cid:90) 1 wmulti(i; (cid:96)) = wα(i; (cid:96)) dα , (7) 0 which is effectively the same as treating α as an unknown with a uniform prior distribution (see Appendix H for details). Using this distribution, we can calculate a mul- tiscale measure rmulti that captures the assortativity of a given node across all scales. As a simple demonstration, we return to Figure 2 in which the distribution of rmulti for each synthetic network is shown in the bottom row. We see under homogeneous mixing [Fig. 2(a)] a unimodal distribution peaked around 0 confirming that the global measure rglobal is represen- tative of the mixing patterns in the network. However, when mixing is heterogeneous [Fig 2(b–e)] we observe multimodal distributions of rmulti that allow us to dis- ambiguate between different local mixing patterns. II. REAL NETWORKS Next we use rmulti to evaluate the mixing patterns in some real networks: an ecological network and set of on- line social networks. In both cases nodes have multiple attributes assigned to them, providing different dimen- sions of analysis. A. Weddell Sea Food Web We first examine a network of ecological consumer interactions between species dwelling in the Weddell Sea [4]. Figure 4 shows the distributions (green) of local assortativity for five different categorical node attributes. For comparison we present a null distribution (black ) ob- tained by randomly re-wiring the edges such that the at- tribute values, degree sequence and global assortativity are all preserved (see Appendix I). In each case we ob- serve skewed and/or multi-modal distributions. The em- pirical distributions appear overdispersed compared to the null distributions. It may be surprising to see that, for some attributes, the null distribution appears to be multi-modal. Closer inspection reveals that the different modes are correlated with the attribute values and that multi-modality arises from the unbalanced distribution of nodes and incident edges across different node types. This effect is particu- larly pronounced for the attribute "Metabolic Category" for which we observe two distinct peaks in the distri- bution. The larger peak that occurs around rmulti ∼ 0 221 = 1.0= 0.0= 0.5ABC 5 FIG. 4. Multiscale assortativity for different attributes in the Weddell Sea Food Web. The observed distribution is depicted by the solid green bars. The black outline shows the null distribution. represents all species that belong to the metabolic cate- gory plant and accounts for the majority (348/492) of the species in the network, upon which approximately two thirds of the edges are incident. This bias in the distri- bution of edges across the different node types means that randomly assigned edges are more likely to connect two nodes of the majority class than any other pair of nodes. In fact, it is impossible to assign edges such that nodes in each Metabolic Category exhibit (approximately) the same assortativity as the global value. Specifically, to achieve rglobal = −0.13 it is necessary that more than half of the edges connect species from different metabolic categories. However, this is impossible for the plant cate- gory without changing the distribution of edges over cat- egories. B. Facebook 100 We next consider a set of online social networks col- lected from the Facebook social media platform at a time when it was only open to 100 US universities [3]. The pro- cess of incrementally providing these universities access to the platform, meant that at this point in time very few links existed between each of the universities' networks, which provides the opportunities to study each of these social systems in a relatively independent manner. One of the original studies on this dataset examined the assor- tativity of each demographic attribute in each of the net- works [3]. This study found some common patterns that occurred in many of the networks, such as a tendency to be assortative by matriculation year and dormitory of residence, with some variation around the magnitude of assortativity for each of the attributes across the different universities. In this case it makes sense to analyse the universities separately since it is reasonable to assume that univer- sity membership played an important and restricting role in the organisation of the network. However, a mod- ern version of this dataset might contain a higher den- sity of inter-university links, making it less reasonable to treat them independently; in general partitioning net- works based on attributes without careful considerations can be problematic [24]. Figure 5 depicts the distributions of rmulti for each of the 100 networks according to dormitory. For many of the networks we observe a positively-skewed distribution. The surrounding subplots show details for four univer- sities with approximately the same global assortativity rglobal ∼ 0.13, but with qualitatively different distribu- tions of rmulti. Common across these distributions is that all of the empirical distributions exhibit a positive skew beyond that of the null distribution. Closer inspection re- veals that in all four networks the nodes associated with a higher local assortativity belong to a community of nodes more loosely connected to the rest of the network. These nodes also correspond to first-year students, which sug- gests that residence is more relevant to friendship among new students than it is for the rest of the student body. We see this pattern in many of the other schools too, first-year students are more assortative by year (for all schools except one) and by residence (more than 75% of schools), see Figs. 8 & 9 in the Appendix for details. We can also use local assortativity to compare how the mixing of multiple attributes covary across a net- work. This may be of interest as a positive corre- lation could suggest a relationship between attributes, while a negative correlation indicates that assortativity of one attribute may replace the assortativity of another. Note that differences in normalisation between attributes mean that the actual values may not be directly compa- rable, which is why we focus on correlation. Figure 6 compares rmulti for year of study and place of residence. The central scatter plot shows, for each university: the correlation between local assortativities of the two at- tributes (x-axis) against the difference in the two global assortativities for each network (y-axis), which was pre- viously the only way to compare assortativities [3]. The four surrounding sub-plots show the joint distribution of year and dorm local assortativity for specific universi- ties. The yellow points indicate students in their first year. In most universities we observed that first-year students were the most assortative by either year, resi- dence or both. In both Auburn and Pepperdine there is a negative correlation between year and dorm assortativ- ity suggesting that many friendships are associated with either being in the same year or from sharing a dorm. For Simmons and Rice we observe a positive correla- tion between dorm and year local assortativity. However, in Simmons we see that the first-year students form a separate cluster, while in Rice they are much more in- terspersed. This difference may relate to how students are placed in university dorms. At Simmons all first year 6 FIG. 5. Distributions of the local assortativity by residence (dorm) for each of the schools in the Facebook 100 dataset [3]. Dotted black lines indicate the 10 and 90 percentiles while the solid black lines show the interquartile range. The global assortativity is indicated by the blue square markers. The distributions for four schools (Dartmouth, Wesleyan, Wellesley and Haverford) are shown in detail in the surrounding. Each of them has approximately the same global assortativity (rglobal ∼ 0.13), but the distributions indicate different levels of heterogeneity in the pattern of mixing by residence. While the distributions are different, there exists a common trend that the first year students tend to be more loosely connected to the rest of the network and exhibit the higher values of assortativity (nodes to the right of the dashed cyan line). FIG. 6. A scatter plot in which each school is a point indicating the correlation of local assortativities by dorm and matriculation year (x-axis) and proportion of nodes which are more assortative by dorm than by year (y-axis). For reference, the blue vertical line indicates zero assortativity (random mixing) and the red horizontal line indicate zero difference in rglobal. Joint distributions of the dorm and year assortativities for four of the schools are shown in the surrounding plots. Blue lines indicate rglobal. students live on campus1 and form the majority residents in the few dorms they occupy. Rice houses their new in- takes according to a different strategy, by placing them evenly spread across all the available dorms. The fact that students are mixed across years and that the vast majority (almost 78%2) of students reside in university accommodation, offers a possible explanation for why we 1 source:http://www.simmons.edu/student-life/ life-at-simmons/housing/residence-halls 2 source:http://campushousing.rice.edu/ a b c da. Dartmouthd. Wesleyanb. Wellesleyc. Haverfordassorta�vedisassorta�veuniform mixingRiceSimmonsAuburnPepperdineRiceCaltechMichiganAuburnOklahoma observe a smooth variation in values of assortativity with- out a distinction between new students and the rest of the population. III. DISCUSSION Characterising the level of assortativity plays an im- portant role in understanding the organisation of com- plex systems. However, the global assortativity may not be representative given the variation present in the net- work. We have shown that the distribution of mixing in real networks can be skewed, overdispersed and possibly multimodal. In fact, for certain network configurations we have seen that a unimodal distribution may not even be possible. As network data grow bigger there is a greater pos- sibility for heterogeneous sub-groups to co-exist within the overall population. The presence of these sub- populations adds further to the ongoing discussions of the interplay between node metadata and network struc- ture [24] and suggests that while we may observe a re- lationship between particular node properties and exis- tence of links in part of a network, it does not imply that this relationship exists across the network as a whole. This heterogeneity has implications on how we make gen- eralisations in network data, as what we observe in a subgraph might not necessarily apply to the rest of the 7 network. However, it may also present new opportu- nities too. Recent results show that with an appropri- ately constructed learning algorithm it is still possible to make accurate predictions about node attributes in networks with heterogeneous mixing patterns [25] and in some cases even utilise the heterogeneity to further im- prove performance [26]. Quantifying local assortativity offers a new dimension to study this predictive perfor- mance. Heterogeneous mixing also offers a potential new perspective for the community detection problem [27], i.e., to identify sets of nodes with similar assortativity, which may be useful in the study of "echo chambers" in social networks [28]. Our approach to quantifying local mixing could easily be applied to any global network measure, such as clus- tering coefficient or mean degree. It may also be used to capture the local correlation between node attributes and their degree, a relationship that plays a definitive role in network phenomena such as the majority illusion [29] and the generalised friendship paradox [30]. ACKNOWLEDGEMENTS This work was supported by ARC (Federation Wallonia-Brussels) [LP, JCD, RL] and FNRS-F.R.S. [LP]. [1] David Krackhardt, "The ties that torture: Simmelian tie analysis in organizations," Research in the Sociology of Organizations 16, 183–210 (1999). [2] Emmanuel Lazega, The collegial phenomenon: The social mechanisms of cooperation among peers in a corporate law partnership (Oxford University Press, 2001). [3] Amanda L Traud, Peter J Mucha, and Mason A Porter, "Social structure of facebook networks," Physica A 391, 4165–4180 (2012). [4] Ulrich Brose et al., "Body sizes of consumers and their resources," Ecology 86, 2545 (2005). [5] H Jeong, B Tombor, R Albert, ZN Oltvai, and AL Barabasi, "The large-scale organization of metabolic networks," Nature 407, 651 (2000). [6] R´eka Albert, Hawoong Jeong, and Albert-L´aszl´o Barab´asi, "Internet: Diameter of the world-wide web," Nature 401, 130 (1999). [7] Duncan J Watts and Steven H Strogatz, "Collective dynamics of 'small-world' networks," Nature 393, 440 (1998). [8] Miller McPherson, Lynn Smith-Lovin, and James M Cook, "Birds of a feather: Homophily in social net- works," Annu. Rev. Sociol. 27, 415–444 (2001). [9] Sinan Aral, Lev Muchnik, and Arun Sundararajan, "Dis- tinguishing influence-based contagion from homophily- driven diffusion in dynamic networks," Proc. Natl. Acad. Sci. 106, 21544–21549 (2009). [10] James Moody, "Race, school integration, and friendship segregation in america," Am. J. Sociol. 107, 679–716 (2001). [11] Jere M Cohen, "Sources of peer group homogeneity," So- ciol Educ , 227–241 (1977). [12] Denise B Kandel, "Homophily, selection, and socializa- tion in adolescent friendships," Am. J. Sociol. 84, 427– 436 (1978). [13] Mark EJ Newman, "Mixing patterns in networks," Phys. Rev. E 67, 026126 (2003). [14] Julian J McAuley and Jure Leskovec, "Learning to dis- cover social circles in ego networks," in Adv. Neur. In. 25, Vol. 2012 (2012) pp. 539–547. [15] Samuel F Sampson, A novitiate in a period of change: An experimental and case study of social relationships, Ph.D. thesis, Cornell University Ithaca, NY (1968). [16] Wayne W Zachary, "An information flow model for con- flict and fission in small groups," J. Anthropol. Res. , 452–473 (1977). [17] Johan Ugander, Brian Karrer, Lars Backstrom, and Cameron Marlow, "The anatomy of the facebook social graph," preprint arXiv:1111.4503 (2011). [18] Mark EJ Newman and Michelle Girvan, "Finding and evaluating community structure in networks," Phys. rev. E 69, 026113 (2004). [19] Francis J Anscombe, "Graphs in statistical analysis," Am. Stat. 27, 17–21 (1973). [20] Reid Andersen, Fan Chung, and Kevin Lang, "Local graph partitioning using pagerank vectors," in Founda- tions of Computer Science (FOCS'06) (IEEE, 2006) pp. 475–486. [21] Isabel M Kloumann, Johan Ugander, and Jon Kleinberg, "Block models and personalized pagerank," Proc. Natl. Acad. Sci. 114, 33–38 (2016). [22] Fran¸cois Fouss, Marco Saerens, and Masashi Shimbo, Algorithms and models for network data and link analysis (Cambridge University Press, 2016). [23] Paolo Boldi, "Totalrank: Ranking without damping," in Special interest tracks and posters of the 14th interna- tional conference on World Wide Web (WWW) (ACM, 2005) pp. 898–899. [24] Leto Peel, Daniel B Larremore, and Aaron Clauset, "The ground truth about metadata and community detection in networks," Sci. Adv. 3, e1602548 (2017). [25] Leto Peel, "Graph-based semi-supervised learning for re- lational networks," in SIAM International Conference on Data Mining (SIAM, 2017) pp. 435–443. [26] Kristen M Altenburger and Johan Ugander, "Bias and variance in the social structure of gender," preprint arXiv:1705.04774 (2017). [27] Michael T Schaub, Jean-Charles Delvenne, Martin Ros- vall, and Renaud Lambiotte, "The many facets of com- munity detection in complex networks," Applied Network Science 2, 4 (2017). [28] Elanor Colleoni, Alessandro Rozza, and Adam Arvids- son, "Echo chamber or public sphere? predicting political orientation and measuring political homophily in twitter using big data," J. Commun. 64, 317–332 (2014). [29] Kristina Lerman, Xiaoran Yan, and Xin-Zeng Wu, "The" majority illusion" in social networks," PloS one 11, e0147617 (2016). [30] Young-Ho Eom and Hang-Hyun Jo, "Generalized friend- ship paradox in complex networks: The case of scientific collaboration," Sci. Rep. 4, srep04603 (2014). [31] George Udny Yule, "On the methods of measuring as- sociation between two attributes," J. R. Stat. Soc. 75, 579–652 (1912). [32] George A Ferguson, "The factorial interpretation of test difficulty," Psychometrika 6, 323–329 (1941). [33] Joy Paul Guilford, Fundamental statistics in psychology and education. (McGraw-Hill, 1950). [34] Ernest C Davenport Jr and Nader A El-Sanhurry, review and synthesis," Educ. Psychol. "Phi/phimax: Meas. 51, 821–828 (1991). [35] Edward E. Cureton, "Note on φ/φmax," Psychometrika 24, 89–91 (1959). [36] Jacob Cohen, "A coefficient of agreement for nominal scales," Educ Psychol Meas 20, 37–46 (1960). [37] Paolo Boldi, Massimo Santini, and Sebastiano Vigna, "A deeper investigation of pagerank as a function of the damping factor," in Web Information Retrieval and Lin- ear Algebra Algorithms, 07071 (2007). [38] Bailey K Fosdick, Daniel B Larremore, Joel Nishimura, and Johan Ugander, "Configuring random graph models with fixed degree sequences," preprint arXiv:1608.00607 (2016). 8 and ending at each of the attribute types. Then the di- rected global assortativity of a network with respect to a particular categorical node attribute yi is: g egg −(cid:80) (cid:80) 1 −(cid:80) g agbg g agbg rglobal = , (A1) where ag and bg represent the total number of outgoing and incoming links of all nodes of type g: (cid:88) (cid:88) ag = egh , bh = egh . (A2) h g Then we can update our definition of local assortativity accordingly, r((cid:96)) = 1 Qmax g (egg((cid:96)) − agbg) . (A3) (cid:88) Appendix B: Scalar attributes For scalar attributes we can simply calculate the Pear- son's correlation across edges. Using xi and xj to indicate the scalar attribute value of the nodes in edge Aij then we can write the global assortativity as, cov(xi, xj) rglobal = (cid:80) σiσj ij Aij(xi − ¯x)(xj − ¯x) i ki(xi − ¯x)2 (B1) , (B2) (cid:80) = (cid:80) where ¯x = 1 i kixi is the mean value of x weighted 2m by node degree k and σi is the standard deviation of the attribute values. If we standardise the scalar values using the linear transformation xi = xi−¯x , then we can simplify this further as, σi rglobal = Aij 2m xi xj . (B3) Then we can calculate the local assortativity rα((cid:96)) for scalar variables as, rα((cid:96)) = wα(i; (cid:96)) Aij ki xi xj . (B4) Figure 7 gives some examples of distributions of rmulti for scalar attributes in the food web network. (cid:88) ij (cid:88) ij Appendix A: Directed networks correlation Appendix C: Categorical assortativity as a We can easily extend the multiscale mixing measure rα described in the main text to directed networks. The main change is to incorporate two sets of marginals a and b that describe the proportion of edges starting from The assortativity coefficient rglobal for categorical at- tributes can be interpreted as a normalised Pearson's correlation. To see this, we start by observing that the Pearson's correlation of two binary variables is equivalent 9 FIG. 7. Multiscale assortativity for different scalar attributes in the Weddell Sea Food Web: node degree, average species mass and mobility. Note that mobility is a discrete ordinal variable (taking integer values in [1,4]) and in the main text we treat it as an unordered discrete variable. TABLE I. Binary contingency table yi = 0 yi = 1 yj = 0 yj = 1 e00 e10 b0 a0 a1 e01 e11 b1 to the Phi coefficient for binary contingency tables [31]. Table I shows a contingency table using the same nota- tion as the directed assortativity, i.e., a and b give the marginal proportions and e gives the joint proportions. Then the Pearson product-moment correlation of these variables is known as φ, which we derive using the mo- ments of a Bernoulli distribution: φ = = E[yi, yj] − E[yi]E[yj] σyi σyj e11 − a1b1 √ √ b1b0 a1a0 . (C1) (C2) Note that it is only necessary to calculate this in terms of e11, since e11 − a1b1 = e00 − a0b0. We can see this using the identity e00 = b0 − a1 + e11: e00 − a0b0 = b0 − a1 + e11 − (1 − a1)(1 − b1) (C3) = (1 − b1) − a1 + e11 − (1 − a1 − b1 + a1b1) (C4) = e11 − a1b1 . (C5) A well-known issue with φ is that the extreme values of +1 and −1 are typically unobtainable, which can cause issues with its interpretation. In fact φ = 1 can only occur if a1 = b1, e.g., when the network is undirected, while φ = −1 can only occur if a1 = b2 = 0.5 [32, 33]. To address this issue, there have been a number of proposed normalisations to ensure the φ = 1 is obtainable [34]. One such normalisation is the φ/φmax proposed by Cure- ton [35], φ φmax = e11 − a1b1 β − a1b1 , (C6) where β is the maximum possible value that e11 can take, i.e., min(a1b1). Note for undirected networks (cid:112) (cid:113) a1b1a2b2 = a2 1a2 2 = a1a2 = a1(1 − a1) = a1 − a2 1 , which equals φmax wnen a1 ≤ a2. (C7) (C8) (C9) (C10) Then we can generalise φ/φmax from binary to multi- category variables by treating each distinct value as a binary variable and taking their sum. If we set β = 1, then we obtain (A1) and thus we recover Newman's as- sortativity [13]. We also note that (A1) also corresponds to Cohen's κ that is frequently used to assess inter-rater agreement [36]. means that rmin ≤ r ≤ 1 and the assortativity coefficient The normalisation of (cid:80) 1 −(cid:80) g agbg rmin = − g agbg which lies in the range −1 ≤ rmin < 0. , (C11) Appendix D: Assortativity as autocorrelation of a time-series Assume a scalar attribute xi on each node i of an undi- rected network. As mentioned in the main text, the prob- ability of being at node i is stationary and proportional to the degree, πi = ki/2m. Given that a random walker is currently at node i, it moves to node j with probability Aij/ki. We define a random time-series, using the simple ran- dom walker, as the sequence of attributes of the nodes visited in the random walk, i.e., the value of the time se- ries at time t is the attribute value x of the node visited at time t in the random walk. Asymptotically, the average i πixi = value observed by the random walker is ¯x =(cid:80) (cid:80) kixi/2m and the variance is σ2 =(cid:80) i − ¯x2. i πix2 Likewise, the autocovariance between the attribute ob- served at two consecutive steps (time lag of 1) is Rx = 2.01.51.00.50.00.51.01.50.00.51.01.52.0degree1.00.50.00.51.01.52.00.00.20.40.60.81.01.21.41.61.8meanMass1.00.50.00.51.01.50.00.51.01.52.02.5Mobilityglobalobserved (cid:80) the autocorrelation Rx =(cid:80) ij πi Aij ki with rglobal as defined in (B3). xixj − ¯x2. Replacing x by x = x−¯x σ , we obtain xi xj, which coincides ij πi Aij ki each type g of the autocovariance, Q = (cid:80) When faced with categorical data, we proceed as in SI C. We consider for each type g of nodes the scalar at- tribute xg valued at 1 for nodes with type g and zero elsewhere. The modularity Q is therefore the sum for g Rg. As in SI C, this can be normalised in various ways, one of which is Newman's global assortativity as used in this article, which therefore represents a sort of categorical autocorrelation of the time-series process of the categor- ical attributes observed by the stationary simple random walker. Appendix E: Disconnected networks By using the personalised PageRank as a neighbour- hood function it means that only nodes within the same connected component contribute to rmulti. Consequently rmulti for each node is insensitive to whether or not mul- tiple connected components are included. Appendix F: Missing values It is common when dealing with real datasets that some values may be missing. This is the case for the Facebook100 data, where a number of node attributes are missing. When considering the global assortativity previ- ous work has simply ignored contributions from missing data values [3]. That is, only edges that connect nodes for which both the attribute values are known are consid- ered when calculating egh. This treatment works fine for the global assortativity because each edge counts equally. However, simply omitting missing values when calculat- ing the local assortativity can cause a bias in the distribu- tion. For example, consider the case when node (cid:96) and its immediate neighbours have missing values, but beyond those the attribute values are known. For small values of α the weight wα(i; (cid:96)) is largest for nodes with miss- ing attribute values. Simply ignoring their edges would mean reassigning more weight to edges further away from gh egh((cid:96)) = 1, a nec- essary step in calculating the assortativity. Then when we examine the distribution of r((cid:96)) across all nodes in the network, the resulting distribution will be biased repre- sentation. To deal with this issue we calculate each of the local assortativities as normal, but assign each a weight gh egh((cid:96)), i.e., the sum of local edge counts before normalisation. The weight z(cid:96) describes our confidence in the local assortativity estimate from z(cid:96) = 0, indicating no confidence, to z(cid:96) = 1 when all node attributes within the neighbourhood are known. We adjust for these weights when plotting the histograms in the main text. (cid:96) when normalising to ensure that(cid:80) z(cid:96) =(cid:80) Appendix G: Calculating the personalised PageRank vector 10 The personalised PageRank vector is the stationary distribution of a random walk with restarts. We calculate it by direct simulation of the random walk process using the power method: wα(i; (cid:96))s+1 = α wα(j; (cid:96))s + (1 − α)δi,(cid:96) , (G1) Aij ki (cid:88) j and at convergence yields a distribution w(i; (cid:96)) with a mode at (cid:96). Appendix H: Integrating over α To integrate over all values of α, we take advantage of the fact that we can equivalently write the η-th approx- imation the power method in (G1) as the η-th degree truncation of the power series [37]: (cid:34)(cid:18) Ai(cid:96) ki (cid:19)s − (cid:18) Ai(cid:96) ki (cid:19)(s−1)(cid:35) . η(cid:88) s=1 wα(i; (cid:96))η = δi,(cid:96) + αs (H1) By taking advantage of the relationship between α and the sequence of approximations computed by the power method, we can calculate the distribution wα(i; (cid:96)) for a given α = α0 and use the sequence of approximations to calculate the distribution for any other α [37]: wα(i; (cid:96))η = δi,(cid:96) + (w(i; (cid:96), α0)s − w(i; (cid:96), α0)s−1) . αs αs 0 (H2) We can then integrate over all possible values of α [23], η(cid:88) (cid:90) 1 s=1 wmulti(i; (cid:96))η = wα(i; (cid:96))η dα η(cid:88) 0 = δi,(cid:96) + (wα0 (i; (cid:96))s − wα0 (i; (cid:96))s−1) s=1 (s + 1)αs 0 (H3) . (H4) Appendix I: Null model network generation We created a null model to generate networks with the same global assortativity as the observed network to compare the distributions of rmulti. For a fair compari- son, we decided to keep the node degree and metadata label fixed while randomly rewiring the network. We do so using a modified version of the Markov chain Monte Carlo (MCMC) sampling of the configuration model for stub-labelled3 simple graphs [38]. The modification is to 3 for simple graphs sampling from the space of stub-labelled graphs is equivalent to sampling from the space of vertex-labelled graphs [38] 11 Facebook. The dataset contains a total of 93, 969, 074 friendship edges between users of the same college. Each node has a set of categorical social variables: status {undergraduate, graduate student, summer student, fac- ulty, staff, alumni}, dorm, major, gender {male, female}, and graduation year. ensure that we sample a graph with (approximately) the same global assortativity as the observed network. We achieve this by adding a rejection sampling step based on the binomial likelihood of observing the number of edges g egg given the proportion of edges required to maintain the global between nodes of the same type min = m(cid:80) assortativity ωin =(cid:80) (cid:18) m g egg, (cid:19) (ωin)min (1 − ωin)m−min . (I1) L(Gi) = log min The modified MCMC algorithm is shown in Algo- rithm 1 Algorithm 1 stub-labeled MCMC Require: initial simple graph G0, initial temp t0 Ensure: sequence of graphs Gi for i < number of graphs to sample do choose two edges at random randomly choose one of the two possible swaps if edge swap would create a self-loop or multiedge then resample current graph: Gi ← Gi−1 else if U nif (0, 1) < exp (cid:16) L(Gi)−L(Gi−1) (cid:17) ti then swap the chosen edges, producing Gi else reject Gi end if end if ti+1 ← update(ti) end for Appendix J: Datasets 1. Weddell Sea Food Web The food web of the Antarctic Weddell Sea [4] rela- consists of 488 species and 15885 consumer tions. For each of the nodes in this network we have five categorical attributes: Metabolic Category {Plant, Ectotherm vertebrate, Endotherm vertebrate, In- vertebrate}, Feeding Type {Carnivorous/necrovorous, Herbivorous/detrivorous, Detrivorous, Omnivorous, Pri- mary producer, Carnivorous}, FeedingMode {Pelagic predator, Predator/scavenger, Primary producer, Preda- tor, Deposit-feeder, Grazer, Suspension-feeder}, Mobility {1, 2, 3, 4}, Environment {Bathydemersal, Land-based, Resource, Pelagic, Benthopelagic, Benthic, Demersal}. For scalar attributes we use the mean mass of the species, mobility (although discrete, the values are ordinal), and node degree. 2. Facebook 100 The Facebook100 dataset [3] contains an anonymised snapshot of the friendship connections among 1, 208, 316 users affiliated with the first 100 colleges admitted to 12 FIG. 8. Distributions of the local assortativity by year separated into first years and the rest of the students for each school. Schools are ordered by increasing proportion of first years that are more assortative than the rest of the students. First year students are more assortative than the rest for all schools except for one. FIG. 9. Distributions of the local assortativity by residence (dorm) separated into first years and the rest of the students for each school. Schools are ordered by increasing proportion of first years that are more assortative than the rest of the students. In general, first year students are more assortative than the rest, however there are some schools in which the difference between first year and the rest is negligible. In a few schools we observe that the first year students are less assortative than the rest. 13 TABLE II. List of schools ordered by global assortativity Johns Hopkins 55 # School 1 Amherst 41 2 Princeton 12 3 Trinity 100 4 Stanford 3 5 Swarthmore 42 6 7 Hamilton 46 8 Bowdoin 47 9 Harvard 1 10 Brown 11 11 Dartmouth 6 12 Wellesley 22 13 Haverford 76 14 Wesleyan 43 15 UConn 91 16 Tufts 18 17 Williams 40 18 Reed 98 19 Columbia 2 20 BC 17 21 Duke 14 22 Virginia 63 23 Oberlin 44 24 Villanova 62 25 Howard 90 26 WashU 32 27 Georgetown 15 28 Colgate 88 29 UF 21 30 BU 10 31 Carnegie 49 32 GWU 54 33 Bingham 82 34 NYU 9 35 UNC 28 36 Simmons 81 37 USF 51 38 JMU 79 39 UCF 52 40 Santa 74 41 Northeastern 19 42 Maine 59 43 Middlebury 45 44 Brandeis 99 45 Bucknell 39 46 MSU 24 47 Pepperdine 86 48 Vermont 70 49 Maryland 58 50 Vanderbilt 48 rglob 0.081 0.087 0.106 0.109 0.109 0.110 0.113 0.118 0.120 0.120 0.126 0.127 0.128 0.128 0.129 0.130 0.133 0.134 0.136 0.136 0.144 0.149 0.151 0.158 0.159 0.162 0.162 0.164 0.165 0.167 0.171 0.171 0.176 0.182 0.185 0.186 0.187 0.187 0.187 0.188 0.190 0.190 0.190 0.193 0.194 0.195 0.198 0.199 0.199 0.201 # School 51 William 77 52 Emory 27 53 UCLA 26 54 Tennessee 95 55 Wake 73 56 MIT 8 57 UMass 92 58 Berkeley 13 59 USC 35 60 Temple 83 61 UVA 16 62 Penn 94 63 Northwestern 25 64 Rutgers 89 65 UPenn 7 66 Michigan 23 67 FSU 53 68 Cornell 5 69 UC 64 70 American 75 71 Notre Dame 57 72 Rochester 38 73 Vassar 85 74 Lehigh 96 75 Texas 80 76 USFCA 72 77 UC 61 78 Syracuse 56 79 Yale 4 80 UCSB 37 81 Cal 65 82 Texas 84 83 UChicago 30 84 Smith 60 85 Mississippi 66 86 Baylor 93 87 UIllinios 20 88 MU 78 89 Tulane 29 90 Mich 67 91 UGA 50 92 Wisconsin 87 93 UCSD 34 94 95 UC 33 96 Auburn 71 97 Oklahoma 97 98 Caltech 36 99 UCSC 68 Indiana 69 100 Rice 31 rglob 0.203 0.205 0.208 0.209 0.212 0.219 0.222 0.222 0.224 0.228 0.230 0.231 0.234 0.235 0.235 0.236 0.238 0.238 0.251 0.253 0.255 0.256 0.256 0.258 0.261 0.263 0.265 0.270 0.273 0.277 0.279 0.291 0.291 0.292 0.297 0.297 0.297 0.306 0.313 0.322 0.336 0.338 0.355 0.356 0.361 0.370 0.397 0.426 0.480 0.504
1908.01456
1
1908
2019-08-05T03:45:17
A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management
[ "cs.SI", "cs.LG", "stat.ML" ]
It is a challenging and complex task to acquire information from different regions of a disaster-affected area in a timely fashion. The extensive spread and reach of social media and networks allow people to share information in real-time. However, the processing of social media data and gathering of valuable information require a series of operations such as (1) processing each specific tweet for a text classification, (2) possible location determination of people needing help based on tweets, and (3) priority calculations of rescue tasks based on the classification of tweets. These are three primary challenges in developing an effective rescue scheduling operation using social media data. In this paper, first, we propose a deep learning model combining attention based Bi-directional Long Short-Term Memory (BLSTM) and Convolutional Neural Network (CNN) to classify the tweets under different categories. We use pre-trained crisis word vectors and global vectors for word representation (GLoVe) for capturing semantic meaning from tweets. Next, we perform feature engineering to create an auxiliary feature map which dramatically increases the model accuracy. In our experiments using real data sets from Hurricanes Harvey and Irma, it is observed that our proposed approach performs better compared to other classification methods based on Precision, Recall, F1-score, and Accuracy, and is highly effective to determine the correct priority of a tweet. Furthermore, to evaluate the effectiveness and robustness of the proposed classification model a merged dataset comprises of 4 different datasets from CrisisNLP and another 15 different disasters data from CrisisLex are used. Finally, we develop an adaptive multitask hybrid scheduling algorithm considering resource constraints to perform an effective rescue scheduling operation considering different rescue priorities.
cs.SI
cs
A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial) Md. Yasin Kabir Department of Computer Science [email protected] Sanjay Madria Department of Computer Science [email protected] Missouri University of Science and Technology, USA Missouri University of Science and Technology, USA 9 1 0 2 g u A 5 ] I S . s c [ 1 v 6 5 4 1 0 . 8 0 9 1 : v i X r a ABSTRACT Every activity in disaster management such as managing evacu- ation plan, and running rescue missions demands accurate and up-to-date information to allow a quick, easy, and cost-effective response to reduce the possible loss of lives and properties. It is a challenging and complex task to acquire information from different regions of a disaster-affected area in a timely fashion. The exten- sive spread and reach of social media and networks allow people to share information in real-time. However, the processing of social media data and gathering of valuable information require a series of operations such as (1) processing each specific tweet for a text classi- fication, (2) possible location determination of people needing help based on tweets, and (3) priority calculations of rescue tasks based on the classification of tweets. These are three primary challenges in developing an effective rescue scheduling operation using social media data. In this paper, first, we propose a deep learning model combining attention based Bi-directional Long Short-Term Mem- ory (BLSTM) and Convolutional Neural Network (CNN) to classify the tweets under different categories. We use pre-trained crisis word vectors and global vectors for word representation (GLoVe) for capturing semantic meaning from tweets. Next, we perform feature engineering to create an auxiliary feature map which dra- matically increases the model accuracy. In our experiments using real data sets from Hurricanes Harvey and Irma, it is observed that our proposed approach performs better compared to other classifi- cation methods based on Precision, Recall, F1-score, and Accuracy, and is highly effective to determine the correct priority of a tweet. Furthermore, to evaluate the effectiveness and robustness of the proposed classification model a merged dataset comprises of 4 dif- ferent datasets from CrisisNLP and another 15 different disasters data from CrisisLex are used. Finally, we develop an adaptive multi- task hybrid scheduling algorithm considering resource constraints to perform an effective rescue scheduling operation considering different rescue priorities. KEYWORDS Social Media, Deep Learning, Disaster management, Rescue Sched- uling Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. SIGSPATIAL , November 2019, Chicago, Illinois, USA © 2019 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION The exponential growth in social media such as Twitter and Face- book experiencing their mass adaptation in several applications. The roles of social media extended but not limited to health and disease analysis and propagation detection [30], Quantifying con- troversial information [13], and disaster crisis management [6, 39]. Natural disasters frequently disrupt regular communication due to the damaged infrastructures [34] which lead to an outflow of information. A report on Hurricane Sandy [9] shows that people were using social media more frequently to communicate. People were seeking help quickly and promptly as they strive to contact friends and family in and out of the disaster area, looking for infor- mation regarding transport, shelter, and food. Hence, the huge flow of information over social media can be beneficial in managing a natural disaster more effectively. During Hurricane Sandy, Twitter proved its usefulness, and at the time of Hurricane Harvey and Irma, again Twitter played a crucial role in the rescue, donation, and recovery. However, while the use of social network seems ap- pealing, still most of the applications are still lacking features and fall short in their usability [22]. Figure 1: Examples of rescue requesting tweets Figure 2: A successful rescue during Hurricane Irma Figure 1 represents two tweets seeking rescue during Hurricane Harvey. People also tweeted similarly at the time of Hurricane Irma. Figure 2 shows a tweet after the successful rescue mission during Hurricane Irma. SIGSPATIAL , November 2019, Chicago, Illinois, USA Md. Yasin Kabir and Sanjay Madria Institutional and Volunteer rescue efforts save a lot of lives during a crisis. However, those rescue missions are not well-organized and structured due to uncertainty. Individual volunteers have time constraints and lack of resources. Moreover, some rescue missions might need extra precaution, advanced equipment, and medical facilities. Besides that, due to the variety of help requesting tweets, some of those tweets might be out of sight. Hence, an automated system is essential to understand the context of the tweets, classify the specific tweets for rescue, prioritize those tweets based on context, and then schedule rescue missions and allocate necessary resources accordingly. Our primary contributions in this paper are: • Developing a multi-headed binary classifier to classify the tweets into six different classes using deep learning where a single tweet can belong to multiple classes. We use a unique machine learning pipeline with a set of punctuation-based auxiliary features which are specifically correlated with the disaster-related tweets. • Evaluating and comparing the proposed model with different • We formally introduce a method for priority determination of each rescue request which plays a crucial role in maintaining fairness in the rescue scheduling. • We propose a resource constraint and burst time adaptive rescue scheduling algorithm with multi-tasking and priority balancing to perform improved rescue operations. machine learning models and diverse datasets. 2 RELATED WORK 2.1 Social Media Analysis for Disaster Management Most of the prior research work research works using social media and networks for disaster management are focused on assessing the disaster situation, and a little, if any, is focused on their use in rescue mission and planning. Authors in [39] proposed a res- cue scheduling algorithm on Hurricane Harvey which connects the victims with the scattered volunteers. A heuristic multi-agent reinforcement learning scheduling algorithm, named as ResQ [27], utilizes reinforcement learning to coordinates the volunteers and the victims during a disaster. [40] proposed a system that uses machine learning mechanism to extract the data that is generated by Twitter messages during a crisis. Authors in [12] presented a research showing how social media communication was used dur- ing the catastrophic Haiti earthquake. They adapted the method of crowd-sourcing for designing coordination protocols and mecha- nisms in order to create coordination between the organizations and their relief activities. [35] analyzed the extensive use of Twitter data in case of mass convergence or disaster situation such as the Southern California Wildfire. After several devastating incidents, a few disaster management applications such as Ushahidi [28] have been developed. 2.2 Tweets Classification The basic approach for tweet classification is to extract features from the text. Naive Bayes classifier[32] is one of the popular classi- fiers which models the document distribution using probability. An- other widely used entity in classification is Support Vector Machines (SVM), which draws a linear separator plane among the classes [7]. To perform the classification, K-Nearest Neighbor Classifier [15] offers proximity-based classifier, and uses distance measurement among the words. The idea of the deep neural network for natural language pro- cessing first used in [20] uses a multitask learning model using the neural network. [10] proposed a deep neural network consisting of 29 layers for natural language processing. [18] and [26] showed that combining with external pre-learned word vectors such as GloVe [31], a neural network can be trained better for the disaster datasets. Our proposed deep learning model took inspiration form their work. However, those works did not consider any auxiliary features or at- tention layer. As a tweet has character length restriction, attention layer with domain-specific engineered auxiliary features can be highly influential. In this work, we create a set of auxiliary features and use an attention based deep neural network to classify the tweets into 6 different classes where each class represents a binary output label, and a single tweet can belong to multiple classes. 2.3 Scheduling Algorithms The scheduling algorithms intend to optimize the time and the use of resources among different parties employing certain constraints. The primary purpose of a scheduling algorithm is to ensure fairness among the participants while maximizing resource utilization. First- Come-First-Served (FCFS) algorithm can not provide fairness when someone cannot wait to use the resource or when someone needs a priority based on a situation. [33] improved the FCFS using parallel processing technique. [21] worked with fixed-priority scheduling to consider the complexity of determining whether a set of periodic real-time tasks can be scheduled on m > 1. [17] proposed fixed- priority scheduling using a fixed-relative deadline. After a certain period of time, a task became suspended upon failure and the re- source became available. [16] presents a scheduling algorithm for emergency medical rescue conflict monitoring and dispatch sched- uling based on the hybrid estimation and intent inference. [38] took a heuristic approach for solving the rescue unit assignment and scheduling problem under the resource constraints. In [39], the authors discuss the utilization of the public resources for disas- ter rescue with the priority based scheduling policy. The authors present a discussion about the fairness and importance of priority based on rescue scheduling. However, there is no formulation to determine the priority scores of rescue scheduling tasks. In this paper, we formally define a method to determine the priority score of rescue tasks and propose a multi-task hybrid scheduling policy using priority, based on certain criteria to develop an effective and efficient rescue scheduling algorithm. 3 TWEETS CLASSIFICATION AND INFORMATION RETRIEVAL Twitter data from two different natural disasters (Hurricane Harvey and Hurricane Irma) were collected for this work. We collected these tweets from August 26 to August 31, 2017 and September 10 to September 17, 2017, respectively. We use Twitter Stream API to collect the tweets along with various meta-information such as user information, geo-location, tags, entities, etc. A simple work- flow for Tweets collection and information retrieval is shown in A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial) SIGSPATIAL , November 2019, Chicago, Illinois, USA Figure 3. The pre-processing step involves discarding non-English tweets, filtering noises and duplicates, removing special characters, stop-words, and jargons. Figure 3: Simple workflow of data collection and informa- tion extraction A tweet classifier is developed using the neural network to iden- tify whether a tweet falls into one or more classes from six different classes (Rescue needed, DECW, Water needed, Injured, Sick, Flood). DECW stands for Disabled, Elderly, Children and Women. Accord- ing to the FEMA [1, 3], WHO [5], and NCDP [4], the "vulnerable populations" or "at-risk individuals" includes children, senior cit- izens, pregnant women, disabled, sick or injured persons. Hence, we labeled and categorized the tweets accordingly. The label "Res- cue needed" is the base label which identifies if a tweet is seeking rescue or assistant to evacuate. We use the label "Water Needed" as a request for drinkable water identified as a vital resource during any disaster or emergency by the CDC [2]. Finally, we also used the label "Flood" because flood is common during hurricanes and should be considered appropriately for determining the priority in rescuing a victim and preparing the rescue mission with appropriate resources. Those six classes help in determining the rescue situation, and their priorities along with the resources needed or requested in a tweet. To classify a tweet, the tweet text along with a processed set of auxiliary features fed into the classification algorithm. 3.1 Deep Neural Network The proposed deep learning model comprises 7 primary compo- nents: the Input layer, Embedding layer, BLSTM layer, Attention layer, Auxiliary features input, Convolution layer, and Output. Fig- ure 4 depicts the fundamental system architecture of the model. Input layer: Pre-processed tweets fed to the input layer which is connected with the embedding layer. Embedding layer: This layer encodes the input into real-valued vectors using lookup tables. Pre-trained word embedding is proven beneficial to understand the semantic meaning of the words and improve the classification models. In this work, we used a pretrained word vectors named Crisis [18] and GloVe [31] which generates a feature word vectors using co-occurrences based statistical model. Embedding applied to the words aids to map all tokenized words in every tweet to their respective word vector tables. To unify the feature vector matrix, appropriate padding is added. BLSTM layer: The Long-Short Term Memory (LSTM) is a spe- cialized version of Recurrent Neural Network (RNN) that is capable of learning long term dependencies. While LSTM can only see and learn from past input data, Bidirectional LSTM (BLSTM) runs input in both forward and backward direction. This bidirectional feature of BLSTM is critical for the various applications involved with un- derstanding complex language [36] as it can capture both future Figure 4: System architecture of the proposed model and past context of the input sequence. (cid:17) (cid:16) it = σ (Wxi xt + Whiht−1 + Wcict−1 + bi) Wxf xt + Whf ht−1 + Wcf ct−1 + bf ft = σ ot = σ (Wxoxt + Whoht−1 + Wcoct + bo) ct = ft ct−1 + it tanh(Wxc xt + Whcht−1 + bc) ht = ot tanh(ct) (1) (2) (3) (4) (5) The input gate it , forget gate ft , output gate ot , and cell state activation ct of the implemented LSTM version in this work can be defined by the equations (1)-(5) where σ represents the logistic sigmoid function, h represents the respective hidden vectors, and W is the weight matrix. A detailed explanation of each equation and more about LSTM are available on [14]. Attention layer: Every word in a sentence does not contribute equally to represent the semantic meaning and the primary concept of attention [24] originated from this observation. We use a word- level deterministic, differentiable attention mechanism to identify the words with the closer semantic relationship in a tweet. Equation 6 represents the attention score ei, e of each word t in a sentence i, where д is an activation function. More information on the attention mechanism is available on [19]. ei, j = д (W ht c) (6) Auxiliary features input: A tweet can only contain 280 char- acters (previously 140) which forces a user to express emotions and opinions in a different way compared to a traditional English sentence. People use extra punctuations and emoticons to intensify Predicted OutputAuxiliary Features InputConvolution layerCNNCNNCNNSigmoidDense LayerText EmbeddingLSTMLSTMLSTMLSTMLSTMLSTMLSTMLSTMAttention layerInput LayerGloVeCrisis SIGSPATIAL , November 2019, Chicago, Illinois, USA Md. Yasin Kabir and Sanjay Madria the meaning of a tweet. We also observed (e.g. Figure 1) greater use of numeric characters in a rescue seeking tweet due to the fact that people try to share location in the tweets, which most of the time essentially contains digits. In this work, we perform feature engineering to obtain a set of specific auxiliary features that can assist the classification model to learn better. A list of extracted auxiliary features that shows noticeable influence during the model evaluation is given in Table 1. The well-known Natural Language Toolkit (NLTK) [23] is used to extract those features. Table 1: Auxiliary Features polarity, subjectivity, sentiment, wordsVsLength, exclamation- Marks, questionMarks, digitVsLength, digitVsWord, punctua- tionVsLength, punctuationVsWords, nounsVsWwords, sadVs- Words, angryVsWords, capitalsWords, capitalsVsWords, unique- Words, repeatedWords, numberOfHashtags. (cid:17) ci = σ Convolution layer The convolution layer performs a matrix- vector operation in the sentence-level representation sequence. Let us assume that H ∈ Rd∗w be the weight matrix, and the feature mapping done as c ∈ Rl−w +1. The i-th element of the feature map can be defined as: (cid:16)(C [∗, i : i + w] oH) + b (7) In sentence-level representation, C[∗, i : i + w] is the i-th to i+w-th column vector. The word vectors pass through the convolution layers [37] where all the input information merged together to produce a features map. The Rectified Linear Unit (ReLU) used as the activation to deal with the non-linearity in the convolution layer and generate a rectified feature map. Finally, the dense layers are activated for generating the outputs. Output layer The activation function siдmoid is used in the dense layer as we want to perform multi headed binary classifica- tion. The model produces binary values for all six target output classes. Detailed information on model hyperparameters and eval- uation results is given in section 5.1. 3.2 Location extraction Due to the privacy policy of Twitter, most of the tweets do not contain any location information. In those cases, we try to extract location using user profile meta information and the location in- formation provided in the tweeted text. Combining the Stanford Named Entity Recognizer (NER) [11] and Google map API, an ap- plication is built for extracting location. 4 RESCUE SCHEDULING 4.1 Problem Specification Let us assume that the number of rescue teams be m with n pending rescue tasks. Let the processing time of rescue task j by team i be tij, where 1 ≤ i ≤ m, 1 ≤ j ≤ n. Based on a typical disaster situation, we consider that the number of rescue tasks is greater than or equal to the number of rescue teams (n ≥ m). The problem is to organize and assign the tasks to rescue teams in such a way that the amount of waiting time for each rescue mission is minimized. However, due to the inconsistent nature of the rescue tasks and the location of the incidents, the formulation of this problem faces the following major challenges. (1) Every rescue team may not capable of processing each task. We need to consider specific requirements of each task and different capabilities of rescue units. (2) It is difficult to precisely estimate the required time tij for a task due to the uncertainty of the environment and location of an incident. (3) Tasks might have different priorities based on the people needed to execute them and their physical condition. The environmental condition of a person such as surrounded by flood water, or fire should also be taken into account while determining priority. Along with the above challenges, we also consider the following restrictions and conditions to formulate the problem effectively. • We imposed a time tj for a task j, where tj denotes the required time for a rescue team i to move from initial rescue center to the place of incident. The time for moving from the location of a task j to another task j′ is represented by tj j′. • Every team requires a preparation time before leaving for a scheduled rescue job from their respective rescue manage- ment station. The preparation time is denoted as ti for every team for a specific task j. Also, after a certain period, every team might require a resting time of tir before the next task. Considering the above sequence of times (tij, tj, tj j′, ti, and tir ), we can estimate a probable time for a rescue mission. Although the time can be changed based on the situation, we consider some constant time variable considering the distance of a task location and the probable situation of the environment around the incident. 4.2 Priority determination A significant step for the rescue scheduling algorithm is deter- mining the priority of rescue tasks. We use the output labels of tweet classifier ( Section 3.1) and assign a weight for each label to determine the priority of that tweet. Assume that the assigned weights for different labels of the tweets is represented by a vector wj = [w1, w2, ...wn]. A feature vector αi = [α1, α2, ...αm] also used which denotes the weight of other considerable variables such as the number of victims, real-time environmental conditions and future weather forecasts of a specific location. The equation 8 rep- resents the formula to estimate the priority for a rescue task. The base priority value of a tweet is 1 where the maximum priority score can be 10. m i =1 n j=1 fp = αi + wj (8) 4.3 Rescue scheduling algorithms General scheduling algorithms are not applicable in disaster rescue scenario as those algorithms might be unfair due to different situ- ations, physical conditions, and the critical importance of human life. A priority-based scheduling algorithm might provide a better solution where we need to consider and determine the priority con- tinuously. In a disaster scenario, priorities can change with time and environmental conditions. Hence, We develop an effective rescue scheduling algorithm considering priority, environmental severity, A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial) and processing time of every single task. We like to define the terms which we use to represent our algorithms. • Tasks: A task is the combination of one or more valid rescue requests by an individual or multiple people. A list of valid requests forms a sequence of tasks which demands to be scheduled appropriately. • Processors: The number of rescue units which can complete a given task is the processors. A processor is responsible to execute a given task, release the resources upon completion, and get back to the initial state to execute a new task. • Arrival Time: The time of receiving a valid rescue request represents the arrival time for a specific task. In our rescue scheduling system, arrival is the time-stamp of a tweet. • Burst Time: The probable time required to complete a task by a processor can be defined as burst time. The burst time is realistically represents the service time of a processor for a rescue mission. In a disaster scenario, estimating appropri- ate burst time is very challenging. Similar tasks might take different times to complete under separate circumstances. To address this issue, first, we assume a probable burst time based on the rescue operations in previous disasters. After the completion of a few rescue missions, the burst time of the future mission is determined using the actual comple- tion time of those missions. To predict the future burst time, we use the exponential averaging method. Given n tasks (taskSeq[1...n]) and burst time for tasks ti, the predicted burst time for the next task taskSeqn + 1 will be: BTn+1 = αTn + (1 − α)BTn (9) In the above equation, α is a constant factor ranging (0 <= α <= 1). The value that can predict the best possible burst time will be assigned as α. The variable BTn denotes the pre- dicted or assumed burst time for the task n, and Tn represents the actual burst time needed for completing task n. Three different scheduling algorithms are implemented for the experiments. All of those algorithms are implemented using multi- ple processors as it is expected to have more than one rescue unit in an emergency rescue situation. Although we emphasize on Multi- task Hybrid Scheduling algorithm, however, we study fundamental rescue algorithms to understand the limitations of these established methods. This study also indicates the necessity of a novel adaptive Hybrid Scheduling algorithm for a disaster scenario. First-Come-First-Serve (FCFS). In FCFS scheduling system, 4.3.1 the task requests are sequentially processed in the order of the arrival time. A sequence of tasks list (taskSeq) with the requests arrival time (arrivalTime) and probable burst time (burstTime) is fed to the algorithm as input. The algorithm returns the scheduled tasks sequence with the possible start time. However, estimate burst time can change and needed to update while the processor is processing a task. While FCFS is a simplest scheduling algorithm, it has two major concerns which need some attention. • In a disaster scenario, every rescue request is not similarly critical. FCFS fails to consider the tasks which have an ur- gency of completion. SIGSPATIAL , November 2019, Chicago, Illinois, USA • FCFS is a non-preemptive scheduling algorithm which is responsible for the short jobs to wait longer based on the sequence order. 4.3.2 Priority Scheduling. In a disaster scenario, conducting rescue missions based on priority can be crucial. There can be lots of rescue requests which can wait longer, and might not be as critical as some other requests. A priority-based scheduling algorithm can be more appropriate considering those facts. The algorithm executes the task based on an ordered queue with high to low priority values. A priority queue based scheduling algorithm is demonstrated in the Algorithm 1. taskSeq[1...n], arrivalTime[at1...atn], Algorithm 1 Priority scheduling with multi-processors Input: processorNo, Output: scheduleSeq[taski ...taskn], startTime[st1...stn], burstTime[bt1....btn], tasksPriority[1...n]; turnAroundTime, averageWaitingTime, averageTurnAround- Time; Initialization: All the processors K are released and ready to begin a task. Initialize, scheduleSeq, startTime, and turnAroundTime as list []; currentTime = 0, waitingTime = 0, totalTurnAroundTime = 0; Sort the taskSeq, arrivalTime, burstTime using taskPriority and assign the tasks in priority queue Pqueue; 1: if (new task request) then 2: update Pqueue, taskSeq, arrivalTime, burstTime, number of tasks n; 16: 17: 18: + (currentTime- = waitingTime end if startTime.append(currentTime); waitingTime arrivalTime[i]); completionTime = currentTime + burstTime[i]; currentTrunAroundTime = completionTime - arrival- Time[i]; totalTurnAroundTime = totalTurnAroundTime + current- TrunAroundTime; turnAroundTime.append(currentTrunAroundTime); release K; else 19: 20: 21: 22: end if 23: 24: end for 25: calculate averageWaitingTime, averageTurnAroundTime; return to if select task i to be processed; dequeue the root element from Pqueue scheduleSeq.append(i); K∗ are the available processors to process task i; if (K∗ (cid:44) ∅) then assign current task to K; if (currentTime<arrivalTime[i]) then currentTime = arrivalTime[i]; 3: end if 4: for i = 1 to n do 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: SIGSPATIAL , November 2019, Chicago, Illinois, USA Md. Yasin Kabir and Sanjay Madria 4.3.3 Multi-Task Hybrid Scheduling. The incidents at the end of the priority queue need to wait longer when there is a large scale disaster because of plenty of rescue requests. Assume there are some tasks which need to wait longer for rescue due to lower pri- ority. Suppose some of those tasks are located in an area where the disaster situation is worsening by time. The severity can increase fast at those places. A priority balancing scheduling policy might be helpful in such a scenario. It may need more information and human input to decide how and when to increase the priority of a task before it enters into critical condition. To solve this dilemma, we introduce a priority balancing module which re-calculate the priority score after the completion of each rescue mission. Instead of a single rescue task in a mission, a rescue team can execute multiple tasks depending on available resources. For ex- ample, in a flood situation, several individuals can be rescued in the same boat and transferred to a shelter together. We illustrate this idea along with priority balancing in Algorithm 2. A processor can be assigned for multiple tasks in a single rescue mission if it has available resources. We use a 2 miles radius area for this pur- pose. A processor looks for other available tasks which are within 2 miles radius of the assigned event. It will incorporate multiple tasks as long as the processor has adequate resources and executes those tasks sequentially using priorities. Comparative performance evaluation of the algorithms is present in Section 5.2. In Section 5.3 we describe and demonstrate the Multi-Task Hybrid Scheduling algorithm using a real-world disaster scenario. 5 EXPERIMENTAL RESULTS 5.1 Tweets Classifier Evaluation The primary goal of the tweet classification is to identify the peo- ple who need help and determine a priority score for each tweet based on the classified labels. To accomplish this goal, 4900 tweets were manually labeled into six different binary classes from 68,574 preprocessed tweets on Hurricane Harvey and Irma. We evaluate the proposed classification model on this labeled dataset and com- pared it with the well-established Logistic Regression (LR), Support Vector Machine (SVM) and fundamental CNN model. Moreover, in order to fully understand the effectiveness of our approach, we evaluate our model on several past disaster datasets obtained from CrisisNLP [18] and CrisisLex [29]. We use the same datasets and data settings of Nguyen et al.[26] and compare the output of our proposed model with the stated results of LR, SVM, and CNN in the same paper. Further, to evaluate the robustness of our proposed technique, we merged 15 different disasters data from CrisisLex [29] and perform a binary classification which identifies the tweets relevant to a particular disaster. 5.1.1 Model Parameters. A set of optimal parameters is crucial to achieve desired performance results. We perform rigorous pa- rameter tuning and select an optimal set that is used in all the experiments. We use the same parameter for better evaluation and model reproducibility. Table 2 represents the used parameters for the model. The popular evaluation metrics such as precision, recall, F1-score, accuracy , and AUC score is used to validate and compare the experimental result of the models. 10: 11: 12: 13: 14: 15: 16: 17: 18: Algorithm 2 Multi-tasks Hybrid Scheduling Input: processorNo, taskSeq[1...n], burstTime[bt1....btn], tasksPriority[1...n], tasksloca- arrivalTime[at1...atn], tion[1...n], disRadius; Output: scheduleSeq[taski ...taskn], startTime[st1...stn], turnAroundTime, averageWaitingTime, averageTurnAround- Time; Initialization: All the processors K are released and ready to begin a task. Initialize, scheduleSeq, startTime, and turnAroundTime as list []; currentTime = 0, waitingTime = 0, totalTurnAroundTime = 0; Sort the variables in descending order using taskPriority. Re- sort the values in ascending order using burstTime and arrival- Time for same taskPriority tasks. Assign the tasks in priority queue Pqueue; 1: if (new task request) then 2: update Pqueue, and resort taskSeq, arrivalTime, burstTime, number of tasks n; 3: end if 4: for i = 1 to n do 5: 6: 7: 8: 9: select task i to be processed; dequeue the root element from Pqueue scheduleSeq.append(i); K∗ are the available processors to process task i; if (K∗ (cid:44) ∅ and available K is capable of addressing task i) then assign current task to K; for m = i + 1 to n do calculate the distance d of taskSeq[m] from current task using tasksLocation[m]; if (d<disRadius and K has the extra resources to com- plete taskSeq[m] after current task) then add taskSeq[m] with the current task queue and cre- ate a sub-scheduling for those tasks; dequeue the taskSeq[m] and update Pqueue; else end if end for estimate startTime, waitingTime, totalTurnAroundTime following the similar process of algorithm 2. release K; return to if 19: 20: 21: end if 22: 23: end for 24: calculate averageWaitingTime, averageTurnAroundTime; 5.1.2 Evaluation on Hurricane Harvey and Hurricane Irma data. We use 4900 manually labeled tweets for this evaluation where 3920 tweets (80%) used for training and the rest of the 20% tweets used for testing. In the evaluation tables, we denote our model as CN NAAf , which stands for CNN with Attention and Auxiliary features. We compare our model (CN NAAf ) with LR, SVM, and CNN without attention and auxiliary features. Our model outperformed all other models by more than 5% inaccuracy metrics. In terms of precision, the proposed model performed surprisingly well and outperformed the closed result of SVM by around 25%. A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial) Table 2: Hyperparameter values Conv1D Layer Dense Layer Hyperparameter Value/Description Text embedding BLSTM Layer Dimension: 300 2 layers; 300 hidden units in each (Forward and Backward) 3 layers; 300 convolution filters 3 layers; First 2 layers have 150 and 75 units respectively and the last one is output (Dense) Word Embedding: 0.3; Dense layer: 0.2 each; Drop-out rate Conv1D, BLSTM, Dense: ReLU; Output Dense Activation func- layer: Sigmoid; tion Adam optimizer Learning rate = 0.0001; beta1=0.9; Epochs and batch Epochs = 10 to 25; batch size = 128; Table 3 represents the full evaluation results for the different classifiers. Table 4 represents the evaluation metrics for individual classes (Hurricane Harvey and Irma) using CN NAAf model. The distributions of the six classes in the data are Help - 29.1%, Flood - 26.3%, Water Needed - 4.9%, DCEW - 4.1%, Injured - 0.3%, Sick - 0.3%. However, we discarded labels Injured and Sick due to lack of enough data instances for training and testing so that it cannot influence the metrics of the model. As there are few true positive instances, those two labels achieve a higher rate of Accuracy although the model is not identifying true positive instances. We can also observe a better precision and accuracy for labels Water Needed and DCEW. This is happening as there are also a few true positive instances. However, still, the model has performed well for the recall and F1-score as the words found in the tweets for those labels have fewer variations. Table 3: Classifier evaluation (Hurricane Harvery and Irma) Model F1-score Accuracy LR SVM CNN CN NAAf Precision Recall 93.0 85.4 90.8 93.4 69.7 73.9 73.4 87.2 55.8 65.1 61.6 81.7 84.5 88.5 87.5 93.7 Table 4: Evaluation metrics for individual classes (Hurricane Harvery and Irma) using CN NAAf model Class Help Flood Water Needed DCEW Weighted Avg Precision Recall 97.7 94.1 71.4 73.2 93.4 F1-score Accuracy 91.2 85.3 78.7 82.3 87.2 87.9 78.2 87.5 93.7 81.7 94.9 91.3 98.0 98.5 93.7 5.1.3 Evaluation on CrisisNLP and CrisisLex datasets. We use the same datasets and class distributions consisting of Nepal Earthquake, California Earthquake, Typhoon Hagupit, and Cyclone PAM which is described in [18]. In that paper, the authors evaluate the models on event data, out-of-event data and a combination of both datasets. In table 5, we represent the results on the com- bination of both datasets. Clearly, our proposed CN NAAf model outperformed all other models in term of AUC score which the SIGSPATIAL , November 2019, Chicago, Illinois, USA authors also used in the referenced paper. Auxiliary features have a high impact to better understand the semantic meaning of the tweets which is reflected on the AUC score. Table 5: Classifier evaluation AUC scores (CrisisNLP) LR SVM CN NI CN NAAf 82.6 75.5 75.9 90.6 Disaster Name Nepal Earthquake California Earthquake Typhoon Hagupit Cyclone PAM 83.6 74.7 77.64 90.74 87.5 83.6 88.3 92.6 84.8 78.3 85.8 92.6 Table 6: Used Datasets from CrisisLex 2012 Colorado wildfires, 2012 Costa Rica earthquake, 2012 Guatemala earthquake, 2012 Italy earthquakes, 2012 Philipinnes floods, 2012 Typhoon Pablo, 2012 Venezuela refinery, 2013 Al- berta floods, 2013 Australia bushfire, 2013 Bohol earthquake, 2013 Colorado floods, 2013 Manila floods, 2013 Queensland floods, 2013 Sardinia floods, and 2013 Typhoon Yolanda. We consider 15 different natural disaster datasets from CrisisLex [29] is presented in table 6. After removing null values and prepro- cessing the merged datasets contains 13738 data instances. We use around 75% data for training (9268) and validation (1030) and 25% data for testing (3440). The comparative evaluation result using sklearn metrics is presented in table 7. It is observable that the domain-specific auxiliary features along with attention layer is highly beneficial for understanding and identifying crisis tweets. Our proposed approach can be used on a diverse set of datasets with good outcome and this might play a crucial role to develop quick response application on the disaster domain. Table 7: Classifier evaluation (CrisisLex) Model LR SVM CNN CN NAAf Precision Recall 71.1 74.7 76.3 93.7 85.8 90.9 93.4 93.6 77.8 82.1 84.2 93.4 85.8 73.2 76.4 93.6 F1-score Accuracy 5.2 Computational experiment on scheduling algorithms A computational experiment has been performed on the proposed algorithm in Section 4. For the purpose of evaluation and compar- ison, a data-set consisting of hurricane Harvey tweets between 27th August 2017 and 31st August 2017 have been used. To iden- tify the rescue seeking tweets, the proposed tweet classification model is used. We processed the identified tweets to extract and determine the required information for the scheduling algorithm such as location, possible service time (burst time), and priority using the described process in Section 3. The priority of each tweet was determined on a scale of 10 using four classes (Flood, Water Needed, DCEW, and Sick or Injured), labeled by the classifier fol- lowing Equation 8. The weights for those classes were assigned SIGSPATIAL , November 2019, Chicago, Illinois, USA Md. Yasin Kabir and Sanjay Madria as 1.5, 1.5, 2 and 2.5, respectively. For the environmental feature vector, we use a random distribution between 0.5 to 2.5. However, automatic weight determination still remains an open problem for the research. Next, the probable service time was estimated for each of the rescue tasks. We use the normal distribution of average ser- vice time as 54 minutes which is described in [39]. Finally, after all the processing, 174 rescue seeking tweets were found from around 72 hours data frame. This sample size is relatively small and dis- tributed over a longer period which is depicted in Figure 5. Hence, we performed upsampling using resample and linear interpolation methods from python pandas library [25] and created a dataset containing 550 rescue tasks to evaluate the rescue algorithms. Figure 5: Distribution of rescue seeking tweets per hour The algorithms were implemented using the multiprocessing system. We use the number of rescue units (processors) as 10 and 20 to evaluate the performance of the scheduling algorithms. In Multi-task hybrid scheduling algorithm, the traveling time from one rescue location to another also considered while combining multiple tasks. Eventually, this estimation reduces the processing time for those tasks. Table 8 describes the summary of the three algorithms. In the table, 10p and 20p represent the number of processors used to execute those algorithms. The average waiting times are lowest in case of Multi-task hybrid scheduling algorithm. The average waiting time (hours) with the number of processed tasks is represented in Figure 6. The experimental results can be summarized as follows. Table 8: Average waiting time summary Algorithms FCFS Priority Multi-tasks Hybrid Max avg WT Mean avg WT 10p 4.74 5.54 4.47 20p 1.61 1.63 1.31 20p 3.73 3.85 3.02 10p 2.53 2.81 2.24 • FCFS scheduling algorithm performs better comparing to Priority scheduling algorithm. However, in a disaster sce- nario, FCFS is not a fair policy to distribute the resources and rescue mission. Priority scheduling has a longer average waiting time because the lower priority tasks are waiting longer in the queue. Figure 6: Average waiting time using 10 and 20 processors • Multi-tasks hybrid scheduling beats all other algorithm with respect to average waiting time. This algorithm is more prac- tical for effective rescue scheduling and resource allocation as it consider resource constraints. It allows completing small tasks together of a nearest distance. Furthermore, it can be utilized to transfer the required resources (such as water, medicine) to the different locations while optimizing the average waiting time. However, the maximum average wait- ing time for this algorithm can be high for a task with less priority and larger processing time. It can happen when the location of a mission is far away with a low priority score. 5.3 Experimental analysis on real-world disaster scenario A sample data-set is processed from the tweets during Hurricane Harvey to demonstrate Multi-task Hybrid Scheduling algorithm. An area of 20 square miles radius at Port Arthur, Texas has been selected for performing rescue operations. Figure 7 represents the geographical locations of the victims and the hyphothetical rescue operation base in the Port Arthur, Texas during hurricane Harvey. The ArcGIS javascript API [8] is used to create Figure 7 and 8. To demonstrate the algorithm, we assume that there is a rescue operation base at Tyrrell Elementary School, Port Arthur, TX. We simulate the rescue operations using 2 and 4 rescue units. The experimental process can be summarized by the following steps: • First, We have selected the rescue seeking tweets and ex- tracted the location using the Stanford Named Entity Recog- nizer (NER) [11] and Google map API. • Second, we extracted 10 tweets which were arrived first and located around 20 miles radius of the rescue operation base after 12pm of 30th August 2017. • Third, the priority score, probable burst time and distance metrics have been calculated for each of the 10 rescue tasks. • Finally, the Multi-task Hybrid Scheduling algorithm created the rescue schedule. We have simulated the experiment using 2 and 4 rescue units and two different distributions of the possible burst time. First, we assumed the required burst time to be 54 minutes for each task based on the paper on hurricane Harvey rescue by Yang et al. [39]. Further, we use a random completion time for the first 5 tasks and predict the burst time of future rescue missions using equation 9. A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial) SIGSPATIAL , November 2019, Chicago, Illinois, USA Table 10: Environmental features example id Forecast Current Storm Road Damaged Storm Flood 1 2 3 4 5 0 0 0 0 1 1 0 1 1 0 1 1 0 0 0 0 0 1 0 0 Burst Time Priority Score Distance from Base Table 11: Real-world data sample for simulation taskSeq Arrival Time 12:13 12:45 12:58 14:07 14:46 15:23 16:10 16:52 17:30 18:05 5.1 5.0 6.9 7.0 3.9 4.5 1.9 7.7 1.8 2.0 1 2 3 4 5 6 7 8 9 10 54 54 54 54 54 75 70 30 35 45 7 2 5 5 1 2 8 7 5 6 The Multi-task Hybrid Scheduling algorithm can be demon- strated on the data in the table 11 as follows. We use 2 rescue units to illustrate the algorithm. (1) The Start time of the rescue operation is 14:00. So, there will be 3 tasks in the queue at the time of the first iteration. The algorithm will first sort the tasks based on the priority score. Hence, the sorted sequence will be 1 >= 3 >= 2. (2) The location of the highest priority task (taskSeq 1) will be the point of interest. The algorithm will consider a perimeter of 2 square miles of that point and check if any other rescue task is there which can be combined. We can observe that taskSeq 1,2, and 3 are within 2 miles radius. If a rescue unit contains enough resource for running those 3 operations se- quentially, it will combine those tasks and rescue the people in a single go without coming back and forth to the base. (3) The algorithm will further create a sub-schedule of 3 tasks assigned to rescue unit 1. Task 1 has the highest priority score and hence, the rescue unit will first go to location 1. From Figure 8, we can observe that tasks 1 and 3 are in a close distance. However, task 2 has a higher priority. As the algorithm emphasizes the priority score most, it will schedule task 2 before task 3. The rescue unit will assist the people in location 2 and then come back to location 3. Finally, it will come back to the base after the completion of all 3 tasks. (4) If there are multiple tasks with the high priority (priority >= 7), separate rescue unit will be assigned despite of there oc- currence in a close proximity. In our experimental setup if two tasks with high priority are within 2 miles radius, the algorithm assigns two separate units for those two tasks. However, if there is only one rescue unit available, the algo- rithm will follow the above approach. Multiple tasks with Figure 7: The geographical positions of the victims (Red icons) and hypothetical rescue operation base (Home icon). Tables 9 and 10 represent example data sample of tweet labels and environmental features for priority calculation using Equation 8. We have used demo weights for the labels and environmental features as (Flood - 1.5, Water Needed - 1.5, DCEW - 2, Sick or Injured - 2.5, Storm - 1, Road Damaged - 1, forecasted storm - 0.5, forecasted flood - 0.5) respectively. We used experimental weights because determining the weights for those labels and features re- quires domain expert and extensive study. An appropriate authority or domain expert will be able to input precise weight values for the labels and environmental features considering the situation during an actual disaster. In the tables, id represent the respective tweet which is later refers to the same numbered taskSeq in Table 11. The calculated priorities also presented in Table 11 as Priority Score. Table 9: Classified tweet labels for priority determination Needed DCEW Sick or Injured id Flood Water 1 2 3 4 5 1 1 0 1 0 1 0 1 0 0 0 0 1 0 0 1 0 0 1 0 Table 11 represents some columns of the processed sample data set of Port Arthur for the rescue scheduling. In the table, the burst- Time is represented in minutes and distanceFromBase is measured in miles. To use Multi-task Hybrid Scheduling algorithm on the data, we need to assume some parameters. We consider the starting time of rescue mission as 14:00, the speed of the used vehicles or boats to rescue is 20MPH, and after the completion of each rescue mission a rescue unit requires 30 minutes as a preparation time before next task. SIGSPATIAL , November 2019, Chicago, Illinois, USA Md. Yasin Kabir and Sanjay Madria the same priority will be sorted based on burst time and arrival time, respectively. Multiple tasks with same priority and burst time will be sorted using arrival time. (5) Based on the conditions, taskSeq 1, 2 and 3 will be assigned to rescue unit 1. Rescue Unit 2 will take care of taskSeq 4 which arrives at 14:07. The algorithm will wait until the completion of a task, after which a rescue unit became available. (6) The taskSeq 4 will complete first and rescue unit 2 will be- come available around 16:13. The algorithm will iterate again and sort the remaining tasks. At this point, the queue con- tains 3 tasks (taskSeq 5,6 and 7). (7) Employing the conditions, the sorted order for the tasks will be 7 >= 6 >= 5. The taskSeq 7 has a high priority and there are no other victims nearby. Hence, rescue unit 2 will be assigned to complete task 7. (8) Rescue unit 1 will be available again at 17:55. The algorithm will continue iterating until all of the 10 tasks are completed. Route Distance Route Duration Table 12: Rescue scheduling output table of Multi-tasks Hy- brid Scheduling algorithm using 2 rescue units taskSeq Start Time 14:00 15:09 16:09 14:07 16:13 17:55 18:05 19:32 19:41 20:49 TAround Time Unit 1 176 1 191 1 265 75 2 2 79 1 116 2 51 2 163 347 1 2 429 Waiting Time 122 137 211 21 09 86 06 128 272 375 5.1 2.0 2.2 7.0 1.9 7.7 2.0 1.8 4.5 3.9 1 3 2 4 7 8 10 9 6 5 15 06 07 21 06 23 06 06 14 12 Table 12 represents some output values and rescue schedule for the data illustrated in Table 11. The column StartTime represents the scheduled time for the respective task. RouteDistance denotes the actual one-way path that a rescue unit needs to travel for a par- ticular rescue mission. When multiple tasks are group together for a single mission the RouteDistance became the path between previ- ous task and current task. For example, in Table 11, the distance of rescue location of taskSeq 3 from base is 6.9 miles. However, as tasks 1,2 and 3 grouped together the distance between the previous task 1 and task 3 became 2 miles. RouteDuration is the rounded time in minutes to travel the specific RouteDistance. In our experiment, we assume that a rescue unit needs 3 minutes to travel a mile. W aitinдTime is the subtraction of StartTime and ArrivalTime with the addition of required travel time (RouteDuration) for a res- cue location. The turnaround time is represented by T AroundTime in the table which is the summation ofW aitinдTime and BurstTime. The rightmost column in the table represents the assigned rescue unit for a task. After returning from a rescue mission to the base, a rescue unit requires a preparation time to become available for the next mission. In the experiment above, the rescue unit 1 reached at the base at 17:25 after completing the first rescue mission of task 1,2 and 3. However, it became available at 17:55 after taking necessary preparations. Figure 8: Route of Rescue Unit 1 by rescue order The routes of the rescue missions assigned to rescue unit 1 pre- sented in table 12 are illustrated in Figure 8. The red pentagon shadow area denotes the rescue operation base. The black shad- owed rectangular shapes represent the rescue mission. Location points 1, 2, 3, 5 and 7 denote the taskSeq 1,3, 2, 8 and 6, respectively. Pointers 1,2, and 3 are inscribed in the same box as those tasks were combined together and performed in a single mission. The rescue unit 1 will start from the base (0) and travel to point 1, 2 and 3 to rescue victims and complete the tasks 1,3 and 2 in the first rescue mission. It will return back to base which is denoted by blue pointer (4) below the red pointer indicating 8. The unit will again travel to location 5, return to the base (6) and complete the taskSeq 8. Finally, the location of the third rescue mission pointed by 7 and the missions will be completed by rescue unit 1 after reaching to the base (point 8). We have also conducted the same experiment with 4 rescue units. The average waiting time and turnaround time reduced dramatically in this scenario. In the first experiment with 2 rescue units, the average waiting time and turnaround time is around 137 minutes and 189 minutes respectively. With 4 rescue units, waiting time and turnaround time came down to 49 minutes and 102 minutes. With the low number of rescue units, the tasks with low priority need to wait longer which increase the average waiting time. From table 11 and table 12, we can observe that taskSeq 5 arrived at 14:46 with a priority score of 1. Due to the very low priority, task 5 scheduled last at time 20:49 with a waiting time of 375 minutes. However, tasks with higher priority such as 1, 7 and 8 had to wait a fairly lower amount of time. 6 CONCLUSION AND FUTURE WORK In this paper, we utilized social media (Twitter) for disaster manage- ment applications such as categorizing, identifying, and prioritizing users who need help and developed an algorithm for rescue sched- uling. We introduced a novel approach for an effective rescue sched- uling algorithm. First, we developed a tweet classifier using deep learning with attention layer and auxiliary features. The classifier labels every tweet into six different classes. Those labels allow us to identify the necessary information to assist the person/people in the A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial) SIGSPATIAL , November 2019, Chicago, Illinois, USA European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers, Vol. 1. [21] Joseph Y-T Leung and Jennifer Whitehead. 1982. On the complexity of fixed- priority scheduling of periodic, real-time tasks. Performance evaluation 2, 4 (1982), 237 -- 250. [22] Bruce R Lindsay. 2011. Social media and disasters: Current uses, future options, [23] Edward Loper and Steven Bird. 2002. NLTK: the natural language toolkit. arXiv and policy considerations. (2011). preprint cs/0205028 (2002). [24] Minh-Thang Luong, Hieu Pham, and Christopher D Manning. 2015. Effec- tive approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025 (2015). [25] W McKinney. 2014. Pandas, python data analysis library. 2015. Reference Source (2014). [26] Dat Tien Nguyen, Kamela Ali Al Mannai, Shafiq Joty, Hassan Sajjad, Muham- mad Imran, and Prasenjit Mitra. 2016. Rapid classification of crisis-related data on social networks using convolutional neural networks. arXiv preprint arXiv:1608.03902 (2016). [27] Long Nguyen, Zhou Yang, Jiazhen Zhu, Jia Li, and Fang Jin. 2018. Coordinating Disaster Emergency Response with Heuristic Reinforcement Learning. arXiv preprint arXiv:1811.05010 (2018). [28] Ory Okolloh. 2009. Ushahidi, or "testimony": Web 2.0 tools for crowdsourcing crisis information. Participatory learning and action 59, 1 (2009), 65 -- 70. [29] Alexandra Olteanu, Sarah Vieweg, and Carlos Castillo. 2015. What to expect when the unexpected happens: Social media communications across crises. In Proceedings of the 18th ACM conference on computer supported cooperative work & social computing. ACM, 994 -- 1009. [30] Mina Park, Yao Sun, and Margaret L McLaughlin. 2017. Social media propagation of content promoting risky health behavior. Cyberpsychology, Behavior, and Social Networking 20, 5 (2017), 278 -- 285. [31] Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP). 1532 -- 1543. [32] Irina Rish et al. 2001. An empirical study of the naive Bayes classifier. In IJCAI 2001 workshop on empirical methods in artificial intelligence, Vol. 3. IBM New York, 41 -- 46. [33] Uwe Schwiegeishohn and Ramin Yahyapour. 1998. Improving first-come-first- serve job scheduling by gang scheduling. In Workshop on Job Scheduling Strategies for Parallel Processing. Springer, 180 -- 198. [34] Irina Shklovski, Moira Burke, Sara Kiesler, and Robert Kraut. 2010. Technology adoption and use in the aftermath of Hurricane Katrina in New Orleans. american Behavioral scientist 53, 8 (2010), 1228 -- 1246. [35] Kate Starbird and Leysia Palen. 2010. Pass it on?: Retweeting in mass emergency. International Community on Information Systems for Crisis Response and âĂę. [36] Shuohang Wang and Jing Jiang. 2015. Learning natural language inference with LSTM. arXiv preprint arXiv:1512.08849 (2015). [37] Xingyou Wang, Weijie Jiang, and Zhiyong Luo. 2016. Combination of convo- lutional and recurrent neural network for sentiment analysis of short texts. In Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers. 2428 -- 2437. [38] Felix Wex, Guido Schryen, Stefan Feuerriegel, and Dirk Neumann. 2014. Emer- gency response in natural disaster management: Allocation and scheduling of rescue units. European Journal of Operational Research 235, 3 (2014), 697 -- 708. [39] Zhou Yang, Long Hoang Nguyen, Joshua Stuve, Guofeng Cao, and Fang Jin. 2017. Harvey flooding rescue in social media. In Big Data (Big Data), 2017 IEEE International Conference on. IEEE, 2177 -- 2185. [40] Jie Yin, Sarvnaz Karimi, Andrew Lampert, Mark Cameron, Bella Robinson, and Robert Power. 2015. Using social media to enhance emergency situation aware- ness. In Twenty-Fourth International Joint Conference on Artificial Intelligence. tweet and estimate a priority score for that task. Second, we devel- oped a multi-task hybrid scheduling algorithm and conducted the experiments using real disasters data for evaluating the efficiency of the algorithm. In the future, we would like to work on precise location determination and optimal estimation of the required time for a rescue mission. In addition, we are developing a fully-featured web application for deploying on the real-time disaster to evaluate the effectiveness of our work in disaster management. ACKNOWLEDGMENTS This research has been partially supported by a grant from NSF CNS-1461914. REFERENCES [1] [n. d.]. Fact Sheet: Not all Disaster Preparedness Plans Are the ([n. d.]). https://www.fema.gov/news-release/2019/05/17/ Same. fact-sheet-not-all-disaster-preparedness-plans-are-same [2] [n. d.]. Food and Water: Preparing for a Disaster Natural Disasters and Severe Weather CDC. ([n. d.]). https://www.cdc.gov/disasters/foodwater/prepare.html [3] [n. d.]. IS-0368 - Including People With Disabilities and Others With Access and Functional Needs in Disaster Operations. ([n. d.]). https://emilms.fema.gov/ IS0368/DIS01summary.htm [4] [n. d.]. Vulnerable Populations - National Center for Disaster Preparedness. ([n. d.]). https://ncdp.columbia.edu/research/vulnerable-populations/ [5] 2012. Vulnerable groups. (Aug 2012). https://www.who.int/environmental_ health_emergencies/vulnerable_groups/en/ [6] David E Alexander. 2014. Social media in disaster risk reduction and crisis management. Science and engineering ethics 20, 3 (2014), 717 -- 733. [7] Mehdi Allahyari, Seyedamin Pouriyeh, Mehdi Assefi, Saied Safaei, Elizabeth D Trippe, Juan B Gutierrez, and Krys Kochut. 2017. A brief survey of text mining: Classification, clustering and extraction techniques. arXiv preprint arXiv:1707.02919 (2017). [8] ArcGIS. 2019. ArcGIS for Developers. (mar 2019). Retrieved March 7, 2019 from https://developers.arcgis.com/javascript/ [9] Drake Baer. 2012. As Sandy became# Sandy, emergency services got social. Fast Company 9 (2012). [10] Alexis Conneau, Holger Schwenk, Loïc Barrault, and Yann Lecun. 2016. Very deep convolutional networks for text classification. arXiv preprint arXiv:1606.01781 (2016). [11] Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005. Incorporat- ing non-local information into information extraction systems by gibbs sampling. In Proceedings of the 43rd annual meeting on association for computational linguis- tics. Association for Computational Linguistics, 363 -- 370. [12] Huiji Gao, Geoffrey Barbier, Rebecca Goolsby, and Daniel Zeng. 2011. Harnessing the crowdsourcing power of social media for disaster relief. Technical Report. Arizona State Univ Tempe. [13] Kiran Garimella, Gianmarco De Francisci Morales, Aristides Gionis, and Michael Mathioudakis. 2018. Quantifying controversy on social media. ACM Transactions on Social Computing 1, 1 (2018), 3. [14] Alex Graves, Abdel-rahman Mohamed, and Geoffrey Hinton. 2013. Speech recognition with deep recurrent neural networks. In 2013 IEEE international conference on acoustics, speech and signal processing. IEEE, 6645 -- 6649. [15] Eui-Hong Sam Han, George Karypis, and Vipin Kumar. 2001. Text categorization using weight adjusted k-nearest neighbor classification. In Pacific-asia conference on knowledge discovery and data mining. Springer, 53 -- 65. [16] Bin Hu, Fang Pan, and Lei Wang. 2019. A scheduling algorithm for medical emergency rescue aircraft trajectory based on hybrid estimation and intent inference. Journal of Combinatorial Optimization 37, 1 (2019), 40 -- 61. [17] Wen-Hung Huang and Jian-Jia Chen. 2016. Self-suspension real-time tasks under fixed-relative-deadline fixed-priority scheduling. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016. IEEE, 1078 -- 1083. [18] Muhammad Imran, Prasenjit Mitra, and Carlos Castillo. 2016. Twitter as a lifeline: Human-annotated twitter corpora for NLP of crisis-related messages. arXiv preprint arXiv:1605.05894 (2016). [19] Akshi Kumar, Saurabh Raj Sangwan, Anshika Arora, Anand Nayyar, Mohamed Abdel-Basset, et al. 2019. Sarcasm Detection Using Soft Attention-Based Bidirec- tional Long Short-Term Memory Model With Convolution Network. IEEE Access 7 (2019), 23319 -- 23328. [20] Mirella Lapata, Phil Blunsom, and Alexander Koller. 2017. Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers. In Proceedings of the 15th Conference of the
1205.3856
2
1205
2012-12-07T22:53:22
Social Turing Tests: Crowdsourcing Sybil Detection
[ "cs.SI", "physics.soc-ph" ]
As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils that effectively befriend legitimate users, rendering most automated Sybil detection techniques ineffective. In this paper, we explore the feasibility of a crowdsourced Sybil detection system for OSNs. We conduct a large user study on the ability of humans to detect today's Sybil accounts, using a large corpus of ground-truth Sybil accounts from the Facebook and Renren networks. We analyze detection accuracy by both "experts" and "turkers" under a variety of conditions, and find that while turkers vary significantly in their effectiveness, experts consistently produce near-optimal results. We use these results to drive the design of a multi-tier crowdsourcing Sybil detection system. Using our user study data, we show that this system is scalable, and can be highly effective either as a standalone system or as a complementary technique to current tools.
cs.SI
cs
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang‡ , Miriam Metzger† , Haitao Zheng and Ben Y. Zhao Department of Computer Science, U. C. Santa Barbara, CA USA †Department of Communications, U. C. Santa Barbara, CA USA ‡Renren Inc., Beijing, China Abstract As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communi- ties such as Online Social Networks (OSNs). Today, sophis- ticated attackers are creating realistic Sybils that effectively befriend legitimate users, rendering most automated Sybil detection techniques ineffective. In this paper, we explore the feasibility of a crowdsourced Sybil detection system for OSNs. We conduct a large user study on the ability of hu- mans to detect today’s Sybil accounts, using a large cor- pus of ground-truth Sybil accounts from the Facebook and Renren networks. We analyze detection accuracy by both “experts” and “turkers” under a variety of conditions, and find that while turkers vary significantly in their effective - ness, experts consistently produce near-optimal results. We use these results to drive the design of a multi-tier crowd- sourcing Sybil detection system. Using our user study data, we show that this system is scalable, and can be highly ef- fective either as a standalone system or as a complementary technique to current tools. 1 Introduction The rapid growth of Sybil accounts is threatening the sta- bility and security of online communities, particularly on- line social networks (OSNs). Sybil accounts represent fake identities that are often controlled by a small number of real users, and are increasingly used in coordinated campaigns to spread spam and malware [6, 30]. In fact, measurement studies have detected hundreds of thousands of Sybil ac- counts in different OSNs around the world [3, 31]. Recently, Facebook revealed that up to 83 million of its users may be fake1 , up significantly from 54 million earlier 2 . 1 http://www.bbc.com/news/technology- 19093078 2 http://www.bbc.com/news/technology- 18813237 The research community has produced a substantial number of techniques for automated detection of Sybils [4, 32, 33]. However, with the exception of SybilRank [3], few have been successfully deployed. The majority of these techniques rely on the assumption that Sybil accounts have difficulty friending legitimate users, and thus tend to form their own communities, making them visible to community detection techniques applied to the social graph [29]. Unfortunately, the success of these detection schemes is likely to decrease over time as Sybils adopt more sophis- ticated strategies to ensnare legitimate users. First, early user studies on OSNs such as Facebook show that users are often careless about who they accept friendship requests from [2]. Second, despite the discovery of Sybil commu- nities in Tuenti [3], not all Sybils band together to form connected components. For example, a recent study of half a million Sybils on the Renren network [14] showed that Sybils rarely created links to other Sybils, and in- stead intentionally try to in filtrate communities of legiti mate users [31]. Thus, these Sybils rarely connect to each other, and do not form communities. Finally, there is evidence that creators of Sybil accounts are using advanced techniques to create more realistic pro files, either by copying pro file data from existing accounts, or by recruiting real users to customize them [30]. Malicious parties are willing to pay for these authentic-looking accounts to better befriend real users. These observations motivate us to search for a new ap- proach to detecting Sybil accounts. Our insight is that while attackers are creating more “human ” Sybil accounts, fool- ing intelligent users, i.e. passing a “social Turing test,” is still a very difficult task. Careful users can apply intuitio n to detect even small inconsistencies or discrepancies in the details of a user pro file. Most online communities already have mechanisms for users to “ flag ” questionable users or content, and social networks often employ specialists dedi- cated to identifying malicious content and users [3]. While these mechanisms are ad hoc and costly, our goal is to ex- plore a scalable and systematic approach of applying human effort, i.e. crowdsourcing, as a tool to detect Sybil accounts. Designing a successful crowdsourced Sybil detection re- quires that we first answer fundamental questions on issues of accuracy, cost, and scale. One key question is, how accu- rate are users at detecting fake accounts? More specifically , how is accuracy impacted by factors such as the user’s ex- perience with social networks, user motivation, fatigue, and language and cultural barriers? Second, how much would it cost to crowdsource authenticity checks for all suspicious pro files? Finally, how can we design a crowdsourced Sybil detection system that scales to millions of pro files? In this paper, we describe the results of a large user study into the feasibility of crowdsourced Sybil detection. We gather ground-truth data on Sybil accounts from three so- cial network populations: Renren [14], the largest social network in China, Facebook-US, with pro files of English speaking users, and Facebook-India, with pro files of users who reside in India. The security team at Renren Inc. pro- vided us with Renren Sybil account data, and we obtained Facebook (US and India) Sybil accounts by crawling highly suspicious pro files weeks before they were banned by Face- book. Using this data, we perform user studies analyzing the effectiveness of Sybil detection by three user popula- tions: motivated and experienced “experts”; crowdsourced workers from China, US, and India; and a group of UCSB undergraduates from the Department of Communications. Our study makes three key contributions. First, we an- alyze detection accuracy across different datasets, as well as the impact of different factors such as demographics, survey fatigue, and OSN experience. We found that well- motivated experts and undergraduate students produced ex- ceptionally good detection rates with near-zero false posi- tives. Not surprisingly, crowdsourced workers missed more Sybil accounts, but still produced near zero false positives. We observe that as testers examine more and more suspi- cious pro files, the time spent examining each pro file de- creases. However, experts maintained their accuracy over time while crowdworkers made more mistakes with addi- tional pro files. Second, we performed detailed analysis on individual testers and account pro files. We found that while it was easy to identify a subset of consistently accu- rate testers, there were very few “chameleon pro files” that were undetectable by all test groups. Finally, we propose a scalable crowdsourced Sybil detection system based on our results, and use trace-driven data to show that it achieves both accuracy and scalability with reasonable costs. By all measures, Sybil identities and fake accounts are growing rapidly on today’s OSNs. Attackers continue to in- novate and find better ways of mass-producing fake pro files, and detection systems must keep up both in terms of accu- racy and scale. This work is the first to propose crowdsourc- ing Sybil detection, and our user study results are extremely positive. We hope this will pave the way towards testing and deployment of crowdsourced Sybil detection systems by large social networks. 2 Background and Motivation Our goal is to motivate and design a crowdsourced Sybil detection system for OSNs. First, we brie fly introduce the concept of crowdsourcing and de fine key terms. Next, we review the current state of social Sybil detection, and high- light ongoing challenges in this area. Finally, we introduce our proposal for crowdsourced Sybil detection, and enumer- ate the key challenges to our approach. 2.1 Crowdsourcing Crowdsourcing is a process where work is outsourced to an unde fined group of people. The web greatly simplifies the task of gathering virtual groups of workers, as demon- strated by successful projects such as Wikipedia. Crowd- sourcing works for any job that can be decomposed into short, simple tasks, and brings significant bene fits to tasks not easily performed by automated algorithms or systems. First, by harnessing small amounts of work from many peo- ple, no individual is overburdened. Second, the group of workers can change dynamically, which alleviates the need for a dedicated workforce. Third, workers can be recruited quickly and on-demand, enabling elasticity. Finally and most importantly, by leveraging human intelligence, crowd- sourcing can solve problems that automated techniques can- not. In recent years, crowdsourcing websites have emerged that allow anyone to post small jobs to the web and have them be solved by crowdworkers for a small fee. The pi- oneer in the area is Amazon’s Mechanical Turk, or MTurk for short. On MTurk, anyone can post jobs called Human Intelligence tasks, or HITs. Crowdworkers on MTurk, or turkers, complete HITs and collect the associated fees. To- day, there are around 100,000 HITs available on MTurk at any time, with 90% paying ≤$0.10 each [11, 24]. There are over 400,000 registered turkers on MTurk, with 56% from the US, and 36% from India [24]. Social networks have started to leverage crowdsourcing to augment their workforce. For example, Facebook crowd- sources content moderation tasks, including filtering porn o- graphic and violent pictures and videos [10]. However, to date we know of no OSN that crowdsources the iden- tification of fake accounts. Instead, OSNs like Facebook and Tuenti maintain dedicated, in-house staff for this pur- pose [3, 10]. Unfortunately, attackers have also begun to leverage crowdsourcing. Two recent studies have uncovered crowd- sourcing websites where malicious users pay crowdworkers to create Sybil accounts on OSNs and generate spam [21, 30]. These Sybils are particularly dangerous because they are created and managed by real human beings, and thus ap- pear more authentic than those created by automated scripts. Crowdsourced Sybils can also bypass traditional security mechanisms, such as CAPTCHAs, that are designed to de- fend against automated attacks. 2.2 Sybil Detection The research community has produced many systems de- signed to detect Sybils on OSNs. However, each one re- lies on specific assumptions about Sybil behavior and graph structure in order to function. Thus, none of these systems is general enough to perform well on all OSNs, or against Sybils using different attack strategies. The majority of social Sybil detectors from the literature rely on two key assumptions. First, they assume that Sybils have trouble friending legitimate users. Second, they as- sume that Sybil accounts create many edges amongst them- selves. This leads to the formation of well-de fined Sybil communities that have a small quotient-cut from the hon- est region of the graph [4, 28, 29, 32, 33]. Although similar Sybil community detectors have been shown to work well on the Tuenti OSN [3], other studies have demonstrated lim- itations of this approach. For example, a study by Yang et al. showed that Sybils on the Renren OSN do not form connected components at all [31]. Similarly, a meta-study of multiple OSN graphs revealed that many are not fast- mixing, which is a necessary precondition for Sybil com- munity detectors to perform well [20]. Other researchers have focused on feature-based Sybil detectors. Yang et al. detect Sybils by looking for ac- counts that send many friend requests that are rejected by the recipient. This detection technique works well on Ren- ren because Sybils must first attempt to friend many users before they can begin effectively spamming [31]. However, this technique does not generalize. For example, Sybils on Twitter do not need to create social connections, and instead send spam directly to any user using “@” messages. Current Sybil detectors rely on Sybil behavior assump- tions that make them vulnerable to sophisticated attack strategies. For example, Irani et al. demonstrate that “hon - eypot” Sybils are capable of passively gathering legitimat e friends and penetrating the social graph [13]. Similarly, some attackers pay users to create fake pro files that bypass current detection methods [30]. As Sybil creators adopt more sophisticated strategies, current techniques are likely to become less effective. 2.3 Crowdsourcing Sybil Detection In this study, we propose a crowdsourced Sybil detec- tion system. We believe this approach is promising for first, humans can make overall judgments three reasons: about OSN pro files that are too complex for automated al- gorithms. For example, humans can evaluate the sincer- ity of photographs and understand subtle conversational nu- ances. Second, social-Turing tests are resilient to changing attacker strategies, because they are not reliant on specifi c features. Third, crowdsourcing is much cheaper than hir- ing full-time content moderators [9, 25]. However, there are several questions that we must answer to verify that this system will work in practice: • How accurate are users at distinguishing between real and fake pro files? Trained content moderators can per- form this task, but can crowdworkers achieve compara- ble results? • Are there demographic factors that affect detection ac- curacy? Factors like age, education level, and OSN ex- perience may impact the accuracy of crowdworkers. • Does survey fatigue impact detection accuracy? In many instances, people’s accuracy at a task decline over time as they become tired and bored. • Is crowdsourced Sybil detection cost effective? Can the system be scaled to handle OSNs with hundreds of mil- lions of users? We answer these questions in the following sections. Then, in Section 6, we describe the design of our crowd- sourced Sybil detection system, and use our user data to validate its effectiveness. 3 Experimental Methodology In this section, we present the design of our user stud- ies to validate the feasibility of crowdsourced Sybil detec- tion. First, we introduce the three datasets used in our experiments: Renren, Facebook US, and Facebook India. We describe how each dataset was gathered, and how the ground-truth classification of Sybil and legitimate pro file s was achieved. Next, we describe the high-level design of our user study and its website implementation. Finally, we introduce the seven groups of test subjects. Test subjects are grouped into experts, turkers from crowdsourcing web- sites, and university undergraduates. We use different test groups from China, the US, and India that correspond to our three datasets. All of our data collection and experimental methodology was evaluated and received IRB approval be- fore we commenced our study. 3.1 Ground-truth Data Collection Our experimental datasets are collected from two large OSNs: Facebook and Renren. Facebook is the most popu- lar OSN in the world and has more than 1 billion users [8]. Renren is the largest OSN in China, with more than 220 Facebook Unknown Pro(cid:127)les Suspicious Pro(cid:127)les Dataset Google Image Search Friends of Suspicious Pro(cid:127)les Figure 1. Facebook crawling methodology. million users [14]. Both sites use similar visual layouts and offer user pro files with similar features, including space f or basic information, message “walls,” and photo albums. Ba- sic information in a pro file includes items like name, gen- der, a pro file image, total number of friends, interests, etc. Each dataset is composed of three types of user pro- files: con firmed Sybils, con firmed legitimate users, and sus- picious pro files that are likely to be Sybils. Con firmed Sybil pro files are known to be fake because they have been banned by the OSN in question, and manually verified by us. Suspicious pro files exhibit characteristics that are hi ghly indicative of a Sybil, but have not been banned by the OSN. Legitimate pro files have been hand selected and verified by us to ensure their integrity. We now describe the details of our data collection process on Facebook and Renren. Facebook. We collect data from Facebook using a cus- tom web crawler. Because Facebook caters to an interna- tional audience, we specifically targeted two regional ar- eas for study: the US and India. We chose these two re- gions because they have large, Internet enabled populations, and both countries have active marketplaces for crowdwork- ers [24]. Our Facebook crawls were conducted between De- cember 2011 and January 2012. The legitimate pro files for our study were randomly se- lected from a pool of 86K pro files. To gather this pool of pro files, we seeded our crawler with 8 Facebook pro files be- longing to members of our lab (4 in the US, and 4 in India). The crawler then visited each seed’s friends-of-friends, i.e. the users two-hops away on the social graph. Studies have shown that trust on social networks is often transitive [18], and thus the friends-of-friends of our trusted seeds are likely to be trustworthy as well. From the 86K total friends-of- friends in this set, the crawler sampled 100 pro files (50 from the US, 50 from India) that had Facebook’s default, permis- sive privacy settings. We manually examined all 100 pro- files to make sure they were 1) actually legitimate users, and 2) we did not know any of them personally (to prevent bias in our study). To facilitate collection of Sybils on Facebook, we make one assumptions about Sybil behavior: we assume that Sybils use widely available photographs from the web as pro file images. Intuitively, Sybils need realistic pro file i m- ages in order to appear legitimate. Hence, Sybils must resort to using publicly available images from around the web. Al- though all Sybils on Facebook may not obey this assump- tion, we will show that enough do to form a sufficiently large sample for our user study. To gather suspicious pro files, we seeded our crawler with the pro files of known Sybils on Facebook [1]. The crawler then snowball crawled outward from the initial seeds. We leveraged Google Search by Image to locate pro files us- ing widely available photographs as pro file images. Fig- ure 1 illustrates this process. For each pro file visited by th e crawler, all of its pro file images were sent to Google Search by Image (Facebook maintains a photo album for each user that includes their current pro file image, as well as all prio r images). If Google Search by Image indexed ≥90% of the pro file images on sites other than Facebook, then we con- sider the account to be suspicious. The crawler recorded the basic information, wall, and photo albums from each sus- picious pro file. We terminated the crawl after a sufficient number of suspicious pro files had been located. We search for all of a user’s pro file images rather than just the current image because legitimate users sometimes use stock photographs on their pro file ( e.g. a picture of their favorite movie star). We eliminate these false positives by setting minimum thresholds for suspicion: we only consider pro files with ≥2 pro file images, and if ≥90% are available on the web, then the pro file is considered suspicious. In total, our crawler was able to locate 8779 suspicious Facebook pro files. Informal, manual inspection of the pro- file images used by these accounts reveals that most use pic- tures of ordinary (usually attractive) people. Only a small number of accounts use images of recognizable celebrities or non-people (e.g. sports cars). Thus, the majority of pro- file images in our dataset are not suspicious at first-glance. Only by using external information from Google does it be- come apparent that these photographs have been misappro- priated from around the web. At this point, we don’t have ground-truth about these pro files, i.e. are they really Sybils? To determine ground- truth, we use the methodology pioneered by Thomas et al. to locate fake Twitter accounts [27]. We monitored the sus- picious Facebook pro files for 6 weeks, and observed 573 became inaccessible. Attempting to browse these pro files results in the message “The page you requested was not found,” indicating that the pro file was either removed by Facebook or by the owner. Although we cannot ascer- tain the specific reason that these accounts were removed, the use of widely available photographs as pro file images makes it highly likely that these 573 pro files are fakes. The sole limitation of our Facebook data is that it only includes data from public pro files. It is unknown if the char- acteristics of private accounts (legitimate and Sybil) differ from public ones. This limitation is shared by all studies that rely on crawled OSN data. Renren. We obtained ground-truth data on Sybil and Dataset # of Profiles Sybil Legit. Renren 100 100 Facebook US Facebook IN 32 50 50 50 Test Group CN Expert CN Turker US Expert US Turker US Social IN Expert IN Turker # of Profiles Testers per Tester 100 24 10 418 50 40 12 299 198 25 100 20 342 12 Table 1. Datasets, test groups, and pro files per tester. Dataset Category Renren Facebook US Facebook IN Legit. Sybil Legit. Sybil Legit. Sybil News- Feed 165 30 55.62 60.15 55 31.6 Photos 302 22 184.78 10.22 53.37 10.28 Profile Images 10 1.5 32.86 4.03 7.27 4.44 Censored Images 0 0.06 0 1.81 0 0.08 Table 2. Ground-truth data statistics (average number per pro file). legitimate pro files on Renren directly from Renren Inc. The security team at Renren gave us complete information on 1082 banned Sybil pro files, from which we randomly se- lected 100 for our user study. Details on how Renren bans Sybil accounts can be found in [31]. We collected legitimate Renren pro files using the same methodology as for Face- book. We seeded a crawler with 4 trustworthy pro files from people in the lab, crawled 100K friends-of-friends, and then sampled 100 public pro files. We forwarded these pro files to Renren’s security team and they verified that the pro files belonged to real users. Summary and Data Sanitization. Table 1 lists the final statistics for our three datasets. Since the Renren data was provided directly by Renren Inc., all pro files are con firmed as either Sybils or legitimate users. For Facebook US and India, pro files that were banned by Facebook are con firmed Sybils, and the remaining uncon firmed suspicious pro files are not listed. During our manual inspection of pro files, we noticed that some include images of pornography or graphic violence. We determined that it was not appropriate for us to use these images as part of our user study. Thus, we manually replaced objectionable images with a grey image contain- ing the words “Pornographic or violent image removed.” This change protects our test subjects from viewing objec- tionable images, while still allowing them to get a sense of the original content that was included in the pro file. Out of 45,096 total images in our dataset, 58 are filtered from Facebook US, 4 from Facebook India, and 6 from Renren. All objectionable images are found on Sybil pro files; none are found on legitimate pro files. Finally, we show the basic statistics of ground-truth pro- files in Table 2. Legitimate users have more photo albums and pro file photos, while Sybils have more censored pho- tos. The “News-Feed ” column shows the average number of items in the first 5 chronological pages of each user’s news- feed. On Facebook, the news-feed includes many types of items, including wall posts, status updates, photo tags, etc. On Renren, the feed only includes wall posts from friends. 3.2 Experiment Design Using the datasets in Table 1, our goal is to assess the ability of humans to discriminate between Sybil and legiti- mate user pro files. To test this, we perform a simple, con- trolled study: we show a human test subject (or simply a tester) a pro file from our dataset, and ask them to classify it as real or fake. The tester is allowed to view the pro file’s basic information, wall, photo albums, and individual pho- tos before making their judgment. If the tester classifies th e pro file as fake, they are asked what pro file elements (basic information, wall, or photos) led them to this determination. Each tester in our study is asked to evaluate several pro- files from our dataset, one at a time. Each tester is given roughly equal number of Sybil pro files and legitimate pro- files. The pro files from each group are randomized for each tester, and the order the pro files are shown in is also ran- domized. Implementation. We implement our study as a website. When a tester begins the study, they are presented with a webpage that includes a consent form and details about our study. After the tester agrees, they are directed to the first pro file for them to evaluate. Figure 2 shows a screenshot of our evaluation page. At the top are links to the all of the pro files the tester will evaluate. Testers may use these link s to go back and change their earlier answers if they wish. Below the numbered links is a box where testers can record their evaluation for the given pro file: real or fake, and if fake, what pro file elements are suspicious (pro file, wall, and/or photos)? When the tester is done evaluating the given pro file, they click the “Save Changes” button, which automatically directs their browser to the next pro file, or t he end of the survey if all pro files have been evaluated. Below the evaluation box are three buttons that allow the tester to view the given pro file’s basic information (shown by default), wall, and photo albums. The basic information and wall are presented as JPEG images, in order to preserve the exact look of Facebook/Renren, while also preventing the tester from clicking any (potentially malicious) embed- ded links. Testers may click on each photo album to view the individual photos contained within. and each pro file was evaluated by multiple testers from each group. This allows us to examine the overall detection ac- curacy of the group (e.g. the crowd), versus the accuracy of each individual tester. We now introduce the three test groups, and explain how we administered our study to them. Experts. experts. The first group of test subjects are This group contains Computer Science professors and grad- uate students that were carefully selected by us. The expert group represents the practical upper-bound on achievable Sybil detection accuracy. The expert group is subdivided into three regional groups: US, Indian, and Chinese experts. Each expert group was evaluated on the corresponding regional dataset. We approached experts in person, via email, or via social me- dia and directed them to our study website to take the test. Table 1 lists the number of expert testers in each regional group. Expert tests were conducted in February, 2012. As shown in Table 1, each Chinese and Indian expert evaluated 100 pro files from our dataset, while US experts evaluated 50 pro files. This is significantly more pro files per tester than we gave to any other test group. However, since experts are dedicated professionals, we assume that their ac- curacy will not be impacted by survey fatigue. We evaluate this assumption in Section 5. Turkers. The second group of test subjects are turkers recruited from crowdsourcing websites. Unlike the expert group, the background and education level of turkers cannot be experimentally controlled. Thus, the detection accuracy of the turker group provides a lower-bound on the efficacy of a crowdsourced Sybil detection system. Like the expert group, the turker group is subdivided into three regional groups. US and Indian turkers were recruited from MTurk. HITs on MTurk may have qualifications as- sociated with them. We used this feature to ensure that only US based turkers took the Facebook US test, and Indian turkers took the Facebook India test. We also required that turkers have ≥90% approval rate for their HITs, to filter out unreliable workers. We recruited Chinese turkers from Zhubajie, the largest crowdsourcing site in China. Table 1 lists the number of turkers who completed our study in each region. Turker tests were conducted in February, 2012. Unlike the expert groups, turkers have an incentive to sacrifice accuracy in favor of finishing tasks quickly. Be- cause turkers work for pay, the faster they complete HITs, the more HITs they can do. Thus, of all our test groups, we gave turkers the fewest number of pro files to evaluate, since turkers are most likely to be effected by survey fatigue. As shown in Table 1, Chinese turkers each evaluated 10 pro- files, while US and Indian turkers evaluated 12. We priced each Zhubajie HIT at $0.15 ($0.015 per pro- file), and each MTurk HIT at $0.10 ($0.0083 per pro file). These prices are in line with the prevailing rates on crowd- Figure 2. Screenshot of the English version of our user study website. At the end of the survey, the tester is asked to answer a short questionnaire of demographic information. Questions include age, gender, country of residence, education level, and years of OSN experience. There is also a free-form comment box where tester can leave feedback. On the server-side, we record all of the classifications and questionnaire answers made by each tester. We also collect additional information such as the time spent by the tester on each page, and total session time per tester. Because our datasets are in two different languages, we construct two versions of our study website. Figure 2 shows the English version of our site, which is used to evaluate Facebook pro files. We also constructed a Chinese version of our site to evaluate Renren pro files. Limitations. The methodology of our user study has two minor limitations. First, we give testers full pro files t o evaluate, including basic info, wall, and photos. It is not clear how accurate testers would be if given different infor- mation, or a restricted subset of this information. Second, we assume that there are no malicious testers participating in our user study. Although attackers might want to in fil- trate and disrupt a real crowdsourced Sybil detector, there is little for them to gain by disrupting our study. Related work on detecting crowdsourcing abuse may be helpful in mitigating this problem in the future [7]. 3.3 Test Subjects In order to thoroughly investigate how accurate different types of users are at detecting Sybils, we ran user studies on three different groups of test subjects. Each individual tester was asked to evaluate ≥10 pro files from our dataset, CN IN US s r e t s e T f o % 100 80 60 40 20 0 Graduate Bachelors High Primary s r e t s e T f o % 100 80 60 40 20 0 CN IN US 5-10 Years 2-5 Years 0-2 Years Never s r e t s e T f o % 100 80 60 40 20 0 CN IN US Female Male T T T E E E u u x x x u o r r r ci p p p k k k e e e a e e e rt rt rt l r r r S T T T E E E x x u u u x o r r r p p ci p k k k e e e a e e e rt rt rt l r r r S (b) OSN Usage Experience (a) Education Level Figure 3. Demographics of participants in our user study. T T T E E E u u u x x x o r r r p p p ci k k k e e e a e e e rt rt rt l r r r S (c) Gender sourcing websites [11]. Although we could have paid more, prior work has shown that paying more money does not yield higher quality results on crowdsourcing sites [19]. Sociology Undergraduates. The final group of test subjects are undergraduate students from the Department of Communications at UCSB (Social Science major). These students were asked to take our study in exchange for course credit. This group adds additional perspective to our study, apart from Computer Science oriented experts and the un- controlled turker population. The social science students are listed in Table 1 as “US social.” We only asked the students to evaluate our Face- book US dataset, since cultural and language barriers pre- vent them from effectively evaluating Chinese and Indian pro files. 198 total students completed our study in March, 2012. Each student was asked to evaluate 25 pro files, mid- way between what we asked of experts and turkers. Summary. We conduct experiments with 7 groups of testers: experts from US, India, and China; turkers from US, India, and China, and social science students from the US. Table 1 lists the number of testers in each group and the number of pro files evaluated by each tester. 4 User Study Results In this section, we present the high level results of our user study. We start by introducing the demographics of the test subjects. Next, we address one of our core questions: how accurate are people at identifying Sybils? We com- pare the accuracy of individual testers to the accuracy of the group to assess whether the “wisdom of the crowd ” can overcome individual classification errors. Finally, we exa m- ine the reasons testers cited in classified pro files as Sybils . 4.1 Demographics At the end of each survey, testers were asked to answer demographic questions about themselves. Figure 3 shows the results that were self-reported by testers. Education. As shown in Figure 3(a), most of our experts are enrolled in or have received graduate level degrees. This is by design, since we only asked Computer Science grad- uate students, undergrads enrolled in graduate courses, and professors to take part in our expert experiments. Similarly, the social science testers are drawn from the undergraduate population at UCSB, which is re flected in the results. The education levels reported by turkers are surprisingly high. The majority of turkers in the US and China report enrollment or receipt of bachelors-level degrees [24]. Sur- prisingly, over 50% of Indian turkers report graduate level educations. This result for Indian turkers stems from cul- tural differences in how education levels are denoted. Un- like in the US and China, in India “graduate school” refers to “graduated from college,” not receipt of a post-graduate degree (e.g. Masters or Doctorate). Thus, most “graduate ” level turkers in India are actually bachelors level. OSN Usage Experience. As shown in Figure 3(b), the vast majority of testers report extensive experience with OSNs. US experts, Chinese experts, and social science un- dergrads almost uniformly report ≥2 years of OSN expe- rience. Indian experts, Indian turkers, and Chinese turkers have the greatest fractions of users with <2 years of OSN experience. US turkers report levels of OSN experience very similar to our most experienced expert groups. Gender. As shown in Figure 3(c), the vast majority of our testers are male. The only group which exhibits a female majority is the social science undergrads, a demo- graphic bias of the communications major. Turker groups show varying levels of gender bias: Chinese and Indian turkers are predominantly male [24], while the US group is evenly divided. 4.2 Individual Accuracy We now address one of the core questions of the paper: how accurate are people at identifying Sybils? To achieve 100% accuracy, a tester needs to correctly classify all Sybil and legitimate pro files they were shown during the test. Fig- ure 4 shows the accuracy of testers in 5 of our test groups. Chinese experts are the most accurate, with half achieving ≥90% accuracy. The US and Indian (not shown) experts also achieved high accuracy. However, the turker groups do ) % ( F D C 100 80 60 40 20 0 CN Turker US Turker US Social US Expert CN Expert Experts Turkers 100 80 60 40 20 ) % ( F D C Experts Turkers Social 100 80 60 40 20 ) % ( F D C 0 20 80 60 40 Accuracy per Tester (%) 100 0 0.2 0.8 0.6 0.4 Average Jaccard Coefficient 1 0 0.2 0.8 0.6 0.4 Average Jaccard Coefficient 1 Figure 4. Tester accuracy. (a) Renren (b) Facebook US Figure 5. Jaccard similarity coef ficient of reasons. ) % ( F D C 100 80 60 40 20 0 0 Expert FP Turker FP Expert FN Turker FN 40 80 60 20 Error Rate per Tester (%) 100 ) % ( F D C 100 80 60 40 20 0 0 Expert FP Turker FP Expert FN Turker FN 40 80 60 20 Error Rate per Tester (%) 100 ) % ( F D C 100 80 60 40 20 0 0 Expert FP Turker FP Expert FN Turker FN 40 80 60 20 Error Rate per Tester (%) 100 (a) Renren (c) Facebook India (b) Facebook US Figure 6. False positive (FP) and false negative (FN) rates for testers. not perform as well as the experts. The Chinese and Indian (not shown) turkers perform the worst, with half achieving ≤65% accuracy. The accuracy of US turkers and social sci- ence students falls in-between the other groups. To better understand tester accuracy, Figure 6 separates the results into false positives and false negatives. A false positive corresponds to misclassifying a legitimate pro fil e as a Sybil, while a false negative means failing to identify a Sybil. Figure 6 focuses on our expert and turker test groups; social science students perform similarly to US turkers, and the results are omitted for brevity. Figure 6 reveals similar trends across all test groups. First, false positives are uniformly lower than false nega- tives, i.e. testers are more likely to misclassify Sybils as le- gitimate, than vice versa. Second, in absolute terms, the false positive rates are quite low: <20% for 90% of testers. Finally, as in Figure 4, error rates for turkers tend to be sig- nificantly higher than those of experts. In summary, our results reveal that people can identify differences between Sybil and legitimate pro files, but most individual testers are not accurate enough to be reliable. 4.3 Accuracy of the Crowd We can leverage “the wisdom of the crowd ” to amor- tize away errors made by individuals. Many studies on crowdsourcing have demonstrated that experimental error can be controlled by having multiple turkers vote on the answer, and then using the majority opinion as the final an- swer [17, 25]. As long as errors by turkers are uncorrelated, this approach generates very accurate results. We now examine whether this methodology can be used to improve the classification accuracy of our results. This question is of vital importance, since a voting scheme would be an essential component of a crowdsourced Sybil detector. To compute the “ final” classification for each pro file in our dataset, we aggregate all the votes for that pro file by tester s in each group. If ≥50% of the testers vote for fake, then we classify that pro file as a Sybil. Table 3 shows the percentage of false positive and neg- ative classifications for each test group after we aggregate votes. The results are mixed: on one hand, false positive rates are uniformly low across all test groups. In the worst case, US turkers and social science students only misclas- sify 1 out of 50 legitimate pro files. Practically, this means that crowds can successfully identify real OSN pro files. On the other hand, false negative rates vary widely across test groups. Experts in China, in the US, and the social science students all perform well, with false negative rates <10%. Indian experts also outperform the turker groups, but only by a 2.7% margin. The Chinese and Indian turker groups perform worst, with ≥50% false negatives. From these results, we can conclude three things. First, using aggregate votes to classify Sybils does improve over- all accuracy significantly. Compared to the results for indi - vidual testers in Figure 6, both false positive and negative rates are much lower after aggregation. Second, the uni- formly low false positive rates are a very good result. This means that running a crowdsourced Sybil detection system will not harm legitimate social network users. Finally, even with aggregate voting, turkers are still not as accurate as ex- Dataset Renren Facebook US Facebook IN Tester CN Expert CN Turker US Expert US Turker US Social IN Expert IN Turker FP Rate 0% 0% 0% 2% 2% 0% 0% FN Rate 3% 63% 9.4% 18.7% 6.25% 16% 50% Table 3. Error rates after aggregating votes. Dataset Renren Facebook US Facebook IN Tester CN Expert CN Turker US Expert US Turker US Social IN Expert IN Turker Info Wall 18% 57% 31% 31% 37% 30% 35% 32% 30% 31% 39% 28% 39% 27% Photos 25% 38% 33% 33% 39% 33% 34% Table 4. Reasons why pro files are suspicious. perts. In the next section, we look more deeply into factors that may negatively in fluence turkers accuracy, and tech- niques that can mitigate these issues. 4.4 Reasons for Suspicion During our user study, testers were asked to give reasons for why they classified pro files as Sybils. Testers were given the option of reporting the pro file’s basic information, wal l, and/or photos as suspicious. Testers could select as many options as they liked. In this section, we compare and contrast the reasons re- ported by different test groups. Table 4 shows percentage of votes for each reasons across our seven test groups. The US and Indian expert and turker groups are very consistent: they all slightly favor basic information. The bias may be due to the way our study presented information, since each pro file’s basic information was shown first, by default. The social science students are the only group that slightly fa- vors photos. In contrast to the US and Indian groups, Chinese experts and turkers often disagree on their reasons for suspicion. The majority of experts rely on wall messages, while turk- ers slightly favor photos. As shown in Figure 4, Chinese turkers have lower accuracy than Chinese experts. One pos- sible reason for this result is that turkers did not pay enough attention to the wall. As previously mentioned, there is a comment box at the end of our survey for testers to of- fer feedback and suggestions. Several Chinese experts left comments saying they observed wall messages asking ques- tions like “do I know you?,” and “why did you send me a friend request?,” which they relied on to identify Sybil pro - files. Consistency of Reasons. There is no way to objec- tively evaluate the correctness of tester’s reasons for classi- fication, since there is no algorithm that can pick out suspi- cious pieces of information from an OSN pro file. Instead, what we can do is examine how consistent the reasons are for each pro file across our test groups. If all the testers agr ee on the reasons why a given pro file is suspicious, then that is a strong indication that those reasons are correct. To calculate consistency, we use the following proce- dure. In each test group, each Sybil is classified by N testers. For all pairs of users in each group that classified a particular Sybil pro file, we calculate the Jaccard similar - ity coefficient to look at overlap in their reasons, giving us N ∗ (N − 1)/2 unique coefficients. We then compute the average of these coefficients for each pro file. By computing the average Jaccard coefficient for each Sybil, we arrive at a distribution of consistency scores for all Sybils for a given test group. Figure 5 shows the consistency distributions of the China and US test groups. The results for the Indian test groups are similar to US testers, and are omitted for brevity. The Chinese turkers show the most disagreement: for 50% of Sybils the average Jaccard coefficient is ≤0.4. Chinese ex- perts and all three US groups exhibit similar levels of agree- ment: 50% of Sybils have coefficients ≤0.5. The fraction of Sybils receiving near complete disagreement (0.0) or agree- ment (1.0) is negligibly small across all test groups. Based on these results, we conclude that testers identify Sybils for inconsistent reasons. Even though Table 4 shows that each of the three available reasons receives a roughly equal portion of votes overall, the reasons are assigned ran- domly across Sybils in our dataset. This indicates that no single pro file feature is a consistent indicator of Sybil act iv- ity, and that testers bene fit from having a large, diverse set of information when making classifications. Note that this provides further support that automated mechanisms based on individual features are less likely to succeed, and also explains the success of human subjects in detecting Sybils. Answer Revisions. While taking our survey, testers had the option of going back and changing classifications that they have previously made. However, few took advantage of this feature. This is not unexpected, especially for turk- ers. Since turkers earn more if they work faster, there is a negative incentive to go back and revise work. In total, there were only 28 revisions by testers: 16 from incorrect to correct, and 12 from correct to incorrect. ) % ( e t a R e v i t a g e N e s l a F 100 80 60 40 20 0 OSN Experience Education Gender ) % ( e t a R e v i t a g e N e s l a F 100 80 60 40 20 0 OSN Experience Education Gender ) % ( e t a R e v i t a g e N e s l a F 100 80 60 40 20 0 OSN Experience Education Gender Never 0-2 Years 2-5 Years 5-10 Years Primary School High School Bachelors Graduate Female Male (a) US Turker (c) Chinese Turker (b) India Turker Figure 7. False positive rates for turkers, broken down by demographic. ) S ( e l i f o r P r e P e m i T 100 80 60 40 20 0 Accuracy Time 100 80 60 40 20 0 20 40 60 80 100 Profile Order ) % ( y c a r u c c A (a) Renren Expert ) S ( e l i f o r P r e P e m i T 100 80 60 40 20 0 100 80 60 40 Accuracy 20 Time 0 1 2 3 4 5 6 7 8 9 10 Profile Order ) % ( y c a r u c c A ) S ( e l i f o r P r e P e m i T 100 80 60 40 20 0 Accuracy Time 100 80 60 40 20 0 10 20 30 40 50 Profile Order ) % ( y c a r u c c A (c) Facebook US Expert (b) Renren Turker Figure 8. Accuracy and time on the nth pro file. ) S ( e l i f o r P r e P e m i T 100 80 60 40 20 0 Accuracy Time 100 80 60 40 20 0 2 4 6 8 10 12 Profile Order ) % ( y c a r u c c A (d) Facebook US Turker 5 Turker Accuracy Analysis 5.2 Temporal Factors and Survey Fatigue The end goal of our work is to create a crowdsourced Sybil detection system. However, in Section 4 we observed that turkers are not as accurate as experts. In this section, we examine factors that may impact the accuracy of turk- ers, and investigate ways to improve our Sybil detection system. We start by looking at demographic factors. Next, we examine pro file evaluation time to understand if turkers are adversely affected by survey fatigue. Next, we examine issues of turker selection. Will adding more turkers to the crowd improve accuracy? What if we set a threshold and fil- ter out turkers that consistently perform poorly? Finally, we calculate the per pro file accuracy of testers to detect “stea lth Sybils” that are undetectable by both experts and turkers. 5.1 Demographic Factors First, we explore the impact of demographic factors on the turker’s accuracy. We focus on false negative rates of turkers, since their false positive rates are close to zero. Fig- ure 7 shows the average false negative rate and standard de- viation of turkers from China, US and India, broken down by different demographics. Education has a clear impact on false negatives: higher education level correlates with in- creased ability to identify Sybils. The impact of OSN usage experience is less clear. Chinese and US turker’s false neg- ative rates decline as OSN experience increases, which is expected. However, for Indian turkers there is no correla- tion. Gender does not appear to impact false negatives in a meaningful way. The results in Figure 7 indicate that turker accuracy could be improved by filtering out workers with few years of OSN experience and low education level. It is known that turkers try to finish tasks as quickly as possible in order to earn more money in a limited amount of time [16]. This leads to our next question: do turkers spend less time evaluating pro files than experts, and does this lead to lower accuracy? The issue of time is also related to survey fatigue: does the accuracy of each tester decrease over time due to fatigue and boredom? To understand these temporal factors, we plot Figure 8, which shows the average evaluation time and accuracy per pro file “slot” for Chinese and US experts and turkers. The x-axis of each sub figure denotes the logical order in which testers evaluated pro files, e.g. “Pro file Order ” n is the nth pro file evaluated by each tester. Note that pro files are pre- sented to each tester in random order, so each tester evalu- ated a different pro file within each slot. Within each slot, w e calculate the average pro file evaluation time and accuracy across all testers. 100% accuracy corresponds to all testers correctly classifying the nth pro file they were shown. Al- though experts evaluated >10 pro files each, we only show the first 10 to present a fair comparison versus the turkers. The results for the Indian test groups are similar to the US groups, and are omitted for brevity. The first important result from Figure 8 is that absolute pro file evaluation time is not a good indicator of accuracy. The Chinese experts exhibit the fastest evaluation times, av- eraging one pro file every 23 seconds. However, they are more accurate than Chinese turkers who spend more time on each pro file. This pattern is reversed on Facebook: ex- perts spend more time and are more accurate than turkers. Next, we look for indications of survey fatigue. In all 4 sub figures of Figure 8, the evaluation time per pro file de- creases over time. This shows that testers speed up as they progress through the survey. As shown in the expert Fig- ures 8(a) and 8(c), this speedup does not affect accuracy. These trends continue through the evaluation of additional pro files (10-50 for Chinese experts, 10-100 for US experts) that are not shown here. However, for turkers, accuracy does tend to decrease over time, as shown in Figures 8(b) and 8(d). This demonstrates that turkers are subject to sur- vey fatigue. The up-tick in Chinese turker accuracy around pro file 10 is a statistical anomaly, and is not significant. 5.3 Turker Selection As demonstrated in Section 4.3, we can mitigate the clas- sification errors of individuals by aggregating their votes to- gether. This raises our next question: can we continue to improve the overall accuracy of turkers by simply adding more of them? To evaluate this, we conducted simulations using the data from our user study. Let C be the list of classifications re- ceived by a given pro file in our dataset (either a Sybil or legitimate pro file) by a given group of turkers (China, US, or India). To conduct our simulation, we randomize the or- der of C , then calculate what the overall false positive and negative rates would be as we include progressively more votes from the list. For each pro file, we randomize the list and conduct the simulation 100 times, then average the rates for each number of votes. Intuitively, what this process re- veals is how the accuracy of the turker group changes as we increase the number of votes, irrespective of the specific order that the votes arrive in. The results of our simulations demonstrate that there are limits to how much accuracy can be improved by adding more turkers to the group, as shown in Figure 9. Each line plots the average accuracy over all Sybil and legitimate pro- files for a given group of turkers. For false positives, the trend is very clear: after 4 votes, there are diminishing re- turns on additional votes. For false negatives, the trend is either flat (US turkers), or it grows slightly worse with more votes (China and India). Filtering Inaccurate Turkers. Since adding more turk- ers does not significantly increase accuracy, we now inves- tigate the opposite approach: eliminating turkers that are consistently inaccurate. Many deployed crowdsourcing sys- tems already use this approach [22]. Turkers are first asked to complete a pre-screening test, and only those who per- form sufficiently well are allowed to work on the actual job. In our scenario, turkers could be pre-screened by asking them to classify accounts from our ground-truth datasets. Only those that correctly classify x accounts, where x is some con figurable threshold, would be permitted to work on actual jobs classifying suspicious accounts. To gauge whether this approach improves Sybil detec- tion accuracy, we conduct another simulation. We vary the accuracy threshold x, and at each level we select all turkers that have overall accuracy ≥ x. We then plot the false neg- ative rate of the selected turkers in Figure 10. Intuitively, this simulates turkers taking two surveys: one to pre-screen them for high accuracy, and a second where they classify unknown, suspicious accounts. Figure 10 demonstrates that the false negative rate of the turker group can be reduced to the same level as experts by eliminating inaccurate turkers. The false negative rates are stable until the threshold grows >40% because, as shown in Figure 4, almost all the turkers have accuracy >40%. By 70% threshold, all three test groups have false negative rates ≤10%, which is on par with experts. We do not increase the threshold beyond 70% because it leaves too few turkers to cover all the Sybil pro files in our dataset. At the 70% threshold, there are 156 Chinese, 137 Indian, and 223 US turkers available for work. 5.4 Pro file Difficulty The last question we examine in this section is the fol- lowing: are there extremely difficult “stealth ” Sybils that re- sist classification by both turkers and experts? As we show in Table 3, neither experts nor turkers have 0% false nega- tives when classifying Sybils. What is unknown is if there is correlation between the false negatives of the two groups. To answer this question, we plot Figure 11. Each scatter plot shows the average classification accuracy of the Sybils from a particular region. The x-axes are presented in as- cending order by turker accuracy. This is why the points for the turkers in each sub figure appear to form a line. Figure 11 reveals that, in general, experts can correctly classify the vast majority of Sybils that turkers cannot (e.g. turker accuracy <50%). There are a select few, extremely difficult Sybils that evade both the turkers and experts. These “stealth ” Sybils represent the pinnacle of difficulty and blur the line between real and fake user pro files. There is only one case, shown in Figure 11(a), where turkers cor- rectly identify a Sybil that the experts missed. One important takeaway from Figure 11 is that “stealth ” Sybils are a very rare phenomenon. Even if a crowdsourced Sybil detector was unable to identify the them, the overall detection accuracy is so high that most Sybils will be caught and banned. This attrition will drive up costs for attackers, deterring future Sybil attacks. Turker Accuracy and Luck. Another takeaway from Figure 11 is that some pro files are difficult for turkers to classify. This leads to a new question: are the most accu- rate turkers actually better workers, or were they just lucky during the survey? Hypothetically, if a turker was randomly shown all “easy ” Sybils, then they would appear to be accu- rate, when in fact they were just lucky. Close examination of our survey results reveals that ac- curate turkers were not lucky. The 75 Chinese turkers who , ) % ( e t a R r o r r E 70 60 50 40 30 20 10 0 FN (CN) FN (IN) FN (US) FP (CN,IN,US) 2 4 6 8 10 12 14 16 18 20 22 Number of Votes per Profile ) % ( e t a R e v i t a g e N e l a F 80 70 60 50 40 30 20 10 0 CN IN US 0 10 20 30 40 50 60 70 Turker Accuracy Threshold (%) Figure 9. Votes per pro file versus the FP and FN rate. Figure 10. Accuracy threshold versus the false negatives. ) % ( l i b y S r e P y c a r u c c A 100 80 60 40 20 0 Turkers Experts 10 20 30 40 50 60 70 80 90 100 Sybils Ordered by Turker Accuracy ) % ( l i b y S r e P y c a r u c c A 100 80 60 40 20 0 Turkers Experts 20 5 30 25 15 10 Sybils Ordered by Turker Accuracy ) % ( l i b y S r e P y c a r u c c A 100 80 60 40 20 0 Turkers Experts 5 10 15 20 25 30 35 40 45 50 Sybils Ordered by Turker Accuracy (a) Renren (c) Facebook India (b) Facebook US Figure 11. Scatter plots of average accuracy per Sybil pro fil e. achieved ≥90% accuracy were collectively shown 97% of Renren Sybils during the survey. Similarly, the 124 US turkers with ≥90% accuracy were also shown 97% of the Facebook US Sybils. Thus, the high accuracy turkers ex- hibit almost complete coverage of the Sybils in our dataset, not just the “easy ” ones. 6 A Practical System In this section, we design a crowdsourced Sybil detection system based on the lessons learned from our experiments. We focus on practical issues such as scalability, accuracy, and privacy. We first describe our system architecture that enables crowdsourced Sybil detection at large scale. Sec- ond, we use trace-driven simulations to examine the trade- off between accuracy and cost in such a system. Finally, we discuss how to preserve user privacy when distributing user pro file data to turkers. 6.1 System Design and Scalability The first challenge we address is scalability. Today’s so- cial networks include hundreds of millions of users, most of whom are legitimate. How do we build a system that can focus the efforts of turkers on the subset of accounts that are suspicious? To address this challenge, we propose a hierarchical Sybil detection system that leverages both au- tomated techniques and crowdsourced human intelligence. As shown in Figure 12, the system contains two main lay- ers: the filtering layer and the crowdsourcing layer. . Filtering Layer. In the first layer, we use an ensemble of filters to locate suspicious pro files in the social network These filters can be automated using techniques from prior work, such as Sybil community detection [3] and feature based selection [31]. Filters can also be based on existing “user report” systems that allow OSN users to “report” or flag ” suspicious pro files. These tools are already imple- mented in social networks such as Facebook and Renren, and help to dramatically reduce the number of target pro- files studied by our crowdsourcing layer. Crowdsourcing Layer. The output of the filtering layer is a set of suspicious pro files that require further validati on (Figure 12). These pro files are taken as input by the crowd- sourcing layer, where a group of turkers classify them as legitimate or fake. OSNs can take further action by either banning fake accounts, or using additional CAPTCHAs to limit potentially damaging behavior. We begin with two techniques to increase the accuracy of the turker group. First, we use majority voting by a group of workers to classify each suspicious pro file. Our earlier results in Table 3 show that the accuracy of the crowd is significantly better than the accuracy of individual turker s. The second mechanism is a “turker selection ” module that filters out inaccurate turkers. Figure 10 shows that eliminating inaccurate turkers drastically reduces the false negative rate. As shown in Figure 12, we can implement turker selection by randomly mixing in “ground-truth pro- files” that have been verified by social network exployees with the larger set of suspicious pro files. By examining a “ All Turkers Crowdsourcing Employees Very Accurate Turkers Threshold L (Lower Layer, Accurate Turkers) U (Upper Layer, Very Accurate Turkers) 70% 80% 90% 5 5 5 3 3 2 Turker Selection Accurate Turkers Sybils Table 5. Optimal # of votes per pro file in each layer in order to keep the false positives <1%. Social Networks User Reports Auto Filters Filtering ? Suspicious Pro!les Figure 12. Crowdsourced Sybil detector. tester’s answers on the ground-truth pro files, we can gauge the evaluation accuracy of each worker. This accuracy test is performed continuously over time, so that any significant deviation in the quality of turker’s work will be detected. This protects against malicious attackers who go “under- cover ” as one of our testers, only to turn malicious and gen- erate bad results when presented with real test pro files. 6.2 System Simulations and Accuracy In this section, we examine the tradeoff between accu- racy and cost in our system. The overall goal of the system is to minimize false positives and negatives, while also min- imizing the number of votes needed per pro file (since each vote from a turker costs money). There is a clear tradeoff between these two goals: as shown in Figure 9, more votes reduces false positives. Simulation Methodology. We use trace-driven simula- tions to examine these tradeoffs. We simulate 2000 suspi- cious pro files (1000 Sybil, 1000 legitimate) that need to be evaluated. We vary the number of votes per pro file, V , and calculate the false positive and false negative rates of the system. Thus, each pro file is evaluated by V random turk- ers, and each turker’s probability of being correct is based on their results from our user study. In keeping with our sys- tem design, all turkers with <60% accuracy are eliminated before the simulation by our “turker selection ” module. We consider two different ways to organize turkers in our simulations. The first is simple: all turkers are grouped together. We refer to this as one-layer organization. We also consider two-layer organization: turkers are divided into two groups, based on an accuracy threshold T . Turkers with accuracy > T are placed in the upper layer, otherwise they go into the lower layer. In the two-layer scheme, pro files are first evaluated by turkers in the lower layer. If there is strong consensus among the lower layer that the pro file is Sybil or legitimate, then the classification stands. However, if the pro file is con- troversial, then it is sent to the more accurate, upper layer turkers for reevaluation. Each pro file receives B votes in the lower layer and U votes in the upper layer. Intuitively, the two-layer system tries to maximize the utility of the very accurate turkers by only having them evaluate difficult pro- files. Figure 12 depicts the two-layer version of our system. In our design, we cap the maximum acceptable false pos- itive rate at 1%. Our motivation is obvious: social network providers will not deploy a security system that has a non- negligible negative impact on legitimate users. We con- ducted simulations on all our turker groups, with consistent results across groups. For brevity, we limit our discussion here to results for the Chinese turkers. As shown in Fig- ure 6, the Chinese turkers have the worst overall accuracy of our turker groups. Thus, they represent the worst-case scenario for our system. The US and Indian groups both exhibit better performance in terms of cost and accuracy during simulations of our system. Votes per Pro file. In the one-layer simulations, the only variable is votes per pro file V . Given our constraint on false positives <1%, we use multiple simulations to compute the minimum value of V . The simulations reveal that the mini- mum number of votes for the Chinese pro files is 3; we use this value in the remainder of our analysis. Calculating the votes per pro file in the two-layer case is more complicated, but still tractable. The two-layer sce- nario includes four variables: votes per pro file ( U upper and L lower), the accuracy threshold between the layers T , and the controversial range R in which pro files are for- warded from the lower to upper layer. To calculate L and U we use the same methodology as in Figure 9. Turkers are divided into upper and lower layers for a given threshold T ∈ [70%, 90%], then we incrementally increase the votes per pro file in each layer until the false positive rate is <1%. The false positive rate of each layer is independent (i.e. the number of votes in the lower layer does not impact votes in the upper layer), which simplifies the calculations. The controversial range only effects the false negative rate, and is ignored from these calculations. Table 5 shows the minimum number of votes per pro file needed in the upper and lower layers as T is varied. We use these values in the remainder of our analysis. Figure 13 shows the average votes per pro file in our sim- ulations. Three of the lines represent two-layer simulations with different R values. For example, R = [0.2, 0.9] means that if between 20% and 90% of the turkers classify the pro- file as a Sybil, then the pro file is considered controversial. Although we simulated many R ranges, only three repre- e l i f o r P r e P s e t o V . g v A 10 8 6 4 2 0 70 [0.2, 0.9] [0.2, 0.5] [0.5, 0.7] One-Layer 75 80 Threshold (%) 85 90 ) % ( e t a R e v i t a g e N e s l a F 100 80 60 40 20 0 70 [0.5, 0.7] One-Layer [0.2, 0.9] [0.2, 0.5] 75 80 Threshold (%) 85 90 ) % ( e t a R e v i t a g e N e s l a F 35 30 25 20 15 10 5 0 1% 0.1% 0 1 2 3 4 5 6 7 8 9 10 Avg. Votes Per Profile Figure 13. Threshold versus average votes per pro files. Figure 14. Threshold versus false negative rate. Figure 15. Tradeoff between votes per pro file and desired accuracy. sentative ranges are shown for clarity. The number of votes for the one-layer scheme is also shown. The results in Figure 13 show that the number of votes needed in the various two-layer scenarios are relatively sta- ble. As R varies, the number of pro files that must be evalu- ated by both layers changes. Thus, average votes per pro file fluctuates, although the average is always ≤ L + U from Table 5. Overall, these fluctuations are minor, with average votes only changing by ≈1. False Negatives. Judging by the results in Figure 13, the one-layer scheme appears best because it requires the fewest votes per pro file (and is thus less costly). However, there is a significant tradeoff for lowering the cost of the system: more false negatives. Figure 14 shows the false negative rates for our simu- lations. The results for the two-layer scheme are superior: for certain values of R and thresholds ≥80%, two-layers can achieve false negative rates <10%. The parameters that yield the lowest false negatives (0.7%) and the fewest aver- age votes per pro file (6) are R = [0.2, 0.5] and T = 90%. We use these parameters for the remainder of our analysis. The results in Figures 13 and 14 capture the power of our crowdsourced Sybil detection system. Using only an average of 6 votes per pro file, the system products results with false positive and negative rates both below 1%. Reducing False Positives. In some situations, a so- cial network may want to achieve a false positive rate sig- nificantly lower than 1%. In order to evaluate how much this change would affect costs, we re-ran all our simulations with the target false positive rate set to <0.1%. Figure 15 plots the number of votes per pro file versus false negatives as the target false positive rate is varied. Each point in the scatter is a different combination of R and T values. The conclusion from Figure 15 is straightforward: to get <0.1% false positives, you need two additional votes per turker. This tradeoff is fairly reasonable: costs increase 33%, but false positives reduce by an order of magnitude. Parameterization. Since our system parameters were optimized using actual user test results, they may not be ideal for every system or user population. The key takeaway is that given a user population, the system can be calibrated to provide high accuracy and scalability. We do not have sufficient data to make conjectures about how often or when systems require re-calibration, but it is likely that a deployed system might periodically recalibrate parameters such as V and T for continued accuracy. 6.3 The Costs of a Turker Workforce Using the parameters derived in the previous section, we can estimate how many turkers would be needed to deploy our system. Using the parameters for Renren, each pro- file requires 6 votes on average, and turkers can evaluate one pro file every 20 seconds (see Figure 8). Thus, a turker working a standard 8-hour day (or several turkers working an equivalent amount of time) can examine 1440 pro files. Data from a real OSN indicates that the number of turk- ers needed for our system is reasonable. According to [3], Tuenti, a Spanish online social network, has a user-base of 11 million and averages 12,000 user reports per day. Our system would require 50 full-time turkers to handle this load. If we scale the population size and reports per day up by a factor of 10, we can estimate the load for a large OSN like Facebook. In this case, our system requires 500 turkers. Our own experience showed that recruiting this many turk- ers is not difficult (Table 1). In fact, following our crowd- sourcing experiments on this and other projects [30], we received numerous messages from crowd requesting more tasks to perform. Finally, we estimate the monetary cost of our system. Facebook pays turkers from oDesk $1 per hour to mod- erate images [10]. If we assume the same cost per hour per turker for our system, then the daily cost for deploy- ment on Tuenti (i.e. 12,000 reports per day) would only be $400. This compares favorably with Tuenti’s existing prac- tices: Tuenti pays 14 full-time employees to moderate con- tent [3]. The estimated annual salary for Tuenti employees are roughly e30,0003, which is about $20 per hour. So the Tuenti’s moderation cost is $2240 per day, which is signif- icantly more than the estimated costs of our turker work- force. 6.4 Privacy Protecting user privacy is a challenge for crowdsourced Sybil detection. How do you let turkers evaluate user pro- files without violating the privacy of those users? This issu e does not impact our experiments, since all pro files are from public accounts. However, in a real deployment, the system needs to handle users with strict privacy settings. One possible solution is to only show turkers the public portions of users’ pro files. However, this approach is prob- lematic because Sybils could hinder the detection system by setting their pro files to private. Setting the pro file to priv ate may make it more difficult for Sybils to friend other users, but it also cripples the discriminatory abilities of turkers. A better solution to the privacy problem is to leverage the OSNs existing “report” filter. Suppose Alice reports Bob’s pro file as malicious. The turker would be shown Bob’s pro- file as it appears to Alice. Intuitively, this gives the turker access to the same information that Alice used to make her determination. If Alice and Bob are friends, then the turker would also be able to access friend-only information. On the other hand, if Alice and Bob are strangers, then the turker would only have access to Bob’s public information. This scheme prevents users from abusing the report system to leak the information of random strangers. 7 Related Work The success of crowdsourcing platforms on the web has generated a great deal of interest from researchers. Sev- eral studies have measured aspects of Amazon’s Mechani- cal Turk, including worker demographics [12, 24] and task pricing [5, 11, 19]. There are studies that explore the pros and cons to use MTurk for user study [16]. Many studies address the problem of how to maximize accuracy from inherently unreliable turkers. The most com- mon approach is to use majority voting [17, 25], although this scheme is vulnerable to collusion attacks by malicious turkers [26]. Another approach is to pre-screen turkers with a questionnaire to filter out less reliable workers [22]. Fi- nally, [26] proposes using a tournament algorithm to deter- mine the correct answer for difficult tasks. In this study, we propose using crowdsourcing to solve a challenging OSN security problem. However, many stud- ies have demonstrated how crowdsourcing can be used by attackers for malicious ends. Studies have observed ma- licious HITs asking turkers to send social spam [30], per- form search engine optimization (SEO) [21], write fake re- views [23], and even install malware on their systems [15]. 8 Conclusion and Open Questions Sybil accounts challenge the stability and security of to- day’s online social networks. Despite significant efforts from researchers and industry, malicious users are creat- ing increasingly realistic Sybil accounts that blend into the legitimate user population. To address the problem today, social networks rely on ad hoc solutions such as manual in- spection by employees. Our user study takes the first step towards the develop- ment of a scalable and accurate crowdsourced Sybil detec- tion system. Our results show that by using experts to cal- ibrate ground truth filters, we can eliminate low accuracy turkers, and also separate the most accurate turkers from the crowd. Simulations show that a hierarchical two-tiered system can both be accurate and scalable in terms of total costs. Ground-truth. Our system evaluation is constrained by the ground-truth Sybils used in our user study, i.e. it is possi- ble that there are additional Sybils that were not caught and included in our data. Thus, our results are a lower bound on detection accuracy. Sybils that can bypass Facebook or Renren’s existing detection mechanisms could potentially be caught by our system. Deployment. Effective deployment of crowdsourced Sybil detection mechanisms remains an open question. We envision that the crowdsourcing system will be used to com- plement existing techniques such as content- filtering and statistical models. For example, output from accurate turk- ers can teach automated tools which fields of the data can most easily identify fake accounts. Social networks can fur- ther lower the costs of running this system by utilizing their own users as crowdworkers. The social network can replace monetary payments with in-system virtual currency, e.g. Facebook Credits, Zynga Cash, or Renren Beans. We are currently discussing internal testing and deployment possi- bilities with collaborators at Renren and LinkedIn. Countermeasures. An effective solution must take into account possible countermeasures by attackers. For exam- ple, ground-truth pro files must be randomly mixed with test pro files in order to detect malicious turkers that attempt to poison the system by submitting intentionally inaccurate re- sults. The ground-truth pro files must be refreshed periodi- cally to avoid detection. In addition, it is possible for attack- ers to in filtrate the system in order to learn how to improve fake pro files to avoid detection. Dealing with these “under- cover ” attackers remains an open question. 3 http://www.glassdoor.com/Salary/Tuenti- Salaries- E245751.htm References - [1] Thousands of fake profiles on facebook identi fied. Weekly Blitz.net, June 2011. [2] Y. Boshmaf et al. The socialbot network: When bots social- ize for fame and money. In Proc. of ACSAC, 2011. [3] Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In Proc. of NSDI, 2012. [4] G. Danezis and P. Mittal. Sybilinfer: Detecting sybil nodes using social networks. In Proc. of NDSS, 2009. [5] S. Faridani, B. Hartmann, and P. G. Ipeirotis. What’s the right price? pricing tasks for finishing on time. In Proc. of AAAI Workshop on Human Computation, 2011. [6] H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and characterizing social spam campaigns. In Proc. of IMC, 2010. [7] A. Ghosh, S. Kale, and P. McAfee. Who moderates the mod- erators? crowdsourcing abuse detection in user-generated content. In Proc. of EC, 2011. [8] D. Goldman. Facebook tops 900 million users. CNN Money, 2012. [9] J. Heer and M. Bostock. Crowdsourcing graphical percep- tion: using mechanical turk to assess visualization design. In Proc. of CHI, 2010. [10] I. Hollingshead and E. Barnett. The dark side of facebook. Telegraph, March 2012. [11] P. G. Ipeirotis. Analyzing the amazon mechanical turk mar- ketplace. XRDS, 17:16–21, Dec. 2010. [12] P. G. Ipeirotis. Demographics of mechanical turk. NYU Working Paper, 2010. [13] D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In Proc. of DIMVA, 2011. [14] J. Jiang et al. Understanding latent interactions in online social networks. In Proc. of IMC, 2010. [15] C. Kanich, S. Checkoway, and K. Mowery. Putting out a hit: Crowdsourcing malware installs. In Proc. of WOOT, 2011. [16] A. Kittur, H. Chi, and B. Suh. Crowdsourcing user studies with mechanical turk. In Proc. of CHI, 2008. [17] J. Le, A. Edmonds, V. Hester, and L. Biewald. Ensuring quality in crowdsourced search relevance evaluation. In Workshop on Crowdsourcing for Search Evaluation, 2010. [18] G. Liu, Y. Wang, and M. Orgun. Trust transitivity in complex social networks. In Proc. of AAAI Conference on Arti ficial Intelligence, 2011. [19] W. Mason and D. J. Watts. Financial Incentives and the “P er- formance of Crowds”. In Proc. of KDD-HCOMP, 2009. [20] A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing Time of Social Graphs. In Proc. of IMC, 2010. [21] M. Motoyama et al. Dirty jobs: The role of freelance labor in web service abuse. In Proc. of Usenix Security, 2011. [22] D. Oleson et al. Programmatic gold: Targeted and scal- able quality assurance in crowdsourcing. In Proc. of Human Computation, 2011. [23] M. Ott, Y. Choi, C. Cardie, and J. T. Hancock. Finding de- ceptive opinion spam by any stretch of the imagination. In Proc. of ACL, 2011. [24] J. Ross et al. Who are the crowdworkers?: Shifting demo- graphics in amazon mechanical turk. In Proc. of CHI, 2010. [25] R. Snow, B. O’Connor, D. Jurafsky, and A. Y. Ng. Cheap and fast —but is it good?: evaluating non-expert annotation s for natural language tasks. In Proc. of EMNLP, 2008. [26] Y.-A. Sun, S. Roy, and G. Little. Beyond independent agree- ment: A tournament selection approach for quality assur- ance of human computation tasks. In Proc. of Human Com- putation, 2011. [27] K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended accounts in retrospect: An analysis of twitter spam. In Proc. of IMC, 2011. [28] N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-resilient online content voting. In Proc. of NSDI, 2009. [29] B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. In Proc. of SIGCOMM, 2010. [30] G. Wang, C. Wilson, X. Zhao, Y. Zhu, M. Mohanlal, H. Zheng, and B. Y. Zhao. Serf and turf: Crowdtur fing for fun and profit. In Proc. of WWW, 2012. [31] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. In Proc. of IMC, 2011. [32] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Proc. of IEEE S&P, 2008. [33] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybil- guard: defending against sybil attacks via social networks. In Proc. of SIGCOMM, 2006.
1111.1053
1
1111
2011-11-04T06:31:55
Modelling and Performance analysis of a Network of Chemical Sensors with Dynamic Collaboration
[ "cs.SI", "physics.soc-ph" ]
The problem of environmental monitoring using a wireless network of chemical sensors with a limited energy supply is considered. Since the conventional chemical sensors in active mode consume vast amounts of energy, an optimisation problem arises in the context of a balance between the energy consumption and the detection capabilities of such a network. A protocol based on "dynamic sensor collaboration" is employed: in the absence of any pollutant, majority of sensors are in the sleep (passive) mode; a sensor is invoked (activated) by wake-up messages from its neighbors only when more information is required. The paper proposes a mathematical model of a network of chemical sensors using this protocol. The model provides valuable insights into the network behavior and near optimal capacity design (energy consumption against detection). An analytical model of the environment, using turbulent mixing to capture chaotic fluctuations, intermittency and non-homogeneity of the pollutant distribution, is employed in the study. A binary model of a chemical sensor is assumed (a device with threshold detection). The outcome of the study is a set of simple analytical tools for sensor network design, optimisation, and performance analysis.
cs.SI
cs
Modelling and Performance analysis of a Network of Chemical Sensors with Dynamic Collaboration HPP Division, Defence Science and Technology Organisation, 506 Lorimer Street, Fishermans Bend, Alex Skvortsov Vic 3207, Australia Branko Ristic ISR Division, Defence Science and Technology Organisation, 506 Lorimer Street, Fishermans Bend, Vic 3207, Australia Abstract The problem of environmental monitoring using a wireless network of chemical sensors with a limited energy supply is considered. Since the conventional chemical sensors in ac- tive mode consume vast amounts of energy, an optimisation problem arises in the context of a balance between the energy consumption and the detection capabilities of such a net- work. A protocol based on "dynamic sensor collaboration" is employed: in the absence of any pollutant, majority of sensors are in the sleep (passive) mode; a sensor is invoked (activated) by wake-up messages from its neighbors only when more information is re- quired. The paper proposes a mathematical model of a network of chemical sensors using this protocol. The model provides valuable insights into the network behavior and near optimal capacity design (energy consumption against detection). An analytical model of the environment, using turbulent mixing to capture chaotic fluctuations, intermittency and non-homogeneity of the pollutant distribution, is employed in the study. A binary model of a chemical sensor is assumed (a device with threshold detection). The outcome of the study is a set of simple analytical tools for sensor network design, optimisation, and performance analysis. 1. Introduction Development of wireless sensor network (WSN) for a particular operation scenario is a complex scientific and technical problem [1], [2]. Very often this complexity resides Preprint submitted to International Journal of Distributed Sensor Networks January 23, 2018 in establishing a balance between the peak performances of the WSN prescribed by the operational requirements (e.g. minimal detection threshold, size of surveillance region, detection time, rate of false negatives, etc) and various resource constrains (e.g. limited energy supply, limited number of sensors, limited communication range, fixed detection threshold of individual sensors, limited budget for the cost of hardware, maintenance, etc). The issue of resource constraints becomes even more relevant for a network of chemical sensors that are used for the continuous environmental monitoring (air and water pollution, hazardous releases, smoke etc). The reason is that a modern chemical sensor is usually equipped with a sampling unit (a fan for air and a pump for water), which turns on when the sensor is active. The sampling unit usually requires a significant amount of energy to operate as well as frequent replacement of some consumable items (i.e. cartridges, filters). This leads to the critical requirement in the design of a WSN to reduce the active (i.e. sampling) time of its individual sensors. One attractive way to achieve an optimal balance between the peak performance of the WSN and its constraints in resources, mentioned above is to exploit the idea of Dynamic Sensor Collaboration (DSC) [3], [4]. The DSC implies that a sensor in the network should be invoked (or activated) only when the network will gain information by its activation [4]. For each individual sensor this information gain can be evaluated against other performance criteria of the sensor system, such as the detection delay or detection threshold, to find an optimal solution in the given circumstances. While the DSC-based approach is a convenient framework for the development of algorithms for optimal scheduling of constrained sensing resources, the DSC-based al- gorithms involve continuous estimation of the state of each sensor in the network and usually require extensive computer simulations [3], [4]. These simulations may become unpractical as the number of sensors in the network increases (e.g. "smart dust" sensors). Even when feasible, the simulations can provide only the numerical values for optimal network parameters, which are specific for an analysed scenario, but without any an- alytical framework for their consistent interpretation and generalisation. For instance, the scaling properties of a network (the functional relationship between the network parameters) still remain undetermined, which prevents any comprehensive optimisation study. 2 This motivates the development of another, perhaps less rigorous, but certainly sim- pler approach to the problem of network analysis and design. The main idea is to phenomenologically employ the so-called bio-inspired (epidemiology, population dynam- ics) or physics inspired (percolation and graph theory) models of DSC in the sensor network in order to describe the dynamics of collaboration as a single entity [5], [6], [7], [9], [10],[11]. Since the theoretical framework for the bio- or physics- inspired models is already well established, we are in the position to make significant progress in the ana- lytical treatment of these models of DSC (including their optimisation). From a formal point of view the derived equations are ones of the "mean-field" theory, meaning that instead of working with dynamic equations for each individual sensor we only have a small number of equations for the "averaged" sensor state (i.e. passive, active, faulty etc), regardless of the number of the sensors in the system. A reveling example of the efficiency of this approach is the celebrated SIR model in epidemiology [12]. For any size of population, the SIR model describes the spread of an infection by using only three equations, corresponding to three "infectious" classes of the population: susceptible, infectious and recovered. The analytic or "equation-based" approach, often leads to valuable insights into the performance of the proposed sensor network system by providing simple analytical expres- sions to calculate the vital network parameters, such as detection threshold, robustness, responsiveness and stability and their functional relationships. In the current paper we develop a simple model of a wireless network of chemical sensors, where dynamic sensor collaboration is driven by the level of concentration of a pollutant (referred to as the "external challenge") at each individual sensor. Our approach is based on the known analogy [11] between the information spread in a sensor network and the epidemics propagation across a population. In this analogy, the infection transmission process corresponds to message passing among the sensors. A chain reaction in transmission of an infection is called the epidemic. In the context of a sensor network, a chain reaction will trigger the network (as a whole) to move from the "no pollutant" state to the "pollutant present" state, which will indicate the presence of an external challenge. The paper shows that the adopted epidemics or population inspired approach can 3 provide a reliable description of the dynamics of such a sensor network. The simple ana- lytical formulas (scaling laws) derived from the model express the relationships between the parameters of the network (e.g. number of sensors, their density, sensing time etc), the network performance (probability of detection, response time of a network) and the parameters of the external challenge (environment, pollutant). As an example of appli- cation of the proposed framework we performed a simple optimisation study. Numerical simulations are carried out and presented in the paper in support of analytic expressions. Although the model presented in this paper is specific to a network of chemical sensors, the underlying analytical approach can be easily adapted to other applications and other types of networks by a simple change of the model of environment and sensor. 2. The Model of Environment The external challenges are modeled by a random time series which mimics the tur- bulent fluctuation of concentration at each sensor of the network. In this approach the fluctuations in concentration C are modeled by the probability density function (pdf) of C with the mean C0 as a parameter (i.e. C0 is a mean concentration of the tracer in the area) [13] : f (CC0) = (1 − ω)δ(C) + ω2 C0 (γ − 2)(cid:18)1 + (γ − 1) ω (γ − 2) C C0(cid:19)−γ . (1) Here the value γ = 26/3 can be chosen to make it compliant with the theory of tracer dispersion in Kolmogorov turbulence (see [13]), but it may vary with the meteorological conditions. The parameter ω, which models the tracer intermittency in the turbulent flow, can be in the range [0, 1], with ω = 1 corresponding to the non-intermittent case. In general it also depends on a sensor position within a chemical plume, thus ω is in the range 0.95 − 0.98 near the plume centroid and may drop to 0.3 − 0.5 near the plume edge. For ω 6= 0, the pdf f of (1) has a delta impulse in zero, meaning that the measured concentration in the presence of intermittency can be zero on some occasions. It can be easily shown that the pdf of (1) integrates to unity, so it is appropriately normalized. The measured concentration time series can be generated by drawing random samples from the probability density function given in (1) at each time step. The random number 4 200 150 . ) . u a ( y 100 50 1.06 1.04 1.02 1 0.98 0.96 0.94 50 100 x (a.u.) 150 200 Figure 1: Example for concentration realisation for a plume-like flow (left) and the selected area of the flow with higher resolution (right). generator is implemented using the inverse transform method based on the following steps [8] : 1. Draw a sample u from the standard uniform distribution: u ∼ U [0, 1]. 2. Compute the value of C that satisfies F (C) = u, where F (·) is the cumulative distribution function (cdf) of the distribution of interest. 3. The value of C computed in the previous step is a random sample drawn from the desired probability distribution. The cdf F (·) needed for inverse transform sampling is obtained by integrating the pdf in (1), and is given by: F (CC0) = 1 − ω(cid:20)1 +(cid:18) 2 γ − 2(cid:19) C C0(cid:21)1−γ . (2) The use of this cdf in the inverse transform sampling procedure generates the value of concentration: C0(cid:0) γ−2 ω (cid:1)h(cid:0) 1−u ω (cid:1)− 0, 1 γ−1 − 1i , u ≥ 1 − ω u < 1 − ω, (3) C =  where u is again the standard uniform distribution u ∼ U [0, 1]. In order to produce spatial correlations that compline with the well-known scaling properties of turbulent dispersion a special 'swapping' algorithms was implement. This recursive algorithm mimic the chaotic fluctuations occurring in the real turbulent flows (for details, see [16]). The proposed framework allows to implement a reasonably realistic model of the con- taminated environment (i.e to generate the concentration realisation at each sensor over 5 time), see Fig 1. Due to a universal nature of turbulence it can be used to simulate performance of WSN in detection of either airborne and waterborne releases. The pa- rameters γ and ω are typically estimated from geophysical observation (meteorological and organological) and will be assumed known. The geometrical complexity of the turbulent flow can be incorporated in the theo- retical framework (2) by assuming a temporal and spatial variability of the mean con- centration filed C0 ≡ C0(r, t). This way we can simulate various morphologies of the flow (jet, wake, boundary layer, compartment flow, etc) as well as various scenarios of hazardous release (plume, puff ), for details see [8] , [17]. For the sake of simplicity in the current paper we consider only case C0 = const. This assumption corresponds to the approximation when the size of WSN is less that the width of hazardous plume (see Fig 1), or to an important practical case of a 'highly distributed' source of pollutant (traffic, extended industrial site or urban area [18]). 3. The Model of a Chemical Sensor We adopt a simple binary (or "threshold") model of a sensor, with the sensor reading V given by: We emphasize that threshold C∗ is an internal characteristic of the sensor, unrelated to 1, C ≥ C∗ 0, C < C∗. (4) V =  C0 in (1). This threshold is another important parameter of our model. A chemical sensor with bar readings, which includes many subsequent levels for concentration thresholds mapped into a discrete sensor output, is an evident generalisation of (4). Using (3) and (4) it is straightforward to derive the probability of detection for an individual sensor embedded in the environment characterised by (2): p = 1 − F (C∗C0). (5) This aggregated parameter links the characteristics of a specific sensor C∗, the parameter of the external challenge C0 and the environment (F (·), γ, ω). 6 4. Modeling and Analysis of Network Performance Our focus is a wireless network of chemical sensors with dynamic collaboration. We assume that N identical sensors (i.e with the same detection threshold C∗ and sampling time τ∗) are uniformly distributed over the surveillance domain of area S with density ρ = N/S. We will model the following network protocol for dynamic collaboration. Each sensor can be only in one of the two states: active or passive. The sensor can be activated only by a message it receives from another sensor. Once activated, the sensor remains in the active state during an interval of time τ∗; then it returns to the passive (sleep) state. While being in the active state, the sensor senses the environment and if the chemical tracer is detected (binary detection), it broadcasts a (single) message. If a sensor receives an activation message while it is in the active state, it will ignore this message. The broadcast capability of the sensor is characterized by its communication range r∗, which is another important parameter of the model. The described protocol assumes that certain sensors of the network are permanently active. The number of permanently active sensors in the network is fixed but the actual permanently active sensors vary over time in order to equally distribute the energy consumption of individual sensors. The WSN following this protocol can be considered as a system of agents, interacting with each other (by means of message exchange) and with the stochastic environment (by means of sampling and probing). The interactions can change the state of agents (active and passive). From this perspective this WSN is similar to the epidemic SIS (susceptible-infected-susceptible) model [12], in which an individual can be in only two states (susceptible or infected), and the change of state is a result of interaction (mixing) between the individuals (which corresponds to the exchange of messages in our case). Thus a dynamic (population) model for our system [12] is as follows: dN+ dt dN− dt = αN+N− − = −αN+N− + , N+ τ∗ N+ τ∗ , (6) (7) where N+, N− denote the number of active and passive sensors, respectively. The nonlin- ear terms on the RHS of (6) and (7) are responsible for the interaction between individuals 7 (i.e. sensors), with the parameter α being a measure of this interaction. The population size (i.e. the number of sensors) is conserved, that is N+ + N− = N = const. The next step is to express α in terms of the parameters of our system by invok- ing physics based arguments used in population dynamics [12] . It is well-known that parameter α in (6) describes the intensity (contact rate) of social interaction between individuals in the community, so we can propose (see [12], [15]) mp N τ∗ , α ∝ (8) where m is the number of contacts made by an "infected" sensor during the infectious period τ∗ (i.e the number of sensors receiving a message from an alerting sensor). In our case we have m = πr2 ∗ρ. Then using N = Sρ we can write α = G ∗ πr2 τ∗S p, (9) where G is a constant calibration factor, being of order unity (it must be estimated during the network calibration); p was defined by (5). In order to simplify notation, from now on we will assume that G is absorbed in the definition of r∗. It is worth noting that by introducing non-dimensional variables n+ = N+/N, n− = N−/N, τ = t/τ∗ the system (6)-(7) can be rewritten in a compact non-dimensional form dn+ dτ = R0n+n− − n+, n− = 1 − n+, with only one non-dimensional parameter R0 = ατ∗N. (10) (11) The parameter R0 is well-known in epidemiology where it has the meaning of a basic reproductive number [12]. The system (6)-(7) combined with the condition N+ + N− = N can be reduced to one equation for y = N+ where dy dt = αy(N − y) − y τ∗ = y(b − αy), b = αN − 1/τ∗ = (R0 − 1)/τ∗. 8 (12) (13) By simple change of variables z = αy/b this equation can be reduced to the standard logistic equation which has the well-known solution dz dt = bz(1 − z), z(t) = z0 (1 − z0) exp(−bt) + z0 , (14) (15) where z0 = z(0). We can see that if b < 0 then z → 0 as t → ∞ for any z0, so any individual sensor activation in the network will "die out", that is the network will not be able to detect the external challenge. The same is valid for b = 0 when z = z0 = const (no response to external challenges). Only if the condition b > 0 is satisfied, then z → 1 as t → ∞ (independently of z0). In this case, after a certain transition interval, the network will reach a new steady state with N+ N = 1 − θ, N− N = θ, θ = 1 ατ∗N ≡ 1 R0 . (16) A fraction of active sensors N+ at this new state is a measure of the network (positive) response to the event of chemical contamination. From (15) it is clear that the time scale for the network to reach the new state can be estimated from the condition e−bt ≪ 1, so (17) τ∗ . 1 b = τ ≥ R0 − 1 This equation provides the relationship between the scale of activation time and param- eter R0. One can see that this scale decreases as R0 increases. From (14), (17) it follows that an "epidemic threshold" for the sensor network is simply ατ∗N > 1 or in terms of the 'basic reproductive number' (11) R0 = ατ∗N = pN ∗ πr2 S > 1. (18) Observe that sensor sampling time τ∗ has disappeared from the expression for R0. This means that it is possible to create an information epidemic (i.e. detect a chemical pol- lutant) for any value of τ∗, provided this time is long enough for a sensor to detect the chemical tracer. But according to (17), the responsiveness of the whole network to the external challenges (i.e. the time constant of detection) is, indeed, strongly dependent on the sensor sampling time τ = τ∗/(R0 − 1). 9 The expressions (16), (17) and (18) are the main analytical results of the paper. For a given level of external challenges (i.e. C0) and meteorological conditions (i.e. γ, ω), these expressions provide a simple yet rigorous way to estimate how a change in the network and sensor parameters (i.e. N, C∗, τ∗) will affect the network performance (i.e. N+, τ ). We can also see that for a given external challenge the network of chemical sensors will respond in the most effective way when its parameters are selected in the combination which meets the criterion for 'information epidemic" (18). The final analytical expressions enable us to maximize the network information gain and optimize other parameters. For example, from (16), we can readily infer the impor- tant scaling properties of the network performance: N− N ∼ 1 r2 ∗ , N− N ∼ 1 N , N− N ∼ 1 p . (19) For instance, if we double the communication range of an individual sensor r∗, the fraction of inactive sensors in the network will drop four times. Likewise, if we need to reach a specified fraction of active sensors (1 − N−/N ) to be able to reliably detect a given level of pollutant concentration, these formulas describe all possible ways of changing the parameters of the model in order to achieve this goal. 5. Information Gain of Collaboration We have explained earlier that the concept of DSC is important for a network with limited energy/material resources. But the question remains will a network with DSC be inferior (in terms of detection performance) in comparison with a benchmark network where all sensors operate independently of each other and only report their (positive) detections of chemical pollution to the central processor for decision making? Clearly, such a benchmark network would be very expensive to run (all sensors would have to be active all the time), but could provide excellent detection performance. In this section we show that, under a certain condition, the network with DSC can provide superior detection performance compared to the benchmark network. Let us assume that we have δN senors continuously operating (0 ≤ δ ≤ 1). For a benchmark network, on average, we have pδN sensors detecting pollutant. For the network with DSC the same quantity can be estimated as p(1 − θ)N (since as we have seen the saturation 10 level of N+ does not depend on initial conditions). From here we can then deduce that the network with DSC will provide more information (for detection of chemical pollution) than the benchmark network if the following condition is satisfied: θ = 1 ατ∗N ≤ (1 − δ), (20) which is eventually reduced to the condition of "epidemic threshold"(18) for the small value of δ. The value of the parameter δ can be also estimated based on the following arguments. Let us assume that our aim is to detect a level concentration C0 associated with a hazardous release within the time T (the constraint on time is driven by the requirement to mitigate the toxic effect of the release). Then we can write a simple condition for the information 'epidemic' in the WSN to occur during time T : δpN T /τ∗ ≥ 1, (21) where p is given by (5), i.e. p = 1− F (C∗C0). Evidently, for information epidemic to be observable, the number of continuously active sensors should be less that the number of sensors activated due to the hazardous release. Thus from (20) we can write the following 'consistency' condition for the minimum value of δ δmin ≈ τ∗ pN T ≤ (1 − 1 ατ∗N ), or by re-writing it in terms of R0, see (16), δmin ≈ τ∗ pN T ≤ (1 − 1 R0 ). (22) (23) It can be seen, that with other conditions being equal the fraction of 'stand-by' sensors δmin can be made however small (since R0 ≥ 1). It implies that only a small fraction of WSN will be active most of the time and is a clear demonstration of the energy consumption gain associated with the 'epidemic' protocol. Another important criteria for epidemic protocol can be derived by comparison of amplitude of "detectable events" for the same number of sensors in the network with DSC with the system of N independent sensors. For the network with DSC it is (1− θ)N (since we use N+ to retrieve information about the environment) and for the system of 11 the same independent sensors it is still pN (since N+ is simply equal to N ). Then instead of (20) we can write θ < (1 − p) (24) Under this condition more detectable events will occur in the presence of chemical pol- lution by the described network with DSC (activation messages) then in a network of stand alone sensors (signals of positive detection). This leads to the interesting threshold condition on the number of sensors in the network N > S πr2 ∗ 1 p(1 − p) . (25) The last term in RHS (p(1− p))−1 has an obvious minimum 4 corresponding to p = 1/2, so finally we arrive at the simple universal condition N > N∗ = 4 π S r2 ∗ . (26) This condition reads that if the number of sensors in the system is greater than N∗ then networking with DSC can provide an information gain over the benchmark network. Un- der this condition, the network with DSC in not only desirable from the aspect of energy conservation, but also provides better detection performance through the information gain. The condition p = 1/2 minimizing RHS of (25) can be considered as a criterion for an "optimal" sensor for a given network with DSC and for a given concentration of pollutant to be detected. Namely, from the equation F (C∗C0) = 1/2 and using (2) we can write C∗ = C0(cid:18) γ − 2 2 (cid:19)"(cid:18) 1 2ω(cid:19)1/(1−γ) − 1# . (27) Given environmental parameters (γ, ω) and given the level of concentration to be de- tected (C0), formula (27) also specifies a simple condition on detection threshold for an individual sensor to maximize an information gain by being networked. 6. Numerical Simulations In support of analytical derivations presented above, a network of chemical sensors operating according to the adopted protocol for dynamic collaboration was implemented 12 in MATLAB. A comprehensive report with numerical simulations result will be published elsewhere; here we present only some illustrative examples. For consistency, a 1000m × 1000m surveillance region populated by N = 400 sensors In each run, chemical with a uniformly random placement was assumed in all tests. pollution with concentration C0 = 150 is applied, and the simulation starts when a single randomly selected sensor (which has detected the presence of chemical contamination in its vicinity) starts broadcasting. Due to this random initiation and the fact that the probability of detection of individual sensors is less than unity (p < 1), each run of the computer program results in a slightly different outcome. Figs.2,3 show the average evolution of the ratio N+/N in the network over time. The curves were obtained by using the following parameters: ω = 0.98, γ = 26/3. Fig.2 demonstrates the changes in dynamics of the WSN for different values of communication range r∗ and Fig.3 depicts the similar plots for changes of the detection threshold of individual sensor C∗. For all plots in Fig.2, Fig.3 the initial number of active sensors N+(t = 0) = 10. Overall we found that the simulation output is much more sensitive to the changes of communication range, than to the threshold of an individual sensor (see range of parameters depicted in Figs.2,3). In all cases we observed the transition of N+ from the initial steady state (where N+ is very small indicating the absence of the pollutant) to the new steady state (high value of N+), so information "epidemic" in the network of chemical sensors does occur. By direct substitution into (18) it was also validated that in all cases presented in Figs.2,3 the condition for an information "epidemic" was satisfied. In general, the saturation value of N+ derived from these plots were in an agreement with theoretical prediction (16), but the estimated standard deviation of N+ (not shown in Fig.2) could be very high (up to 30%) for some combination of parameters. The relative standard deviation (normalized by mean value N+) usually gradually decreased over time and quite rapidly decays with the increase of communication range r∗. The occasional high variability of the output of the sensor network is undesirable and motivates further analysis. We also used the data from the plots in Figs. 2, 3 to calibrate our model. The calibration was performed by extracting the steady-sate (or saturation) values of N+ from the plots and by adjusting the "free" constant G in the analytical expressions (16) to achieve the best match between the analytical predictions and simulations. The 13 1 0.8 0.6 0.4 0.2 N / + N 0 0 20 40 60 80 100 t/τ * Figure 2: Results of numerical simulations: The fraction of active sensors in the network over time for the different communication range r∗: ♦ − r∗ = 40m, (cid:3) − r∗ = 30m, ▽ −r∗ = 27m, (cid:13) −r∗ = 20m; C∗/C0 = 1.03, N+(t = 0) = 10. The dashed red line corresponds to the analytical predictions (15). It is clearly seen that in the case r∗ = 20m the information epidemic in WSN dies off. value G ≈ 0.7 seems to provide an optimal agreement with the presented simulations. In order to validate our simple model for parameter α we performed the following study. For each simulation we derived value of αs from (16) and then compared it with the value αt calculated from the theoretical expression (9) using the calibration value G ≈ 0.7. The results of this study are presented in Fig.4. The red dashed line corresponds to the perfect agreement between the theory and simulations. Considering the high variability of N+ and a rather simple model for α, the agreement between the theory and simulations is acceptable. To validate further the alignment between the computer simulations and the proposed mathematical model, we numerically estimated some scaling properties of the network system (i.e. (9), (19)). Firstly we derived the scaling properties from computer simula- tions and then compared them to the theoretical predictions. In general we found that all trends of the derived scaling do agree with theoretical expressions in (19), but the quantitative agrement may significantly vary from case to case. As an illustration, in 14 N / + N 1 0.8 0.6 0.4 0.2 0 0 20 40 t/τ * 60 80 100 Figure 3: Results of numerical simulations: The fraction of active sensors in the network over time for the different threshold of individual sensor C∗: (cid:3) − C∗/C0 = 1.05, ▽ −C∗/C0 = 1.02, (cid:13) −C∗/C0 = 1.00; r∗ = 40m, N+(t = 0) = 10. The dashed red line corresponds to the analytical predictions (15). It is clearly seen that in the case C∗/C0 = 1.00 the information epidemic in WSN dies off. 0.1 0.09 0.08 0.07 0.06 0.05 0.04 0.03 0.02 0.01 t α 0 0 0.01 0.02 0.03 0.04 0.06 0.07 0.08 0.09 0.1 0.05 α s Figure 4: Simulation and theoretical predictions of parameter α : αt is the theoretical value (9), αs is the results of simulations. The red dashed line corresponds to the perfect agreement. 15 1.2 1 0.8 0.6 0.4 0.2 0 α −0.2 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 p Figure 5: Parameter α as a function of p extracted from numerical simulations in log-log scale. The dashed line corresponds to the power-law fit α ∝ pq, q = 1.27, theoretical prediction corresponds to q = 1, see (8). Fig.5 we present the plot of dependency of α against p in log-log scale. The extracted exponent corresponds to α ∝ pq, where q = 1.27 while the theoretical value according to (8) is q = 1. This indicates that while our analytical model is very simple and fast to compute, for higher accuracy it may need further refinements as discussed below. The results of numerical simulations presented above serve to verify that the 'infor- mation epidemic' does occur in the wireless network of chemical senors. This also implies that the proposed theoretical framework may lead to a gain in the energy consumption, that may result in the significant advantages in operational deployment of such systems. More detailed analysis of the optimal values of parameters satisfying threshold conditions (18), (23), (26) and lead to the optimal performance of WSN will be reported in separate publications. 7. Refinements of the model The disagreement described above is due to the implicit assumption of "homogeneous mixing" which we made in equations (6)-(7). The homogeneous mixing manifests itself in the bilinear form of the interaction terms on the RHS of (6)-(7). This bi-linearity means that the number of new "infected" sensors is proportional to the product of the number which is currently "infected" and the number which is currently "susceptible". Effectively 16 it means that all passive sensors are equally likely to be activated. This assumption holds only if the majority of activated ("infected") sensors are far away from each other (i.e. at the distances ≫ r∗). At some stage of the sensor "epidemic" this assumption can be violated, because the secondary "infected" sensors will be at the shorter distances from the "infectious" parents (see Fig.6). The broadcasted messages in overlapping areas become duplicated and the rate of new "infections" will be no longer proportional to the number of their parents. The fraction of "infected" sensors in the overlapping areas will depend on the new equilibrium state of the sensor system (i.e. N+/N as t → ∞) and may not be small for some scenarios. To overcome this restriction we again invoke an approach successfully implemented in epidemiology (see [15]). Instead of (6)-(7) we now write dN+ dt = αN ν +N− − N+ τ∗ , dN− dt = −αN ν +N− + N+ τ∗ , (28) where a new parameter 0 ≤ ν ≤ 1 depends on the packing density of "infected" sensors (or on the ratio N+/N ). For a "sparse" network configuration we have ν ≈ 1 (no overlapping areas) and for an extremely "dense" network ν ≈ 0 (all sensors are located around the same point), see Fig. 6. In general ν can be used as a fitting parameter of the model [9] or estimated based on the mathematical theory of packing. For a specific network configuration a value ν = 1/2 was derived in [7] based on some simplified assumptions. By employing new parameter ν we can significantly improve agreement between analytical model and simulation at the initial stage of information epidemic, since here we can assume N− ≈ N = const, so dN+ Fig.7. +. An example of improved fitting is presented in dt ∝ N ν A B Figure 6: Examples of dense (A) and sparse (B) wireless sensor networks. 17 1 0.8 0.6 0.4 0.2 N / N + 0 0 10 20 30 40 50 t/τ * Figure 7: Effect of parameter ν in the model (28) on the simulation data fit: dashed line ν = 1, solid line ν = 0.7. Similarly to the epidemiological models (see [12]), incorporation of the spatial inho- mogeneity can be achieved by adding the appropriate diffusion terms on the LHS of (6) and (7): ∂N+ ∂t − D△N+ = αN+N− − ∂N− ∂t − D△N− = −αN+N− + N+ τ∗ , N+ τ∗ , (29) (30) where D is diffusivity in the sensor system which can be estimated as D ≈ r2 the same time the inhomogeneity of pollutant distribution can be easily incorporated in ∗/τ∗. At α(r) with non-uniform C0(r) (see (2), (5), (8)). An important property of the system (29), (30) is the existence of analytical solutions in the form of traveling waves, propagating with the velocity v0 ∼ √αD [12]. In our case these waves correspond to the switching fronts between active and passive sensors. If pollutant is advected by the wind flow with a characteristic velocity v∗, then a simple synchronisation condition v0 ≥ v∗ or α ≥ v2 network optimisation. ∗ provides an important criteria for ∗τ∗/r2 18 Another interesting extension of the proposed model is the introduction of the con- cept of a faulty sensor, a sensor which is no longer available for sensing and networking. This state of a sensor would correspond to the removed population segment in the epi- demiological framework and can be attributed to any kind of faults (flat battery, software malfunction, hardware defects etc). As in the celebrated SIR epidemiological model [12], a new state results in the third equation for N0 in the system (6)-(7) with a new temporal parameter - an average operational time (the lifespan) of a sensor. The total number of sensors will be still conserved: N = N+ + N− + N0 = const. This model provides a more realistic representation of an operational sensor systems and allows us to estimate such important parameters as the operational lifetime of the network and the reliability of the network. 8. Conclusions We developed a "bio-inspired" model of a network of chemical sensors with dynamic collaboration for the purpose of energy conservation and information gain. The proposed model leverages on the existing theoretical discoveries from epidemiology resulting in a simple analytical model for the analysis of network dynamics. The analytical model enabled us to formulate analytically the conditions for the network performance. Thus we found an optimal configuration which, within the underlying assumptions, yields a balance between the number of sensors, detected concentration, the sampling time and the communication range. The findings are partly supported by numerical simulations. Further work is required to address the model refinements and generalisations. 9. Acknowledgement The authors would like to thank Ralph Gailis, Ajith Gunatilaka and Chris Woodruff for helpful technical discussions and Champake Mendis for his assistance in the software implementation of the proposed model. References [1] C. S. Raghavendra, K. M. Sivalingam, Taieb Znati. (2005) Wireless Sensor Networks. Springer, USA, 2005. 19 [2] P. E. Bieringer, A. Wyszogrodzki, J. Weil and G. Bieberbach. An Evaluation of Propylene Sampler Grid Designs for the FFT07 Field Program(2006), Tech. Report, National Center for Atmospheric Research, Boulder, USA. [3] E. Ertin, J. W. Fisher, L. C. Potter.(2003) Maximum Mutual Information Principle for Dynamic Sensor Query Problems. Lecture Notes in Computer Science: Information Processing in Sensor Networks, 2003 2634, pp. 91-104. [4] F. Zhao, J. Shin, J. Reich. (2002) Information-Driven Dynamic Sensor Collaboration for Tracking Applications. IEEE Signal Processing Magazine, 2002, 19, 2, pp. 61 -- 72. [5] J. Mathieu, G. Hwang, J. Dunyak (2006). The State of the Art and the State of the Practice: Transferring Insights from Complex Biological Systems to the Exploitation of Netted Sensors in Command and Control Enterprises, 2006 MITRE Technichal Papers, July, 2006, MITRE Corpo- ration, USA. [6] A. Khelil, C. Becker, J. Tian, K. Rothermel.(2002) An Epidemic Model for Information Diffusion in MANETs.In MSWiM 2002: Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, Atlanta, Georgia, USA, 2002, pp. 54 -- 60. [7] P. De, Y. Liu, S. K. Das. (2007) An Epidemic Theoretic Framework for Evaluating Broadcast Pro- tocols in Wireless Sensor Networks. In MASS 2007: Proceedings of IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, Pisa, Italy, 2007, pp 1 -- 9. [8] A. Gunatilaka, B.Ristic, A.Skvortsov, M. Morelande. (2008) Parameter Estimation of a Continuous Chemical Plume Source. in Fusion 2008: 11th International Conference on Information Fusion, Cologne, Germany, 2008, pp. 1-8. [9] B.Ristic, A.Skvortsov, M.Morelande. (2009) Predicting the Progress and the Peak of an Epidemics. in ICASSP 2009: Proceedings of 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Taiwan, April, 2009. [10] A.Dekker, A.Skvortsov. (2009) Topological Issues in Sensor Networks. in MODSIM 2009: 2009 MSSANZ International Congress on Modelling and Simulation, Cairns, Australia, 2009. [11] S. Eubank, V. S. Anil Kumar, M. Marathe. (2008) Epidemiology and Wireless Communication: Tight Analogy or Loose Metaphor? Lecture Notes in Computer Science: Bio-Inspired Computing and Communication, 2008, 5151, pp. 91-104. [12] J. D. Murray.(2002) Mathematical Biology, Springer, USA, v 1,2. 2002 [13] V. Bisignanesi, M.S. Borgas (2007). Models for integrated pest management with chemicals in atmospheric surface layers. Ecological modelling, 2007, 201, 1, pp. 2 -- 10. [14] P. D. Stroud, S. J. Sydoriak, J. M. Riese, J. P. Smith, S. M. Mniszewski, and P. R. Romero. (2006) Semi-empirical Power-law Scaling of New Infection Rate to Model Epidemic dynamics with Inhomogeneous Mixing, Mathematical Biosciences, 203, pp. 301 -- 318. [15] A.T. Skvortsov, R.B.Connell, P.D. Dawson, R.M. Gailis. (2007) Epidemic Spread Modeling: Align- ment of Agent-Based Simulation with a Simple Mathematical Model. in BIOCOMP 2007: Proceed- ings of International Conference on Bioinformatics and Computational Biology, Las Vegas Nevada, USA, CSREA Press, 2007, 2, pp 487 -- 490. 20 [16] A. Gunatilaka, A. Skvortsov, and R. Gailis. (2008) Progress in DSTO CBR simulation environment development, Land Warfare Conference (LWC2008), Brisbane, 2008, pp. 62 -- 68. [17] A.Skvortsov, E.Yee. Scaling laws of peripheral mixing of passive scalar in a wall-shear layer (2008). Phys. Rev. E 83, 036303 -- 11. [18] M. Jamriska, T. C. DuBois, A. Skvortsov Statistical characterisation of bio-aerosol background in an urban environment (2011), http://www.arxiv.org/pdf/1110.4184 21
1210.8182
3
1210
2013-01-10T20:53:32
Discovering Social Circles in Ego Networks
[ "cs.SI", "physics.soc-ph" ]
People's personal social networks are big and cluttered, and currently there is no good way to automatically organize them. Social networking sites allow users to manually categorize their friends into social circles (e.g. 'circles' on Google+, and 'lists' on Facebook and Twitter), however they are laborious to construct and must be updated whenever a user's network grows. In this paper, we study the novel task of automatically identifying users' social circles. We pose this task as a multi-membership node clustering problem on a user's ego-network, a network of connections between her friends. We develop a model for detecting circles that combines network structure as well as user profile information. For each circle we learn its members and the circle-specific user profile similarity metric. Modeling node membership to multiple circles allows us to detect overlapping as well as hierarchically nested circles. Experiments show that our model accurately identifies circles on a diverse set of data from Facebook, Google+, and Twitter, for all of which we obtain hand-labeled ground-truth.
cs.SI
cs
Discovering Social Circles in Ego Networks Julian McAuley and Jure Leskovec Stanford [email protected], [email protected] May 3, 2014 Abstract People’s personal social networks are big and cluttered, and currently there is no good way to automatically organize them. Social networking sites allow users to man- ually categorize their friends into social circles (e.g. ‘circles’ on Google+, and ‘lists’ on Facebook and Twitter), however they are laborious to construct and must be updated whenever a user’s network grows. In this paper, we study the novel task of auto- matically identifying users’ social circles. We pose this task as a multi-membership node clustering problem on a user’s ego-network, a network of connections between her friends. We develop a model for detecting circles that combines network structure as well as user profile information. For each circle we learn its members and the circle- specific user profile similarity metric. Modeling node membership to multiple circles allows us to detect overlapping as well as hierarchically nested circles. Experiments show that our model accurately identifies circles on a diverse set of data from Facebook, Google+, and Twitter, for all of which we obtain hand-labeled ground-truth. 1 Introduction Online social networks allow us to follow streams of posts generated by hundreds of our friends and acquaintances. The people we follow generate overwhelming volumes of infor- mation and to cope with the ‘information overload’ we need to organize our personal social networks (Agarwal et al., 2008; Chen and Karger, 2006; El-Arini et al., 2009). One of the main mechanisms for users of social networking sites to organize their networks and the content generated by them is to categorize their friends into what we refer to as social cir- cles. Practically all major social networks provide such functionality, for example, ‘circles’ on Google+, and ‘lists’ on Facebook and Twitter. Once a user creates her circles, they can be used for content filtering, for privacy, and for sharing groups of users that others may wish to follow. Examples of circles from a user’s personal social network are shown in Figure 1. The ‘owner’ of such a network (the ‘ego’) may form circles based on common bonds and at- tributes between themselves and the users whom they follow. In this example, the ego may wish to share their latest TKDD article only with their friends from the computer science department, while their baby photos should be shared only with their immediate family; similarly, they may wish to limit the amount of content generated by their high- school friends. These are precisely the types of functionality that circles are intended to facilitate. 1 Figure 1: An ego-network with labeled circles. The central user, the ‘ego’, is friends with all other users (the ‘alters’) in the network. Alters may belong to any number of circles, including none. We aim to discover circle memberships and to find common properties around which circles form. This network shows typical behavior that we observe in our data: Approximately 25% of our ground-truth circles (from Facebook) are contained completely within another circle, 50% overlap with another circle, and 25% of the circles have no members in common with any other circle. Currently, users in Facebook, Google+ and Twitter identify their circles either man- ually, or in a naıve fashion by identifying friends sharing a common feature. Neither approach is particularly satisfactory: the former is time consuming and does not update automatically as a user adds more friends, while the latter fails to capture individual as- pects of users’ communities, and may function poorly when profile information is missing or withheld. In this paper we study the problem of automatically discovering users’ social circles. In particular, given a single user with her personal social network, our goal is to identify her circles, each of which is a subset of her friends. Circles are user-specific as each user organizes her personal network of friends indepen- dently of all other users to whom she is not connected. This means that we can formulate the problem of circle detection as a clustering problem on her ego-network, the network of friendships between her friends. In practice, circles may overlap (a circle of friends from the same hometown may overlap with a circle from the same college), or be hierarchically nested (among friends from the same college there may be a denser circle from the same degree program). We design our model with both types of behavior in mind. In Figure 1 we are given a single user u and we form a network between her friends vi. We refer to the user u as the ego and to the nodes vi as alters. The task is then to identify the circles to which each alter vi belongs, as in Figure 1. In other words, the goal is to find communities/clusters in u’s ego-network. Generally, there are two useful sources of data that help with this task. The first is the 2 set of edges of the ego-network. We expect that circles are formed by densely-connected sets of alters (Newman, 2006). However, different circles overlap heavily, i.e., alters belong to multiple circles simultaneously (Ahn et al., 2010; Palla et al., 2005), and many circles are hierarchically nested in larger ones (as in Figure 1). Thus it is important to model an alter’s memberships to multiple circles. Secondly, we expect that each circle is not only densely connected but that its members also share common properties or traits (Mislove et al., 2010). Thus we need to explicitly model the different dimensions of user profiles along which each circle emerges. We model circle affiliations as latent variables, and similarity between alters as a func- tion of common profile information. We propose an unsupervised method to learn which dimensions of profile similarity lead to densely linked circles. After developing a model for this problem, we then study the related problems of updating a user’s circles once new friends are added to the network, and using weak supervision from the user in the form of ‘seed nodes’ to improve classification. For the former problem, we show that given an already-defined set of a users’ circles, we can accurately predict to which circles a new user should be assigned. For the latter problem, we show that classification accuracy improves for each seed node that a user provides, though substantial improvements in accuracy are already obtained even with 2-3 seeds. Our model has two innovations: First, in contrast to mixed-membership models (Airoldi et al., 2008) we predict hard assignment of a node to multiple circles, which proves critical for good performance (Gregory, 2010b). Second, by proposing a parameterized definition of profile similarity, we learn the dimensions of similarity along which links emerge (Feld, 1981; Simmel, 1964). This extends the notion of homophily (Lazarsfeld and Merton, 1954; McPherson et al., 2001) by allowing different circles to form along different social dimen- sions, an idea related to the concept of Blau spaces (McPherson, 1983). We achieve this by allowing each circle to have a different definition of profile similarity, so that one circle might form around friends from the same school, and another around friends from the same location. We learn the model by simultaneously choosing node circle memberships and profile similarity functions so as to best explain the observed data. We introduce a dataset of 1,143 ego-networks from Facebook, Google+, and Twitter, for which we obtain hand-labeled ground-truth from 5,636 circles. Experimental results show that by simultaneously considering social network structure as well as user profile information our method performs significantly better than natural alternatives and the current state-of-the-art. Besides being more accurate our method also allows us to generate automatic explanations of why certain nodes belong to common communities. Our method is completely unsupervised, and is able to automatically determine both the number of circles as well as the circles themselves. We show that the same model can be adapted to deal with weak supervision, and to update already-complete circles as new users arrive. A preliminary version of this article appeared in McAuley and Leskovec (2012). 1.1 Further Related Work Although a ‘circle’ is not precisely the same as a ‘community’, our work broadly falls un- der the umbrella of community detection (Lancichinetti and Fortunato, 2009a; Schaeffer, 2007; Leskovec et al., 2010; Porter et al., 2009; Newman, 2004). While ‘classical’ cluster- ing algorithms assume disjoint communities (Schaeffer, 2007), many authors have made 3 the observation that communities in real-world networks may overlap (Lancichinetti and Fortunato, 2009b; Gregory, 2010a; Lancichinetti et al., 2009; Yang and Leskovec, 2012), or have hierarchical structure (Ravasz and Barab´asi, 2003). Topic-modeling techniques have been used to uncover ‘mixed-memberships’ of nodes to multiple groups, and extensions allow entities to be attributed with text information. Airoldi et al. (2008) modeled node attributes as latent variables drawn from a Dirichlet distribution, so that each attribute can be thought of as a partial membership to a com- munity. Other authors extended this idea to allow for side-information associated with the nodes and edges (Balasubramanyan and Cohen, 2011; Chang and Blei, 2009; Liu et al., 2009). A related line of work by Hoff et al. (2002) also used latent node attributes to model edge formation between ‘similar’ users, which they adapted to clustering problems in Handcock et al. (2007b) and Krivitsky et al. (2009). Classical clustering algorithms tend to identify communities based on node features (Johnson, 1967) or graph structure (Ahn et al., 2010; Palla et al., 2005), but rarely use both in concert. Our work is related to Yoshida (2010) in the sense that it performs clustering on social-network data, and Frank et al. (2012), which models memberships to multiple communities. Another work closely related to ours is Yang and Leskovec (2012), which explicitly models hard memberships of nodes to multiple overlapping communities, though it does so purely based on network information rather than node features. Our inference procedure is also similar to that of Hastings (2006), which treats nodes’ assignments to communities as a Maximum a Posteriori inference problem between a set of interdependent variables. Finally, Chang et al. (2009); Menon and Elkan (2011, 2010) and Vu et al. (2011) model network data similar to ours; like our own work, they model the probability that two nodes will form an edge, though the underlying models do not form communities, so they are not immediately applicable to the problem of circle detection. The rest of this paper is organized as follows. We propose a generative model for the formation of edges within communities in Section 2. In Section 3 we derive an efficient model parameter learning strategy. In Section 4 we describe extensions to our model that allow it to be used in semi-supervised settings, in order to help users update and maintain their circles. We describe the datasets that we construct in Section 5. We give two schemes for automatically constructing parameterized user similarity function from profile data in Section 6. In Section 7 we show how to scale the model to large ego-networks. Finally in Section 8 we describe our evaluation and experimental results. 2 A Generative Model for Friendships in Social Circles We desire a model of circle formation with the following properties: 1. Nodes within circles should have common properties, or ‘aspects’. 2. Different circles should be formed by different aspects, e.g. one circle might be formed by family members, and another by students who attended the same university. 3. Circles should be allowed to overlap, and ‘stronger’ circles should be allowed to form within ‘weaker’ ones, e.g. a circle of friends from the same degree program may form within a circle from the same university, as in Figure 1. 4 4. We would like to leverage both profile information and network structure in order to identify circles. 5. Ideally we would like to be able to pinpoint which aspects of a profile caused a circle to form, so that the model is interpretable by the user. The input to our model is an ego-network G = (V, E), along with ‘profiles’ for each user v ∈ V . The ‘center’ node u of the ego-network (the ‘ego’) is not included in G, but rather G consists only of u’s friends (the ‘alters’). We define the ego-network in this way precisely because creators of circles do not themselves appear in their own circles. For each ego-network, our goal is to predict a set of circles C = {C1 . . . CK}, Ck ⊆ V , and associated parameter vectors θk that encode how each circle emerged. We encode ‘user profiles’ into pairwise features φ(x, y) that in some way capture what properties the users x and y have in common. We first describe our model, which can be applied using arbitrary feature vectors φ(x, y), and in Section 6 we develop several ways to construct feature vectors φ(x, y) that are suited to our particular application. We describe a model of social circles that treats circle memberships as latent variables. Nodes within a common circle are given an opportunity to form an edge, which naturally leads to hierarchical and overlapping circles. We will then devise an unsupervised algorithm to jointly optimize the latent variables and the profile similarity parameters so as to best explain the observed network data. Our model of social circles is defined as follows. Given an ego-network G and a set of K circles C = {C1 . . . CK}, we model the probability that a pair of nodes (x, y) ∈ V × V form an edge as p((x, y) ∈ E) ∝ exp (cid:40) (cid:88) (cid:124) Ck⊇{x,y} (cid:104)φ(x, y), θk(cid:105) (cid:125) (cid:123)(cid:122) − (cid:88) (cid:124) Ck(cid:43){x,y} (cid:41) αk (cid:104)φ(x, y), θk(cid:105) (cid:125) (cid:123)(cid:122) . (1) circles containing both nodes all other circles For each circle Ck, θk is the profile similarity parameter that we will learn. The idea is that (cid:104)φ(x, y), θk(cid:105) is high if both nodes belong to Ck, and low if either of them do not. The parameter αk trades-off these two effects, i.e., it trades-off the influence of edges within Ck compared to edges outside of (or crossing) Ck. Since the feature vector φ(x, y) encodes the similarity between the profiles of two users x and y, the parameter vector θk encodes which dimensions of profile similarity caused the circle to form, so that nodes within a circle Ck should ‘look similar’ according to θk. Note that the pair (x, y) should be treated as an unordered pair in the case of an undirected network (e.g. Facebook), but should be treated as an ordered pair for directed networks (e.g. Google+ and Twitter). Considering that edges e = (x, y) are generated independently, we can write the prob- ability of G as PΘ(G;C) = p(e /∈ E), (2) (cid:89) e∈E p(e ∈ E) ×(cid:89) e(cid:54)∈E where Θ = {(θk, αk)}k=1...K is our set of model parameters. Defining the shorthand nota- tion dk(e) = δ(e ∈ Ck) − αkδ(e /∈ Ck), Φ(e) = dk(e)(cid:104)φ(e), θk(cid:105) (cid:88) Ck∈C 5 allows us to write the log-likelihood of G: lΘ(G;C) = (cid:88) e∈E Φ(e) − (cid:88) (cid:16) 1 + eΦ(e)(cid:17) , log (3) e∈V ×V where Z = (1 + eΦ(e)) is a normalization constant. Next, we describe how to optimize node circle memberships C as well as the parameters of the user profile similarity functions Θ = {(θk, αk)} (k = 1 . . . K) given a graph G and user profiles. 3 Unsupervised Learning of Model Parameters Treating circles C as latent variables, we aim to find Θ = {θ, α} so as to maximize the regularized log-likelihood of (eq. 3), i.e., Θ, C = argmax Θ,C lΘ(G;C) − λΩ(θ). We solve this problem using coordinate ascent on Θ and C (MacKay, 2003): Ct = argmaxC Θt+1 = argmax Θ lΘt(G;C) lΘ(G;Ct) − λΩ(θ). (4) (5) (6) We optimize (eq. 6) using L-BFGS, a standard quasi-Newton procedure to optimize smooth functions of many variables (Nocedal, 1980). Partial derivatives are given by (cid:88) (cid:88) e∈V ×V e∈V ×V ∂l ∂θk ∂l ∂αk = = eΦ(e) −de(k)φ(e)k 1 + eΦ(e) δ(e /∈ Ck)(cid:104)φ(e), θk(cid:105) (cid:88) + e∈E eΦ(e) 1 + eΦ(e) −(cid:88) e∈E dk(e)φ(e)k − ∂Ω ∂θk δ(e /∈ Ck)(cid:104)φ(e), θk(cid:105) . (7) (8) For fixed C \ Ci we note that solving argmaxCi lΘ(G;C \ Ci) can be expressed as pseudo-boolean optimization in a pairwise graphical model (Boros and Hammer, 2002). ‘Pseudo-boolean optimization’ refers to problems defined over boolean variables (in this case, whether or not a node is assigned to a particular community), where the variables being optimized are interdependent (in this case, relationships are defined over edges in a graph). In short, our optimization problem can be written in the form (x,y)(δ(x ∈ C), δ(y ∈ C)). Ek (9) (cid:88) Ck = argmax C (x,y)∈V ×V Although this problem class is NP-hard in general, efficient approximation algorithms are readily available (Rother et al., 2007). In our setting, we want edges with high weight (under θk) to appear in Ck, and edges with low weight to appear outside of Ck. Defining ok(e) = Ck∈C\Ci dk(e)(cid:104)φ(e), θk(cid:105) (cid:88) 6 the energy Ek e of (eq. 9) is Ek e (0, 0) = Ek e (0, 1) = Ek e (1, 0) = Ek e (1, 1) = (cid:26) ok(e) − αk (cid:104)φ(e), θk(cid:105) − log(1 + eok(e)−αk(cid:104)φ(e),θk(cid:105)), (cid:26) ok(e) + (cid:104)φ(e), θk(cid:105) − log(1 + eok(e)+(cid:104)φ(e),θk(cid:105)), − log(1 + eok(e)−αk(cid:104)φ(e),θk(cid:105)), − log(1 + eok(e)+(cid:104)φ(e),θk(cid:105)), e ∈ E e /∈ E . e ∈ E e /∈ E By expressing the problem in this form we can draw upon existing work on pseudo-boolean optimization. We use the publicly-available ‘QPBO’ software described in Rother et al. (2007), which implements algorithms described in Hammer et al. (1984) and Kohli and Torr (2005), and is able to accurately approximate problems of the form shown in (eq. 9). Essentially, problems of the type shown in (eq. 9) are reduced to maximum flow, where boolean labels for each node are recovered from their assignments to ‘source’ and ‘sink’ sets. Such algorithms have worst-case complexity O(N3), though the average case running-time is far better (Kolmogorov and Rother, 2007). We solve (eq. 9) for each Ck in a random order. The two optimization steps of (eq. 5) and (eq. 6) are repeated until convergence, i.e., until Ct+1 = Ct. The entire procedure is presented in Algorithm 1. We regularize (eq. 4) using the (cid:96)1 norm, i.e., K(cid:88) θk(cid:88) θki, Ω(θ) = k=1 i=1 which leads to sparse (and readily interpretable) parameters. Our algorithm can readily handle all but the largest problem sizes typically observed in ego-networks: in the case of Facebook, the average ego-network has around 190 nodes (Ugander et al., 2011), while the largest network we encountered has 4,964 nodes. Later, in Section 7, we will exploit the fact that our features are binary, and that many nodes share similar features, to develop more efficient algorithms based on Markov Chain Monte Carlo inference. Note that since the method is unsupervised, inference is performed independently for each ego-network. This means that our method could be run on the full Facebook graph (for example), as circles are independently detected for each user, and the ego-networks typically contain only hundreds of nodes. In Section 4 we describe extensions that allow our model to be used in semi-supervised settings. 3.1 Hyperparameter Estimation To choose the optimal number of circles, we choose K so as to minimize an approximation to the Bayesian Information Criterion (BIC), an idea seen in several works on probabilistic clustering (Airoldi et al., 2008; Handcock et al., 2007a; Volinsky and Raftery, 2000). In this context, the Bayesian Information Criterion is defined as BIC (K; ΘK) (cid:39) −2lΘK (G;C) + ΘK log E, (10) where ΘK is the set of parameters predicted when there are K circles, and ΘK is the number of parameters (which increases linearly as K increases). We then choose K so as to minimize this objective: K = argmin BIC (K; ΘK). (11) K 7 ALGORITHM 1: Predict complete circles with hyperparameters λ, K. Data: ego-network G = (V, E), edge features φ(e) : E → RF , hyperparameters λ, K Result: parameters Θ := {(θk, αk)}k=1...K, communities C initialize θ0 repeat k := 1, Ck := ∅, t := 0; k ∈ {0, 1}F , α0 (cid:80) for k ∈ {1 . . . K} do Ct k := argmaxC // using QPBO, see (eq. 9) (x,y)∈V ×VEk (x,y)(δ(x ∈ C), δ(y ∈ C)); end Θt+1 := argmaxΘ lΘ(G;Ct) − λΩ(θ); // using L-BFGS, see (eqs. 7 and 8) t := t + 1; until C t+1 = Ct; In other words, an additional circle will only be added to the model if doing so has a ‘significant’ impact on the log-likelihood. The regularization parameter λ ∈ {0, 1, 10, 100} was determined using leave-one-out cross validation, though in our experience did not significantly impact performance. 4 Extensions So far, we have considered the ‘cold-start’ problem of predicting complete sets of circles using nothing but node attributes and edge information. In other words, we have treated circle prediction as an unsupervised task. This setting is realistic if users construct their circles only after their ego-networks have already been defined. On the other hand, in settings where users build their circles incrementally, it is less likely that we would wish to predict complete circles ‘from scratch’. We note that both settings occur in the three social networks that we consider. In this section, we describe techniques to exploit partially observed circle information to help users update and maintain their circles. In other words, we would like to apply our model to users’ personal networks as they change and evolve (Backstrom et al., 2006). Since our model is probabilistic, it is straightforward to adapt it to make use of partially observed data, by conditioning on the assignments of some of the latent variables in our model. In this way, we adapt our model for semi-supervised settings in which a user labels some or all of the members of their circles. Later, in Section 7, we describe modifications of our model that allow it to be applied to extremely large networks, by exploiting the fact that many users assigned to common circles also have common features. 4.1 Circle Maintenance First we deal with the problem of a user adding new friends to an established ego-network, whose circles have already been defined. Thus, given a complete set of circles, our goal is to predict community memberships for a new node, based on that node’s features, and their patterns of connectivity to existing nodes in the ego-network. Since circles in this setting are fully-observed, we simply fit the model parameters that 8 best explain the ground-truth circles ¯C provided by the user: lΘ(G; ¯C) − λΩ(θ). Θ = argmax Θ (12) As with (eq. 6) this is solved using L-BFGS, though optimization is significantly faster in this case as there are no longer latent community memberships to infer, and thus coordinate ascent is not required. Next, we must predict to which of the K ground-truth circles a new user u belongs. That is, we must predict cu ∈ {0, 1}K, where each cu k is a binary variable indicating whether the user u should belong to the circle Ck. In practice, for the sake of evaluation, we shall suppress a single user from G and ¯C, and try to recover their memberships. This can be done by choosing the assignment cu that maximizes the log-likelihood of C once u is added to the graph. We define the augmented community memberships as C+ = {C+ k }k=1...K, where (cid:26) ¯Ck ∪ {u}, ¯Ck, C+ k = cu k = 1 cu k = 0 . (13) (14) The updated community memberships are then chosen according to C+ = argmax cu l Θ(G ∪ {u};C+). The above expression can be computed efficiently for different values of cu by noting that the log-likelihood only changes for terms including u, meaning that we need to compute p((x, y) ∈ E) only if x = u or y = u. In other words, we only need to consider how the new user relates to existing users, rather than considering how existing users relate to each other; thus computing the log-likelihood requires linear (rather than quadratic) time. To find the optimal cu we can simply enumerate all 2K possibilities, which is feasible so long as the user has no more than K (cid:39) 20 circles. For users with more circles we must resort to an iterative update scheme as we did in Section 3. 4.2 Semi-Supervised Circle Prediction Next, we consider the problem of using weak supervision in the form of ‘seed nodes’ to assist in circle prediction (Andersen and Lang, 2006). In this setting, the user manually labels a few users from each of the circles they want to create, say {s1 . . . sK}. Our goal is then to predict K circles C = {C1 . . . CK} subject to the constraint that sk ⊆ Ck for all k ∈ {1 . . . K}. Again, since our model is probabilistic, this can be done by conditioning on the as- signments of some of the latent variables. That is, we simply optimize lΘ(G;C) subject to the constraint that sk ⊆ Ck for all k ∈ {1 . . . K}. In the parlance of graphical models, this means that rather than treating the seed nodes as latent variables to be predicted, we treat them as evidence on which we condition. We could also include negative evidence (i.e., the user could provide labels for users who do not belong to each circle), or we could have users provide additional labels interactively, though the setting described is the most similar to what is used in practice. 9 Figure 2: Histogram of overlap between circles (on Facebook). A value of zero indicates that the circle does not intersect with any of the user’s other circles, whereas a value of one indicates that a circle is entirely contained within another. Approximately 25% of circles exhibit the latter behavior. 5 Dataset Description Our goal is to evaluate our method on ground-truth data. We expended significant time, effort, and resources to obtain high quality hand-labeled data, which we have made available online.1 We were able to obtain ego-networks and ground-truth from three major social networking sites: Facebook, Google+, and Twitter. From Facebook we obtained profile and network data from 10 ego-networks, consisting of 193 circles and 4,039 users. To obtain circle information we developed our own Facebook application and conducted a survey of ten users, who were asked to manually identify all of the circles to which their friends belonged. It took each user between 2 and 3 hours to label their entire network. On average, users identified 19 circles in their ego-networks, with an average circle size of 22 friends. Examples of circles we obtained include students of common universities and classes, sports teams, relatives, etc. Figure 2 shows the extent to which our 193 user-labeled circles in 10 ego networks from Facebook overlap (intersect) with each other. Around one quarter of the identified circles are independent of any other circle, though a similar fraction are completely contained within another circle (e.g. friends who studied under the same adviser may be a subset of friends from the same university). The remaining 50% of communities overlap to some extent with another circle. For the other two datasets we obtained publicly accessible data. From Google+ we obtained data from 133 ego-networks, consisting of 479 circles and 106,674 users. The 133 ego-networks represent all 133 Google+ users who had shared at least two circles, and whose network information was publicly accessible at the time of our crawl. The Google+ circles are quite different to those from Facebook, in the sense that their creators have chosen to release them publicly, and because Google+ is a directed network (note that our model can very naturally be applied to both to directed and undirected networks). For example, one circle contains candidates from the 2012 republican primary, who presumably do not follow their followers, nor each other. Finally, from Twitter we obtained data from 1,000 ego-networks, consisting of 4,869 circles (or ‘lists’ (Kim et al., 2010; Nasirifard and 1http://snap.stanford.edu/data/ 10 01fractionofoverlapwithmostsimilarcommunity01020304050frequency Hayes, 2011; Wu et al., 2011; Zhao, 2011)) and 81,362 users. The ego-networks we obtained range in size from 10 to 4,964 nodes. Taken together our data contains 1,143 different ego-networks, 5,541 circles, and 192,075 users. The size differences between these datasets simply reflects the availability of data from each of the three sources. Our Facebook data is fully labeled, in the sense that we obtain every circle that a user considers to be a cohesive community, whereas our Google+ and Twitter data is only partially labeled, in the sense that we only have access to public circles. We design our evaluation procedure in Section 8 so that partial labels cause no issues. 6 Constructing Features from User Profiles Profile information in all of our datasets can be represented as a tree where each level encodes increasingly specific information (Figure 3, left). In other words, user profiles are organized into increasingly specific categories. For example, a user’s profile might have a education category, which would be further separated into categories such as name, location, and type. The leaves of the tree are then specific values in these categories, e.g. Princeton, Cambridge, and Graduate School. Several works deal with automatically building features from tree-structured data (Haussler, 1999; Vishwanathan and Smola, 2002), but in order to understand the relationship between circles and user profile information, we shall design our own feature representation scheme. We propose two hypotheses for how users organize their social circles: either they may form circles around users who share some common property with each other, or they may form circles around users who share some common property with themselves. For example, if a user has many friends who attended Stanford, then they may form a ‘Stanford’ circle. On the other hand, if they themselves did not attend Stanford, they may not consider attendance to Stanford to be a salient feature. The feature construction schemes we propose allow us to assess which of these hypotheses better represents the data we obtain. From Google+ we collect data from six categories (gender, last name, job titles, insti- tutions, universities, and places lived). From Facebook we collect data from 26 categories, including users’ hometowns, birthdays, colleagues, political and religious affiliations, etc. As a proxy for profile data, from Twitter we collect data from two categories, namely the set of hashtags and mentions used by each user during two-weeks’ worth of tweets. ‘Categories’ correspond to parents of leaf nodes in a profile tree, as shown in Figure 3. We first propose a difference vector to encode the relationship between two profiles. A non-technical description is given in Figure 3. Essentially, we want to encode those dimensions where two users are the same (e.g. Alan and Dilly went to the same graduate school), and those where they are different (e.g. they do not have the same surname). Suppose that users v ∈ V each have an associated profile tree Tv, and that l ∈ Tv is a leaf in that tree. We define the difference vector σx,y between two users x and y as a binary indicator encoding the profile aspects where users x and y differ (Figure 3, bottom left): σx,y[l] = δ((l ∈ Tx) (cid:54)= (l ∈ Ty)). (15) Note that feature descriptors are defined per ego-network : while many thousands of high schools (for example) exist among all Facebook users, only a small number appear among any particular user’s friends. 11 Although the above difference vector has the advantage that it encodes profile infor- mation at a fine granularity, it has the disadvantage that it is high-dimensional (up to 4,122 dimensions in the data we considered). One way to address this is to form difference vectors based on the parents of leaf nodes: this way, we encode what profile categories two users have in common, but disregard specific values (Figure 3, bottom right). For example, we encode how many hashtags two users tweeted in common, but discard which hashtags they tweeted: l∈children(p)σx,y[l]. (16) x,y[p] =(cid:80) (cid:48) σ This scheme has the advantage that it requires a constant number of dimensions, regardless of the size of the ego-network (26 for Facebook, 6 for Google+, 2 for Twitter, as described above). Based on the difference vectors σx,y (and σ(cid:48) x,y) we now describe how to construct edge features φ(x, y). The first property we wish to model is that members of circles should have common relationships with each other: φ1(x, y) = (1;−σx,y). (17) The second property we wish to model is that members of circles should have common relationships to the ego of the ego-network. In this case, we consider the profile tree Tu from the ego user u. We then define our features in terms of that user: φ2(x, y) = (1;−(cid:12)(cid:12)σx,u − σy,u (cid:12)(cid:12)) (18) (σx,u − σy,u is taken elementwise). These two parameterizations allow us to assess which mechanism better captures users’ subjective definition of a circle. In both cases, we include a constant feature (‘1’), which controls the probability that edges form within circles, or equivalently it measures the extent to which circles are made up of friends. Importantly, this allows us to predict memberships even for users who have no profile information, simply due to their patterns of connectivity. Similarly, for the ‘compressed’ difference vector σ(cid:48) ψ1(x, y) = (1;−σ x,y), ψ2(x, y) = (1;−(cid:12)(cid:12)σ x,y, we define x,u − σ (cid:48) (cid:48) (cid:48) y,u (cid:12)(cid:12)). (19) To summarize, we have identified four ways of representing the compatibility between dif- ferent aspects of profiles for two users. We considered two ways of constructing a difference vector (σx,y vs. σ(cid:48) x,y) and two ways of capturing the compatibility between a pair of profiles (φ(x, y) vs. ψ(x, y)). The features are designed to model the following behavior: 1. Ego users build circles around common relationships between their friends (φ1, ψ1) 2. Ego users build circles around common relationships between their friends and them- selves (φ2, ψ2) In our experiments we assess which of these assumptions is more realistic in practice. 12 7 Fast Inference in Large Ego-Networks Although our algorithm is able to handle the problem sizes typically encountered in ego- networks (i.e., fewer than 1,000 friends), scalability to larger networks presents an issue, as we require quadratic memory to encode the compatibility between every pair of nodes (an issue we note is also present in the existing approaches we consider in Section 8). In this section, we propose a more scalable alternative that makes use of the fact that many nodes belonging to common communities also share common features. Noting that features φ1 and φ2 described in Section 6 are binary valued, as are com- munity memberships, if there are K communities and F -dimensional features, there can be at most 2K+F ‘types’ of node. In other words, every node’s community membership is drawn from {0, 1}K, and every node’s feature vector is drawn from {0, 1}F , so there are at most 2K+F distinct community/feature combinations. Of course the number of distinct node types is also bounded by V , the number of nodes in the graph. In practice, however, the number of distinct node ‘types’ is much smaller, as nodes belonging to common communities tend to have common features. Community member- ships are also not independent: in Figure 2 we observed both disjoint and hierarchically nested communities, which means that of the 2K possible community memberships, only a fraction of them occur in practice. In this section, we propose a Markov-Chain Monte Carlo (MCMC) sampler (Newman and Barkema, 1999) which efficiently updates node-community memberships by ‘collapsing’ nodes that have common features and community memberships. Note that the adaptations to be described can be applied to any types of feature (i.e., not just binary features), all we require is that many users share the same features; we assume binary features merely for the sake of presentation. We start by representing each node using binary strings that encode both its community memberships and its features. Each node’s community memberships are represented using S : V → ΣK, such that S(x)[k] = . (20) (cid:26) 1, if x ∈ Ck 0, otherwise Similarly, each node’s features are represented using the binary string Q, which, since our features are already binary, is simply the concatenation of the feature dimensions. We now say that the ‘type’ of a node x is the concatenation of its community string and its feature string, (S(x); Q(x)), and we build a (sparse) table types : ΣK × ΣF → N that counts how many nodes exist of each type. In our setting, MCMC consists of repeatedly updating the (binary) label of each node in a particular community. Specifically, if the marginal (log) probability that a node x belongs to a community k is given by (cid:96)k x, then the node’s new label is chosen by sampling z ← U(0, 1), and updating (cid:26) 1, S(x)[k] = 0, otherwise if z < exp{ 1 T ((cid:96)k x(1) − (cid:96)k x(0))} , (21) where T is a temperature parameter that decreases at each iteration, so that we are more likely to choose the label with higher probability as the model ‘cools’. x(1) (the probability that node x takes the label 0 or 1 in community k) requires computing p((x, y) ∈ E) for all y ∈ V . However, we note that if Computing (cid:96)k x(0) and (cid:96)k 13 two nodes y and y(cid:48) have the same type (i.e., they belong to the same communities and have the same features), then p((x, y) ∈ E) = p((x, y(cid:48)) ∈ E). In order to maximize the log- likelihood of the observed data, we must also consider whether (x, y) and (x, y(cid:48)) are actually edges in the graph. To do so, we first compute (cid:96)k x(1) under the assumption that no edges are incident on x, after which we correct for those edges incident on x. Thus the running time of a single update is linear in the number of distinct node types, plus the average node degree, both of which are bounded by the number of nodes. x(0) and (cid:96)k The entire procedure is demonstrated in Algorithm 2. ALGORITHM 2: Update memberships node x and circle k. Data: node x whose membership to circle Ck is to be updated Result: updated membership for node x initialize (cid:96)k construct a dummy node x0 with the communities and features of x but with x /∈ Ck; construct a dummy node x1 with the communities and features of x but with x ∈ Ck; for (c, f ) ∈ dom(types) do x(0) := 0, (cid:96)k x(1) := 0; // c = community string, f = feature string n := types(c, f ); // n = number of nodes of this type if S(x) = c ∧ Q(x) = f then // avoid including a self-loop on x n := n − 1; end construct a dummy node y with community memberships c and features f ; // first compute probabilities assuming all pairs (x, y) are non-edges x(0) := (cid:96)k (cid:96)k x(1) := (cid:96)k (cid:96)k x(0) + n log p((x0, y) /∈ E); x(1) + n log p((x1, y) /∈ E); end for (x, y) ∈ E do // correct for edges incident on x x(0) := (cid:96)k (cid:96)k x(1) := (cid:96)k (cid:96)k x(0) − log p((x0, y) /∈ E) + log p((x0, y) ∈ E); x(1) − log p((x1, y) /∈ E) + log p((x1, y) ∈ E); end // update membership to circle k types(S(x), Q(x)) := types(S(x), Q(x)) − 1; z ← U(0, 1); if z < exp{T ((cid:96)k S(x)[k] := 1 x(0))} then x(1) − (cid:96)k else S(x)[k] := 0 end types(S(x), Q(x)) := types(S(x), Q(x)) + 1; We also exploit the same observation when computing partial derivatives of the log- likelihood, that is we first efficiently compute derivatives under the assumption that the graph contains no edges, and then correct the result by summing over all edges in E. 14 8 Experiments We first describe the evaluation metrics to be used in Sections 8.1 and 8.2, before de- scribing the baselines to be evaluated in Section 8.3. We describe the performance of our (unsupervised) algorithm in Section 8.4, and extensions in Sections 8.6, 8.7, and 8.8. 8.1 Evaluation metrics Although our method is unsupervised, we can evaluate it on ground-truth data by ex- amining the maximum-likelihood assignments of the latent circles C = {C1 . . . CK} after convergence. Our goal is that for a properly regularized model, the latent circles will align closely with the human labeled ground-truth circles ¯C = { ¯C1 . . . ¯C ¯K}. To measure the alignment between a predicted circle C and a ground-truth circle ¯C, we compute the Balanced Error Rate (BER) between the two circles (Chen and Lin, 2006), (cid:18)C \ ¯C C + (cid:19) ¯C \ C ¯C BER(C, ¯C) = 1 2 . (22) This measure assigns equal importance to false positives and false negatives, so that trivial or random predictions incur an error of 0.5 on average. Such a measure is preferable to the 0/1 loss (for example), which assigns extremely low error to trivial predictions. We also report the F1 score, which we find produces qualitatively similar results. 8.2 Aligning predicted and ground-truth circles Since we do not know the correspondence between circles in C and ¯C, we compute the optimal match via linear assignment by maximizing: (1 − BER(C, f (C))), (23) (cid:88) max f :C→ ¯C 1 f C∈dom(f ) where f is a (partial) correspondence between C and ¯C. That is, if the number of predicted circles C is less than the number of ground-truth circles ¯C, then every circle C ∈ C must have a match ¯C ∈ ¯C, but if C > ¯C, we do not incur a penalty for additional predictions that could have been circles but were not included in the ground-truth. We use established techniques to estimate the number of circles, so that none of the baselines suffers a disadvantage by mispredicting K = C. In the case of Facebook (where we have ‘complete’ ground-truth, in the sense that survey participants ostensibly label every circle), our method ought to penalize predicted circles that do not appear in the ground-truth. A simple penalty would be to assign an error of 0.5 (i.e., that of a random prediction) to additional circles in the case of Facebook. However, in our experience, our method did not overpredict the number of circles in the case of Facebook: on average, users identified 19 circles, whereas using the Bayesian Information Criterion described in Section 3.1, our method never predicted K > 10. In practice this means that in the case of Facebook, we always penalize all predictions. Again we note that the process of choosing the number of circles using the BIC is a standard procedure from the literature (Airoldi et al., 2008; Handcock et al., 2007a; Volinsky and Raftery, 2000), whose merit we do not assess in this paper. 15 Network Modularity. Although for our algorithm, and other probabilistic baselines, we shall choose the number of communities using the Bayesian Information Criterion as described in Section 3.1, another standard criterion used to determine the number of com- munities in a network is the modularity (Newman, 2006). The Bayesian Information Criterion has the advantage that it allows for overlapping communities, whereas the modularity does not (i.e., it assumes all communities are dis- joint); it is for this reason that we chose the BIC to choose K for our algorithm. On the other hand, the Bayesian Information Criterion can only be computed for probabilistic models (i.e., models that associate a likelihood with each prediction), whereas the modu- larity has no such restriction. For this reason, we shall use the modularity to choose K for non-probabilistic baselines. The modularity essentially measures the extent to which clusters in a network have dense internal, but sparse external, connections (Newman, 2003). If eij is the fraction of edges in the network that connect vertices in Ci to vertices in Cj, then the modularity is defined as eii − K(cid:88) j=1 K(cid:88) i=1  . eij Q(K) = (24) We then choose K so that the modularity is maximized. 8.3 Baselines We considered a wide number of baseline methods, including those that consider only network structure, those that consider only profile information, and those that consider both. Mixed Membership Stochastic Block Models. (Airoldi et al., 2008). This method detects communities based only on graph structure; the output is a stochastic vector for each node encoding partial memberships to each community. The optimal number of communities K is determined using the Bayesian Information Criterion as described in (eq. 11). This model is similar to those of (Liu et al., 2009) and (Chang and Blei, 2009), the latter of which includes the implementation of MMSB that we used. Since we require ‘hard’ memberships for evaluation, we assign a node to a community if its partial membership to that community is positive. Block-LDA. (Balasubramanyan and Cohen, 2011). This method is similar MMSB, except that it allows nodes to be augmented with side information in the form of ‘documents’. For our purposes, we generate ‘documents’ by treating aspects of user profiles as words in a bag-of-words model. K-means clustering. (MacKay, 2003). Just as MMSB uses only the graph structure, K- means clustering ignores the graph structure and uses only node features (for node features we again use a bag-of-words model). Here, we choose K so as to maximize the modularity of C, as defined in (eq. 24). Hierarchical Clustering. (Johnson, 1967). This method builds a hierarchy of clusters. Like K-means, this method form clusters based only on node profiles, but ignores the network. Link Clustering. (Ahn et al., 2010). Conversely, this method uses network structure, but ignores node features to construct hierarchical communities in networks. 16 Table 1: Baselines Algorithm network structure? Yes MMSB Yes Block-LDA No K-means No Hierarchical Clustering Yes Link Clustering Yes Clique Percolation Low-Rank Embedding Yes Multi-Assignment Clustering No Our algorithm Yes node/edge features? No Yes Yes Yes No No Yes Yes Yes overlapping communities? Yes Yes No Yes No Yes No Yes Yes hard member- ships? No No Yes Yes Yes Yes Yes Yes Yes Clique Percolation. (Palla et al., 2005). This method also uses only network structure, and builds communities from the union of small, densely-connected sub-communities. Low-Rank Embedding. (Yoshida, 2010). Uses both graph structure and node similarity information, but does not perform any learning. We adapt an algorithm described by (Yoshida, 2010), where node similarities are based on the cosine distance between profile bags-of-words. After our features are embedded into a low-dimensional space, we again use K-means clustering to detect communities, again choosing K so as to maximize the modularity. Multi-Assignment Clustering. (Frank et al., 2012). Like ours, this method predicts hard assignments to multiple clusters, though it does so without using the network struc- ture. The above methods (and our own) are summarized in Table 1. Of the eight baselines highlighted above we report the three whose overall performance was the best, namely Block-LDA (Balasubramanyan and Cohen, 2011) (which slightly outperformed mixed mem- bership stochastic block models (Airoldi et al., 2008)), Low-Rank Embedding (Yoshida, 2010), and Multi-Assignment Clustering (Frank et al., 2012). 8.4 Performance on Facebook, Google+, and Twitter Data Figure 4 shows results on our Facebook, Google+, and Twitter data. The largest circles from Google+ were excluded as they exhausted the memory requirements of many of the baseline algorithms. Circles were aligned as described in (eq. 23), with the number of circles K determined as described in Section 3. For non-probabilistic baselines, we chose K so as to maximize the modularity, as described in (eq. 24). In terms of absolute performance our best model φ1 achieves BER scores of 0.84 on Facebook, 0.72 on Google+ and 0.70 on Twitter (F1 scores are 0.59, 0.38, and 0.34, respectively). The lower F1 scores on Google+ and Twitter are explained by the fact that many circles have not been maintained since they were initially created: we achieve high recall (we recover the friends in each circle), but at low precision (we recover additional friends who appeared after the circle was created). Comparing our method to baselines we notice that we outperform all baselines on all datasets by a statistically significant margin. Compared to the nearest competitors, our best performing features φ1 improve on the BER by 43% on Facebook, 26% on Google+, 17 and 16% on Twitter (improvements in terms of the F1 score are similar). Regarding the performance of the baseline methods, we note that good performance seems to depend critically on predicting hard memberships to multiple circles, using a combination of node and edge information; none of the baselines from Table 1 exhibit precisely this combination, a shortcoming our model addresses. Both of the features we propose (friend-to-friend features φ1 and friend-to-user features φ2) perform similarly, revealing that both schemes ultimately encode similar information, which is not surprising, since users and their friends have similar profiles. Using the ‘com- pressed’ features ψ1 and ψ2 does not significantly impact performance, which is promising since they have far lower dimension than the full features; what this reveals is that it is sufficient to model categories of attributes that users have in common (e.g. same school, same town), rather than the attribute values themselves. We found that all algorithms perform significantly better on Facebook than on Google+ or Twitter. There are a few explanations: Firstly, our Facebook data is complete, in the sense that survey participants manually labeled every circle in their ego-networks, whereas in other datasets we only observe publicly-visible circles, which may not be up-to-date. Secondly, the 26 profile categories available from Facebook are more informative than the 6 categories from Google+, or the tweet-based profiles we built from Twitter. A more basic difference lies in the nature of the networks themselves: edges in Facebook encode mutual ties, whereas edges in Google+ and Twitter encode follower relationships, which changes the role that circles serve (Wu et al., 2011). The latter two points explain why algorithms that use either edge or profile information in isolation are unlikely to perform well on this data. 8.5 Qualitative Analysis Next we examine the output of our model in greater detail. Figure 5 shows results of our unsupervised method on example ego-networks from Facebook and Google+. Different colors indicate true-, false- positives and negatives. Our method is correctly able to identify overlapping circles as well as sub-circles (circles within circles). Figure 6 shows parameter vectors learned for four circles for a particular Facebook user. Positive weights indicate properties that users in a particular circle have in common. Notice how the model naturally learns the social dimensions that lead to a social circle. Moreover, the first parameter that corresponds to a constant feature ‘1’ has the highest weight; this reveals that membership to the same community provides the strongest signal that edges will form, while profile data provides a weaker (but still relevant) signal. 8.6 Circle Maintenance Next we examine the problem of adding new users to already-defined ego-networks, in which complete circles have already been provided. For evaluation, we suppress a single user u from a user’s ego-network, and learn the model parameters Θ that best fit G \ {u} and C\{u}. Our goal is then to recover the set of communities to which the node u belongs, as described in Section 4.1. Again we report the Balanced Error Rate and F1 score between the ground-truth and the predicted set of community memberships for u. We use all of each users’ circles for training, up to a maximum of fifteen circles. This experiment is 18 repeated for 10 random choices of the user u for each ego-network in our dataset. As a baseline we compare the performance of our algorithm to that of a fully-supervised Support Vector Machine (SVM) model. For each community Ck, we train a binary classi- fier that discriminates members from non-members based on their node features. Binary classifications are then made for each community independently. Performance on this task is shown in Figure 7. On Facebook, Google+, and Twitter our best performing features φ1 achieve Balanced Error Rates of 0.30, 0.34, and 0.34 (respectively), and F1 scores of 0.38, 0.59, and 0.54. The SVM model achieves better accuracy when rich node features are available (which is the case for Facebook), though it fails to make use of edge information, and does not account for interdependencies between circles. This proves critical in the case of Google+ and Twitter, where node information alone proves uninformative. 8.7 Semi-Supervised Circle Prediction Our next task is to identify circles using a form of weak supervision provided by the user, in the form of seed nodes as described in Section 4.2. In this setting, the user provides S seed nodes for each of K circles that they wish to identify. For evaluation, we select the K circles to be identified and the S seed nodes uniformly at random. Without seed nodes (as in our initial experiments), the circles that are automatically identified by our algorithm may be quite different from those identified once seed nodes are added. Similarly, there may be many circles containing the same seed nodes, meaning that different solutions may be chosen for different values of S. Thus it is difficult to compare the loss of (eq. 23) with and without seed nodes. To address this, we modify the matching objective of (eq. 23) so that the K circles randomly selected for seeding must be the same as those matched when evaluating the loss. Thus the loss is always evaluated on the same K circles for every number of seed nodes S ∈ {0 . . . 10}. Note also that for each value of K, performance is only evaluated on those ego-networks with at least K ground-truth circles. Figure 8 shows the performance of our algorithm for different numbers of seed nodes S ∈ {0 . . . 10} and different numbers of circles K ∈ {1 . . . 5}. The same results in terms of the F1 score are qualitatively similar and are omitted for brevity. We find that for all values of K, adding seed nodes increases the accuracy significantly, though the effect is most pronounced when the number of circles that the user wishes to identify is small. Curiously, we find that while larger values of K lead to better prediction when there are no seeds, the opposite is true when there are many seeds. The former behavior may be explained by the simple fact that larger values of K are better able to fit the data, though the latter behavior is more enigmatic. Pleasingly, assuming that a user wishes to identify only a small number of circles at a time, then they can do so with very few seeds: for small K, most of the benefit is gained once only two or three seeds are provided. 8.8 Scalability Analysis Figure 9 examines how our algorithm scales with the size of an ego-network. Here we use the Markov-Chain Monte-Carlo (MCMC) version of our algorithm described in Section 7. Figure 9 shows the total time taken to predict different numbers of circles in differently sized ego-networks. Since the performance of our MCMC algorithm is a function of the 19 number of circles K and the feature dimensionality F , we fix the feature dimensionality at F = 10 for all ego-networks, using the ten most common features that appear in each ego-network using the ‘friend-to-friend’ features φ1. For comparison, Figure 9 shows the running time of inference using QPBO as described in Section 3. Although the two algorithms are competitive for up to a few hundred nodes, the QPBO algorithm becomes intractable for networks of around 1000 nodes, since it requires us to optimize a probability distribution defined on complete graphs (in practice, in order to apply the QPBO algorithm in the previous experiments, we did not construct complete graphs, but rather included only those edges whose influence on the likelihood was maximal). Although this version of the algorithm is not particularly efficient for small networks (identifying K = 10 circles on an ego network with 1000 nodes requires around one hour), it has the advantage that it is easily able to scale to the largest ego-networks that are ever encountered. For very large networks, the algorithm is able to take advantage of the fact that many nodes with the same features and community memberships can be ‘collapsed’, so that the running time increases only modestly between 2500 and 5000 node ego-networks. Figure 10 shows the accuracy of our MCMC algorithm in terms of the Balanced Error Rate and F1 score. We note that the best performance of our algorithm is obtained on reasonably small ego-networks, though in practice small networks account for the vast majority of our data. Note that the results for any particular value of K are slightly worse than those reported in Figure 4, since we are not selecting K using the BIC described in Section 3.1. Although performance clearly degrades for large ego-networks, it remains an open question whether this is due to the difficulty of optimization on large networks, or simply due to the fact that our model assumptions become increasingly violated as large networks become less ‘community-like’. 9 Discussion and Future Work We have modeled circle detection as a problem that can be solved independently for each user. In practice this assumption is advantageous, as it allows us to deal with several small problems independently, using sophisticated models that could not easily scale to networks with millions of nodes. However, it is possible that circles could be more ac- curately predicted by exploiting relationships between the circles of multiple users. For example, if a user has a ‘Stanford’ circle in their ego-network, it is highly likely that users belonging to that circle will also have Stanford circles within their own ego-networks. Al- ternately, if a Stanford community could be detected across the entire Facebook, Google+, or Twitter network, then a user’s ‘Stanford’ circle might simply be the intersection of their ego-network with that community. Although studying such models is an appealing avenue for future work, it is unfortunately not possible using our data, where we do not have access to complete network information. Although we developed algorithms that scale to the largest ego-networks that we en- countered, we find that the best performance occurs on ego-networks with up to a few hundred nodes, but degrades significantly for networks with more than 1000. It remains to be seen whether this is a shortcoming of our algorithm (due to the fact that optimization is more difficult for large networks), or whether the assumptions of our model simply break 20 down at large scales. Our fundamental assumption that circles will be made up of close- knit groups of friends with common properties seems like a better fit to networks with at most a few hundred nodes. We also found that performance on even the largest Facebook networks (i.e., over 1000 friends) was better than that obtained on small networks from Google+ and Twitter. This suggests that it is not merely the size of the networks that causes our model assumptions to become violated, but rather the very nature of the networks themselves (in addition to the differences in the ground-truth already mentioned). Naturally, a circle containing members of the same squash team (as we find on Facebook) is fundamentally different from a circle containing presidential candidates (as we find on Google+). It remains to design a circle detection algorithm that is tailored for networks with asymmetric following relationships. 10 Conclusion ‘Circles’ allow us to organize the overwhelming volumes of data generated by our personal social networks, though they are laborious to construct manually. We have designed an algorithm to automatically detect circles in ego-networks, which we evaluated on a dataset of 1,143 ego-networks and 5,541 ground-truth circles obtained from Facebook, Google+, and Twitter. We find in such data circles that are disjoint, overlapping, and hierarchically nested, and design our model with such behavior in mind. Our model is unsupervised, but can also make use of weakly-labeled data that may be available in practice. Experiments reveal that social circles can be accurately detected using a combination of both network and profile information. Acknowledgements This research has been supported in part by NSF IIS-1016909, CNS-1010921, CAREER IIS-1149837, IIS-1159679, AFRL FA8650-10-C-7058, DARPA XDATA, DARPA GRAPHS, Albert Yu & Mary Bechmann Foundation, Boeing, Allyes, Samsung, Intel, Alfred P. Sloan Fellowship and the Microsoft Faculty Fellowship. The U.S. Government is authorized to reproduce and distribute reprints for Governmen- tal purposes notwithstanding any copyright annotation thereon. [Disclaimer] The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of IARPA, AFRL, or the U.S. Government. References D. Agarwal, B.-C. Chen, P. Elango, N. Motgi, S.-T. Park, R. Ramakrishnan, S. Roy, and J. Zachariah. Online models for content optimization. In Neural Information Processing Systems, 2008. Y.-Y. Ahn, J. Bagrow, and S. Lehmann. Link communities reveal multiscale complexity in networks. Nature, 2010. 21 E. Airoldi, D. Blei, S. Fienberg, and E. Xing. Mixed membership stochastic blockmodels. Journal of Machine Learning Research, 2008. R. Andersen and K. Lang. Communities from seed sets. In WWW, 2006. L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006. R. Balasubramanyan and W. Cohen. Block-LDA: Jointly modeling entity-annotated text and entity-entity links. In SIAM International Conference on Data Mining, 2011. E. Boros and P. Hammer. Pseudo-boolean optimization. Discrete Applied Mathematics, 2002. J. Chang and D. Blei. Relational topic models for document networks. In International Conference on Artificial Intelligence and Statistics, 2009. J. Chang, J. Boyd-Graber, and D. Blei. Connections between the lines: augmenting social networks with text. In Knowledge Discovery and Data Mining, 2009. H. Chen and R. Karger. Less is more: Probabilistic models for retrieving fewer relevant documents. In Special Interest Group on Information Retrieval, 2006. Y. Chen and C. Lin. Combining SVMs with various feature selection strategies. Springer, 2006. K. El-Arini, G. Veda, D. Shahaf, and C. Guestrin. Turning down the noise in the blogo- sphere. In Knowledge Discovery and Data Mining, 2009. Scott L. Feld. The focused organization of social ties. American Journal of Sociology, 1981. Mario Frank, Andreas P. Streich, David Basin, and Joachim M. Buhmann. Multi- assignment clustering for Boolean data. Journal of Machine Learning Research, 2012. Steve Gregory. Finding overlapping communities in networks by label propagation. New Journal of Physics, 2010a. Steve Gregory. Fuzzy overlapping communities in networks. CoRR, abs/1010.1523, 2010b. P. Hammer, P. Hansen, and B. Simeone. Roof duality, complementation and persistency in quadratic 0-1 optimization. Mathematical Programming, 1984. M. Handcock, A. Raftery, and J. Tantrum. Model-based clustering for social networks. Journal of the Royal Statistical Society Series A, 2007a. Mark S. Handcock, Adrian E. Raftery, and Jeremy M. Tantrum. Model-based clustering for social networks. Journal of the Royal Statistical Society, 2007b. M. B. Hastings. Community detection as an inference problem. Physical Review E, 2006. David Haussler. Convolution kernels on discrete structures. Technical report, University of California at Santa Cruz, 1999. 22 Peter D. Hoff, Adrian E. Raftery, and Mark S. Handcock. Latent space approaches to social network analysis. Journal of the American Statistical Association, 2002. S. Johnson. Hierarchical clustering schemes. Psychometrika, 1967. D. Kim, Y. Jo, L.-C. Moon, and A. Oh. Analysis of twitter lists as a potential source for discovering latent characteristics of users. In CHI, 2010. P. Kohli and P. Torr. Efficiently solving dynamic Markov random fields using graph cuts. In International Conference on Computer Vision, 2005. Vladimir Kolmogorov and Carsten Rother. Minimizing nonsubmodular functions with graph cuts-a review. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007. P. Krivitsky, M. Handcock, A. Raftery, and P. Hoff. Representing degree distributions, clustering, and homophily in social networks with latent cluster random effects models. Social Networks, 2009. A. Lancichinetti and S. Fortunato. Community detection algorithms: a comparative anal- ysis. arXiv:0908.1062, 2009a. Andrea Lancichinetti and Santo Fortunato. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Physical Review E, 2009b. Andrea Lancichinetti, Santo Fortunato, and Janos Kertesz. Detecting the overlapping and hierarchical community structure in complex networks. New Journal of Physics, 2009. P. Lazarsfeld and R. Merton. Friendship as a social process: A substantive and method- ological analysis. In Freedom and Control in Modern Society. 1954. J. Leskovec, K. Lang, and M. Mahoney. Empirical comparison of algorithms for network community detection. In WWW, 2010. Y. Liu, A. Niculescu-Mizil, and W. Gryc. Topic-link LDA: joint models of topic and author community. In International Conference on Machine Learning, 2009. D. MacKay. Information Theory, Inference and Learning Algorithms. Cambrdige Univer- sity Press, 2003. J. McAuley and J. Leskovec. Learning to discover social circles in ego networks. In Neural Information Processing Systems, 2012. M. McPherson. An ecology of affiliation. American Sociological Review, 1983. Miller McPherson, Lynn Smith-Lovin, and James M. Cook. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 2001. A. Menon and C. Elkan. Link prediction via matrix factorization. In European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2011. 23 Aditya Menon and Charles Elkan. A log-linear model with latent features for dyadic prediction. In International Conference on Data Mining, 2010. A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks. In International Conference on Web Search and Data Mining, 2010. P. Nasirifard and C. Hayes. Tadvise: A twitter assistant based on twitter lists. In SocInfo, 2011. M. Newman. Modularity and community structure in networks. Proceedings of the National Academy of Sciences, 2006. M. E. J. Newman. Fast algorithm for detecting community structure in networks. Physical Review E, 2003. M. E. J. Newman. Detecting community structure in networks. The European Physical Journal B, 2004. M. E. J. Newman and G. T. Barkema. Monte Carlo Methods in Statistical Physics. Oxford University Press, 1999. Jorge Nocedal. Updating quasi-Newton matrices with limited storage. Mathematics of Computation, 1980. G. Palla, I. Derenyi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 2005. M. A. Porter, J.-P. Onnela, and P. J. Mucha. Communities in networks. February 2009. E. Ravasz and A.-L. Barab´asi. Hierarchical organization in complex networks. Physical Review E, 2003. C. Rother, V. Kolmogorov, V. Lempitsky, and M. Szummer. Optimizing binary MRFs via extended roof duality. In Computer Vision and Pattern Recognition, 2007. S.E. Schaeffer. Graph clustering. Computer Science Review, 2007. Georg Simmel. Conflict and the web of group affiliations. Simon and Schuster, 1964. J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The anatomy of the Facebook social graph. preprint, 2011. S. V. N. Vishwanathan and Alexander J. Smola. Fast kernels for string and tree matching. In Neural Information Processing Systems, 2002. C. Volinsky and A. Raftery. Bayesian information criterion for censored survival models. Biometrics, 2000. D. Vu, A. Asuncion, D. Hunter, and P. Smyth. Dynamic egocentric models for citation networks. In International Conference on Machine Learning, 2011. 24 S. Wu, J. Hofman, W. Mason, and D. Watts. Who says what to whom on twitter. In WWW, 2011. J. Yang and J. Leskovec. Community-affiliation graph model for overlapping community detection. In International Conference on Data Mining, 2012. T. Yoshida. Toward finding hidden communities based on user profiles. In ICDM Work- shops, 2010. J. Zhao. Examining the evolution of networks based on lists in twitter. In International Conference on Internet Multimedia System Architectures and Applications, 2011. 25   0 0 0 0 1 1 0 1 1 0 0 first name : Dilly last name : Knox first name : Alan last name : Turing work : position : Cryptanalyst work : location : GC &CS work : location : Royal Navy education : name : Cambridge education : type : College education : name : Princeton education : type : Graduate School 1 − σx,y =   0 0 1 1 1 1 1 − σ(cid:48) x,y = first name last name work : position work : location education : name education : type Figure 3: Feature construction. Profiles are tree-structured, and we construct features by comparing paths in those trees. Examples of trees for two users x (blue) and y (pink) are shown at top. Two schemes for constructing feature vectors from these profiles are shown at bottom: (1) (bottom left) we construct binary indicators measuring the difference between ‘work→position→Cryptanalyst’ appears in both trees. (2) leaves in the two trees, e.g. (bottom right) we sum over the leaf nodes in the first scheme, maintaining the fact that the two users worked at the same institution, but discarding the identity of that institution. 26 first namelast nameworkAlanTuringpositionCryptanalystcompanyGC&CSeducationnameCambridgetypeCollegenamePrincetontypeGraduate Schoolfirst namelast nameworkDillyKnoxpositionCryptanalystcompanyGC&CSeducationpositionCryptanalystcompanyRoyal NavynameCambridgetypeCollege Figure 4: Performance on Facebook, Google+, and Twitter, in terms of the Balanced Error Rate (top), and the F1 score (bottom). Higher is better. Error bars show standard error. The improvement of our best features φ1 compared to the nearest competitor are significant at the 1% level or better. Facebook: Google+: Figure 5: Top: Three detected circles on a small ego-network from Facebook, compared to three ground-truth circles (BER (cid:39) 0.81). Blue nodes: true positives. Grey: true negatives. Red: false positives. Yellow: false negatives. Our method correctly identifies the largest circle (left), a sub-circle contained within it (center), and a third circle that significantly overlaps with it (right). Bottom: Four detected circles on ego-networks from Google+ (BER (cid:39) 0.73). Green nodes in the two right networks show additional detected circles, whose accuracy cannot be evaluated as we only observed two circles in the ground-truth. 27 FacebookGoogle+Twitter0.51.0Accuracy(1-BER).77.72.70.84.72.70Accuracyondetectedcommunities(1-BalancedErrorRate,higherisbetter)multi-assignmentclustering(Streich,Frank,etal.)low-rankembedding(Yoshida)block-LDA(BalasubramanyanandCohen)ourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19)FacebookGoogle+Twitter0.01.0Accuracy(F1score).40.38.34.59.38.34Accuracyondetectedcommunities(F1score,higherisbetter)multi-assignmentclustering(Streich,Frank,etal.)low-rankembedding(Yoshida)block-LDA(BalasubramanyanandCohen)ourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19) Figure 6: Parameter vectors of four communities for a particular Facebook user. The top four plots show ‘complete’ features φ1, while the bottom four plots show ‘compressed’ features ψ1 (in both cases, BER (cid:39) 0.78). For example the former features encode the fact that members of a particular community tend to speak German, while the latter features encode the fact that they speak the same language. (Personally identifiable annotations have been suppressed.) Figure 7: Accuracy of assigning a new node to already-existing circles. Although a fully- supervised Support Vector Machine gives accurate results on Facebook (where node fea- tures are highly informative), our model yields far better results on Google+ and Twitter data. 28 featureindexforφ1i1weightθ1,ipeoplewithPhDslivinginS.F.orStanfordfeatureindexforφ1i1weightθ2,iGermanswhowenttoschoolin1997featureindexforφ1i1weightθ3,iAmericansfeatureindexforφ1i1weightθ4,icollegeeducatedpeopleworkingataparticularinstitutefeatureindexforψ1i1weightθ1,istudiedthesamedegreespeakthesamelanguagesfeatureindexforψ1i1weightθ2,istudiedthesamedegreefeatureindexforψ1i1weightθ3,isamelevelofeducationfeatureindexforψ1i1weightθ4,iworkedforthesameemployeratthesametimeFacebookGoogle+Twitter0.51.0Accuracy(1-BER).66.60.66.70.66.65Accuracyofcirclemaintenance(1-BalancedErrorRate,higherisbetter)SupportVectorMachineourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19)FacebookGoogle+Twitter0.01.0Accuracy(F1score).32.52.56.38.59.54Accuracyofcirclemaintenance(F1score,higherisbetter)SupportVectorMachineourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19) friend-to-friend features φ1 friend-to-user features φ2 compressed features ψ1 compressed features ψ2 Facebook: Google+: Twitter: Figure 8: Number of seeds versus accuracy (1 - Balanced Error Rate) for different numbers of circles K. For each of the K circles being identified, the user provides the same number of seeds. Although providing additional seeds is generally beneficial to performance for all K, the benefit is most pronounced when the number of circles to be identified is small. Results in terms of the F1 score are qualitatively similar and are omitted for brevity. Figure 9: Running time of our Markov Chain Monte Carlo (MCMC) algorithm for different ego-network sizes and different values of K (the number of circles to be detected). For comparison, our previously described inference algorithm (based on QPBO (Rother et al., 2007)) is shown for K = 10. 29 010numberofseeds0.550.881-BER010numberofseeds0.550.881-BER010numberofseeds0.550.881-BER010numberofseeds0.560.881-BER010numberofseeds0.570.751-BER010numberofseeds0.570.761-BER010numberofseeds0.570.751-BER010numberofseeds0.580.761-BERK=1K=2K=3K=4K=5010numberofseeds0.550.831-BER010numberofseeds0.550.831-BER010numberofseeds0.550.831-BER010numberofseeds0.550.831-BER010002000300040005000numberoffriends100101102103104105walltimeEgo-networksizevs.timeQPBO,K=10K=2K=4K=6K=8K=10 Figure 10: Accuracy of our Markov Chain Monte Carlo (MCMC) algorithm, in terms of the Balanced Error Rate (top), and the F1 score (bottom). 30 010002000300040005000numberoffriends0.40.7Accuracy(1-BER)Accuracyondetectedcommunities(1-BalancedErrorRate,higherisbetter)K=2K=4K=6K=8K=10010002000300040005000numberoffriends0.00.7Accuracy(F1score)Accuracyondetectedcommunities(F1score,higherisbetter)K=2K=4K=6K=8K=10
1911.12285
1
1911
2019-11-27T17:01:07
ComHapDet: A Spatial Community Detection Algorithm for Haplotype Assembly
[ "cs.SI", "cs.IT", "cs.LG", "cs.IT", "q-bio.GN" ]
Background: Haplotypes, the ordered lists of single nucleotide variations that distinguish chromosomal sequences from their homologous pairs, may reveal an individual's susceptibility to hereditary and complex diseases and affect how our bodies respond to therapeutic drugs. Reconstructing haplotypes of an individual from short sequencing reads is an NP-hard problem that becomes even more challenging in the case of polyploids. While increasing lengths of sequencing reads and insert sizes {\color{black} helps improve accuracy of reconstruction}, it also exacerbates computational complexity of the haplotype assembly task. This has motivated the pursuit of algorithmic frameworks capable of accurate yet efficient assembly of haplotypes from high-throughput sequencing data. Results: We propose a novel graphical representation of sequencing reads and pose the haplotype assembly problem as an instance of community detection on a spatial random graph. To this end, we construct a graph where each read is a node with an unknown community label associating the read with the haplotype it samples. Haplotype reconstruction can then be thought of as a two-step procedure: first, one recovers the community labels on the nodes (i.e., the reads), and then uses the estimated labels to assemble the haplotypes. Based on this observation, we propose ComHapDet - a novel assembly algorithm for diploid and ployploid haplotypes which allows both bialleleic and multi-allelic variants. Conclusions: Performance of the proposed algorithm is benchmarked on simulated as well as experimental data obtained by sequencing Chromosome $5$ of tetraploid biallelic \emph{Solanum-Tuberosum} (Potato). The results demonstrate the efficacy of the proposed method and that it compares favorably with the existing techniques.
cs.SI
cs
ComHapDet: A Spatial Community Detection Algorithm for Haplotype Assembly Abishek Sankararaman ∗, Haris Vikalo †, Fran¸cois Baccelli, ‡ Abstract Background: Haplotypes, the ordered lists of single nucleotide variations that distinguish chromosomal sequences from their homologous pairs, may reveal an individual's susceptibility to hereditary and complex diseases and affect how our bodies respond to therapeutic drugs. Reconstructing haplotypes of an individual from short sequencing reads is an NP-hard prob- lem that becomes even more challenging in the case of polyploids. While increasing lengths of sequencing reads and insert sizes helps improve accuracy of reconstruction, it also exacer- bates computational complexity of the haplotype assembly task. This has motivated the pursuit of algorithmic frameworks capable of accurate yet efficient assembly of haplotypes from high- throughput sequencing data. Results: We propose a novel graphical representation of sequencing reads and pose the hap- lotype assembly problem as an instance of community detection on a spatial random graph. To this end, we construct a graph where each read is a node with an unknown community label associating the read with the haplotype it samples. Haplotype reconstruction can then be thought of as a two-step procedure: first, one recovers the community labels on the nodes (i.e., the reads), and then uses the estimated labels to assemble the haplotypes. Based on this observation, we propose ComHapDet -- a novel assembly algorithm for diploid and ployploid hap- lotypes which allows both bialleleic and multi-allelic variants. Conclusions: Performance of the proposed algorithm is benchmarked on simulated as well as experimental data obtained by sequencing Chromosome 5 of tetraploid biallelic Solanum- Tuberosum (Potato). The results demonstrate the efficacy of the proposed method and that it compares favorably with the existing techniques. 1 Introduction and Background Technological advancements in DNA sequencing have enabled unprecedented studies of genetic blueprints and variations between individual genomes. An individual genome of a eukaryotic or- ganism is organized in K-tuples of homologous chromosomes; diploids (K = 2), including humans, have genomes organized in pairs of homologous chromosomes where the chromosomes in a pair differ from each other at a small fraction of positions. The ordered lists of such variants -- the so-called single nucleotide polymorphisms (SNPs) -- are referred to as haplotypes. Many plants are polyploid, i.e., have genomes organized in K-tuples, K > 2, of homologous chromosomes; for ∗Electrical and Computer Engineering, The University of Texas at Austin. Email - [email protected] †Electrical and Computer Engineering, The University of Texas at Austin. Email - [email protected] ‡Dept of Mathematics and Electrical and Computer Engineering, The University of Texas at Austin. Email - [email protected] 1 instance, the most commonly grown potato crop (Solanum Tubersoum) is a tetraploid organism with a total of 48 chromosomes (i.e., 12 distinct quadruplets). Haplotype information of an indi- vidual is useful in a wide range of applications. For instance, in humans, the haplotype information contains indicators to the individual's susceptibility to diseases and expected responses to certain classes of drugs [1]. Haplotype sequences are also used to infer recombination patterns and identify genes under positive section [2]. In the case of agricultural crops such as the tuber family, the haplotypes provide insight into developing disease and pest resistant variety of crops [3]. Thus, fast and accurate algorithms for both polyploid and diploid haplotype reconstruction (or also known as phasing) from high throughput sequencing reads are highly desirable. Recent advancements in DNA sequencing technologies have dramatically improved affordability and speed of sequencing; the most widely used are high-throughput sequencing devices (e.g., the Illumina's platforms). Information provided by such platforms typically comes in form of paired- end reads, each consisting of two short contiguous samples of the chromosome (separated by a few hundred bases). Typical reference-guided data processing pipeline starts by determining the relative ordering of the reads via mapping them to a reference genome; this step is followed by the detection of variant positions and SNP calling. To perform haplotype assembly, existing methods typically retain only the reads that cover variant positions; parts of the retained reads that cover homozygous sites are also discarded. Then the remaining information needs to be used to identify K distinct haplotype sequences S1,··· , SK, of same length. From the previous discussion, it is clear that there is no position in these K strings where all the alleles are identical (such a position would be homozygous and therefore discarded in the pre-processing step). While the relative positions of reads are revealed by mapping them onto a reference, their origin remains unknown, i.e., it is not known which among the K chromosomes a given read samples. In the absence of sequencing errors, grouping reads according to their origin is rather straightforward and based on the disagreement re- garding the allele information that the reads provide for each variant site. Unfortunately, however, sequencing is erroneous with state-of-the-art sequencing platforms achieving sequencing errors in the range of 10−3 − 10−2. In the presence of errors, it is no longer obvious how to decide whether a read originates from a particular haplotype; to this end, one needs to rely on a computational framework for haplotype assembly -- the central focus of the present paper. Existing work formulates haplotype assembly as a combinatorial optimization problem where one seeks to reconstruct the haplotype sequence by judiciously making as few modifications of the data as possible in order to remove read membership ambiguities arising due to sequencing errors. This has led to optimization criteria such as minimal fragment removal, minimum SNP removal [4], maximum fragments cut [5] and minimum error correction (MEC) [6]. Motivated by the observation that the MEC score optimization is NP-hard [4, 7], a considerable amount of recent work studied relaxations of the underlying combinatorial optimization problem [8, 9, 10, 7]. In a pioneering work, [11] proposed a greedy algorithm aimed at assembling most-likely haplotype sequences given the observations. This line of thought of using Bayesian methods to reconstruct the most likely haplotype sequence was carried out further in [12] and [13] using MCMC and Gibbs sampling, respectively. However, these methods are usually slow as the associated Markov chains have large mixing times, thereby making their practical applicability limited. HapCUT [14] makes a connection between haplotype assembly and graph-clustering, and solves it by identifying a maximum cut in an appropriately constructed graph. This method was shown to be superior to 2 [11] and is widely used in benchmarking. HapCUT algorithm was then significantly outperformed by HapCompass [15]. However, apart from HapCompass, all of these methods are restricted to the diploid case. To address both the diploid and polyploid scenarios, SDhaP [16] relaxes the MEC minimization problem to a convex optimization program and solves it efficiently by exploiting the underlying data structure. More recently, AltHap [17] casts haplotype assembly as a low-rank tensor factorization problem and solves it via fast alternating optimization heuristics. The connection to matrix factorization was previously exploited in [18] and [19], but those methods were incapable of handling polyploids or polyallelic assembly problem. Prior to the current paper, AltHap [17] is the only algorithm capable of solving the assembly problem in the polyploids/polyallelic scenario. Main Contributions In this paper, we propose a novel formulation of haplotype assembly as a spatial graph clustering problem. This formulation is based on spatial point process representation of paired-end reads; in particular, we argue that assigning to each paired-end read spatial coordinates corresponding to the starting indices of the reads in the pair represents valuable augmentation of the information. Equipped with such a representation of the data, we construct a graph whose nodes represent the reads, and place a weighted edge between two reads if they overlap in at least one position. The edge weights are formed using the scoring function adopted from [16]; this weighting mecha- nism ensures that if two reads belong to the same haplotype, then the edge connecting them will likely be assigned a large positive weight, while if they belong to different haplotypes, then the edge between them will likely be assigned a large negative weight. We then cast the haplotype assembly problem as an Euclidean community detection problem [20], where the community label of a node (i.e., a read) indicates the haplotype it comes from. We find in our experiments that such a 'spatial' embedding of the problem greatly improves both the accuracy and the run time complexity of polyploid phasing. The improvement in accuracy stems from the fact that our al- gorithm naturally enforces a regularizing constraint that the underlying sampling process is in a sense uniformly distributed in space. In other words, we know that in every 'location' of space, the total number reads covering the given SNP location belonging to the various haplotypes are identical. Having a spatial representation of the data allows one to incorporate this prior knowledge about the sampling process and leads to dramatically higher accuracy, especially in the polyploid case. The spatial representation is also crucial in reducing run times, as this exposes the problem's inherent 'locality' condition in space. More precisely, observe that if two reads are 'far away' in this embedding (i.e, they do not overlap), there will be no edge connecting them in the corresponding graph. This allows us to naturally 'decompose' the haplotype assembly problem using a divide- and-conquer paradigm, where we can perform assembly on smaller spatially localized sets of reads -- which is computationally very efficient -- and then perform a synchronization step to combine the local haplotype assemblies into a single global solution. This algorithmic framework is robust to inaccuracies in the individual local instances of phasing since the synchronization or the combining step has a natural error-correction mechanism due to a single location being phased in multiple local instances. Thus, we can employ faster but less accurate local phasing methods while still achieving high global accuracy and good run-time performance. Further technical aspects of these ideas are elaborated in Section 3. 3 Figure 1: A pictorial description of a paired end read on an example with m = 9. Figure 2: A pictorial description of a connected block of sites. There are 4 reads in the figure corresponding to the green bars. They set of sites covered by them are {1, 2}, {2, 3}, {3, 4, 5, 6} and {6, 7, 8, 9} respectively. The bottom figure is the graph Q on m = 9 vertices constructed by the 4 reads. 2 Problem Formulation Setup and Notation Let m and n denote the length of the haplotype sequences and the total number of paired-end read measurements, respectively. Let k denote the ploidy, i.e., the number of haplotype sequences and a be the cardinality of the alphabet set. If the variant sites are polyallelic, then a = 4 (i.e., all 4 alleles A, C, G, T are possible); in diploid and polyploid bi-allelic case, a = 2. The haplotype sequences are denoted by sl[i], where for each i ∈ {1,··· , m} and l ∈ {1,··· , k}, we have sl[i] ∈ {1,··· , a}. As an example, in the poly-allelic case, we have sl[i] ∈ {A, C, G, T}. In the rest of the paper, we refer to the haplotype positions {1,··· , m} as sites. Each read ru, u ∈ {1,··· , n}, is formed by first sampling a haplotype indexed by vu ∈ {1,··· , k} and then sampling a sequence of alleles {s(u)[i]}i∈Iu at sites Iu ⊂ {1,··· , m}, where for each i ∈ Iu, s(u)[i] ∈ {A, C, G, T} is a "noisy" (due to sequencing errors) version of the underlying ground truth svu[i]. For each measurement u ∈ {1,··· , n}, we observe the set of positions Iu and the noisy values {s(u)[i]}i∈Iu but not the index vu of the haplotype from which the read originates. Thus, using the above notation, the total dataset is denoted as ({s(u)[i]}i∈Iu)u∈{1,··· ,n}. The goal of assembly is to infer origins of the reads and recover haplotype sequences. In this paper, we consider the case where the data is in form of paired-ended reads. Formally, this implies that each measurement u ∈ {1,··· , n} is such that the set of sites covered by read u has two contiguous blocks. More precisely, we assume that each read u ∈ {1,··· , n} is such that there 2 ∈ {1,··· , m}, such that the set of sites covered by u, which was denoted (u) exists i 2 , j 2 }. See Figure 1 for by Iu satisfies, Iu = {i (u) 1 , i an illustration. 2 + 1,··· , i 1 + 1,··· , i (u) 1 } ∪ {i (u) 1 , j (u) 1 , i (u) (u) 2 , i (u) 2 + j (u) (u) (u) (u) 1 + j 4 A Paired-End Read123456789Sitesi(u)1<latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit><latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit><latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit><latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit>i(u)2<latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit><latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit><latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit><latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit>i(u)2+j(u)2<latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit><latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit><latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit><latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit>i(u)1+j(u)1<latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit><latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit><latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit><latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit>Reads123456789Sites We further assume that the set of m sites and n reads forms a single connected component. In particular, if we draw a graph Q on the vertex set {1,··· , m}, where for any two a, b ∈ {1,··· , n}, there is an edge in Q if and only if there is a read u ∈ {1,··· , n}, that covers both sites a and b. We say that our data set consisting of the m sites and n reads is connected, if the graph Q has a single connected component. Refer to Figure 2 for an illustration. Notice that since the problem definition is agnostic to how we label the strings from {1,··· , k}, any haplotype phasing algorithm can only hope to recover the k strings up to a permutation of the string label (which takes values in {1,··· , k}). For two disjoint blocks of a haplotype that are not bridged by a read, there is no way to ascertain how to phase fragments of the k haplotypes locally recovered inside the blocks. For this reason (and without the loss of generality of the proposed assembly framework), we assume that the set of haplotypes form a contiguous block of reads. If this were not the case, we could pre-process the reads and split the problem into many smaller instances, where each instance consists of a single contiguous haplotype block that needs to be assembled independently of other blocks. Recovery Goals and Performance Metrics In this subsection, we formalize the main performance metrics used to benchmark haplotype as- sembly algorithms, namely the Correct Phasing Rate (CPR) and the Minimum Error Correction (MEC) score (see eg. ([21], [22], [23])). The CPR measures the discrepancy between the recon- structed haplotypes s1,··· , sk and the ground truth s1,··· , sk, 1sl[i]=sπ(l)[i], (1) where Sk is the set of all permutations of {1,··· , k}. Note that this is a more demanding notion of recovery compared to that used in [17] and [24]; the metric used there, so-called Reconstruction Rate, we for convenience denote by M-CPR (abbreviating "Modified CPR"). This metric is defined as m(cid:88) i=1 k(cid:89) l=1 CPR = 1 m max π∈Sk M-CPR = max π∈Sk 1 mk m(cid:88) k(cid:88) i=1 l=1 1sl[i]=sπ(l)[i]. (2) j=1 1Xj ≤(cid:80)k since for all sets X1,··· , Xk,(cid:81)k In the case of assembly of diploid haplotypes (i.e., k = 2), CPR and M-CPR are identical. However, in the polyploid case where the size of the alphabet is generally 4, it holds that CPR ≤ M-CPR j=1 1Xj . We adopt CPR in equation (1) since it reflects the fraction of sites where the haplotype phasing algorithm correctly recovers all the haplotypes. Unfortunately, the design of algorithms for direct minimization of this objective is infeasible since the ground truth is unknown. A commonly used proxy metric in practice is the MEC which can be computed directly from the observed data and the reconstructed output. The MEC score is defined as n(cid:88) u=1 m(cid:88) i=1 MEC = min l∈{1,··· ,k} 1Read u covers site i1s(u)[i](cid:54)=sl[j]. A number of existing haplotype assembly schemes such as [17], [14], attempt to directly minimize the MEC score by solving relaxations of the underlying combinatorial optimization problem that is 5 known to be NP-hard [4], [7]. Contrary to this common approach, in this paper we do not attempt to directly minimize the MEC but rather leverage inherent structural properties of the data and the fact that the noise in measurements is introduced randomly, rather than by an adversarial source, to design a randomized assembly algorithm. Specifically, we rely on the above observations to provide a solution to haplotype assembly by posing it as a clustering problem on a random graph. The key parameters that impact the performance of assembly are coverage, error rate and effective read length. Formally, effective read-length R is defined to be the average of j (l) 1 and j (l) 2 , i.e., n(cid:88) u=1 R = 1 2n (j (u) 1 + j (u) 2 ). We define the coverage C as the average number of reads that cover a single base in a haplotype, i.e., C = 2nR km . Since there are n reads, each covering on average 2R haplotype alleles, the total average number of bases being read is 2nr. The error-rate p is the average error rate of the data acquisition process, i.e., the fraction of alleles incorrectly represented by the reads; this rate is aggregate of the sequencing and SNP calling errors. We adopt the standard practice of characterizing and benchmarking the performance of haplotype assembly algorithms using either the achieved MEC in practical settings where the ground truth is unknown, and the CPR in simulation studies where the ground truth is known. We will characterize the performance of our algorithm in settings with varied ploidy, alphabet size, coverage, read-lengths and error-rates. 3 The Haplotype Assembly Algorithm The algorithm we propose is based on identifying a simple connection between the aforementioned haplotype reconstruction problem and Euclidean community detection. Although such a connection was previously noted in the special case of single-ended reads and the diploid haplotype phasing problem [25], no prior work explored this connection in the case of paired-end reads and phasing polyploids. For the first time, we provide a unified framework based on Euclidean community detection (e.g., [20],[26]) for both diploid and polyploid haplotype phasing problems. Pre-Processing the Data In order to invoke a connection to spatial community detection, we pre-process the n paired-end reads into a graph G with n nodes, where each node represents a paired-end read. This pre- processing has two steps - (i) Constructing weights between pairs of nodes (reads), (ii) Placing labels on the nodes. 1. Weights between nodes - For any two reads u, v ∈ [n] with u (cid:54)= v, denote the intersection of sites at which the two measurements occur by Iu ∩ Iv := {l1,··· , lq}, where q = 0 implies empty set. More precisely, each li, for i ∈ {1,··· , q}, is a position along the haplotype covered by both u and v. If q = 0, reads u and v cover disjoint set of sites; in this case, there is no edge between u and v in the graph G. If on the other hand q > 0, then we place an edge between them and assign it weight wuv given by (1s(u)[lh]=s(v)[lh] − 1s(u)[lh](cid:54)=s(v)[lh]). (3) q(cid:88) wuv := 1 q h=1 6 Figure 3: An illustration of our pre-processing the set of reads into a spatial random graph. The starting indices of the two contiguous blocks of a read forms its spatial coordinate and the weight is computed using Equation 3. In this example, the shaded sites contribute to the weight wuv. In words, the weight of an edge between any two overlapping reads u and v is the difference between the number of positions (sites) where u and v agree and the number where they disagree, divided by the total number of sites in common. Observe in the definition that the weights wuv ∈ [−1, 1] for all u, v ∈ [n]. Such a weighting scheme ensures that if wuv is positive and large, then it is likely that the reads u and v are generated from the same string, while if wuv is negative and large in magnitude, then it is likely that the reads u and v are generated from different strings. This bias in the weights wuv can be understood by examining the typical structure of the polyploid phasing problem. Note that if the SNP positions were called accurately, i.e., all of the m haplotypes to be phased were 'true', then it would hold that in any location i ∈ {1,··· , m}, not all strings s1,··· , sk have identical bases, i.e., the set of locations {i ∈ {1,··· , m} : s1[i] = ··· = sk[i]} = ∅. Since sequencing errors are 'typically' small, it is thus the case that if two reads covering the same site have different values, then it is likely that they come from different haplotypes. 2. Node Labels - To each node u ∈ [Nn] of the graph we assign two labels: (i) - a community label Zu ∈ [k] and (ii) - a spatial label Xu ∈ [m]2. The community label of a node indicates origin of the corresponding read (i.e., which haplotype the read samples), while the spatial label of a node u ∈ [n] is (i (u) 2 ), i.e., the locations along the haplotype where the two contiguous substrings of the paired-end read start. See Figure 3 for an illustration of the data pre-processing. This definition of spatial labels assumes that the reads consist of precisely two contiguous substrings; however, experimental data show that this may be violated due to various practicalities in base- calling, read mapping and variant calling steps (e.g., due to omitting bases with confidence scores below a threshold); consequently, in practice a read (more precisely, the parts of a read covering heterogeneous variant positions that are being used in haplotype assembly) may consist of either a single or more than 2 contiguous fragments. If a read is only a single contiguous string of alleles, the spatial location of that read is placed on the diagonal in [n]2, i.e., the spatial label assigned to the read is a pair of identical numbers (each being the starting position of the single read). If a read happens to consist of more than 2 contiguous fragments, there are several possibilities when it comes to assigning it a spatial label. For instance, we may split the read into multiple reads such that each one has at most two contiguous fragments; alternatively, we may choose two of the multiple starting contiguous points in a suitable fashion to form the spatial label. Further details regarding assignment of spatial labels are discussed in Section 4.2. (u) 1 , i 7 1i(u)1<latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit>i(u)2<latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit>i(v)2<latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit>i(v)1<latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit>i(v)1<latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit>i(u)1<latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit>i(v)2<latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit>i(u)2<latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit>wuv<latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit><latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit><latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit><latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit>m...... Summary of the Algorithmic Pipeline Our algorithm takes the spatial graph G as input, and produces the reconstructed haplotypes. After pre-processing the sequencing data, we may form the graph G and assign spatial labels (Xu)u∈[n] to its nodes. However, the community labels (Zu)u∈[n] are unknown at this point. We defer a detailed discussion of the computational complexity involved in the pre-processing needed to construct G to the end of this section, where we show that one can exploit the structure in the data to reduce complexity of this pre-processing step from the naive O(n2) to roughly O(n). Given the represen- tation of the data by the graph G, and having assigned spatial labeling to its nodes, our algorithm has two main components - (i) - a community detection on G to discover origin of each read and thus effectively group the reads into k different clusters and (ii) - Subsequently, for all i ∈ [m] and l ∈ [k], we estimate sl[i] by a simple majority rule as described in the sequel. 1. Euclidean Community Detection - This part of the algorithm is where we take as input the (cid:98)Zu ∈ [k], denoting which of the k haplotype, a read is likely originating from. We summarize the graph G along with the spatial labels (Xu)u∈[n] and estimate for each u ∈ [n], a community label key steps in this task. The formal pseudo code is given in Algorithm 1. 1. We first tessellate the grid [n]2 into smaller overlapping boxes, denoted by (Bx,y)1≤x≤n,1≤y≤n. Here n < n is a parameter which we choose and each Bx,y ⊂ [n]2. The tessellation is such that each grid point u ∈ [n]2 belongs to multiple boxes Bx,y since the boxes overlap. 2. For each box Bx,y, let Hx,y denote the subgraph of G containing nodes whose spatial locations lie in Bx,y. The nodes of Hx,y are all clustered independently into k communities. 3. The community estimates in different boxes are synchronized to obtain a global clustering estimate from spatially-local clustering estimates. Since each grid point is present in multiple boxes, a read gets many estimates for its community, each of which adds an 'evidence' to the label of the node. This scheme has a natural 'error-correcting' mechanism, since it is less likely for a node to be misclassified in the majority of the boxes it lies in, as opposed to any one particular box. it originates ((cid:98)Zu)u∈[n], we reconstruct the haplotypes by a simple majority vote. For all j ∈ [k] and 2. Reduce by Majority - After estimating for each node (read), the likely haplotype from which i ∈ [m], we estimate sj[i] to be the majority among the 4 letters in the alphabet as indicated by the reads that cover site i and are estimated to belong to string j in the above clustering step. Intuition behind the Algorithm Observe that for any two reads u and v that overlap, if the weight wuv is positive and large, then they are likely from the same haplotype while if negative and large, they are likely from different haplotypes. Consider a subset of reads such that the absolute value of the weights on the edges that connect them in graph G are 'large'. This subset of reads can readily be grouped into up to k different clusters using standard techniques such as the spectral method. Such simple schemes will be successful in this scenario since the 'signal' for clustering in the subgraph is high due to strong interaction between the corresponding reads, i.e., the adjacency matrix of the subgraph is dense. 8 Figure 4: An instance with three strings (haplotypes) of length 1000 where spectral clustering on G fails. The coverage is 10, the effective read lengths r = 2 and R = 250. The error probability p = 0.05. The figure on the left is the union of the three figures on the right. The three colored plots are the spatial locations of the recovered communities by the spectral algorithm applied on G. The density of the recovered blue estimates is 0.0995, while that of red is 0.33 and of green is 0.57. The total overlap achieved by the spectral method is 0.1. Note that in the ground truth all three colors are equal in intensity, which is not captured by the spectral method. However, our correctly algorithm predicts approximately equal-sized communities, achieves an overlap of 0.98 and runs 4 times faster. However, the entire set of reads does not posses the aforementioned property -- in particular, it has a large diameter (of order n). Thus, standard spectral methods applied to graph G are both computationally impractical as well as statistically sub-optimal for recovery. The computational impracticality is easy to observe; indeed, any clustering scheme will be super-linear in the num- ber of nodes Nn, which renders them extremely slow on large problem instances that are typical in practice. Furthermore, even the pre-processing of reads to construct graph G is of order N 2 n, which makes it computationally challenging in practical settings. The statistical sub-optimality is more subtle and stems from the fluctuations in the density of reads in space; in many problem instances, the density of reads varies across space due to randomness in the read generation process. For instance, in Figure 4, we see an example where the density of reads captured by the spectral algorithm is highly imbalanced due to the fluctuations of the nodes in space. However, in the ground truth set, the statistical distribution of reads across space is the same for all communities. Therefore, to improve performance, one would need an additional 'constraint' in the reconstruction algorithm to enforce the fact that the spatial distribution of reads across all communities is the same. Our strategy in this paper is to first partition the set of reads into subsets wherein the reads interact strongly. Since the reads have spatial locality, we partition the set of reads into boxes as illustrated in Figure 5. In each box, we consider the subgraph of G with nodes having spatial labels lying in that box and then cluster this sub-graph independently of other subgraphs in other boxes. The partition of space into boxes is fixed a priori and is data independent. The box size and how much they overlap are hyper-parameters that can be tuned. In each box, we run a clustering algorithm and then combine the estimates from different boxes to form a final global partitioning of the nodes of G. The partitioning based on spatial locality automatically ensures that the spatial density of the estimated communities are roughly identical. The intuition for this stems from the fact that the reads will be roughly uniformly distributed within a box since the box is 'small' in size. More importantly, by requiring that the boxes overlap, a single read will be present in multiple boxes. This further boosts statistical accuracy of clustering by embedding natural error-correction 9 scheme; since a single read is processed multiple times, there are multiple instances of 'evidence' for the community label of a node. From a computational complexity viewpoint, partitioning the set of nodes and clustering smaller instances dramatically reduces run-time as a majority of clustering algorithms are super-linear in the number of data points and hence reducing the sizes of the graphs to be clustered has a significant beneficial impact. Therefore, our algorithm is both computationally feasible on large instances and is statistically superior compared to standard graph clustering algorithms directly applied on G. 3.1 Pseudo Code Let us start by introducing the notation needed to formalize the algorithm. The algorithm has hyper-parameters A, B, iter, M ∈ N and α ∈ [0, 1]. For x, y ∈ [(cid:100) n A(cid:101)], we define Bx,y ⊂ [n]2 as Bx,y := [Ax, min(Ax + B, n)] × [Ay, min(Ay + B, n)], the box indexed by (x, y). Thus, the param- eters A and B dictate how large a box is and how many boxes cover a read. In the course of the algorithm, we maintain a dictionary of lists C, where for each node u ∈ [Nn], C[u] denotes the list of community estimates for node u. Each node has more than one estimate as it belongs to more than one box. The estimates from clustering in each box are added as 'evidence' of the community estimate for the nodes in the box. Having multiple estimates for a node helps in combating clus- tering errors in certain boxes. Main Routine - We now describe the algorithm in detail. The first step consists of partitioning the space [n]2 into multiple overlapping boxes as shown in Figure 5. Recall that the hyper-parameters A and B allow one to tune both the size of a box and the number of boxes that will cover a given location of [n]2. In each box indexed by (x, y) for x, y ∈ [(cid:100) n A(cid:101)], we identify the nodes of G having their spatial label in that box; let us denote the collection of such nodes by Hx,y. If the number of nodes in Hx,y is small (e.g., smaller than a certain hyper-parameter M ), then we do not attempt to cluster these nodes. We need to set such a minimum size of Hx,y or the output of clustering may turn out to be noisy and non-informative. In addition, if more than an α < 1 fraction of nodes in Hx,y have at least one community estimate, then again we do not cluster Hx,y. The reason for doing so is to decrease the running time by ensuring we only perform the clustering step when there are sufficiently many new unexplored nodes. In each remaining box (x, y) (i.e., each box with at least M nodes where at most an α fraction of them have prior estimates) we apply a fast and simple local clustering algorithm. In particular, we generate an approximate clustering of the nodes in Hx,y by directly running a standard k-means algorithm [27] on the adjacency matrix of Hx,y. We then iteratively improve upon this initial guess by reassigning each node to the most likely cluster while keeping the assignment of other nodes fixed. This iterative update rule is reminiscent of the class of Expectation Maximization algorithms, although our method is fast and non-parametric. We run the iterative clean-up procedure for iter number of iterations. Once the nodes of Hx,y are clustered, we append the result to the dictionary of lists C after appropriately synchronizing the community estimates of each node. Once we have iterated over all boxes, we assign a single community estimate to each node based on the majority in the list of estimates in C. The algorithm is formalized as the following pseudo-code. Local Clustering Step - This step is described in Algorithm 2. We follow a two step-procedure. In the first step, we get an approximate clustering of the graph H by applying the standard k- means algorithm on the adjacency matrix H. We then one-hot encode this clustering result. One 10 Figure 5: This is an example with n = 7. The parameters A = 1 and B = 3. The red and green boxes are examples of Bx,y. Algorithm 1 Main Routine 1: procedure Main(G, k, (Xi)i∈[1,Nn], A, B, iter, M ) for i ∈ {1,··· , n} do 2: end for C[i] ← [] for 1 ≤ x ≤(cid:2)(cid:100) n A(cid:101)(cid:3) do A(cid:101)(cid:3) do for 1 ≤ y ≤(cid:2)(cid:100) n (cid:46) A, B, iter, M, α are hyper-parameters (cid:46) For every node(read) (cid:46) Initialize to empty Bx,y ← [Ax, min(Ax + B, n)] × [Ay, min(Ay + B, n)] Hx,y ← Subgraph of G with spatial labels in Bx,y f ← {l∈Hx,y:C[l]>0 if Hx,y ≥ M AND f ≥ 1 − α then Hx,y e ← LOCAL-CLUSTER(Hx,y, k, iter) C ←SYNCHRONIZE(C, e) (cid:46) Fraction of nodes with a community estimate 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: end if end for end for 16: return REDUCE-BY-MAJORITY(C) 17: end procedure hot encoding is one where for each read we associate a k×1 vector in which all entries re 0 except for a single entry corresponding to the estimated community label of that read to be 1. More formally, if r denotes the number of nodes of H, then the one-hot encoding result is a matrix e0 of size r× k. Each entry of e0 is either 0 or 1; the entry in the ith row and jth column being 1 implies that the ith node is classified as belonging to community j. Thus, each row of e0 contains exactly one 1 while the rest of the entries are all 0. We then run a 'clean-up' procedure by iteratively updating the estimate as follows. et+1 = T (Het). (4) The function T is applied row-wise; for matrix A, it sets the ith row and jth column of T (A) to 1 if j = arg max A[i], else the ith row and jth column of T (A) is set to 0. If a row has more than one column where the maximum is attained, the first column where the maximum occurs is assigned value 1 while the other columns are assigned value 0. Hence the dimensions of A and T (A) are the same. Furthermore, for any matrix A, the matrix T (A) is such that its entries are either 0 or 1, with each row having exactly one entry valued 1. 11 Algorithm 2 Small Graph Clustering 1: procedure Local-Cluster(H, k, iter) 2: e := k-means-cluster(H, k) e0 = One-Hot-Encoding(e). for 1 ≤ i ≤ iter do 3: 4: 5: (cid:46) k-means Algorithm of [27] ei = arg max Hei−1 (cid:46) row wise argmax end for 6: 7: return eiter. 8: end procedure The iterative update is based on the following intuition. Let the clustering be encoded by matrix et for some t ∈ N, and consider a tagged node u ∈ [n]. The new updated value of the community label of node u is then the 'most-likely' label given the estimates of the community labels of the rest of the nodes. More precisely, the 'weight' that a node u is in a community l ∈ [k] is the sum of the weights along the edges connecting u to v ∈ [n] in G such that the estimate of node v is l. The new community label of node u is the one having the largest weight. By performing this op- eration simultaneously for all nodes, one obtains the representation in Equation (4). The intuition for reassigning the node to the community with the maximum weight stems from the observation that if a weight along an edge is positive and large, then it is likely that the end nodes of the edge share the origin, i.e., the corresponding reads sample the same haplotype. Likewise, if the weight along an edge is negative and large, then it is likely that the end nodes represent reads that sample different haplotypes. Therefore, for the iterative update to perform well, the initial estimate e0 must be 'good enough'; we achieve this by applying the k-means clustering algorithm on the adjacency matrix H. In principle, one can obtain somewhat better initial guess for e0 by applying the k-means algorithm to the eigenvectors of H, but the marginal gains in statistical accuracy does not warrant the enormous increase in computation needed to perform such a spectral clustering. The clean-up method, at first glance, seems to bear similarities to other dynamical algorithms such as expectation maximization, Belief Propagation (BP) and tensor factorization based methods of [17]. Unlike BP, however, we do not iterate the beliefs or probabilities of a node belonging to vari- ous communities; instead, we make a hard assignment at each update step. While for standard BP algorithms it is desirable that a graph is tree-structured, our graph contains a lot of triangles and loops due to the spatial embeddings. Therefore, it would be insufficient to keep track of the node marginals -- instead, BP would need the entire joint distribution which is not tractable. Despite the undesirable properties of G, benchmarking results demonstrate that our algorithm performs community detection on the graph very well. Synchronization Step - The main routine in Algorithm 1 considers the boxes sequentially and performs local clustering steps. Once the local clustering is performed, a key component is to synchronize the estimates of the current box with the estimates of the boxes that are already clus- tered. The synchronization is essential since the problem is a permutation invariant to the labels. Formally, the statistical distribution of the data remains unchanged if the true underlying labels of the [k] strings are permuted. Hence, the best hope for any recovery algorithm is to reconstruct the k strings upto a permutation of labels. Thus, if any clustering algorithm is run on two different 12 (cid:46) The identity permutation (cid:80) j∈C[i] 1π(σ[i])=C[i][j] j∈C[i] 1 Algorithm 3 Synchronization Step 1: procedure Synchronize(C, e) (cid:99)W ← 0 (cid:98)π ← id for All permutations π of [k] do (cid:80) i∈Nx,y end for 1C[i](cid:54)=empty local-weight ← 0 for All nodes in e do Wπ ←(cid:80) if Wπ >(cid:99)W then (cid:99)W ← Wπ (cid:98)π ← π. Append(cid:98)π(e[nodes]) to C[nodes]. end if end for for nodes in e do 16: end for 17: return C. 18: end procedure 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 4: 5: 6: 7: 9: subsets of nodes, the corresponding haplotype estimates need to be synchronized to produce a clustering of the nodes in the union of the sets. We perform this clustering in line 8 of the main routine Algorithm 1 by invoking the sub-routine 3. In sub-routine 3, we decide on how to permute the community label output of the local clustering estimate of Hx,y that best 'synchronizes' with the label estimates of the other nodes of G at that instance. Observe that at the instant of synchronizing the output of Hx,y, other nodes of G have either none or multiple label estimates. There is a possibility that more than one label estimate per node is present in multiple boxes, each adding an 'evidence' for a node's cluster. We select a permutation of the labels by sequentially going over all permutations of [k] and selecting the one Algorithm 4 Reduce by Majority 1: procedure Reduce-Majority(C) C[node] ← Majority(C[node]). for node in C.keys do 2: 3: (cid:46) Estimate haplotype by majority end for for l ∈ {1,··· , k} do for i ∈ {1.··· , m} do (cid:98)sl[i] ← majority of alphabets among reads j with C[j] = l and covering site i. 8: end for 10: return ((cid:98)sl[i])l∈{1,··· ,k},i∈{1,··· ,m} end for 11: end procedure 13 that has the highest 'synchronization-weight'. More formally, let Nx,y ⊂ [n] denote the indices of the nodes in Hx,y; for all u ∈ Nx,y, denote by σ[u] ∈ [k] the label estimates formed by the local clustering on Hx,y. The synchronization weight for a permutation π of [k] is defined as (cid:80) (cid:80) j∈C[i] 1 (cid:88) i∈Nx,y Wπ := 1C[i](cid:54)=empty j∈C[i] 1π(σ[i])=C[i][j] . In words, we go over all nodes in Hx,y that have at least one prior estimate and sum the fraction of the previous estimate equaling the label assigned by the local clustering Hx,y after applying the permutation π to the local clustering's output. Among all permutations, we select the π∗ having the highest synchronization weight (ties are broken arbitrarily). After doing so, for each node u of Hx,y we append the label π∗(σ(u)) to the list C[u]. The key feature of the above procedure is consideration of the fraction, which is a proxy for the 'belief' of the community label of a node, rather than just a count; this is meaningful because the counts across different nodes can be significantly skewed by the order in which the boxes are clustered and synchronized. Computational Complexity In this section, we discuss the computational complexity of implementing our algorithm and the effect of various hyper-parameters on runtimes. A naive implementation of the algorithm would incur a cost of the order n2 just to construct the graph G from the reads. This step itself may be infeasible in practical scenarios where the number of reads will be on the order of millions. However, our algorithm only needs the subgraphs Hx,y instead of the full graph G. Therefore, we pre-process the reads and create a hash-map where for each location in [n]2, we store the list of reads that have spatial label in that location. This requires one pass through the list of reads, i.e., has computational complexity of order n and storage complexity of order n. Now, creating the adjacency matrix Hx,y is quadratic in only the number of nodes in Hx,y. The synchronization step requires time complexity of the order of the number of nodes in Hx,y times the number of distinct permutations of [k]. Choosing the Parameters of our Algorithm Our algorithm has an inherent trade-off between computational complexity and statistical accuracy that can be achieved by varying the hyper-parameters. For instance, if we decrease A while keeping B fixed, the number of boxes and therefore the computational time are increased. However, the statistical accuracy would improve since each node would now be present in many boxes and hence the error-correction scheme performs more accurately. Similarly, increasing the parameter M can reduce the run-time by considering fewer boxes to perform local clustering, while potentially decreasing statistical accuracy because there is less evidence for determining community label of each node. 4 Experimental Evaluation We evaluate the performance of our proposed algorithm on both simulated and experimental data. We implemented our algorithm in Python. The simulations, as well as the experimental evaluations were conducted on a single core Intel I5 Processor with 2.3Ghz processor and 8 GB 2133 MHz LPDDR3 RAM. 14 Cov Err ComHapDet t(s) CPR MEC 662.7 99.2 18.3 1289.1 18.8 98.2 2640 80.5 18.2 923.4 99.9 29.2 1831.1 27.1 99.5 3575.9 27.9 91.9 1382.7 52.1 100 2772.9 56.4 99.9 97.9 5283.6 50 AltHap σ 0.2 0.4 1.6 0.1 5.3 1.3 0 0.1 0.4 CPR MEC 99.9 960.7 99.8 1871.2 85.9 4844.1 1352.9 99.9 3132.3 98.1 92.8 5231.9 2034.5 100 3989.7 99.9 96.8 7646.3 t(s) 13.4 13.8 13.7 15.43 15.5 24.2 30 39.1 39.2 σ 0 0.1 1.3 0 0.8 1.3 0.1 0 0.6 HPoP CPR MEC t(s) 3.1 99.8 3.4 99.4 84.8 3.5 1.7 99.9 99.8 3.1 88.3 3.3 100 8 7.3 99.9 96.7 7 961.5 1868.5 3862.7 1354.9 2667.5 5488.2 2022.5 3986.5 7789 σ 0.1 0.3 8.6 0 0.4 11.5 0 0 1.8 0.05 0.1 0.2 0.05 0.1 0.2 0.05 0.1 0.2 Table 1: Simulated diploid biallelic data. ComHapDet 97 93.7 413.1 Err CPR MEC t(s) 0.002 98.6 76.7 93.8 662.1 81.2 0.01 97.1 1504.7 75.5 0.05 0.002 99.8 137.5 99.7 0.01 135.9 99.4 2021.9 139.8 0.05 124.6 99.9 300.4 0.002 611.1 99.9 0.01 307.9 2981.5 297.2 99.9 0.05 σ M-CPR CPR MEC 687 0.9 966.2 10.8 2887.4 1.6 0.17 1215.4 1029.1 0.2 3632.0 0.3 1725 0.1 0.1 1628.6 6721.3 0.2 99.5 97 98.9 99.9 99.9 99.8 99.9 99.9 99.9 89 88.7 80.1 83.7 92.7 92.7 89.9 96 87.4 Table 2: Simulated Triploid Tetraallelic Data. AltHap t(s) 295.2 289.8 332.1 593.2 592.7 592.4 708.5 781 713.3 σ M-CPR 14 17.5 20.2 20.7 14.6 14.6 16.1 9.82 20.4 93 92.4 86.3 88.4 95.4 95.4 94 97.6 92.1 AltHap 7 10 15 Cov 7 10 15 Cov Err 7 10 15 0.002 0.01 0.05 0.002 0.01 0.05 0.002 0.01 0.05 ComHapDet CPR MEC 80 79.1 68.3 98.9 99.1 98.2 99.8 99.8 99 t(s) 1316.3 143.5 1640.0 118.5 129.7 3722.8 193.1 253.3 585.9 261.8 2727.7 238.6 182.7 487.0 806.5 482.7 4101.4 523.8 σ 20.3 17.8 14 1.4 0.4 0.6 0.2 0.2 298.9 t(s) M-CPR CPR MEC 521.4 1388.6 1812.8 515.8 3481.9 503.1 594.3 1979.7 1779.4 585 667.5 5331.4 684.5 2614.6 684.1 3973.7 6397.6 682.5 76.1 79.9 83.6 71.9 85.4 78.6 85.2 83.5 95.1 91.8 91.8 87.3 99.6 99.8 99.5 99.9 99.9 99.7 σ M-CPR 20.8 20.5 20.2 15.5 18.5 15.6 18.4 17.4 14.5 87.5 88.1 92 85.6 92.1 89.7 92 92.6 97.4 Table 3: Simulated Tetraploid Tetraallelic Data. 4.1 Performance on Simulated Data We first test the performance of our algorithm in simulations for both the diploid biallelic case as well as the more challenging polyploid polyallelic case. Since the ground truth in simulations is known, we use CPR, MEC and M-CPR as the primary performance benchmarks. The CPR and 15 Cov Err 10 15 20 0.002 0.01 0.05 0.002 0.01 0.05 0.002 0.01 0.05 ComHapDet t(s) CPR MEC 78.9 551.1 2256.6 2250.4 84.1 563.2 526.3 48.8 9578.4 308.2 99.3 1295.6 1528.5 1359.1 97.4 94.7 6554.2 1207.5 382.8 99.5 2097.1 1654.3 2116.5 99.5 99.6 7912.8 2298.9 15.6 14 25.6 0.3 5.4 11.7 0.2 0.2 0.2 σ M-CPR CPR MEC 2022.9 3533.7 7440.7 4960.6 5493.4 13751.6 7095.1 5905.4 23381.8 76 70.4 75.8 70.4 77.7 65.9 77.1 87.3 65.1 94.1 95.8 81.9 99.9 99.4 98.7 99.9 99.9 99.9 AltHap t(s) 977.9 919.9 1222.1 1780.4 1624.6 2406.3 7561.2 6862.1 8563.4 σ M-CPR 20 19.9 17.9 25.2 23.2 19 19.3 18 24.5 90.6 86.8 90 87.3 89.9 87.2 91.9 96.1 86.9 Table 4: Simulated Hexaploid Tetraallelic Data. M-CPR are reported as percentages, for ease of presentation. We compare the performance over a range of problem parameters, namely the ploidy and alphabet size, as well as the measurement parameters, in particular the coverage, average read length and error rates. In each case, the hyper-parameters were set to A = 15 and B = 4. The parameter α = 0.95, for all polyploid cases and α = 0.85 in the diploid case. Recall that the parameter α allows one to control the trade-off between the run time and statistical accuracy; specifically, a lower value of α results in faster run times at the cost of reduced CPR. The column σ displays the standard deviation of CPR (after being multiplied by 100, for consistency). In each table and metric, the boldfaced entry represents the algorithm with the best performance for that entry. Simulated Data - Diploid Bialllelic Case In the diploid case, we rely on the synthetic paired-end read data used in [17]. The average length of the effective (i.e., haplotype-informative) paired-end read 4 with an insert gap in a paired end reads being uniformly sampled between 50 to 150. We use a haplotype length (m in our notation) of 700 in all case to be consistent with prior literature. As an example [23], which is often used to benchmark haplotype assembly methods. The results are reported in Table 1. We simulate 15 instances for each configuration of coverage and error probability and report the average in Table 1. We compare our methods against AltHap [17], a sparse tensor factorization method, and HPop [8], a state-of-the-art dynamic programming approach to haplotype assembly. Since for diplod case CPR and M-CPR are identical, we only report the CPR. We restrict our attention to these methods since it is already established in [17], [8], [28], that they are superior, both in terms of accuracy and run times, as compared to various other approaches including SDHaP [16], an approach inspired by semi-definite programming relaxations of the max-cut problem, BP [29], a communications system design inspired belief propagation algorithm, HapTree [30], an algorithm inspired by a Bayesian reformulation of the problem, and HapCompass [15], an algorithm focused on finding cycle basis in a graphical representation of the haplotype assembly problem. Simulated Data - Polyploid Polyallelic Case We report the results in Tables 2, 3 and 4 for the cases of triploid, tetraploid and hexaploid, respectively. In all cases, we considered the tetra-allelic case, i.e., the case of alphabets of size 16 Method MEC Score t(secs) ComHapDet AltHap HPoP HapCompass HapTree 17738 14580 10596 12497 46617 207 105 102 375 215 Table 5: The performance comparison of the various algorithms on the biallelic tetraploid Potato dataset 4, and the average length of the effective (i.e., haplotype-informative) paired-end read 4. The average insert size between the paired end reads was chosen to be 200 with a minimum gap of 50. The benchmarking algorithm we consider is that of [17], the state-of-the-art algorithm capable of polyploid polyallelic phasing; all other methods are restricted to biallelic variants. In each case, we test our algorithm on 10 different problem instances, where in each instance, a haplotype sequence of length 1000 was phased. We use the same method and the publicly available code from [17] to generate the synthetic data for the various instances. For the hexaploid case, we do not report performances on coverage smaller than 10, since the performance of both algorithms are poor. 4.2 Performance on Real Data Tetraploid Potato Data Set We test our algorithm on a tetraploid real data set of Chromosome 5 of Potato species Solanum Tuberosum, whose reference genome is available publicly 1. We considered a set of paired-end sequence reads reported in experiment SRX3284127 available in the NCBI database 2. We then mapped the reads to the reference genome using the BWA software of [31]. Subsequently, we use the FreeBayes software [32] for SNP calling and create the vcf file. We then extracted out connected components of reads and considered the haplotype assembly on instances that were at-least 20 haplotypes long. The data set of reads after SNP calling is available in the Github link provided in Abstract. We compare the performance of our algorithm with AltHap, HapCompass [33], HPoP [8] and HapTree [30], and report the results in Table 5. We use the recommended hyper parameters of A = 20, B = 5, α = 0.85 and the minimum problem size as 20. We chose these set of parameters to minimize run time, while at the same time ensuring that all reads in a data set are covered by at-least one community estimate. Table 5 compares MEC scores achieved by our method with those achieved by competing techniques. Note that the true accuracy is captured by the correct phasing rate but the ground truth data in this set is not available and thus CPR cannot be computed. While being a convenient surrogate metric, the MEC score may be misleading since e.g. a very low MEC score does not necessarily imply high CPR (see Table 1 of [17] for an illustrative example). Note that the task of tetraploid phasing presents a challenge to our scheme because the weight of an edge in the spatial graph (see Equation (3) is biased towards being positive, even if the reads on the end points of an edge originate from 1 http://ftp.ensemblgenomes.org/pub/plants/release-41/fasta/ solanum tuberosum/dna/ 2https://www.ncbi.nlm.nih.gov/Traces/study/?acc=SRP119957 17 different strings; this limits accuracy of assembly schemes that rely on read clustering. Finally, as illustrated by simulations, our methodology is suitable to settings where sequencing coverage exceeds ∼ 10× (both in diploid and polyploid setting). At the time of writing this paper we do not have access to data sets with coverage beyond 10× and thus do not perform further experiments on real data. 4.3 Results and Discussions The results indicate that our method is comparable to the state of the art, both in the diploid as well as the more challenging polyploid polyallelic scenario. In the diploid biallelic case, we see in Table 1 that our method performs comparable to both AltHap and HPoP in terms of reconstruction accuracy as measured by CPR and MEC scores. In the polyploid polyallelic scenario however, tables 2, 3 and 4 indicate that our algorithm is superior in terms of both CPR and MEC compared to the state of art, namely AltHap, which is the only methodology prior to our work that is capable of handling polyploid polyallelic data. In terms of experiment on a real data ployploid experiment, we see in Table 5, that our method performs comparably both in terms of reconstruction accuracy as measured by MEC score and runtime complexity as compared to other state of art methods. The results demonstrate that our methodology has significantly higher reconstruction at higher coverages as compared to lower coverages. This is unsurprising, as at higher coverages, there are more reads and hence more data to recover the haplotypes. Moreover, the runtime complexity of our method scales very gracefully with increasing coverage, making it attractive for many practical high coverage scenarios. 5 Conclusions In this paper, we propose a novel methodology to assemble both diploid and ployploid haplotypes. The main observation we make is that, by a spatial representation of the paired-end reads, we can effectively convert the problem about haplotype assembly into a community detection task on a spatial graph. Our algorithm assigns to each paired end read, a spatial label corresponding to the starting indices of the two read fragments. We then divide the problem into overlapping instances, each of which considers the set of reads located nearby in this embedding and performs a community clustering, where the community label of a read (node) is the haplotype from which it originates from. Finally, for each read, we take the majority of the estimated communities from the various instances as the final community estimate of that read. We then use this estimated community labels for the reads to output the reconstructed haplotype. Acknowledgements AS acknowledges numerous discussions with Abolfazel Hashemi and Ziqi Ke on this and related topics that helped in the conducting the numerical experiments. The authors also thank anonymous reviewers of ACM CNB MAC 2019, whose comments greatly helped shape the presentation. This work was funded in part by the NSF grant CCF 1618427 and a grant of the Simons foundation #197982 to The University of Texas at Austin. 18 References [1] Clark, A.G.: The role of haplotypes in candidate gene studies. Genetic Epidemiology: The Official Publication of the International Genetic Epidemiology Society 27(4), 321 -- 333 (2004) [2] Sabeti, P.C., Reich, D.E., Higgins, J.M., Levine, H.Z., Richter, D.J., Schaffner, S.F., Gabriel, S.B., Platko, J.V., Patterson, N.J., McDonald, G.J., et al.: Detecting recent positive selection in the human genome from haplotype structure. Nature 419(6909), 832 (2002) [3] Consortium, P.G.S., et al.: Genome sequence and analysis of the tuber crop potato. Nature 475(7355), 189 (2011) [4] Lancia, G., Bafna, V., Istrail, S., Lippert, R., Schwartz, R.: Snps problems, complexity, and algorithms. In: European Symposium on Algorithms, pp. 182 -- 193 (2001). Springer [5] Duitama, J., Huebsch, T., McEwen, G., Suk, E.-K., Hoehe, M.R.: Refhap: a reliable and fast algorithm for single individual haplotyping. In: Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, pp. 160 -- 169 (2010). ACM [6] Lippert, R., Schwartz, R., Lancia, G., Istrail, S.: Algorithmic strategies for the single nucleotide polymorphism haplotype assembly problem. Briefings in bioinformatics 3(1), 23 -- 31 (2002) [7] Bonizzoni, P., Dondi, R., Klau, G.W., Pirola, Y., Pisanti, N., Zaccaria, S.: On the minimum error correction problem for haplotype assembly in diploid and polyploid genomes. Journal of Computational Biology 23(9), 718 -- 736 (2016) [8] Xie, M., Wu, Q., Wang, J., Jiang, T.: H-pop and h-popg: Heuristic partitioning algorithms for single individual haplotyping of polyploids. Bioinformatics 32(24), 3735 -- 3744 (2016) [9] Pirola, Y., Zaccaria, S., Dondi, R., Klau, G.W., Pisanti, N., Bonizzoni, P.: Hapcol: accurate and memory-efficient haplotype assembly from long reads. Bioinformatics 32(11), 1610 -- 1617 (2015) [10] Kuleshov, V.: Probabilistic single-individual haplotyping. Bioinformatics 30(17), 379 -- 385 (2014) [11] Levy, S., Sutton, G., Ng, P.C., Feuk, L., Halpern, A.L., Walenz, B.P., Axelrod, N., Huang, J., Kirkness, E.F., Denisov, G., et al.: The diploid genome sequence of an individual human. PLoS biology 5(10), 254 (2007) [12] Bansal, V., Halpern, A.L., Axelrod, N., Bafna, V.: An mcmc algorithm for haplotype assembly from whole-genome sequence data. Genome research 18(8), 1336 -- 1346 (2008) [13] Kim, J.H., Waterman, M.S., Li, L.M.: Diploid genome reconstruction of ciona intestinalis and comparative analysis with ciona savignyi. Genome research 17(7), 000 -- 000 (2007) [14] Bansal, V., Bafna, V.: Hapcut: an efficient and accurate algorithm for the haplotype assembly problem. Bioinformatics 24(16), 153 -- 159 (2008) [15] Aguiar, D., Istrail, S.: Hapcompass: a fast cycle basis algorithm for accurate haplotype as- sembly of sequence data. Journal of Computational Biology 19(6), 577 -- 590 (2012) 19 [16] Das, S., Vikalo, H.: Sdhap: haplotype assembly for diploids and polyploids via semi-definite programming. BMC genomics 16(1), 260 (2015) [17] Hashemi, A., Zhu, B., Vikalo, H.: Sparse tensor decomposition for haplotype assembly of diploids and polyploids. BMC genomics 19(4), 191 (2018) [18] Cai, C., Sanghavi, S., Vikalo, H.: Structured low-rank matrix factorization for haplotype assembly. IEEE Journal of Selected Topics in Signal Processing 10(4), 647 -- 657 (2016) [19] Chaisson, M.J., Mukherjee, S., Kannan, S., Eichler, E.E.: Resolving multicopy duplications de novo using polyploid phasing. In: International Conference on Research in Computational Molecular Biology, pp. 117 -- 133 (2017). Springer [20] Sankararaman, A., Baccelli, F.: Community detection on euclidean random graphs. In: Pro- ceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 2181 -- 2200 (2018). SIAM [21] Chen, Z.-Z., Deng, F., Wang, L.: Exact algorithms for haplotype assembly from whole-genome sequence data. Bioinformatics 29(16), 1938 -- 1945 (2013) [22] He, D., Choi, A., Pipatsrisawat, K., Darwiche, A., Eskin, E.: Optimal algorithms for haplotype assembly from whole-genome sequence data. Bioinformatics 26(12), 183 -- 190 (2010) [23] Geraci, F.: A comparison of several algorithms for the single individual snp haplotyping re- construction problem. Bioinformatics 26(18), 2217 -- 2225 (2010) [24] Motazedi, E., de Ridder, D., Finkers, R., Baldwin, S., Thomson, S., Monaghan, K., Maliepaard, C.: Tripoly: haplotype estimation for polyploids using sequencing data of re- lated individuals. Bioinformatics (2018) [25] Chen, Y., Kamath, G., Suh, C., Tse, D.: Community recovery in graphs with locality. In: International Conference on Machine Learning, pp. 689 -- 698 (2016) [26] Abbe, E., Baccelli, F., Sankararaman, A.: Community detection on euclidean random graphs. arXiv preprint arXiv:1706.09942 (2017) [27] Arthur, D., Vassilvitskii, S.: k-means++: The advantages of careful seeding. In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1027 -- 1035 (2007). Society for Industrial and Applied Mathematics [28] Motazedi, E., Finkers, R., Maliepaard, C., de Ridder, D.: Exploiting next-generation sequenc- ing to solve the haplotyping puzzle in polyploids: a simulation study. Briefings in bioinformatics 19(3), 387 -- 403 (2017) [29] Puljiz, Z., Vikalo, H.: Decoding genetic variations: Communications-inspired haplotype assem- bly. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB) 13(3), 518 -- 530 (2016) [30] Berger, E., Yorukoglu, D., Peng, J., Berger, B.: Haptree: A novel bayesian framework for single individual polyplotyping using ngs data. PLoS computational biology 10(3), 1003502 (2014) 20 [31] Li, H.: Aligning sequence reads, clone sequences and assembly contigs with bwa-mem. arXiv preprint arXiv:1303.3997 (2013) [32] Garrison, E., Marth, G.: Haplotype-based variant detection from short-read sequencing. arXiv preprint arXiv:1207.3907 (2012) [33] Aguiar, D., Istrail, S.: Hapcompass: a fast cycle basis algorithm for accurate haplotype as- sembly of sequence data. Journal of Computational Biology 19(6), 577 -- 590 (2012) 21
1111.2092
1
1111
2011-11-09T03:22:16
Pushing Your Point of View: Behavioral Measures of Manipulation in Wikipedia
[ "cs.SI", "cs.LG" ]
As a major source for information on virtually any topic, Wikipedia serves an important role in public dissemination and consumption of knowledge. As a result, it presents tremendous potential for people to promulgate their own points of view; such efforts may be more subtle than typical vandalism. In this paper, we introduce new behavioral metrics to quantify the level of controversy associated with a particular user: a Controversy Score (C-Score) based on the amount of attention the user focuses on controversial pages, and a Clustered Controversy Score (CC-Score) that also takes into account topical clustering. We show that both these measures are useful for identifying people who try to "push" their points of view, by showing that they are good predictors of which editors get blocked. The metrics can be used to triage potential POV pushers. We apply this idea to a dataset of users who requested promotion to administrator status and easily identify some editors who significantly changed their behavior upon becoming administrators. At the same time, such behavior is not rampant. Those who are promoted to administrator status tend to have more stable behavior than comparable groups of prolific editors. This suggests that the Adminship process works well, and that the Wikipedia community is not overwhelmed by users who become administrators to promote their own points of view.
cs.SI
cs
Pushing Your Point of View: Behavioral Measures of Manipulation in Wikipedia Sanmay Das, Allen Lavoie, and Malik Magdon-Ismail Dept. of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 April 17, 2018 Abstract As a major source for information on virtually any topic, Wikipedia serves an important role in public dissemination and consumption of knowledge. As a result, it presents tremen- dous potential for people to promulgate their own points of view; such efforts may be more subtle than typical vandalism. In this paper, we introduce new behavioral metrics to quantify the level of controversy associated with a particular user: a Controversy Score (C-Score) based on the amount of attention the user focuses on controversial pages, and a Clustered Contro- versy Score (CC-Score) that also takes into account topical clustering. We show that both these measures are useful for identifying people who try to "push" their points of view, by showing that they are good predictors of which editors get blocked. The metrics can be used to triage potential POV pushers. We apply this idea to a dataset of users who requested promotion to administrator status and easily identify some editors who significantly changed their behav- ior upon becoming administrators. At the same time, such behavior is not rampant. Those who are promoted to administrator status tend to have more stable behavior than comparable groups of prolific editors. This suggests that the Adminship process works well, and that the Wikipedia community is not overwhelmed by users who become administrators to promote their own points of view. 1 Introduction Wikipedia has become a one-stop source for information on nearly any subject. In aggregate, it has the power to broadly influence public perceptions. Wikipedia's ubiquity creates strong in- centives for biased editing, attracting editors with strong opinions on controversial topics. At the same time, Wikipedia is self-policing, and over time the Wikipedia community has formulated a comprehensive set of policies to prevent editors from "pushing" their own points of view on the readership ("POV pushing"). Most policing takes the form of users editing or reverting disputed content, while persistent violations are brought to the attention of administrators. A responding administrator has the power to temporarily protect pages from being edited, and to block users from editing. POV pushing is not considered vandalism on Wikipedia, the latter term being re- served for blatantly ill-intentioned edits. 1 While there has been a lot of attention paid to the problems of vandalism and maintenance on Wikipedia, there has been little systematic, quantitative investigation of the phenomenon of POV pushing. Nevertheless, anecdotal evidence suggests that it is a serious issue. For example, in April 2008 a pro-Palestinian online publication called Electronic Intifada released messages from the pro-Israel media watchdog group CAMERA (the Committee for Accuracy in Middle East Reporting in America) that asked for volunteers to help "keep Israel related entries ... from becoming tainted by anti-Israel editors." The messages also contained blueprints explaining how members could become Wikipedia administrators, and then use their power to further the goals of the organization [1]. In 2006, there was a significant controversy surrounding edits to Wikipedia pages of prominent U.S. politicians, made by their own staff.1 To further illustrate the importance of the problem, in an interview with Alex Beam of the Boston Globe, Gilead Ini, who initiated the CAMERA campaign, said "[Wikipedia] may be the most influential source of information in the world today, and we and many others think it is broken" [2]. But another quote from Ini highlights the difficulty of confronting these issues, "Wikipedia is a madhouse. We were making a good-faith effort to ensure accuracy." Indeed, Wikipedia poli- cies typically assume good faith. The policy on vandalism states "Even if misguided, willfully against consensus, or disruptive, any good-faith effort to improve the encyclopedia is not vandal- ism. Edit warring over content is not vandalism."2 In addition to the difficulty of arguing against good faith when editors may simply be attempting to disseminate strongly held beliefs, even more subtle forms of manipulation can achieve a similar outcome. For example, a manipulative admin- istrator may enforce Wikipedia's Neutral Point Of View (NPOV) guidelines selectively, reverting only edits that take a particular point of view. Hypothetically, a manipulative admin with a con- servative viewpoint may revert all edits that seem to push a liberal viewpoint, while leaving those that push a conservative viewpoint untouched (or vice versa for a manipulative liberal admin). While there is nothing technically "wrong" with this, it can significantly affect the information on pages. It is worth noting that even if there is attempted manipulation on sensitive pages, it is restricted to a relatively small fraction of Wikipedia. Most pages are more "encyclopaedic" in nature (for example, pages on mathematics or on algorithms), and generate less controversy than pages that deal with current events or ideologies. All of this cries out for a useful algorithmic method of detecting potential POV pushing behav- ior, and quantitative metrics that can provide evidence and allow us to examine the behavior of such users in more detail. In this paper we present two such metrics and then use them to examine the behavior of the population of administrators. The first metric, the Controversy Score ("C-Score"), measures the proportion of energy an ed- itor spends on controversial pages. It works by first assigning a controversy score to each page. This score is based on factors that have been identified as well-correlated with controversy, in- cluding the number of revisions to an article's talk page, the fraction of minor edits on the talk page, and the number of times it has been protected [8]. It is independent of language or content, and therefore easily generalizable. An editor's C-Score is then the mean of the controversy scores of the pages she edits, weighted by the proportion of her editing attention she focuses on those pages. While the C-Score is a useful measure, it does not account for the topical clustering of a user's 1http://en.wikipedia.org/wiki/Congressional_Staffer_Edits retrieved 11/4/2011. 2 http://en.wikipedia.org/wiki/Wikipedia:Vandalism retrieved 11/4/2011. 2 edits. This is particularly important when we use these scores to assess the behavior of adminis- trators, because administrators' responsibilities imply that they will spend more time on contro- versial pages in general. However, we would expect users who have strong opinions on a topic to push their POV especially in pages related to that topic, rather than broadly across many different controversial topics. Consider two editors A and B, with 100 edits each. They each have 25 edits on the article about the U.S. Republican party. Editor A's remaining edits are about Republican legislators and Republican sponsored legislation from the past 10 years, while B's are divided be- tween the IRA, the Catholic Church, and Jimmy Wales. All of B's edits are controversial, but only some of A's edits are. While B has more controversial edits, we would intuitively consider A to be more suspicious. To deal with editors of this form, we introduce the Clustered Controversy Score ("CC-Score"), which takes into account the similarity among different pages that a user has edited, in addition to how controversial those pages are. We expect the CC-Score to be particularly useful for triage, as it is designed to be a high recall measure: it flags potentially manipulative users, who focus their attention on specific topic areas that include controversial topics. Of course, some users who have editing patterns of this form may be acting in good faith and just have deep interests in that topic. Both the C-Score and the CC-score are behavioral. They do not rely in any way on the specific text of edits, only on the patterns of editing and interaction between editors. We demonstrate the validity of the two scores by showing that they have predictive power in discriminating between heavy editors who were blocked and equally heavy editors who were not. Having validated them on an exogenous measure, we then apply these measures in order to analyze the behavior of administrators. We compare the editing patterns of administrators who score highly on the C-Score and the CC-Score. The CC-Score identifies administrators who would not have been identified by the simple C-Score, because only some of the major pages on the topics they edit are highly controversial. These administrators also edit a long tail of related pages, thus influencing public perception of the topic at large. Finally, we use the CC-Score to test whether or not admins are behaving in a truly manipulative manner: first becoming trusted and attaining promotion to admin status, and then using this trusted status to push their points of view in particular domains. To do so, we look at changes in CC-score before and after the editor stood for promotion (the Request for Adminship, or "RfA" process). While we find several instances of potentially suspicious changes of focus, we also note that the overall behavior of the population of editors who become admins is better than that of two comparable populations: (1) those who stood for election but failed; and (2) those who edited prolifically but never stood for election to administrator status. The population behavior is better in the sense that the variance of changes in the CC-Score pre- and post-RfA is lower, indicating that those who fail in their RfAs actually change their behavior more significantly. Thus, Wikipedia admins as a population do not misrepresent themselves in order to gain their trusted status. 1.1 Contributions We introduce two new behavioral measures that indicate whether or not a user is trying to push his or her point of view on Wikipedia pages. These measures have predictive power on historical data: they can determine which users were blocked for disputes related to controversial editing. We anticipate that these measures can be used for auditing or triage: they can flag potentially suspicious behavior automatically for more detailed human investigation. The measures are be- 3 havioral and general, and do not rely on specifics of text edited by users, and are thus applicable beyond Wikipedia. We then show how these measures can be used to discover interesting changes in behavior, fo- cusing on the behavioral changes of editors who applied for promotion to administrator status on Wikipedia. While there are instances of suspicious looking changes in behavior upon promotion to administrator status, we find that at the population-level, Wikipedia editors are in fact better behaved than the population of prolific editors, in the sense that their behavior is more stable, and does not change significantly upon promotion. While there are specific instances that seem suspi- cious, our evidence suggests that the Wikipedia adminship process works well at the population level: there is no evidence that editors are in general seeking promotion to adminship so they can "push" their point of view on the larger population. 2 Related work There is a large literature on many different aspects of Wikipedia as a collaborative community. It is now well-established that Wikipedia articles are high quality [5] and very popular on the Web [12]. The dynamics of how articles become high quality and how information grows in collective media like Wikipedia have also garnered some attention [14, 4]. While there has not been much work on how Wikipedia itself influences public opinion on particular topics, it is not hard to draw the analogy with search engines like Google, which have the power to direct a huge portion of the focus of public attention to specific pages. Hindman et al discuss how this can lead to a few highly ranked sites coming to dominate political discussion on the Web [6]. Subsequent research shows that the combination of what users search for and what Google directs them to may lead to more of a "Googlocracy" than the "Googlearchy" of Hindman et al [10]. Our work in this paper draws directly on three major streams of literature related to Wikipedia. These are, work on conflict and controversy, automatic vandalism detection, and the process of promotion to adminship status on Wikipedia. There is a significant body of work characterizing conflict on Wikipedia. Kittur et al introduce new tools for studying conflict and coordination costs in Wikipedia [8]. Vuong et al characterize controversial pages using both disputes on a page and the relationships between articles and con- tributors [13]. We use the measures identified by Kittur et al and Vuong et al as a starting point for measuring the controversy level associated with a page. This then feeds into our user-level C-Score and CC-Score measures. Our results on the blocked users dataset serve as corroborating evidence for the usefulness of these previously identified measures. Automatic vandalism detection has been a topic of interest from both the engineering perspec- tive (many bots on Wikipedia automatically find and revert vandalism), as well as from a scientific perspective. Smets et al report that existing bots, while useful, are "far from optimal", and report on the results of a machine learning approach for attempting to identify vandalism [11]. They conclude that this is a very difficult problem to solve without incorporating semantic information. While we touch on vandalism in dealing with blocked users, we are focused on "POV pushing" by extremely active users who are unlikely to engage in petty vandalism, which is the focus of most work on automated vandalism detection. Wikipedia administrator selection is an independently interesting social process. Burke and Kraut study this process in detail and build a model for which candidates will be successful once they choose to stand for promotion and go through the Request for Adminship (RfA) process 4 [3]. The dataset of users who stand for promotion is useful because it allows us to compare both previous and later behavior of users who were successful and became admins and those who did not. Finally, we use a similarity metric for articles based on editors which is similar to existing work on expert-based similarity [9]. 3 Methodology We begin by discussing our methodology in computing the "simple" Controversy Score for each user, and then describe how we can compute a Clustered Controversy Score that captures editors who focus on articles related to a single, controversial topic. All data is from an April 2011 database dump of the English Wikipedia. The term "article" refers to a page in Wikipedia's article namespace along with any pages in the article talk names- pace with the same name, unless otherwise specified. 3.1 Controversy Score We define the C-Score for a user as an edit-proportion-weighted average of the level of controversy of each page. The controversy of a page (loosely following the article-level conflict model of Kittur et al [8]) is based on the number of revisions to an article's talk page, the fraction of minor edits on an article's talk page, and the number of times a page is "protected", where editing by new or anonymous users is limited. We scale and shift each of the three quantities above such that their 5th and 95th percentiles are equal, then take the mean. Next, we transform this number such that the lowest values are at -5 and 1% of articles have scores above 0. Finally, the scores are transformed using the logistic function 1/(1 + e−t). This produces a controversy score ck ∈ [0, 1] for each page. One alternative to manual tuning is logistic regression, where a model is trained on a data set reflecting some notion of controversy. Let pk be the fraction of a user's edits on page k. The controversy score for a user is then an edit-weighted average of the page-level controversy scores: (cid:88) C − Score = pkck (1) k We would expect this measure to be effective at finding users who edit controversial pages. However, many Wikipedia users dedicate at least part of their time to removing blatant vandalism, which occurs disproportionally on controversial pages. Thus we turn to a measure that combines topical clustering with controversy. 3.2 Clustered Controversy Score We work from the hypothesis that users who concentrate their edits have some vested interest in those articles. Going back to the example in the Introduction, we would like to be able to detect users like A, who focuses almost entirely on Republican politics. While A's edits include some controversial pages, B fights vandalism broadly, and so has exclusively controversial edits. B has 5 the same number of edits to the article on the U.S. Republican Party as A, but the rest of B's edits are scattered across other topics. A's edits to this article are interesting; they are topically related to A's other edits. At the same time, edits to this article by editor B are far less interesting. We would like to incorporate a measure of topical edit concentration into the C-Score. In order to do so, we could define topics globally, but this is both expensive and sensitive to parameter changes: what is the correct granularity for a topic? Instead, we focus on a local measure of topical concentration. Given a similarity metric between articles, we can measure the extent to which a user's edits are clustered. Page similarity We base our score on a generalization of the clustering coefficient to weighted networks with edge weights between 0 and 1 [7]. Several natural measures of page similarity have values in this rage. We consider pages which link to (or are linked from) the same pages as similar, pages edited by the same users as similar, and pages in the same categories as similar. Each page has a set of incoming links I, outgoing links Θ, users U, and categories Γ associated with it. To determine how similar two pages are based on one of these sets, we divide the cardinality of the intersection of the sets from each page by the cardinality of their union (the Jaccard coefficient). To compute a single similarity score between two pages i and j, we take an average of scores for each type of set, giving equal weight to links, users, and categories. The similarity score wij is then: wij = Ii ∩ Ij Ii ∪ Ij + 1 6 Θi ∩ Θj Θi ∪ Θj + Ui ∩ Uj Ui ∪ Uj + 1 3 Γi ∩ Γj Γi ∪ Γj 1 3 1 6 (2) Computing the CC-Score Consider a set of edits from a user. Let N be the number of unique pages in this set and wij be the similarity score between pages i and j. We start with a generaliza- tion of the clustering coefficient [7]. For a page k, define: (cid:80)N (cid:80)N i=1 (cid:80)N (cid:80)N i=1 j=1 wkiwkjwij j=1 wkiwkj clust(k) = (3) The clustering coefficient will be higher when other pages in the edit set are related to k and to each other. When computing the CC-Score for the entire edit set, there are two other factors we would like to consider: how much a user concentrated on any given page, and how controversial that page is. Let pk be the proportion of edits on page k, and ck be some measure of controversy. Then we have the following coefficient for the edit set: N(cid:88) k=1 CC − Score = Since(cid:80)N pkckclust(k) (4) k=1 pk = 1, (4) is a weighted average. If ck ∈ [0, 1], then so is (4). Pushing raw contro- versy scores through a sigmoid to produce ck ensures that this condition holds, and also prevents outliers from unduly affecting the final score. There is no reason that ck must be a measure of controversy. Instead, it can measure any prop- erty of a page which is of interest. For example, a ck measuring how much a page relates to global warming would yield a ranking of editors based on the extent to which their edits concentrate 6 on global warming. The CC-Score is a general tool for ranking single-topic contributors based on some property of that topic. We also compute a raw Clustering Score where each page has the same ck – this yields a measure of topical clustering independent of any properties of the particular pages. We choose a measure that combines clustering and controversy page-wise rather than user- wise so that we do not end up with editors who are very topically focused on uncontroversial pages (say Flamingos), but also spend a significant fraction of their time combating vandalism broadly across a spectrum of topics. We also note that the only Wikipedia-specific contributions to the CC-Score are encapsulated in the computation of ck and wij. The same quantities can be computed for a wide variety of collaborative networks. Consider email messages: wij between two threads could be based on senders and recipients, and ck based on the length of the thread as a measure of controversy. These quantities are entirely language independent, although we might make use of natural language processing to improve estimates of both similarity and controversy. 4 Evaluation We evaluate our metrics in several different ways. First, to establish their validity, we examine whether the metrics provide discriminatory power in identifying potentially manipulative users. In order to do so, we need an independent measure of manipulation, so we focus on users that were blocked from editing on Wikipedia, and compare them with a similar set who were not blocked. One of the goals of our work is to provide an objective metric for analyzing adminis- trators, who have gained significant status in Wikipedia. We present some detail on the editing habits of the admins who score highest on our metrics. In doing so, we also use our metrics to provide fresh insight into what is controversial on Wikipedia, by analyzing the topic distribution of edits amongst admins with high CC-Scores. A reasonable hypothesis, suggested by the CAMERA messages discussed in Section 1 is that people who wish to seriously push their points of view on Wikipedia may try to become admins by editing innocuously, and then changing their behavior once they become admins. In order to examine this hypothesis, we look at the behavior of admins whose CC-Scores changed signifi- cantly, as well as at the distribution of changes in the CC-Score. 4.1 Blocked users Users can be blocked from Wikipedia for a variety of reasons. Reasons for blocks include blatant vandalism (erasing the content of a page), editorial disputes (repeatedly reverting another user's edits), threats, and more. Many blocks are of new or anonymous editors for blatant vandalism; we are not interested in these blocks. We are interested in blocks stemming from content disputes. While editors are not directly blocked for contributing to controversial articles, controversy on Wikipedia is often accompanied by "edit warring", where two or more editors with mutually exclusive goals repeatedly make changes to a page (e.g., one editor thinks the article on Sean Hannity should be low priority for WikiProject Conservatism, and another thinks it should be high priority). We examine a set of users who were active between January 2010 and April 2011. For blocked users, we use 180 days of data, directly before the block. For the users who were never blocked, 7 Figure 1: ROC curve for CC, Controversy, and Clustering Scores when differentiating between blocked and not-blocked users, based on 180 days of data. The CC and Controversy Scores effec- tively discriminate between these classes, whereas the Clustering Score does not. the 180 days ends on one of their edits chosen randomly. In order to filter out new or infre- quent editors, we only consider users with between 500 and 1000 edits during this 180 day period. The upper bound removes users who do significant amounts of automated editing; it is not un- common for such accounts to be blocked for misbehaving scripts which have nothing to do with controversy. By examining only exceptionally active users, we eliminate most petty reasons for blocks; users who have made hundreds of legitimate contributions are unlikely to start blanking pages. After the filtering, we are left with 178 blocked users and 236 who were never blocked. Figure 1 shows the performance of the CC, Controversy, and Clustering Scores when discrim- inating between the blocked users and users who were never blocked. Both the CC- and C-Scores show significant discriminative power, while Clustering alone is no better than guessing. The performance of the CC- and C-Scores on the blocked users data set validates both mea- sures for detecting users who make controversial contributions to Wikipedia. Many blocks in this data set involve violations of Wikipedia's "3 Revert Rule", limiting the number of contributions which an editor can revert on a single page during any 24 hour period, which implies that editors are not only making controversial changes but are vigorously defending them. This rule is not automatically enforced and does not apply to blatant vandalism; instead, another user must post a complaint which is then reviewed by an administrator. It is certainly possible to edit controver- sial pages while following the rules closely and never getting blocked, and likewise some blocks of active users have nothing to do with controversy (rogue scripts, for example). All else being equal, we expect more controversial editors to be blocked more frequently. The discriminative power of the CC- and C-Scores provides strong evidence that these scores are correctly detecting 8 0.00.20.40.60.81.0FPR0.00.20.40.60.81.0TPRBlock ROCCC (AUC=0.689)Controversy (AUC=0.681)Clustering (AUC=0.492) controversial editors. 4.2 Highest scoring admins We now turn to examining the behavior of admins through the lens of the Controversy and CC- Scores. Where do admins focus their attention, and what is controversial on Wikipedia? To explore this issue, we use human evaluations of the edit history of administrators during the 180 days after they became an administrator. Without knowing anything about the CC, Controversy, or Clustering Scores associated with the edit history, a reviewer analyzed the top 50 pages edited by a user and decided which general category, if any, the edits were in. Results for the top and bottom 100 administrators ranked by each score are presented in Figure 2. Figure 2 is useful validation for our methodology: for example, administrators with very low CC-Scores were often classified as not editing in a coherent general category. Conversely, users with a high CC-Score were much more likely to be topically focused. This effect is even more apparent for the raw Clustering Score, with 73% of the bottom 100 admins classified as topically unfocused. This implies that our article similarity metric corresponds with an intuitive notion of topical similarity. There are some interesting differences in the topic areas of the 100 admins with the highest C-Scores and the 100 with the highest CC-Scores. As expected, the C-Score picks up a substantial chunk of editors with no particular focus, while the CC score does not. These are admins who are doing their job of "policing" controversy across a broad spectrum of topics. Surprisingly, the C-Score picks up more politically focused editors while the CC-Score picks up many more who focus on media and entertainment. Specific examples help to elucidate this effect. Table 1 shows the top 6 administrators by CC and C-Score respectively for the 180 day period immediately following their promotion (success- ful RfA). The CC-Score picks up three media-focused editors while the C-Score does not. These editors focus on a specific media franchise (a TV show, for example), editing on this topic almost exclusively. The long tail of edits for media-focused users often includes non-controversial articles related to the same media franchise, for example articles on minor characters. This comprehensive long tail means that the page-level clustering score for pages related to the media franchise is very high, including the main pages related to the franchise; these main pages tend to be quite con- troversial. This combination of controversy and clustering contributes significantly to the user's overall CC-Score, while the long tail of less controversial articles moderates the C-Score. We note that all the users with very high C-Scores also have very high CC-Scores (falling at least in the 96th and typically in the 99th percentile of CC-Score). However, the converse is not true, because of the properties of the CC-Score described above. For example Admins 3, 4, and 5 in particular are relatively low in C-Score. Admin 5 is media-focused. Admin 4 has a high CC-Score despite editing topically unrelated pages; yet the similarity scores between them are high. This user focuses on disambiguation pages, all of which share common categories, and many of which are maintained by the same users. Major disambiguation pages also turn out to be fairly controversial, being of interest to editors contributing to any of the pages they link to. This combination of a long tail of "related" disambiguation pages with controversial major disambiguation pages leads to a high CC-Score, just as it did for media. As with media, the CC- Score highlights a real phenomenon on Wikipedia: WikiProject Disambiguation, of which this user is a member, consists of users who focus their efforts on disambiguation pages. Thus the CC-Score 9 Figure 2: Human evaluation of the general category of edits (if any) for administrators directly after their RfA. The 100 highest and 100 lowest scoring administrators for each metric are shown; because of overlap, 286 administrators are represented in total. Many users with a high CC-Score are topically focused, and the CC-Score finds many more media-focused users than the C-Score. 10 None20%Geography5%History8%Media8%Politics24%Religion15%Sci.&tech.14%Sports2%Other3%Top controversyNone8%Geography6%History5%Media22%Politics14%Religion15%Sci.&tech.15%Sports4%Other11%Top CCNone26%Geography17%History10%Media11%Politics7%Religion1%Sci.&tech.12%Sports10%Other5%Bottom controversyNone44%Geography12%History9%Media10%Politics3%Religion2%Sci.&tech.5%Sports7%Other7%Bottom CC is finding exactly single-topic editors of controversial pages, even if their topic is rather specific to Wikipedia. The story with Admin 3 is similar to Admins 4 and 5, in that this editor also edits a long tail of uncontroversial articles. Qualitatively, it is useful that the CC-Score is picking up different people than the simple C-Score, and sometimes turning up surprises – this is exactly the kind of behavior one would want to pick up on, and it may give the CC-Score an advantage over the simple C-Score in terms of detecting subtle manipulation. We note that in this paper we are agnostic to what makes a page or a topic controversial, which reveals much of interest about Wikipedia, but at the same time our methods are completely gen- eral – specifically, we expect they would work well with any measure of controversy, and so the techniques can easily be adapted to domain-specific needs. For example, to focus on more tradi- tionally controversial single-topic editors, we might consider a modification of the page-level con- troversy score which ignores controversy on media-related pages. More generally, the page-level controversy score can give preference to any topic; it does not need to be related to controversy at all. For example, we could find single-topic editors interested in a specific country. 4.3 Distribution of CC changes While it is interesting to find editors focused on a single, controversial topic, it is not surprising that such editors exist; Wikipedia certainly needs domain experts even on controversial topics. Sudden changes in behavior, especially increases in the topical concentration or the controversial nature of edits, are more surprising; especially so when some level of community trust is involved, as with administrators. In particular, an editor changing behavior dramatically shortly after be- coming an admin is suspicious. The RfA process Standing for promotion to adminship on Wikipedia is an involved process.3 An editor who stands for, or is nominated for adminship must undergo a week of public scrutiny which allows the community to build consensus about whether or not the candidate should be promoted. A special page is set up on which the candidate makes a nomination statement about why she or he should be promoted, based on detailed evidence from their history of contributions to Wikipedia. Other users can then weigh in and comment on the case, and typically a large volume of support (above 75% of commenters) as well as solid supporting statements from other editors are necessary for high-level Wikipedia "bureaucrats" to approve the application. Burke and Kraut provide many further details on this process [3]. Wikipedia policies call for nominees to demonstrate a strong edit history, varied experience, adherence to Wikipedia policies on points of view and consensus, as well as demonstration of willingness to help with tasks that admins are expected to do, like building consensus. Burke and Kraut note that the actual value of some of these may be mixed: participating in seemingly controversial tasks like fighting vandalism or requesting admin intervention on a page before becoming an admin actually seems to hurt the chances of success. Overall, the Wikipedia community devotes significant effort to the RfA process, and there is a lot of human attention focused on making sure that those who become admins are worthy of the community's trust. Now we turn to examining some cases where the behavior of an editor changed significantly right after they became an admin. 3http://en.wikipedia.org/wiki/Wikipedia:Rfa 11 Admin1 Admin2 Admin3 CC 100.0% Clust. 96.4% Cont. 99.9% CC 99.9% Clust. 97.4% Cont. 95.7% CC 99.9% Clust. 98.8% Cont. 76.6% Title Jehovah's Witnesses Salt Tony Blair Joseph Franklin Ruther- ford Robby Gordon Leet Jehovah's Witnesses and congregational discipline Wavelength biguation) Charles Taze Russell (disam- Admin4 Edit% Cont. 63.9% 100.0% 6.6% 99.7% 1.6% 100.0% 1.6% 99.7% 1.6% 96.4% 1.6% 100.0% 99.5% 1.6% 1.6% 0.0% 1.6% 100.0% Title Sailor Venus Sailor Moon (character) Sailor Mercury List of minor Sailor Moon characters List of Sailor Moon episodes The Church of Christ Saints Sailor Starlights Sailor Jupiter Sailor Moon Jesus of Latter-day Admin5 Edit% 4.2% 4.0% 3.7% 3.1% Cont. 99.7% 99.9% 99.8% 99.7% 3.0% 99.8% 2.7% 100.0% 99.6% 2.7% 99.6% 2.6% 2.6% 100.0% CC 99.8% Clust. 99.9% Cont. 37.9% CC 99.8% Clust. 99.3% Cont. 72.3% CC 99.7% Clust. 95.1% Cont. 83.5% Title Global city List of school pranks Scholars for 9/11 Truth Pi 9/11 Truth movement Christopher Langan Hubbert peak theory Stephen Barrett Prime number Cont. Edit% 99.9% 2.8% 99.7% 2.6% 2.0% 99.9% 1.9% 100.0% 1.8% 100.0% 1.8% 99.9% 1.8% 100.0% 1.6% 100.0% 1.2% 99.9% Admin6 Title Big Brother 2007 (UK) List of Big Brother 2007 housemates (UK) Ionic bond Big Brother (UK) Big Brother 8 (U.S.) Big Brother X Big Brother 2006 (UK) Big Brother (TV series) Big Brother 2004 (UK) Edit% Cont. 17.6% 100.0% 6.7% 98.9% 98.4% 6.1% 3.0% 99.9% 2.4% 100.0% 2.4% 38.8% 2.4% 100.0% 99.8% 2.4% 2.4% 99.6% Title 1948 Palestinian exodus Yasser Arafat Israeli West Bank bar- rier Israeli settlement Hebron Second Intifada Gaza Strip Palestinian territories Palestinian people Edit% Cont. 6.8% 100.0% 6.3% 100.0% 4.9% 100.0% 4.9% 100.0% 4.6% 100.0% 3.2% 100.0% 3.2% 99.9% 2.9% 100.0% 2.9% 100.0% Title Yasser Arafat Estimates of the Pales- tinian Refugee flight of 1948 Israel ArabIsraeli conflict Ariel Sharon Jews Antisemitism Muhammad al-Durrah incident Second Intifada Edit% Cont. 5.2% 100.0% 99.6% 2.7% 2.2% 100.0% 2.0% 100.0% 1.8% 100.0% 1.8% 100.0% 1.5% 100.0% 1.5% 100.0% 1.5% 100.0% Admin7 Admin8 Admin9 CC 100.0% Clust. 96.4% Cont. 99.9% CC 99.6% Clust. 89.6% Cont. 99.8% CC 99.5% Clust. 87.5% Cont. 99.8% (disam- Title Matrix Apartheid biguation) ETA (disambiguation) Gemini Solo XXX X Games FAST Fame Edit% Cont. 5.4% 96.5% 3.5% 99.8% 3.5% 99.4% 3.1% 92.8% 3.1% 59.0% 3.1% 96.8% 2.7% 96.9% 2.3% 39.2% 2.3% 74.7% Title Jehovah's Witnesses Salt Tony Blair Joseph Franklin Ruther- ford Robby Gordon Leet Jehovah's Witnesses and congregational discipline Wavelength biguation) Charles Taze Russell (disam- Edit% Cont. 63.9% 100.0% 6.6% 99.7% 1.6% 100.0% 99.7% 1.6% 1.6% 96.4% 1.6% 100.0% 1.6% 99.5% 1.6% 0.0% 1.6% 100.0% Title Meet Kevin Johnson The Other Woman Lost (season 4) Lost (season 5) List of Heroes episodes Martin Keamy The Shape of Things to Come (Lost) Through the Looking Glass (Lost) There's No Place Like Home Title Global warming Global warming contro- versy Electronic voice phe- nomenon An Inconvenient Truth Greenhouse effect American Enterprise In- stitute The Warming Swindle List scientists opposing the mainstream sci- entific assessment of global warming The Beatles Global Great Title Rick Reilly Keith Olbermann Lara Logan Treaty of Tripoli Glenn Greenwald Eli Whitney, Jr. Michael J. Fox Newton's laws of mo- tion William Connolley Edit% Cont. 10.0% 99.6% 6.4% 100.0% 99.9% 5.5% 99.9% 4.5% 99.9% 3.6% 3.6% 99.3% 99.8% 3.6% 3.6% 99.9% 2.7% 100.0% Title Abortion University of Michigan Jesus Islamofascism NARAL America Intelligent design Saint Joseph C. S. Lewis God Pro-Choice Edit% Cont. 14.7% 98.8% 10.1% 97.8% 7.2% 99.6% 6.8% 99.3% 6.2% 99.9% 5.3% 96.9% 4.0% 98.3% 1.8% 99.6% 1.7% 98.0% Edit% Cont. 9.7% 100.0% 5.6% 100.0% 3.6% 100.0% 3.3% 100.0% 3.0% 100.0% 2.9% 99.8% 2.8% 100.0% 2.8% 100.0% 2.6% 100.0% Edit% Cont. 36.6% 100.0% 5.5% 99.9% 3.4% 100.0% 2.8% 100.0% 2.8% 99.0% 2.8% 100.0% 2.1% 99.9% 2.1% 100.0% 1.4% 100.0% Admin10 Admin11 Admin12 CC 96.3% Clust. 52.1% Cont. 99.7% CC 96.9% Clust. 59.6% Cont. 99.6% CC 97.7% Clust. 69.3% Cont. 99.6% Table 1: The most edited articles by the administrators with the highest CC-Scores (top 6) and high- est C-Scores (bottom 6) during the 180 days after they became an admin. Each article is annotated with the percentile of its article-level controversy score and the percentage of the administrator's edits which were to that article. On top of each table are the percentiles for the CC, Clustering, and C-Scores of the administrator during the same period. 12 Admin 1: Rank 1 Admin 2: Rank 3 Admin 3: Rank 5 Admin 4: Rank 9 Before RfA Je- Wit- Wit- Jeho- Article Jehovah's nesses Eschatology of hovah's Witnesses Jehovah's nesses practices Organizational structure of vah's Witnesses Criticism of vah's Witnesses History vah's Witnesses Christianity re- Controversies garding Jehovah's Witnesses Beliefs and prac- tices of Jehovah's Witnesses Jeho- Jeho- of Before RfA bat- energy Article Rechargeable tery Flywheel storage Ethanol fuel Imaginary color Mensural notation Noise pollution Pay it forward TamilNet CIE space 1931 color Edit% 48.5% 3.8% 2.1% 1.6% 1.5% 1.4% 1.3% 1.1% 0.8% Edit% 8.0% 6.5% 3.0% 3.0% 2.7% 2.5% 2.1% 1.8% 1.6% After RfA and Wit- Jeho- Wit- the Article Jehovah's nesses Jehovah's nesses United Nations Criticism of vah's Witnesses Salt Jehovah's Wit- nesses and congre- gational discipline Eschatology of hovah's Witnesses Blue link Brendan Loy Charles Taze Rus- sell Je- After RfA Article Buddhahood Sri Lanka and state terrorism Premier of the Re- public of China Sri Lankan Tamil militant groups Outpost for Hope Sri Lanka Armed Forces Liberation Tigers of Tamil Eelam Esperanto List of attacks at- tributed to the LTTE Edit% 62.1% 6.8% 4.9% 3.9% 2.9% 1.9% 1.0% 1.0% 1.0% Edit% 13.2% 3.9% 3.0% 2.8% 2.6% 2.6% 2.1% 1.4% 1.4% Before RfA physical Article Chiropractic Extreme information Prime number Normal number Axiom of choice Year 10,000 prob- lem Difference operator Kenny Rogers Roasters Selector calculus Before RfA Solution Article Biman Bangladesh Airlines Fatimah First Money Transfer 72 Virgins 2007 Bangladesh cartoon controversy Ramadan Royal Bengal Air- line Criticism of Qur'an Air Sylhet the Edit% 6.5% 3.6% 3.4% 3.2% 3.1% 2.2% 2.0% 1.7% 1.7% Edit% 8.4% 6.3% 3.0% 1.8% 1.3% 1.2% 1.2% 1.2% 1.1% After RfA Lan- for 9/11 Article Global city Christopher gan Stephen Barrett Scholars Truth List pranks The National Coun- cil Against Health Fraud 9/11 Truth move- ment Quackwatch Pi school of After RfA Article Mawlid Fatimah Five Pillars of Islam Air Sylhet Ezra Hajj Osmani tional Airport Biman Bangladesh Airlines Eid ul-Fitr Interna- Edit% 3.9% 2.3% 2.0% 1.9% 1.8% 1.7% 1.6% 1.6% 1.5% Edit% 20.0% 11.8% 3.6% 3.0% 2.5% 2.1% 2.0% 1.8% 1.8% Table 2: Most edited articles for 180 days before and after becoming an administrator. Users were selected from the top ten CC-Score changes. Changes in behavior Table 2 shows the article edit history of four administrators for 180 days before and 180 days after their successful RfA. These users were among the top 10 administrators ranked by the change in CC-Score between the two periods (Admins 1, 2, 3, and 4 were ranked 1, 3, 5, and 9 respectively in CC-Score change). For two of the administrators shown (Admin 1 and Admin 4), the change in CC-Score is explained by a change in edit distribution; while the general category of their edits remains consistent, they concentrated on this category much more heavily after their respective RfAs. For Admins 2 and 3 in Table 2, the change in CC Score is the result of a rather dramatic shift in topic. Admin 2 shifts from mathematics to 9/11 conspiracy theories (several related pages are not shown in the table), while Admin 3 shifts from relatively unfocused edits to the Sri Lankan Civil War. Upon further examination of their behavior, neither administrator appears to be violating Wikipedia policy (instead acting as mediators and enforcing a neutral point of view), and yet the changes are quite striking. While it may not be the case for these editors, a similar pattern could reflect subtle manipulation by one-sided enforcement of the NPOV guidelines, for example. 13 (a) Full distribution (b) Log-log plot of the right hand tail Figure 3: Distribution of changes in the CC-Score before and after successful and unsuccessful RfAs, and for users who have never participated in an RfA. Population-level changes This leads us to a more general question. Is there evidence of a population-wide change in Admin behavior after successful RfAs? Figure 3 shows the distri- bution of CC-Score changes for RfA candidates, both successful and unsuccessful, before and after their respective RfAs (again 180 days each), and for a group of 1000 active editors who were never nominated for administrator status. The results clearly show that those who stand for pro- motion and are successful behave differently at the population-level than those who either stand for promotion and fail or those who never stand for promotion at all. In fact, they end up stay- ing closer to their previous behavior than either of the other groups – the variance in CC-Score changes is higher for the other two groups than it is for editors who had successful RfAs (see below for details on the data and statistical tests). This implies strongly that there is no serious problem with people becoming admins on Wikipedia in order to push their own point of view. There are two reasonable hypotheses that may explain the lower variance in CC-Score changes for successful RfA candidates. Either some aspect of the RfA process selects for editors who are less likely to change their behavior, or the very fact of becoming an administrator has a "centralizing" influence: given their new status, associated with a (real or perceived) higher level of scrutiny, administrators become less likely to change their behavior. The hypothesis that the RfA process selects for editors who tend not to change their CC-Scores is unlikely, as we would then expect this type of user to appear in the population of users who were never nominated to become administrators. If this were the case, then the non-RfA distribution would be a mix of the successful and unsuccessful RfA distributions; instead, the unsuccessful and non-RfA distributions are similar to each other and different from successful RfAs. We run a second test that provides further evidence for the centralizing hypothesis. We construct a matched sample of successful and unsuccessful RfA candidates, matching on the estimated probability pi that editor i's RfA will be successful RfA based on i's pre-RfA behavior. We use the model of Burke and Kraut to estimate the pis [3]. For each successful RfA j, we find the editor in the unsuccessful RfA set k with pk closest to pj (throwing out examples that are not within 1 percentage point). We then compare the population-level behavior of the two sets of editors we are left with. Now that 14 0.040.020.000.020.04CC after - CC before020406080100120140Frequency (normalized)CC ChangesSuccessfulUnsuccessfulNon-RfA10-2CC after - CC before10-1100101102Frequency (normalized)CC Changes (log-log)SuccessfulUnsuccessfulNon-RfA we have controlled for endogenous factors, we expect that the two populations are very similar in intrinsic qualities: the only difference between them should be that the successful ones actually became admins and the unsuccessful ones did not. We again find that the population of successful admins is significantly different, exhibiting more stable behavior than the population of editors who were unsuccessful in their RfAs (see below for details on statistics). This suggests that some aspect of actually being an administrator reduces the propensity for significant behavior changes (incidentally, this makes administrators who do significantly change their editing behavior all the more interesting). Data and statistics: For the non-RfA users, we use edits before and after a randomly selected edit. The distributions of changes for unsuccessful and non-RfA editors have a significantly higher variance than the distribution for successful RfAs, with the 95% confidence interval on the ratio of the variance of the successful RfA distribution to the variance among non-RfA users being [0.22, 0.28]. The 95% confidence interval on the same ratio for unsuccessful and non-RfA users, on the other hand, is [0.88, 1.11] (est. 0.99). Further, the Kolmogorov-Smirnov Test rules out an identical distribution for successful and unsuccessful distributions (p = 10−7, D = 0.109), and between the successful and non-RfA distributions (p = 10−4, D = 0.086). We cannot rule out the possibility that the non-RfA and unsuccessful distributions are identical (p = 0.25, D = 0.042). Closer examination of the tails of the distributions does not show any differences not already explained by the variance. For the matched sample described above, the 95% confidence interval for the ratio of the variances of successful and unsuccessful RfA distributions is [0.32, 0.43]; the conclusions of the KS-tests are unchanged. 5 Discussion This paper contributes to the literature in two different ways: first, we introduce new behavioral metrics for quantifying controversial editing on Wikipedia. The measures we introduce can be used (perhaps with domain specific modifications) to triage suspicious behavior for deeper inves- tigation. Second, these measures allow us to contribute to the study of Wikipedia as an evolving social system: along with showing that Wikipedia admins behave in a stable manner, we also identify some intuitively surprising topics of conflict in Wikipedia. The Controversy Score (C-Score), measures the extent to which an editor is influencing con- troversial pages. The Clustered Controversy Score (CC-Score) builds on the C-Score, finding single-topic editors of controversial pages. Both metrics are flexible, since they are language- and platform- independent, and can work with different measures of controversy. We validate the C- and CC-Scores as user-level measures of controversy on a set of blocked users. On a set of administrators, we find several weaknesses of the C-Score: it misses contro- versial, single-topic editors in the presence of a long tail of related, but less controversial, pages. Further, the C-Score gives undue weight to unfocused vandalism fighting, a common behavior among administrators. The CC-Score solves many of these issues, allowing us to find controver- sial, single-topic editors, and often finds editors who would not show up ranked highly on just the C-Score measure. The CC-score also enables us to identify interesting Wikipedia-specific phenom- ena, for example, the substantial levels of controversy associated with some media/entertainment specific pages as well as with some disambiguation pages. We also show how the CC-Score can be used to analyze behavior changes, both for single ed- itors and in aggregate. We find several instances of dramatic shifts in behavior by administrators 15 upon assuming their responsibilities. At the same time, we show that administrators as a group change their behavior significantly less than any other group of Wikipedians. This consistency appears to be due to the role of administrator itself, rather than being a selection effect. Future work While we focus on editors working alone in this paper, an extension of the CC- Score might highlight groups of editors influencing a single, controversial topic; this presents in- teresting computational and evaluation challenges. Improvements to the CC-Score to better detect manipulation might focus on natural language processing, or on non-local aspects of an editor's behavior. Being platform-independent, the CC-Score is a useful tool for analyzing behavior in general collective wisdom processes; we are interested in applications of the CC-Score to other domains. 6 Acknowledgments The authors would like to thank Mark Goldberg and Al Wallace for helpful discussions. This research is supported by an NSF CAREER Award (IIS-0952918) to Das. Magdon-Ismail's contri- butions to this research are continuing through participation in the Network Science Collaborative Technology Alliance sponsored by the U.S. Army Research Laboratory under Agreement Num- ber W911NF-09-2-0053. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. References [1] Candid CAMERA. Harper's Magazine, July 2008. [2] A. Beam. War of the virtual Wiki-worlds. The Boston Globe, May 3 2008. [3] M. Burke and R. Kraut. Mopping up: modeling wikipedia promotion decisions. In Proceed- ings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW '08, pages 27–36, New York, NY, USA, 2008. ACM. [4] S. Das and M. Magdon-Ismail. Collective wisdom: Information growth in wikis and blogs. In Proceedings of the ACM Conference on Electronic Commerce, pages 231–240, 2010. [5] J. Giles. Internet encyclopaedias go head to head. Nature, 438(7070):900–901, December 2005. [6] M. Hindman, K. Tsioutsiouliklis, and J. Johnson. Googlearchy: How a few heavily-linked sites dominate politics on the web. In Annual Meeting of the Midwest Political Science Associa- tion, volume 4, pages 1–33. Citeseer, 2003. [7] G. Kalna and D. J. Higham. A clustering coefficient for weighted networks, with application to gene expression data. AI Commun., 20:263–271, December 2007. [8] A. Kittur, B. Suh, B. A. Pendleton, and E. H. Chi. He says, she says: Conflict and coordination in Wikipedia. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '07, pages 453–462, New York, NY, USA, 2007. ACM. 16 [9] C. Li, A. Datta, and A. Sun. Mining latent relations in peer-production environments: a case study with wikipedia article similarity and controversy. Social Network Analysis and Mining, pages 1–14, 2011. 10.1007/s13278-011-0037-5. [10] F. Menczer, S. Fortunato, A. Flammini, and A. Vespignani. Googlearchy or Googlocracy? IEEE Spectrum Online, 2006. [11] K. Smets, B. Goethals, and B. Verdonk. Automatic vandalism detection in Wikipedia: To- wards a machine learning approach. In In WikiAI '08: Proceedings of the AAAI Workshop on Wikipedia and Artificial Intelligence, 2008. [12] A. Spoerri. What is popular on Wikipedia and why? First Monday, 12(4), April 2007. [13] B.-Q. Vuong, E.-P. Lim, A. Sun, M.-T. Le, and H. W. Lauw. On ranking controversies in Wikipedia: Models and evaluation. In Proceedings of the International Conference on Web Search and Web Data Mining, WSDM '08, pages 171–182, New York, NY, USA, 2008. ACM. [14] D. M. Wilkinson and B. A. Huberman. Assessing the value of coooperation in Wikipedia. First Monday, 12(4), Feb 2007. 17
1609.03946
1
1609
2016-09-13T17:34:33
A Holistic Approach for Predicting Links in Coevolving Multilayer Networks
[ "cs.SI" ]
Networks extracted from social media platforms frequently include multiple types of links that dynamically change over time; these links can be used to represent dyadic interactions such as economic transactions, communications, and shared activities. Organizing this data into a dynamic multiplex network, where each layer is composed of a single edge type linking the same underlying vertices, can reveal interesting cross-layer interaction patterns. In coevolving networks, links in one layer result in an increased probability of other types of links forming between the same node pair. Hence we believe that a holistic approach in which all the layers are simultaneously considered can outperform a factored approach in which link prediction is performed separately in each layer. This paper introduces a comprehensive framework, MLP (Multilayer Link Prediction), in which link existence likelihoods for the target layer are learned from the other network layers. These likelihoods are used to reweight the output of a single layer link prediction method that uses rank aggregation to combine a set of topological metrics. Our experiments show that our reweighting procedure outperforms other methods for fusing information across network layers.
cs.SI
cs
A Holistic Approach for Predicting Links in Coevolving Multilayer Networks Alireza Hajibagheri University of Central Florida [email protected] Gita Sukthankar University of Central Florida [email protected] Kiran Lakkaraju Sandia National Labs [email protected] Abstract -- Networks extracted from social media platforms frequently include multiple types of links that dynamically change over time; these links can be used to represent dyadic interactions such as economic transactions, communications, and shared activities. Organizing this data into a dynamic multiplex network, where each layer is composed of a single edge type linking the same underlying vertices, can reveal interesting cross-layer interaction patterns. In coevolving networks, links in one layer result in an increased probability of other types of links forming between the same node pair. Hence we believe that a holistic approach in which all the layers are simultaneously considered can outperform a factored approach in which link prediction is performed separately in each layer. This paper introduces a comprehensive framework, MLP (Multilayer Link Prediction), in which link existence likelihoods for the target layer are learned from the other network layers. These likelihoods are used to reweight the output of a single layer link prediction method that uses rank aggregation to combine a set of topological metrics. Our experiments show that our reweighting procedure outperforms other methods for fusing information across network layers. I. INTRODUCTION As social media platforms offer customers more interac- tion options, such as friending, following, and recommending, analyzing the rich tapestry of interdependent user interactions becomes increasingly complicated. In this paper, we study two types of online societies: 1) players in a massively multiplayer online game (Travian) [1] 2) dialogs between Twitter users before, during, and after an exceptional event [2]. Although standard social network analysis techniques [3] offer useful insights about there is relatively little theory from the social sciences on how to integrate information from multiple types of online interactions. these communities, 6 1 0 2 p e S 3 1 ] I S . s c [ 1 v 6 4 9 3 0 . 9 0 6 1 : v i X r a Rather than organizing this data into social networks separately chronicling the history of different forms of user interaction, dynamic multiplex networks [4] offer a richer formalism for modeling the social fabric of online societies. A multiplex network is a multilayer network that shares the same set of vertices across all layers. This network can be modeled as a graph G =< V, E > where V is the set of vertices and E is the set of edges present in the graph. The dynamic graph G = {G0, G1, ..., Gt} represents the state of the network at different times. The network is then defined as: t ⊆ V × V , ∀α ∈ {1, ..., M}, Gt =< V, E1 where each set Eα t corresponds to the edge set of a distinct layer at time t. Thus a dynamic multiplex network is well suited for representing diverse user activities over a period of time. t > with Eα t , ..., EM In this paper, we address the problem of predicting fu- ture user interactions from the history of past connections. Assuming the data is represented as a graph, our goal is to predict the structure of graph Gt using information from previous snapshots as well as other layers of the network. Link prediction algorithms [5] -- [8] have been implemented for many types of online social networks, including massively multi- player online games and location-based social networks. These systems offer great value to social networking services due to their practical applicability for friend recommendations and social network bootstrapping. Although user profiles can be mined for additional data, topological approaches 1) perform well in many networks 2) preserve user privacy since they do not rely on actor information and 3) can be combined with node content approaches to enhance prediction performance. link prediction is a well studied problem, few link prediction techniques specifically address the problem of simultaneously predicting links across multiple networks [9] -- [11]. Basu et al. [12] note that there are many real-world cases where interdependencies between processes cause the layers of a multiplex network to coevolve, resulting in a higher number of overlapping edges between the same node pair in different network layers. In this paper, we explore the role of overlapping edges towards improving the perfor- mance of link prediction; our aim is to leverage the cross-layer link co-occurrence history to model coevolution in a multiplex network. Despite the fact that We propose a framework for multilayer link prediction integrates complementary information sources, (MLP) that including topological metrics, network dynamics, and overlap- ping edges. MLP uses a likelihood based method for learning cross-layer dependencies and a temporal decay function to model the network dynamics. Rank aggregation is then em- ployed to collect information from multiple topological metrics into one final scoring matrix. In the next section, we present related work on link prediction. The proposed framework is described in Section IV. Section V presents a comparison of our method vs. two other approaches for fusing information across network layers. We conclude in section VII with a description of possible directions for future work. II. RELATED WORK A variety of computational approaches have been employed for predicting links in single layer networks, including super- vised classifiers, statistical relational learning, matrix factoriza- tion, metric learning, and probabilistic graphical models (see surveys by [13] -- [15] for a more comprehensive description). Regardless of the computational framework, topological net- work measures are commonly used as features to describe node pairs and can be combined in a supervised or unsupervised fashion to do link prediction. [6]. In this paper, we aggregate several of these metrics (listed in the next section), but our framework can be easily generalized to include other types of features. The primary focus of this paper is leveraging cross-layer information to improve link prediction in multiplex networks, although we also introduce our own single layer link prediction technique. This process of using cross-layer information can be treated as a transfer learning problem where information is learned from a source network and applied to improve prediction performance the target network. Tang et al. [9] in- troduced a transfer-based factor graph (TranFG) model which incorporates social theories into a semi supervised learning framework. This model is then used to transfer supervised information from a source network to infer social ties in the target network. Another strategy is to create more general versions of the topological measures that capture activity patterns in multi- plex networks. Davis et al. [10] introduced a probabilistically weighted extension of the Adamic/Adar measure for these networks. Weights are calculated by doing a triad census to estimate the probability of different link type combinations. The extended Adamic/Adar metric is then used, along with other unsupervised link predictors, as input for a supervised classifier. Similarly, Hristova et al. [11] extend the definition of network neighborhood by considering the union of neighbors across all layers. These multilayer features are then combined in a supervised model to do link prediction. One weakness with the above mentioned models is their inability to use temporal information accrued over many snapshots, rather than relying on a single previous snapshot. In this paper, we evaluate two versions of our MLP framework, a version that only uses topological metrics calculated from one time slice vs. multiple snapshots. Conversely, there are a number of approaches that ignore cross-layer network dependencies, while using the history of changes between snapshots to predict future network dynam- ics. We have experimented with two types of techniques: time series forecasting [5], [16] and decay models [17]. Soares and Prudencio [16] investigated the use of time series within both supervised and unsupervised link prediction frameworks. The core concept of their approach is that it is possible to predict the future values of topological metrics with time series; these values can either be used in an unsupervised fashion or combined in a supervised way with a classifier. In previous work, we introduced a rate prediction model [5] that uses time series to predict the rate of link formation. Our proposed framework, MLP, both models the rate of link formation in each layer and uses a decay model to account for changes in the topological metrics over time. In our results, we compare the improvements achieved by temporal vs. cross- layer modeling. However, incorporating more features is not helpful, with- out an effective information fusion procedure. Pujari et al. [18] employed computational social choice algorithms for aggre- gating multiple topological features. They evaluated the per- formance of two well-known rank aggregation methods, Borda and Kemeny, for single layer link prediction. In their method, weights are learned for each voter participating in the rank aggregation, where each topological metric is treated as a voter. These weights are tuned to maximize the identification of positive examples or minimize negative examples. To extend their method to multiplex networks [19], the authors compute topological attributes for each network layer and combine them using 1) a simple aggregation of these scores across all layers or 2) an entropy-aggregation of values. These combinations are then used as a series of features in a decision tree model. In this paper, we use rank aggregation to fuse our features and compare our procedure to their aggregation methods. Another example of a supervised framework that uses rank aggregation is RankMerging [20]. During a learning phase, weights are assigned to each unsupervised method using a training set of node pairs. The contribution of each ranking to the merged ranking is then computed using sliding indices. At each step, the aim is to identify the ranking with the highest number of true predictions in the upcoming steps. Rank aggregation methods can be highly effective, but the more complex social choice algorithms can suffer from high computational complexity, making them less effective for large datasets. For this reason, we opted to use the Borda rank aggregation procedure in MLP. III. NODE SIMILARITY METRICS This section provides a brief description of the topological and path-based metrics for encoding node similarity that are used within our MLP framework to create ranked score lists for each node pair. These techniques are often used in isolation as unsupervised methods for link prediction. Note that Γ(x) stands for the set of neighbors of vertex x while w(x, y) represents the weight assigned to the interaction between node x and y. • Number of Common Neighbors (CN) The CN measure is defined as the number of nodes with direct relationships with both evaluated nodes x and y [21]. For weighted networks, the CN measure is: CN (x, y) = w(x, z) + w(y, z) (1) (cid:88) • Jaccard's Coefficient (JC) z∈Γ(x)∩Γ(y) The JC measure assumes higher values for pairs of nodes who share a higher proportion of common neighbors relative to their total neighbors: (cid:80) (cid:80) a∈Γ(x) w(x, a) +(cid:80) z∈Γ(x)∩Γ(y) w(x, z) + w(y, z) b∈Γ(y) w(y, b) (2) JC(x, y) = • Preferential Attachment (PA) The PA measure assumes that the probability that a new link originates from node x is proportional to its node degree. Consequently, nodes that already possess a high number of relationships tend to create more links [22]: (cid:88) w(x, z1) × (cid:88) z1∈Γ(x) z2∈Γ(y) P A(x, y) = w(y, z2) (3) P Rw(x) = α (cid:88) node x, and (cid:80)N k∈Γ(x) P Rw(x) L(k) + (1− α) w(x)(cid:80)N y=1 w(y) (6) • Adamic-Adar Coefficient (AA) This metric [23] is closely related to Jaccard's coeffi- cient in that it assigns a greater importance to common neighbors who have fewer neighbors. Hence, it measures the exclusivity of the relationship between a common neighbor and the evaluated pair of nodes: (cid:88) log(1 +(cid:80) w(x, z) + w(y, z) c∈Γ(z) w(z, c)) (4) AA(x, y) = z∈Γ(x)∩Γ(y) • Resource Allocation (RA) RA was first proposed in [24] and is based on physical processes of resource allocation: RA(x, y) = z∈Γ(x)∩Γ(y) w(x, z) + w(y, z) c∈Γ(z) w(z, c) (5) (cid:88) (cid:80) • Page Rank (PR) The PageRank algorithm [25] measures the significance of a node based on the significance of its neighbors. We use the weighted PageRank algorithm proposed in [26]: where L(x) is the sum of outgoing link weights from y=1 w(y) is the total weight across the whole network. • Inverse Path Distance (IPD) The Path Distance measure for unweighted networks simply counts the number of nodes along the shortest path between x and y in the graph. Note that P D(x, y) = 1 if two nodes x and y share at least one common neighbor. In this article, the Inverse Path Distance is used to measure the proximity between two nodes, where: IP D(x, y) = 1 P D(x, y) (7) IPD is based on the intuition that nearby nodes are likely to be connected. In a weighted network, IPD is defined by the inverse of the shortest weighted distance between two nodes. • Product of Clustering Coefficient (PCF) The clustering coefficient of a vertex v is defined as: P CF (v) = 3 × # of triangles adjacent to v # of possible triples adjacent to v (8) To compute a score for link prediction between the vertex x and y, one can multiply the clustering coefficient score of x and y. Section V compares MLP vs. unsupervised versions of these approaches. as the target layer. To do so, we create a weighted version of the original target layer where interactions and connections that exist in other layers receive higher weights. After reweighting the layer, we employ the collection of node similarity metrics described in the previous section on the weighted network. To express the temporal dynamics of the network, we use a decay model on the time series of similarity metrics to predict future values. Finally, the Borda rank aggregation method is employed to combine the ranked lists of node pairs into a single list that predicts links for the next snapshot of the target network layer. Each component of the model is explained in more detail in the following sections. A. Multilayer Likelihood Assignment and Edge Weighting This component leverages information about cross-layer link co-occurrences. During the coevolution process, links may be engendered due to activity in other network layers. Some layers may evolve largely independently of the rest of the network, whereas links in other layers may be highly predictive of links in the target layer. In our proposed method, a weight is assigned to each layer based on its influence on the target layer. Weights are calculated using a likelihood function: wi = Likelihood(Link in LT argetLink in Li) (9) the ith layer and the weight where Li and wi represent calculated for it respectively. LT arget indicates the target layer for which we want to predict future links. The Likelihood function computes the similarity between the target layer and the ith layer; to do this, we use the current ratio of overlapping edges. Next, we calculate weights for every node pair by checking the link correspondence between two layers using the likelihood of a link being present layer given the existence of the link in the other layer at any other previous snapshot. This orders other layers in terms of their relative importance for a specific target layer. The process assigns higher weights to node pairs which occur in more than one layer (multiplex edges). The rate of link formation is incorporated into the model as the first term of the edge weight. Algorithm 1 shows the process of assigning likelihoods to layers and reweighting the adjacency matrix. in the target Algorithm 1 Likelihood Assignment and Edge Weighting 1: Input: Edge sets (E1, ..., EM ) for M layers where Eα is the edge set of target layer 2: Output: Eα w weighted adjacency matrix for layer α (target wi = Likelihood(Link in LαLink in Li) layer) //Calculate weights for the layers 3: for i ∈ {1, 2, ..., M} − {α} do 4: 5: end for 6: for edge e ∈ Eα do 7: 8: end for we = rate +(cid:80)M //Weighting target layer i=1&i(cid:54)=α wi × linkExist(e) IV. PROPOSED METHOD MLP is a hybrid architecture that utilizes multiple compo- nents to address different aspects of the link prediction task. We seek to extract information from all layers of the network for the purpose of link prediction within a specific layer known The term rate is defined as the average value of the source node's out-degree over previous timesteps. Function linkExist is used to obtain information about a link's existence in other layers during previous snapshots. It checks each layer for the presence of an edge and returns 1 if an edge is present in that layer. B. Temporal Link Structure Given the network history for T time periods, we need to capture the temporal dependencies of the coevolution process. To do so, our framework uses a weighted exponentially de- caying model [27]. Let {Simt(i, j), t = t0 + 1, ..., t0 + T} be a time series of similarity score matrices generated by a node similarity metric on a sliding window of T successive temporal slices. An aggregated weighted similarity matrix is constructed as follows: t0+T(cid:88) Sim(t0+1)∼(t0+T )(i, j) = θt0+T−tSimt(i, j) (10) t=t0+1 where the parameter θ ∈ [0, 1] is the smoothing weight for previous time periods. Different values of θ modify the importance assigned to the most or least recent snapshots before current time t + 1. This procedure generates a com- posite temporal score matrix for every node similarity metric. Sim(t0+1)∼(t0+T ) (shortened to Sim) is used by the algorithm as a summary of network activity, encapsulating the temporal evolution of the similarity matrix. C. Rank Aggregation Before describing the final step of our approach, let us briefly discuss existing methods for ranked list aggrega- tion/rank aggregation. List merging or list aggregation refers to the process of combining a number of lists with the same or different numbers of elements in order to get one final list including all the elements. In rank aggregation, the order or rank of elements in input lists is also taken into consideration. The input lists can be categorized as full, partial, or disjoint lists. Full lists contain exactly the same elements but with a different ordering, partial lists may have some of the elements in common but not all, and disjoint lists have completely different elements. In this case, we are only dealing with full lists since each similarity metric produces a complete list for the same set of pairs, differing only in ordering. Several rank aggregation methods are described in [28], including Borda's, Markov chain, and median rank methods. Borda's method is a rank-then-combine method originally proposed to obtain a consensus from a voting system. Since it is based on the absolute positioning of the rank elements and not their relative rankings, it can be considered a truly positional method. For every element in the lists, a Borda score is calculated and elements are ranked according to this score in the aggregated list. For a set of complete ranked lists L = [L1, L2, L3, ...., Lk], the Borda score for an element i and a list Lk is given by: BLk (i) = {count(j)Lk(j) < Lk(i)&j ∈ Lk} The total Borda score for an element is given as: k(cid:88) B(i) = BLt(i) (11) (12) Fig. 2: Heatmap representing the edge overlap between pairs of layers for datasets (a) Travian (b) Cannes2013 aggregation to produce an accurate prediction of future links in a dynamic multilayer network. The Borda function produces the final output of the MLP framework. Results of the proposed algorithm are compared with other state-of-the-art techniques in the next section. Algorithm 2 Multilayer Link Prediction Framework (MLP) 1: Input: Weighted edge sets of the target layer for T previous 2: Output: Temporal aggregated score matrix S for the target snapshots layer Calculate score matrix Simu t0+t for t ∈ {1, ..., T} do 3: for each node similarity metric u do 4: 5: 6: 7: 8: end for 9: Final score matrix S = Borda(Sim1, ..., Simu) end for Calculate temporal similarity matrix Simu V. EXPERIMENTAL STUDY t=1 Borda's method is computationally cheap, which is a highly desirable property for link prediction in large networks. Algorithm 2 shows our proposed framework which incor- porates edge weighting, the temporal decay model, and rank This paper evaluates the MLP framework on networks ex- tracted from two real-world datasets, Travian and Cannes2013. To investigate the impact of each component of our proposed method, not only do we compare our results with two other approaches for fusing cross-layer information, but we also (a) (b) (c) (d) (e) Fig. 1: Log scale box-whisker plots for user interactions in different layers of the network: (a) Travian (Trades) (b) Travian (Messages) (c) Cannes2013 (Retweets) (d) Cannes2013 (Mentions) (e) Cannes2013 (Replies) analyze the performance of ablated versions of our method. The complete method, MLP (Hybrid), is compared with MLP (Decay Model + Rank Aggregation) and MLP (Weighted + Rank Aggregation). All of the algorithms were implemented in Python and executed on a machine with the Intel(R) Core i7 CPU and 24GB of RAM for the purpose of fair comparison. Our implementation uses Apache Spark to speed the link prediction process. A. Datasets We use two real-world dynamic multilayer networks to demonstrate the performance of our proposed algorithm. These networks are considerably disparate in structure and were se- lected from different domains (a massively multiplayer online game (MMOG) and an event-based Twitter dataset). Table I provides the network statistics for each of the datasets: • Travian MMOG [1] Travian is a browser-based, real- time strategy game in which the players compete to create the first civilization capable of constructing a Wonder of the World. The experiments in this paper were conducted on a 30 day period in the middle of the Travian game cycle. In Travian, players can execute different game actions including: sending messages, trading resources, joining alliances, and attacking enemy villages. In this research, we focus on networks created from trades and messages. • Twitter Interactions [2] This dataset consists of Twitter activity before, during, and after an "exceptional" event as characterized by the volume of communications. Unlike most Twitter datasets which are built from follower- followee relationships, links in this multilayer network correspond to retweeting, mentioning, and replying to other users. The Cannes2013 dataset was created from tweets about the Cannes film festival that occurred be- tween May 6,2013 to June 3, 2013. Each day is treated as a separate network snapshot. TABLE I: Dataset Summary: Number of edges, nodes, and snapshots for each network layer Dataset No. of Nodes No. of Snapshots Layers/No. of Edges Travian 2,809 30 87,418 44,956 Cannes2013 438,537 29 496,982 411,338 83,534 Retweet Mention Reply Trades Messages varying the decision threshold on probability estimations or scores. For all of our experiments, we report area under the ROC curve (AUROC), the scalar measure of the performance over all thresholds. Since link prediction is highly imbalanced, straightforward accuracy measures are well known to be mis- leading; for example, in a sparse network, the trivial classifier that labels all samples as missing links can have a 99.99% accuracy. C. Analysis of Cross-layer Interaction Figure 1 shows log scale box-whisker plots that depict the frequency of interactions between users who are con- nected across multiple layers. We compare the frequency of interactions in cases where the node pair is connected on all layers vs. the frequency of being connected in a single layer (Travian) or less than all layers (for Cannes which has three layers). As expected, in cases where users are connected on all layers, the number of interactions (trades, messages, retweets, mentions and replies) is higher. The heatmap of the number of overlapping edges between different network layers (Figure 2) suggests that a noticeable number of edges are shared between all layers. This clearly indicates the potential value of cross- layer information for the link prediction task on these datasets. Our proposed likelihood weighting method effectively captures the information revealed by our analysis. B. Evaluation Metrics D. Performance of Multilayer Link Prediction For the evaluation, we measure receiver operating charac- teristic (ROC) curves for the different approaches. The ROC curve is a plot of the true positive rate (tpr) against the false positive rate (fpr). These curves show achievable true positive rates (TP) with respect to all false positive rates (FP) by For our experiments, we adopted a moving-window ap- proach to evaluate the performance of our temporal multilayer link prediction algorithm. Given a specified window size T , for each time period t(t > T ), graphs of T previous periods (GtT , ..., Gt1) (where each graph consists of M layers) are TABLE II: AUROC performances for a target layer averaged over all snapshots with a sliding time window of T = 3 for Travian layers and T = 5 for Cannes2013 layers used in the decay model. Variants of our proposed framework are shown at the top of the table, followed by standard unsupervised methods. The algorithms shown in the bottom half of the table are techniques for multiplex networks proposed by other research groups. The best performer is marked in bold. Algorithms / Networks MLP (Hybrid) MLP (Likelihood + Rank Aggregation) MLP (Decay Model + Rank Aggregation) Likelihood Rank Aggregation Common Neighbors Jaccard Coefficient Preferential Attachment Adamic/Adar Resource Allocation Page Rank Inverse Path Distance Clustering Coefficient Average Aggregation Entropy Aggregation Multilayer Common Neighbors Multilayer Jaccard Coefficient Multilayer Preferential Attachment Multilayer Adamic/Adar Travian (Trade) 0.8209±0.0016 0.8024±0.0013 0.7226±0.0029 0.7702±0.0332 0.6941±0.0010 0.6565±0.0024 0.6287±0.0023 0.7094±0.0019 0.6354±0.0034 0.6254±0.0052 0.5954±0.0016 0.5723±0.0037 0.5804±0.0023 0.7446±0.0300 0.7310±0.0038 0.7293±0.0040 0.6663±0.0312 0.7226±0.0098 0.6712±0.0104 Travian (Message) 0.8036±0.0023 0.7906±0.0021 0.7310±0.0021 0.7606±0.0410 0.7120±0.0014 0.6671±0.0021 0.6803±0.0031 0.6374±0.0013 0.7002±0.0028 0.6902±0.0028 0.6871±0.0021 0.6506±0.0032 0.6332±0.0025 0.7521±0.0201 0.7630±0.0201 0.6429±0.0130 0.6193±0.0124 0.6459±0.0127 0.6899±0.0310 Cannes2013 (Retweet) Cannes2013 (Mention) Cannes2013 (Reply) 0.8116±0.0025 0.8088±0.0027 0.7267±0.0025 0.7524±0.0218 0.7001±0.0020 0.6999±0.0019 0.5944±0.0016 0.5846±0.0019 0.6999±0.0026 0.5973±0.0021 0.6604±0.0024 0.6312±0.0030 0.5702±0.0201 0.7405±0.0026 0.7515±0.0030 0.6723±0.0028 0.5803±0.0031 0.5801±0.0034 0.6709±0.0036 0.8345±0.0035 0.8141±0.0036 0.7283±0.0028 0.7806±0.0517 0.7062±0.0023 0.7050±0.0031 0.7331±0.0016 0.6122±0.0020 0.6419±0.0022 0.6222±0.0019 0.6301±0.0032 0.6410±0.0020 0.6213±0.0105 0.7366±0.0107 0.7584±0.0311 0.7163±0.0027 0.7360±0.0022 0.6403±0.0031 0.6687±0.0026 0.8393±0.0025 0.8160±0.0029 0.7331±0.0018 0.7573±0.0423 0.7004±0.0027 0.6999±0.0012 0.7107±0.0029 0.5869±0.0026 0.5160±0.0028 0.6717±0.0036 0.6131±0.0017 0.5614±0.0036 0.5220±0.0041 0.7611±0.0035 0.7441±0.0022 0.7328±0.0019 0.7219±0.0016 0.6212±0.0028 0.5523±0.0033 used to predict links that occur at the target layer α in the t ). To assess our proposed framework and current period (Gα study the impact of its components, we compare against the following baselines: • MLP (Hybrid): incorporates all elements discussed in the framework section. It utilizes the likelihood assign- ment and edge weighting procedure to extract cross-layer information. Node similarity scores are modified using the temporal decay model and combined with Borda rank aggregation. • MLP (Likelihood + Rank Aggregation): This method only uses the aggregated scores calculated from the graphs weighted with cross-layer information. It does not consider the temporal aspects of network coevolution. • MLP (Decay Model + Rank Aggregation): This method does not use the cross-layer weighting scheme and relies on temporal information alone to predict future links. The final aggregated score matrix is calculated based on forecast values at time t for each node similarity metric using the decay model. • Likelihood: Weights generated by the cross-layer likeli- hood assignment procedure are treated as scores for every node pair. We then sort the pairs based on their score and calculate the AUROC. • Rank Aggregation: This method is a simple aggregated version of all unsupervised scoring methods using the Borda's rank aggregation method applied to node simi- larity metrics from the target layer. • Unsupervised Methods: The performance of our pro- posed framework is compared with eight well-known unsupervised link prediction methods described in Sec- tion III. All unsupervised methods are applied to the binary static graph from time 0 to t−1 in order to predict links at time t. Only the structure of the target layer is used. • Average Aggregation: In order to extend the rank ag- gregation model to include information from other layers of the network, we use the idea proposed in [19]. Node similarity metrics are aggregated across all layers. So for attribute X (Common Neighbors, Adamic/Adar, etc.) over M layers the following is defined: (cid:80)M X(u, v) = α=1 X(u, v)α M (13) where X(u, v) is the average score for nodes u and v across all layers and X(u, v)α is the score at layer α. Borda's rank aggregation is then applied to the extended attributes to calculate the final scoring matrix. • Entropy Aggregation: Entropy aggregation is another extended rank aggregation model proposed in [19] where X(u, v) is defined as follows: X(u, v) = − M(cid:88) where Xtotal = (cid:80)M α=1 X(u, v)α Xtotal log( X(u, v)α Xtotal ) (14) α=1 X(u, v)α. The entropy based attributes are more suitable for capturing the distribution of the attribute value over all dimensions. A higher value indicates a uniform distribution of attribute values across the multiplex layers. • Multilayer Unsupervised Methods: Finally, using the definition of core neighborhood proposed in [11], we extend four unsupervised methods (Common Neigh- bors, Preferential Attachment, Jaccard Coefficient and Adamic/Adar) to their multilayer versions. Table II shows the results of different algorithms on the Travian and Cannes2013 datasets. With 30 days of data from Travian and 27 days for Cannes2013, we were able to exten- sively compare the performance of the proposed methods and the impact of using different elements. Bold numbers indicate the best results on each target layer considered; MLP (Hybrid) is the best performing algorithm in all cases. VI. DISCUSSION In this section, we discuss the most interesting findings: Does rank aggregation improve the performance of the unsupervised metrics? As shown in Table II, although the aggregated scores matrix produced by Borda's method achieves better results than unsupervised methods in some cases (Travian message, Cannes2013 retweet and mention networks) and comparable results on others (Travian trade and Cannes2013 reply networks), it is not able to significantly outperform all unsupervised methods in any of the networks. As discussed before, we are using the simple Borda method for the rank aggregation which does not consider the effect of each ranker on the final performance. While adding weights to the rankers or using more complex rank aggregation models such as Kemeny might achieve better results, it has been shown that those approaches have high computational complexity which makes them less suitable for large real-world networks [18], [20]. Despite the fact that the rank aggregation alone does not significantly improve the overall performance of the link prediction task, it enables us to effectively fuse different kinds of information (edge and node features, nodes similarity, etc.). On the other hand, the Average and Entropy Aggregation methods which are designed to consider attribute values from other layers are able to outperform regular Rank Aggregation and MLP (Decay Model + Rank Aggregation). However, both methods use the static structure of all snapshots from time 0 to t − 1, while MLP (Decay Model + Rank Aggregation) only incorporates the past T snapshots which makes it more suitable for large networks. Does the likelihood assignment procedure outperform the unsupervised scores? To study the ability of our likeli- hood weighting method to model the link formation process, we generate results for two methods: using likelihood explicitly as a scoring method as well as using the values to generate a weighted version of the networks. First, the Likelihood method is used in isolation to demonstrate the prediction power of its weights as a new scoring approach. Table II shows significant improvements on unsupervised scores as well as the aggregated version of them. As expected, the more overlap between the target layer and predictor layers, the more performance improvement Likelihood achieves. As an example, Likelihood achieves ∼ 7% of improvement on Travian (Trade) compared with ∼ 5% of improvement on Travian (Message). Not only is there a lower rate of overlapping edges between those layers, but also the number of interactions is higher than the two other layers. The same holds true for Cannes2013 (Retweet) compared with the mention and reply layers. On the other hand, the method introduced in Algorithm 1 generates a weighted version of input graphs which is used to generate a weighted version of unsupervised methods to produce the final scoring matrix. This paired with the rank aggregation method generates significantly better average AU- ROC performance compared with other proposed methods. Also, when temporal information from previous snapshots of the network is included, MLP (Hybrid) outperforms other variants of MLP as well as well-known unsupervised methods. This indicates the power of overlapping links in improving the performance of link prediction in coevolving multilayer networks. Does including temporal information improve AUROC performance? The importance of incorporating temporal in- formation into link prediction has been thoroughly discussed in our previous work [5]. However, here we are interested in analyzing the impact of this information on improving the performance of MLP. For that purpose, first, the decay model is employed in MLP (Decay Model + Rank Aggregation) to determine whether it improves the results generated by the aggregated score matrix. The final aggregated score matrix is calculated based on forecast values at time t for each unsupervised method using the decay model. As expected, this version of MLP is able to achieve up to ∼ 3% of AUROC improvement using only information from the last three and five snapshots of the Travian and Cannes2013 networks respectively. On the other hand, we observed the same pattern when the decay model was added to MLP (Hybrid) along with likelihood and rank aggregation. Link prediction using the scores generated by our hybrid method outperformed all other proposed and existing methods. The results presented here have been obtained using T = 3 for the Travian dataset and T = 5 for Cannes2013. These values are based on experiments performed on both datasets. While for Travian layers, increasing the value of T tends to improve the prediction performance slightly until T = 3; higher values of T may decrease the performance. The same pattern occurs for Cannes2013 layers when T = 5. Similarly, the value of θ is set to 0.4 for both datasets. In summary, MLP (Decay Model + Rank Aggregation) is able to achieve results comparable to other baseline methods except Average and Entropy Aggregation since they benefit from the entire graph structure. Although rank aggregation by itself is not able to significantly improve the performance of unsupervised methods, paired with decay models and tak- ing temporal aspects of the network, it can achieve better performance. On the other hand, the multilayer versions of the neighborhood based unsupervised methods are able to improve average AUROC performance, however the results are inconsistent and they achieve lower performance in many cases. Finally, both MLP (Hybrid) and MLP (Likelihood + Rank Aggregation) achieve higher performance compared with all other methods illustrating the importance of the cross-layer information created by the network coevolution process. A paired two-sample t-test is used to indicate the significance of the results produced by each method where the p-value is smaller than 0.0001. It is worth mentioning that, even though MLP (Hybrid) is able to outperform all other methods, its [9] J. Tang, T. Lou, and J. Kleinberg, "Inferring social ties across het- erogenous networks," in Proceedings of the fifth ACM international conference on Web search and data mining. ACM, 2012, pp. 743 -- 752. [10] D. Davis, R. Lichtenwalter, and N. V. Chawla, "Supervised methods for multi-relational link prediction," Social network analysis and mining, vol. 3, no. 2, pp. 127 -- 141, 2013. [11] D. Hristova, A. Noulas, C. Brown, M. Musolesi, and C. Mascolo, "A multilayer approach to multiplexity and link prediction in online geo- social networks," arXiv preprint arXiv:1508.07876, 2015. [12] P. Basu, M. Dippel, and R. Sundaram, "Multiplex networks:a generative model and algorithmic complexity," in IEEE/ACM International Confer- ence on Advances in Social Networks Analysis and Mining (ASONAM), 2015, pp. 456 -- 463. [13] L. Lu and T. Zhou, "Link prediction in complex networks: A survey," Physica A: Statistical Mechanics and its Applications, vol. 390, no. 6, pp. 1150 -- 1170, 2011. [14] M. Al Hasan and M. J. Zaki, "A survey of link prediction in social networks," in Social network data analytics. Springer, 2011, pp. 243 -- 275. J. Zhang and S. Y. Philip, "Link prediction across heterogeneous social networks: A survey," 2014. [15] [16] P. R. d. S. Soares and R. B. C. Prudencio, "Time series based link prediction," in Neural Networks (IJCNN), The 2012 International Joint Conference on. IEEE, 2012, pp. 1 -- 7. [17] S. Gao, L. Denoyer, and P. Gallinari, "Temporal link prediction by integrating content and structure information," in Proceedings of the 20th ACM international conference on Information and knowledge management. ACM, 2011, pp. 1169 -- 1174. [18] M. Pujari and R. Kanawati, "Supervised rank aggregation approach for link prediction in complex networks," in Proceedings of the 21st international conference companion on world wide web. ACM, 2012, pp. 1189 -- 1196. [19] -- -- , "Link prediction in multiplex networks," NHM, vol. 10, no. 1, pp. 17 -- 35, 2015. [20] L. Tabourier, D. F. Bernardes, A.-S. Libert, and R. Lambiotte, "Rankmerging: A supervised learning-to-rank framework to predict links in large social network," arXiv preprint arXiv:1407.2515, 2014. [21] M. E. J. Newman, "Clustering and preferential attachment in growing networks," Phys. Rev. E, 2001. [22] A.-L. Barab´asi et al., "Scale-free networks: a decade and beyond," Science, vol. 325, no. 5939, p. 412, 2009. [23] L. A. Adamic and E. Adar, "Friends and neighbors on the web," Social networks, vol. 25, no. 3, pp. 211 -- 230, 2003. [24] T. Zhou, L. Lu, and Y.-C. Zhang, "Predicting missing links via local information," The European Physical Journal B, vol. 71, no. 4, pp. 623 -- 630, 2009. [25] S. Brin and L. Page, "Reprint of: The anatomy of a large-scale hypertextual web search engine," Computer networks, vol. 56, no. 18, pp. 3825 -- 3833, 2012. [26] Y. Ding, "Applying weighted pagerank to author citation networks," Journal of the American Society for Information Science and Technol- ogy, vol. 62, no. 2, pp. 236 -- 245, 2011. [27] E. Acar, D. M. Dunlavy, and T. G. Kolda, "Link prediction on evolving data using matrix and tensor factorizations," in Data Mining Workshops, 2009. ICDMW'09. IEEE International Conference on. IEEE, 2009, pp. 262 -- 269. [28] D. Sculley, "Rank aggregation for similar items." in SDM. 2007, pp. 587 -- 592. SIAM, performance is not significantly better than MLP (Likelihood + Rank Aggregation) in the case of Travian (Message) and Cannes (Retweet). VII. CONCLUSION AND FUTURE WORK In this paper, we introduce a new link prediction frame- work, MLP (Multilayer Link Prediction), that employs a holistic approach to accurately predict links in dynamic multi- plex networks using a collection of topological metrics, the temporal patterns of link formation, and overlapping edges created by network coevolution. Our analysis on real-world networks created by a variety of social processes suggests that MLP effectively models multiplex network coevolution in many domains. The version of Borda's method used in this research assigns the same weight to all rankers. However, for different networks, each scoring method might add differing value to the final scoring matrix. In future work, it would be interesting to use weighted Borda to calculate final scores. Also, while using more network features often increases the performance of a link prediction algorithm, this might not be true for all networks. Thus it may be useful to employ a feature selection algorithm to identify the best subset of unsupervised methods to be used in MLP, based on performance improvements in early snapshots. ACKNOWLEDGMENTS Research at University of Central Florida was supported by NSF award IIS-0845159. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. REFERENCES [1] A. Hajibagheri, K. Lakkaraju, G. Sukthankar, R. T. Wigand, and N. Agarwal, "Conflict and communication in massively-multiplayer online games," in Social Computing, Behavioral-Cultural Modeling, and Prediction. Springer, 2015, pp. 65 -- 74. [2] E. Omodei, M. De Domenico, and A. Arenas, "Characterizing inter- actions in online social networks during exceptional events," arXiv preprint arXiv:1506.09115, 2015. J. Scott, Social network analysis. Sage, 2012. [3] [4] M. Kivela, A. Arenas, M. Barthelemy, J. Gleeson, Y. Moreno, and M. Porter, "Multilayer networks," Journal of Complex Networks, vol. 2, pp. 203 -- 271, 2014. [5] A. Hajibagheri, G. Sukthankar, and K. Lakkaraju, "Leveraging improved link prediction," arXiv preprint network dynamics for arXiv:1604.03221, 2016. [6] D. Liben-Nowell and J. Kleinberg, "The link-prediction problem for the American society for information social networks," Journal of science and technology, vol. 58, no. 7, pp. 1019 -- 1031, 2007. [7] A. K. Menon and C. Elkan, "Link prediction via matrix factorization," in Machine Learning and Knowledge Discovery in Databases. Springer, 2011, pp. 437 -- 452. [8] S. Scellato, A. Noulas, and C. Mascolo, "Exploiting place features in link prediction on location-based social networks," in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2011, pp. 1046 -- 1054.
1903.00077
1
1903
2019-02-28T21:39:12
High Degree Vertices and Spread of Infections in Spatially Modelled Social Networks
[ "cs.SI", "math.CO", "physics.soc-ph" ]
We examine how the behaviour of high degree vertices in a network affects whether an infection spreads through communities or jumps between them. We study two stochastic susceptible-infected-recovered (SIR) processes and represent our network with a spatial preferential attachment (SPA) network. In one of the two epidemic scenarios we adjust the contagiousness of high degree vertices so that they are less contagious. We show that, for this scenario, the infection travels through communities rather than jumps between them. We conjecture that this is not the case in the other scenario, when contagion is independent of the degree of the originating vertex. Our theoretical results and conjecture are supported by simulations.
cs.SI
cs
High Degree Vertices and Spread of Infections in Spatially Modelled Social Networks Joshua Feldman and Jeannette Janssen Dept. of Mathematics and Statistics, Dalhousie Un. Halifax, NS, Canada {Jeannette.Janssen,Joshua.Feldman}@dal.ca Abstract. We examine how the behaviour of high degree vertices in a network affects whether an infection spreads through communities or jumps between them. We study two stochastic susceptible-infected- recovered (SIR) processes and represent our network with a spatial pref- erential attachment (SPA) network. In one of the two epidemic scenarios we adjust the contagiousness of high degree vertices so that they are less contagious. We show that, for this scenario, the infection travels through communities rather than jumps between them. We conjecture that this is not the case in the other scenario, when contagion is independent of the degree of the originating vertex. Our theoretical results and conjecture are supported by simulations. Keywords: Spatial graph model, preferential attachment, infection in networks, contact process. 1 Introduction While community structure plays an important role in the spread of infections [14], there are few analytic results on the topic and it is unclear precisely how clustering interacts with other network properties. Part of the difficulties in this area stem from the notion that communities consist of disjoint groups or small cycles. Recently, however, many have taken an approach to studying community structure by embedding vertices in a metric space [1,4,6,7,12]. One can interpret the metric space as a feature space in which nearby vertices have more affinity than the vertices at a distance and, accordingly, close vertices have a higher probability of being connected. Since a community is a group of individuals who share some similarities, we represent communities as geometric clusters. The use of spatial networks allows for a more nuanced notion of community where groups can overlap and boundaries are fuzzy. Not only is this approach more realistic, but it is also easier to analyze. We will exploit the mathematical tractability of a spatial model to study the interaction between community structure and the spread of infections. Specifically, our focus will be how the behaviour of high degree nodes changes whether an infection spreads through communities or jumps between them. This 9 1 0 2 b e F 8 2 ] I S . s c [ 1 v 7 7 0 0 0 . 3 0 9 1 : v i X r a 2 Joshua Feldman and Jeannette Janssen question is important because understanding who spreads diseases between com- munities can help guide interventions. For example, as [14] show, vaccinating hosts who bridge communities can be more effective than vaccinating highly connected individuals. If high degree vertices connect communities, then these two strategies amount to the same thing. We model our infection with a stochastic susceptible-infected-recovered (SIR) process in discrete time. Susceptible vertices can be infected in the future, in- fected vertices are currently sick, and recovered vertices have gained immunity from a previous infection. To control the behaviour of high degree vertices, we recognize that infections spread through contacts (i.e. sexual contact, airborn contact, etc.), but a network edge only refers to the potential for contacts. [13] demonstrate that the number of contacts made with a neighbour has a significant effect on epidemic dynamics. We consider two scenarios in which the "popular" vertices behave differently: (A) high degree and low degree vertices make the same number of total contacts per time step, so highly connected vertices make fewer contacts with any individual neighbour and (B) the time vertices spend with all their neighbours per time step is proportionate to their degree, so each vertex gets an equal amount of time with any individual neighbours. In scenario A, high degree nodes have many weak connections and, in scenario B, high de- gree and low degree vertices have connections of equal strength so high degree vertices should pass on the disease to more neighbours. We note that contacts are not reciprocal -- two vertices can make a different number of contacts with one another. To model the relationship between contacts per neighbour per time step and the probability of infecting a susceptible neighbour in a time step, we use an STI model developed by Garnett and Anderson in [5]. To model our network, we use the Spatial Preferential Attachment (SPA) Model proposed in [1]. These networks are sparse power-law graphs with positive clustering coefficients [1]. It has been shown that the SPA model fits real-life social networks well [8]. Since we are working with a stochastic process on a random network, we modify the SPA model to remove some randomness. We show that, compared to the SPA model, vertices in our modified networks have the same expected degree and the overall degree distribution has the same power- law coefficient. Using techniques developed by [9], we will show that when popular high de- gree nodes are less infectious (scenario A), the infection will travel slowly through the metric space and respect the community structure. We also conjecture that in scenario B, the infection will take long jumps between communities. To sup- port our result and conjecture, we run simulations on the modified SPA model. While there are numerical studies exploring the relationship between the be- haviour of highly connected individuals and the spread of disease with respect to community structure [14], we believe these are the first analytic results on the topic. Our research presents new strategies for understanding communities in net- works. Networks generated by the modified SPA model display many properties of real-world systems, and are more tractable than those generated by the origi- High Degree Vertices and Spread of Infections 3 nal SPA model. More generally, by representing communities with a continuous feature space rather than with disjoint subsets, we can easily leverage geometric properties to prove otherwise difficult results. The work presented here develops techniques for understanding this geometric conception of community structure in networks. 2 Definitions Here we present the definitions of the SPA model, the modified SPA model, and our model of the infection. 2.1 The SPA Model The SPA model was first proposed in [1]. It is a spatial digraph model where vertices are embedded in a metric space. The metric space represents the feature space, which reflects the attributes of the vertices that determine their linking patterns. The model indirectly incorporates the principle of preferential attach- ment, first proposed by Barabasi and Albert (BA) [2], through the notion of spheres of influence around every vertex. Vertices with a larger in-degree have a sphere of influence with greater vol- ume, but as time progresses the spheres of influence of all nodes decrease. In the BA model, the preferential attachment came from a probability of a newcomer connecting to the old vertices. In the SPA model, we use the sphere of influence to incorporate the preferential attachment process. If a newcomer falls within an older vertex's sphere of influence, we connect them. Specifically, vertices are embedded in a hypercube C of dimension d with unit volume. We endow the hypercube with the torus metric derived from any of the Lp norms. The torus metric is used to avoid edge effects. If x and y are two vertices in C, the distance between them is given by: d(x, y) = min{(cid:107)x − y + u(cid:107)p : u ∈ {−1, 0, 1}m} The SPA model has parameters A1 ∈ (0, 1) and A2 ∈ [0,∞). (The original SPA model also has a parameter p representing the conditional probability that a vertex which falls into the sphere of influence of vertex, actually links to that vertex. We here assume this to be 1.) The model consists of a stochastic sequence of n graphs {Gt = (Vt, Et)}0≤t≤n with Vt ⊂ C. The index t is interpreted as the t-th time step. At each time t, the sphere of influence S(v, t) of a vertex v ∈ Vt is the ball centered at v with volume (cid:26) A1 deg − (cid:27) S(v, t) = min (v, t) + A2 t , 1 (1) Let G0 be the null graph. Given Gt−1, we define Gt = (Vt, Et) as follows. Vt = Vt−1 ∪ {vt} where vt is placed uniformly at random in C. The edge set Et = Et−1 ∪ {(vt, u) vt ∈ S(u, t)}. 4 Joshua Feldman and Jeannette Janssen We now review the relevant properties of the SPA model. As shown in [1], the network has a power law degree distribution, with an exponent of 1 + 1 . A1 The geometric nature of the network implies that there is a high amount of local clustering [10]. In [3], logarithmic bounds on the directed diameter were given. In [9] it was shown that the effective undirected diameter is also logarithmically bounded. 2.2 The Modified SPA Model While the SPA model generates spatial graphs that fit empirical networks well, we must modify the model to make it mathematically tractable for our purposes. Since the behaviour of a vertex during its early life significantly determines its late time behaviour, working with the preferential attachment model can be difficult. Instead, we modify the sphere of influence to depend upon the deterministic expected in-degree, instead of the stochastic actual in-degree. First we present a theorem from [10] on the expected in-degree of a vertex in the SPA model. Theorem 1. Let ω = ω(t) be any function tending to infinity together with t. The expected in-degree at time t of a vertex vi born at time i ≥ ω is given by E(deg − (vi, t)) = (1 + o(1)) A2 A1 (cid:18) t i (cid:19)A1 − A2 A1 A vertex's birth time i and the size of the overall network t determines its expected in-degree. Furthermore, if the expected degree is larger than log2 n then the real in-degree is concentrated around its expected in-degree [10]. Hence, the time a vertex is born can be used as a proxy for its degree, with old nodes being more highly connected than young nodes. We modify the SPA model by redefining the sphere of influence to depend on the vertex's expected in-degree, instead of its actual in-degree. This substitution makes the size of the sphere of influence a nonrandom object. Precisely, the modified spatial preferential attachment model is defined as the SPA model, with the one difference being that the size of the sphere of influence of vertex vi at time is changed to: (cid:26) A2 t1−A1iA1 (cid:27) S(vi, t) = min , 1 (2) We derive equation (2) by replacing the actual in-degree in formula (1) for the original sphere of influence with the expected in-degree and simplifying. We now state and prove a theorem which shows that the modified SPA model generates networks with an expected in-degree equivalent to the original model. Theorem 2. Let Gn be a graph generated by the modified SPA model with n vertices. The expected in-degree of a vertex vi born at time i is given by (cid:18)(cid:16) n (cid:19) (cid:17)A1 − 1 i −  E(deg − (vi, n)) = A2 A1 High Degree Vertices and Spread of Infections 5 where  < A2 A1 . Proof. Let vj be a vertex born at time j > i. Let Xj be a random variable that equals 1 if there is an edge from vj to vi and equals 0 otherwise. By the definition of the modified SPA model, we place an edge from vj to vi if and only if vj falls within the sphere of influence of vi. Since vj is placed in the hypercube uniformly at random, Xj = 1 with probability equal to the volume of vi's sphere of influence at time j. By the linearity of expectation, E(deg − (vi, n)) = E (cid:33) Xk (cid:32) n(cid:88) n(cid:88) n(cid:88) k=i+1 k=i+1 k=i+1 E (Xk) S(vi, k) = = (cid:90) n A2 x1−A1 iA1 dx −  (cid:18)(cid:16) n i (cid:19) (cid:17)A1 − 1 (cid:90) n −  S(vi, k) ≤ A2 x1−A1 iA1 i (cid:90) n+1 We approximate this sum with an integral. n(cid:88) S(vi, k) = k=i+1 i A2 A1 = To bound the error, we first recognize that, (cid:90) n+1 dx ≤ n(cid:88) k=i+1 A2 x1−A1 iA1 i+1 Hence, (cid:90) n i A2 iA1 A2 iA1 A2 A1 A2 A1  < = < < < A2 dx − x1−A1iA1 ((i + 1)A1 − iA1) − ((n + 1)A1 − nA1) x1−A1iA1 i+1 dx A2 A1 (i + 1)A1 − iA1 (cid:0)2A1 − 1(cid:1) A1 dx (cid:117)(cid:116) 6 Joshua Feldman and Jeannette Janssen In addition to having equivalent expected in-degrees, we also derive that both models lead to the same (power law) cumulative in-degree distribution. The cumulative in-degree distribution ck is defined as the number of vertices with in-degree j ≤ k divided by the total number of vertices. As stated above, from [1] we know that a.a.s. the cumulative in-degree distribution of networks generated by the SPA model follows a power law with exponent 1 . Theorem 3 A1 states that the same is true of networks generated by the modified SPA model. An event occurs with extreme probability (w.e.p.) if it occurs with probability at least 1 − e−Θ(log2 n) as n → ∞. for k > k(cid:48) = log2(n). − (vi, n) ≤ f (i) +  where  =(cid:112)f (i) log n. Theorem 3. Let Gn be a graph generated by the modified SPA model with n vertices. The cumulative in-degree distribution ck of Gn is w.e.p. a power law with exponent 1 A1 Proof. The in-degree of a vertex vi born at time i is the sum of n−i independent Bernoulli variables Xj with success probability equal to the volume of the sphere of influence S(vi, j). We let f (i) equal the expected in-degree of a vertex born at time i in a network of size n. By the generalized Chernoff bound [11], we know that w.e.p. f (i) −  ≤ deg Using this bound, we determine how many vertices have in-degree greater than k. If a vertex is born before i− = f−1(k + ), then w.e.p. it has a degree greater than k. Likewise, if a vertex is born after i+ = f−1(k − ), then w.e.p. it has a degree less than k. Hence, the number of vertices with degree greater than k is between i− and i+. By inverting the formula for expected degree and examining its asymptotic growth, we find i− = f−1(k + ) = (1 + o(1))f−1(k) Hence, the number of vertices with degree greater than k is w.e.p. (1+o(1))f−1(k). This implies that ck = (1 + o(1))(kA1/A2 − 1)−1/A1. (cid:117)(cid:116) i+ = f−1(k − ) = (1 + o(1))f−1(k) 2.3 Infectious Processes Now that we have a workable model of real-world networks, we define a SIR disease model in discrete time. To begin the infectious process, we pick a node at random to be the origin node. At time t = 0, we infect the origin node and denote all other nodes as susceptible. In each time step, the infected nodes infect each neighbour with probability β. Though the modified SPA model generates directed graphs, we ignore the orientation of the edges. If a susceptible vertex has multiple infected neighbours, they each independently attempt to infect the susceptible vertex. At the end of each time step, all infected nodes recover. This is a simplification of the typical SIR model because usually the recovery time is modelled as a stochastic variable. Here we simplify and assume each vertex to recover in exactly one time step. We run the process until no vertices are infected. If we run the infection process for t time steps on a network with n vertices, the infected and recovered vertices together with the edges taken by the infection (oriented in the direction the infection travelled) form an an acyclic directed High Degree Vertices and Spread of Infections 7 subgraph of the network. We denote this subgraph, I t time t. n, the infection graph at Suppose that in a given time step vertex v is infected, vertex u is susceptible, and they are neighbours. The probability β of v infecting u in the time step depends on κ(v), the average number of contacts v makes with u per time step, and the probability of transmitting the infection per contact τ . If v makes more contacts on average with u or if the probability of infection per contact is higher, the disease will have a greater chance of spreading. Following [5], we set β = 1 − e−τ κ To study how the behaviour of high degree nodes changes how a disease spreads through the network, we consider two different scenarios: scenario A and scenario B with their own infection probabilities βA and βB, respectively. In scenario A, we define the average number of contacts a vertex v makes with a neighbour per time step as κA(v) = T − E(deg (v)) − where T is the average number of contacts v makes with all its neighbours in the time step. We use E(deg (v)) as a rough approximation of the degree of v. Hence, in scenario A, βA(v) = 1 − e−τ κA(v). Since T is constant for all vertices, high and low degree alike, high degree vertices make fewer contacts with any single neighbour because their contacts are dispersed over a greater number vertices. While high degree nodes have many neighbours, these connections may be weaker than a node with few neighbours. In scenario B, however, we no longer keep the average number of contacts a vertex makes with all its neighbours in a time step constant. Instead, we let T (v) depend on T and the expected in-degree of v. We define T (v) = T − E(deg (v)) (cid:104)deg −(cid:105) −(cid:105) = (1 + o(1)) A2 1−A1 −(cid:105) is the average degree in the graph. From [1], we know a.a.s. that where (cid:104)deg (cid:104)deg in the SPA model, which is asymptotically constant. Since the total number of edges in the network is the sum of Bernoulli variables, by the linearity of expectation, it is a simple calculation to show that (cid:104)deg −(cid:105) is equivalent in the modified and original SPA models. As in scenario A, we use E(deg (v)) to approximate the degree of v. From the average number of contacts a vertex makes with all its neighbours in a time step, we can define the average number of contacts a vertex makes with a specific neighbour in a time step as − κB(v) = T (v) E(deg(v)) = Hence, in scenario B, βB = 1 − e−τ κB , which is constant. Any infected vertex v has an equal chance of infecting a neighbour, regardless of the degree of v. Hence, in scenario B, we expect that high degree vertices will pass the infection on to more individuals than low degree vertices. T (cid:104)deg −(cid:105) 8 Joshua Feldman and Jeannette Janssen 3 Spatial spread of infections Our main result states that when highly connected vertices are less infectious, the infection will not make large jumps through the metric space. Since our metric space represents a feature space, this means that the infection spreads through communities rather than jumping between them. To prove this result, we treat the infection as percolating through the network. We first show that a.a.s. all vertices in the network will only infect neighbours within a certain distance. From this result, we conclude that any particular infection will a.a.s. be bounded by a ball of a relatively small radius after a given number of time steps. Theorem 4. Let Gn be a graph with n vertices generated by the modified SPA model. Let λ = n−φ be such that φ < A1(1−A1) (A1+2)d . For scenario A, a.a.s. all nodes in the infection graph at time t will be within tλ of the origin node u. 3.1 Proof of Theorem 4 Before we present the proof, we first adopt some conventions regarding the in- fection process. Instead of considering the infection spreading through a network in time, we a priori consider whether any vertex would infect a neighbour given that they are connected. If we "occupy" each pair of vertices with probability βA, and restrict our occupied pairs to edges present in our network, we get a subgraph consisting of where the infection could possibly travel, which we call the potential infection graph. The infection graph, describing where the infection actually spread, will be a subset of the potential infection graph. Formally, let Gn = (Vn, En) be a network of order n generated by the mod- ified SPA model, where we replace each directed edge by two edges in opposite directions. We consider ordered pairs of vertices (vi, vj) and (vj, vi) because our infection model ignores the orientation of the edges in the original network gen- erated by the modified SPA model. In other words, even though all edges in the modified SPA model are directed from younger to older vertices, we allow the old to infect the young. Let u ∈ Vn be the node where the infection originates. With each ordered pair of vertices (vi, vj) we associate a Bernoulli random variable Ivi,vj defined as (cid:40) Ivi,vj = 1 with probability βA(vi) 0 otherwise (3) We define the potential infection graph on Gn as the graph In = (VI , EI ) where VI = Vn and EI = {(vi, vj){vi, vj} ∈ En and Ivi,vj = 1}. We can recover the infection graph at time t, I t n, by taking the subgraph induced by the tth out- neighbourhood of u in In. The proof of our main result is based on an analysis of the edges in the potential infection digraph. Define the length of an edge as the distance between its two end points. We first establish a lemma stating that there is an asymptotic bound on the length of edges in the potential infection graph. High Degree Vertices and Spread of Infections 9 Lemma 1. Let Gn be a graph with n vertices generated by the modified SPA model and In be a potential infection graph on Gn in scenario A. Let λ = n−φ such that φ < A1(1−A1) (A1+2)d . Then a.a.s. In does not contain any edges of length greater than λ. Proof. Let L represent the event of there being an edge in In where the distance between its endpoints is greater than λ. We will call such edges "long" and all other edges "short". Given two (not necessarily connected) nodes in Vn, vi and vj, let Lvi,vj represent the event of there being a long edge from vi to vj in In. Thus, Lvi,vj occurs if vi and vj (the vertices born at time i and j, respectively) have distance at least λ, there is an edge between vi and vj, and the infection (cid:0)Lvi,vj ∪ Lvj ,vi (cid:1), by taking the can travel from vi to vj. Since L =(cid:83)n−1 n(cid:88) P(L) ≤ n−1(cid:88) union bound, we know (cid:83)n i=0 j=i+1 P(Lvi,vj ) + P(Lvj ,vi) i=0 j=i+1 Our proof will show that this double sum goes to 0 as n approaches infinity. We first need an expression for P(Lvi,vj ) + P(Lvj ,vi ). Since i < j, by the definition of the potential infection graph, Lvi,vj occurs if and only if three other events also occur: d(vi, vj) > λ, vj ∈ S(vi, j), and Ivi,vj = 1. In other words, for there to be a long edge between vi and vj, Ivi,vj must equal 1 and vj must be far enough away from vi to be considered long, but close enough to be in the sphere of influence of vi at time j. Since vj is placed uniformly at random in the hypercube, the distance d(vj, vi) and the event Ivi,vj = 1 are independent. Therefore, for any specific values for j and i. i < j, we can write P(Lvi,vj ) = P(d(vi, vj) > λ, vj ∈ S(vi, j), Ivi,vj = 1) = P(d(vi, vj) > λ, vj ∈ S(vi, j))P(Ivi,vj = 1) For the edge oriented in the opposite direction, we can make a similar argu- ment. Hence, we can write P(Lvj ,vi) = P(d(vi, vj) > λ, vj ∈ S(vi, j), Ivj ,vi = 1) = P(d(vi, vj) > λ, vj ∈ S(vi, j))P(Ivj ,vi = 1) Combining our expressions for P(Lvi,vj ) and P(Lvj ,vi) we find that P(Lvi,vj )+P(Lvj ,vi) = P(d(vi, vj) > λ, vj ∈ S(vi, j))(P(Ivi,vj = 1)+P(Ivj ,vi = 1)) We know P(Ivi,vj = 1) = βA(vi) and P(Ivj ,vi = 1) = βA(vj) from equation (3), but we need expressions for P(d(vi, vj) > λ, vj ∈ S(vi, j)) and P(Ivi,vj = 1). 10 Joshua Feldman and Jeannette Janssen We use a geometric argument to find P(d(vj, vi) > λ, vj ∈ S(vi, j)), which is the probability of there being a long edge between vi and vj in the original network. There are three cases. In the first case, the sphere of influence of vi has radius smaller than λ at its time of birth. Since spheres of influence only shrink, in this case there will never be a time when vj can both fall within vi's sphere of influence and be greater than λ away from vi. This case occurs when i exceeds a critical value m, which is the first time when vertices are born with a sphere of influence that has radius smaller than λ. In the second case, i is smaller than the critical value m, but j is larger than the second critical value mi. This critical value is reached when the radius of vi's sphere of influence equals λ. Again, since spheres of influence only shrink, vertices born at times after mi cannot have d(vj, vi) > λ and vj ∈ S(vi, j)). In these first two cases, P(d(vj, vi) > λ, vj ∈ S(vi, j)) = 0. A ball of radius λ has volume λdcp where cp depends on our Lp norm. Using this, we find that m = A2 λdcp mi = (cid:18) A2 (cid:19) 1 1−A1 iλdcp In the last case, i < m and j < mi, which means d(vj, vi) > λ and vj ∈ S(vi, j)) is possible. Since vj is placed in the hypercube uniformly at random and the hypercube has unit volume, P(d(vj, vi) > λ, vj ∈ S(vi, j)) is equal to the volume of the spherical shell between the sphere of influence and the ball centred at vi with radius λ which we denote B(vi, λ). Hence, in this case, P(d(vj, vi) > λ, vj ∈ S(vi, j)) = S(vi, j) − B(vi, λ). Combining the results from the previous paragraphs, P(L) ≤ m(cid:88) mi(cid:88) i=0 j=i+1 (S(vi, j) − B(vi, λ))(βA(vi) + βA(vj)) Since the oldest vertex will always have the largest sphere of influence, we know that mi < m1 for all i ∈ [1, m] and that m < m1. Also, A2 = S(v1, 1) > S(vi, j)−B(vi, λ) for all i, j ∈ [1, m1]. Finally, since vm1 has the lowest expected degree of all vertices born at or before time m1, βA(vm1) > βA(vi), βA(vj) for all i, j ∈ [1, m1]. Hence, we can write P(L) ≤ m1(cid:88) m1(cid:88) 1 − exp ≤ 2 j=i+1 i=1 − 2A2βA(vm1 )   A2m2 1 (4) (5) (cid:18)(cid:16) n τ T (cid:19) (cid:17)A1 − 1 m1 A2 A1 From the formula for m1, we see that m1 ∼ n γ = τ T , we see that φd 1−A1 . Setting φ = A1(1−A1) (A1+2)d and High Degree Vertices and Spread of Infections 11 1 − exp (cid:18) (cid:18) (cid:18) 1 − exp 1 − P(L) ≤ 2 ∼ 2 ∼ 2 γ − (cid:18)  A2m2  (cid:19) (cid:18)(cid:16) n (cid:17)A1 − 1 (cid:17)(cid:19)(cid:19) (cid:16) φd (cid:18) −γnA1 (cid:17) (cid:16) φd A2n 1−A1 −1 2φd 1−A1 (cid:16) φd m1 1 + O n2A1 1−A1 1 − γnA1 −1 1−A1 = o(1) (cid:17)(cid:19)(cid:19)(cid:19) −1 2φd 1−A1 A2n (6) (7) (8) (9) (cid:117)(cid:116) Using this lemma, we can now prove our main result, Theorem 4. Proof. Let B represent the bad event where there is a node v in the infection digraph at time t, I t n, where d(v, u) > tλ. If B occurs, then there is a path from n is the tth neighbourhood of u in In. By v to u with at most t edges because I t the triangle inequality, at least one of the edges in the path from v to u has a length greater than λ and, more generally, there is an edge in the potential infection graph with a length greater than λ. Let L represent the event of there being an edge in In where the distance between its endpoints is greater than λ. Since B ⊂ L, P(B) ≤ P(L), but by the previous lemma, a.a.s. P(L) = 0. (cid:117)(cid:116) 3.2 Conjecture for Scenario B We conjecture that in scenario B, the negation of Lemma 1 holds. We know that the modified SPA model a.a.s. has edges greater than length λ(cid:48) where λ(cid:48) = µn−θ with θ > 1 − A1 4A1+2 and µ constant. We conjecture that the potential infection graph will have long edges as well. Conjecture 1 Let Gn be a graph with n vertices generated by the modified SPA model and In be a potential infection graph on Gn in scenario B. There exists φ > 0 such that if we let λ = n−φ, a.a.s. In contains an edge of length greater than λ. 4 Simulations Using simulations, we test our theoretic result that the infection in scenario A will not make long jumps. We also use simulations to provide evidence for our conjecture that, in scenario B, the infection can make long jumps if we pick the origin vertex correctly. Recall that in both infection scenarios, we can vary how easily the infection spreads by altering T , the total number of contacts made per time step, and τ , the probability of transmission per contact. Also recall 12 Joshua Feldman and Jeannette Janssen that we denote γ = τ T . For the 2 infection scenarios, we consider 3 levels of contagiousness: γ = 1, γ = 10 and γ = 100. We generated 10 networks with the modified SPA network in R1 with A1 = 0.5 and A2 = 1. Our results are highly asymptotic and the bound is lowest in low dimensions so, due to computational constraints, we choose to simulate in R1. The 10 networks are of increasing size, beginning at n = 1000 and increasing by increments of 1000 to a maximum of n = 10000. For each network, we run each of the 6 infection processes 50 times. We chose to begin the infections at the oldest vertex because it has the highest likelihood of having neighbours far away in the metric space. On one hand, we want to give the infection in scenario B the opportunity to make long jumps and, on the other hand, we do not want to mistakenly conclude that the infection in scenario A makes short jumps only because it was never exposed to long edges. While our main result states that given a number of time steps, a.a.s. the infection remains within a certain region, this result depends on both the size of the network and the current time step in the infection process. We thought it would be more clear to compare Lemma 1 to our simulations, which states that the edge length taken by the infection in scenario A is bounded. To compare scenario A and B, we likewise observe the maximum edge length the infection in scenario B takes. Fig. 1. Longest jump made by the infection vs. network size in scenario A and B stratified by 3 levels of contagion. The results of our simulations are shown in Figure 1. We make two conclu- sions from our simulations. First, we see that in scenario A, when high degree nodes are less contagious, the infection takes shorter jumps than in scenario B. As indicated by our asymptotic result, the difference becomes more pronounced in larger networks. One might notice that in scenario B the infection does not always make long jumps, which seems to contradict our conclusion. These out- High Degree Vertices and Spread of Infections 13 liers can be explained by recognizing that the longest edge in the entire network is a non-clustered random variable. Vertices receive long edges in a brief period during the early steps of the model and, consequently, whether there are long edges in the network at all is highly variable. It is not that the infection avoids the long edges, but rather, that the infection has no long edges to take in the first place. Second, we see that this difference between scenario A and scenario B becomes less pronounced when we make the infection more contagious. Again, this matches our theoretic result, since our bound on the probability of long infection increases when γ is larger. We expect that if we could generated large enough networks, eventually we would see the difference between scenario A and B reemerge, even at high levels of contagion. Fig. 2. A log-log plot of the longest jump made by the infection vs. network size in scenario A with γ = 10. The equation for the regression line is log(y)=-0.51log(x)+1.40 (R2 = 0.19). To compare our analytic bound φ to our simulations, we perform a linear regression on a log-log plot of longest jump vs. network size for infections in Sce- nario A with γ = 10 (see Figure 2). The simulations are the same as those represented in Figure 1. We have added a small amount of noise to the x- values in order to make the distribution of data more clear. If our result is true, then we should expect that the slope of the regression line should be less than − A1(1−A1) our lemma. Of course, our data is highly variable and this plot only gestures towards the fact that our bound is valid. We expect that for larger networks, this variation would decrease. (A1+2)d = −0.1. We found the slope to be −0.51, which provides support for To illustrate that the infection spreads slowly through the feature space in scenario A, we simulate one run of the process on a graph generated by the modified SPA model in R2 with A1 = 0.5, A2 = 1, γ = 10, and n = 1000. 14 Joshua Feldman and Jeannette Janssen We present the simulation in Figure 3. The blue vertices were infected earlier in the process and red vertices later. Since nearby vertices have similar colours (recall that we are using the torus metric), this simulation provides additional qualitative evidence for our finding that the infection does not make long jumps in scenario A. Fig. 3. A scenario A infection with γ = 10 on a modified SPA network with A1 = 0.5, A2 = 1, and n = 1000. The gradient from blue to red represents earlier to later infections. 5 Conclusion When modelling contagious processes, it is important to take contacts made per neighbour into account. With analytic and numeric results, we show that if all High Degree Vertices and Spread of Infections 15 vertices make an equal number of contacts, the infection will spread through communities rather than jumping between them. High degree vertices are more likely to have neighbours in distant communities and when these popular individ- uals are less contagious, the infection is less likely to spread from one community to another. We also show with simulations that scaling the number of contacts a vertex makes by its degree results in an epidemic that spreads irrespective of the communities in the network. In addition to our conjecture, we identify two areas of future research. First, since infections in scenario A and scenario B behave differently with respect to community structure, interventions may benefit from exploiting this distinction. In other words, if we know a contagious process will spread through communities, how can we use this fact to control the epidemic? Likewise, how should we control diseases that jump between communities? The second area of potential research is studying scenario A infections further. While we find that these types of contagious processes will be a.a.s. bounded by a ball with a growing radius, we do not discuss how this may affect the success of an infection spreading through a network. If a disease does not jump, does community structure prevent the infection from spreading beyond its original group? References 1. Aiello, W., Bonato, A., Cooper, C., Janssen, J., Pralat, P.: A Spatial Web Graph Model with Local Influence Regions. Internet Mathematics 5(12), 173 -- 193 (2007) 2. Barab´asi, A.L., Albert, R.: Emergence of Scaling in Random Networks. Science 286(5439) (1999) 3. Cooper, C., Frieze, A., Pra(cid:32)lat, P.: Some Typical Properties of the Spatial Preferred Attachment Model. Internet Mathematics 10(1-2), 116 -- 136 (2014) 4. Flaxman, A.D., Frieze, A.M., Vera, J.: A Geometric Preferential Attachment Model of Networks. Internet Mathematics 3(2), 187 -- 206 (2006) 5. Garnett, G.P., Anderson, R.M.: Sexually Transmitted Diseases and Sexual Behav- ior: Insights from Mathematical Models. The Journal of Infectious Diseases 174(2), S150 -- S161 (1996) 6. Hoff, P.D., Raftery, A.E., Handcock, M.S.: Latent Space Approaches to Social Network Analysis. Journal of the American Statistical Association 97(460), 1090 -- 1098 (2002) 7. Jacob, E., Morters, P.: Spatial preferential attachment networks: Power laws and clustering coefficients. Annals of Applied Probability 25(2), 632 -- 662 (2015) 8. Janssen, J., Hurshman, M., Kalyaniwalla, N.: Model Selection for Social Networks Using Graphlets. Internet Mathematics 8(4), 338 -- 363 (2012) 9. Janssen, J., Mehrabian, A.: Rumours Spread Slowly in a Small World Spatial Network. Algorithms and Models for the Web Graph pp. 107 -- 118 (2015) 10. Janssen, J., Pralat, P., Wilson, R.: Geometric graph properties of the spatial pre- ferred attachment model. Advances in Applied Mathematics 50(2), 243 -- 267 (2013) 11. Lu, L., Chung, F.: Old and new concentration inequalities. In: Complex Graphs and Networks, chap. 2, pp. 23 -- 56. American Mathematical Society, Providence (2006) 12. Newman, M.E.J., Peixoto, T.P.: Generalized communities in networks. Physical Review Letters 115(8) (2015) 16 Joshua Feldman and Jeannette Janssen 13. Nordvik, M.K., Liljeros, F.: Number of Sexual Encounters Involving Intercourse and the Transmission of Sexually Transmitted Infections. Sexually Transmitted Diseases 33(6), 342 -- 349 (2006) 14. Salath´e, M., Jones, J.H., May, R., Johnson, A., Auranen, K.: Dynamics and Control of Diseases in Networks with Community Structure. PLoS Computational Biology 6(4), e1000736 (2010)
1805.12512
3
1805
2018-09-22T21:02:03
On the Origins of Memes by Means of Fringe Web Communities
[ "cs.SI", "cs.CY" ]
Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2.6B posts gathered from Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, over the course of 13 months. We group the images posted on fringe Web communities (/pol/, Gab, and The_Donald subreddit) into clusters, annotate them using meme metadata obtained from Know Your Meme, and also map images from mainstream communities (Twitter and Reddit) to the clusters. Our analysis provides an assessment of the popularity and diversity of memes in the context of each community, showing, e.g., that racist memes are extremely common in fringe Web communities. We also find a substantial number of politics-related memes on both mainstream and fringe Web communities, supporting media reports that memes might be used to enhance or harm politicians. Finally, we use Hawkes processes to model the interplay between Web communities and quantify their reciprocal influence, finding that /pol/ substantially influences the meme ecosystem with the number of memes it produces, while \td has a higher success rate in pushing them to other communities.
cs.SI
cs
On the Origins of Memes by Means of Fringe Web Communities∗ Savvas Zannettou(cid:63), Tristan Caulfield‡, Jeremy Blackburn†, Emiliano De Cristofaro‡, Michael Sirivianos(cid:63), Gianluca Stringhini‡(cid:5), and Guillermo Suarez-Tangil‡+ †University of Alabama at Birmingham, (cid:5)Boston University, +King's College London (cid:63)Cyprus University of Technology, ‡University College London [email protected] {t.caulfield,e.decristofaro}@ucl.ac.uk [email protected], [email protected], [email protected], [email protected] 8 1 0 2 p e S 2 2 ] I S . s c [ 3 v 2 1 5 2 1 . 5 0 8 1 : v i X r a Abstract Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propa- gation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across mul- tiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2.6B posts gathered from Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, over the course of 13 months. We group the images posted on fringe Web communities (/pol/, Gab, and The Donald subreddit) into clusters, annotate them using meme metadata obtained from Know Your Meme, and also map images from mainstream communities (Twitter and Reddit) to the clusters. Our analysis provides an assessment of the popularity and diversity of memes in the context of each community, showing, e.g., that racist memes are extremely common in fringe Web communities. We also find a substantial number of politics- related memes on both mainstream and fringe Web commu- nities, supporting media reports that memes might be used to enhance or harm politicians. Finally, we use Hawkes processes to model the interplay between Web communities and quantify their reciprocal influence, finding that /pol/ substantially influ- ences the meme ecosystem with the number of memes it pro- duces, while The Donald has a higher success rate in pushing them to other communities. Introduction 1 The Web has become one of the most impactful vehicles for the propagation of ideas and culture. Images, videos, and slo- gans are created and shared online at an unprecedented pace. Some of these, commonly referred to as memes, become viral, evolve, and eventually enter popular culture. The term "meme" was first coined by Richard Dawkins [12], who framed them as cultural analogues to genes, as they too self-replicate, mu- tate, and respond to selective pressures [18]. Numerous memes have become integral part of Internet culture, with well-known examples including the Trollface [54], Bad Luck Brian [27], and Rickroll [49]. While most memes are generally ironic in nature, used with ∗A shorter version of this paper appears in the Proceedings of 18th ACM Internet Measurement Conference (IMC 2018). This is the full version. no bad intentions, others have assumed negative and/or hateful connotations, including outright racist and aggressive under- tones [84]. These memes, often generated by fringe commu- nities, are being "weaponized" and even becoming part of po- litical and ideological propaganda [67]. For example, memes were adopted by candidates during the 2016 US Presidential Elections as part of their iconography [19]; in October 2015, then-candidate Donald Trump retweeted an image depicting him as Pepe The Frog, a controversial character considered a hate symbol [58]. In this context, polarized communities within 4chan and Reddit have been working hard to create new memes and make them go viral, aiming to increase the visibility of their ideas -- a phenomenon known as "attention hacking" [64]. Motivation. Despite their increasingly relevant role, we have very little measurements and computational tools to under- stand the origins and the influence of memes. The online in- formation ecosystem is very complex; social networks do not operate in a vacuum but rather influence each other as to how information spreads [86]. However, previous work (see Sec- tion 6) has mostly focused on social networks in an isolated manner. In this paper, we aim to bridge these gaps by identifying and addressing a few research questions, which are oriented towards fringe Web communities: 1) How can we character- ize memes, and how do they evolve and propagate? 2) Can we track meme propagation across multiple communities and measure their influence? 3) How can we study variants of the same meme? 4) Can we characterize Web communities through the lens of memes? Our work focuses on four Web communities: Twitter, Red- dit, Gab, and 4chan's Politically Incorrect board (/pol/), be- cause of their impact on the information ecosystem [86] and anecdotal evidence of them disseminating weaponized memes [73]. We design a processing pipeline and use it over 160M images posted between July 2016 and July 2017. Our pipeline relies on perceptual hashing (pHash) and clustering techniques; the former extracts representative feature vectors from the images encapsulating their visual peculiarities, while the latter allow us to detect groups of images that are part of the same meme. We design and implement a custom distance met- ric, based on both pHash and meme metadata, obtained from Know Your Meme (KYM), and use it to understand the in- 1 terplay between the different memes. Finally, using Hawkes processes, we quantify the reciprocal influence of each Web community with respect to the dissemination of image-based memes. Findings. Some of our findings (among others) include: 1. Our influence estimation analysis reveals that /pol/ and The Donald are influential actors in the meme ecosys- tem, despite their modest size. We find that /pol/ substan- tially influences the meme ecosystem by posting a large number of memes, while The Donald is the most efficient community in pushing memes to both fringe and main- stream Web communities. 2. Communities within 4chan, Reddit, and Gab use memes to share hateful and racist content. For instance, among the most popular cluster of memes, we find variants of the anti-semitic "Happy Merchant" meme [36] and the controversial Pepe the Frog [45]. 3. Our custom distance metric effectively reveals the phy- logenetic relationships of clusters of images. This is evi- dent from the graph that shows the clusters obtained from /pol/, Reddit's The Donald subreddit, and Gab available for exploration at [1]. Contributions. First, we develop a robust processing pipeline for detecting and tracking memes across multiple Web com- munities. Based on pHash and clustering algorithms, it sup- ports large-scale measurements of meme ecosystems, while minimizing processing power and storage requirements. Sec- ond, we introduce a custom distance metric, geared to high- light hidden correlations between memes and better under- stand the interplay and overlap between them. Third, we pro- vide a characterization of multiple Web communities (Twitter, Reddit, Gab, and /pol/) with respect to the memes they share, and an analysis of their reciprocal influence using the Hawkes Processes statistical model. Finally, we release our processing pipeline and datasets1, in the hope to support further measure- ments in this space. 2 Methodology In this section, we present our methodology for measuring the propagation of memes across Web communities. 2.1 Overview Memes are high-level concepts or ideas that spread within a culture [12]. In Internet vernacular, a meme usually refers to variants of a particular image, video, clich´e, etc. that share a common theme and are disseminated by a large number of users. In this paper, we focus on their most common incarna- tion: static images. To gain an understanding of how memes propagate across the Web, with a particular focus on discovering the communi- ties that are most influential in spreading them, our intuition is to build clusters of visually similar images, allowing us to track variants of a meme. We then group clusters that belong to the same meme to study and track the meme itself. In Fig- ure 1, we provide a visual representation of the Smug Frog 1https://github.com/memespaper/memes pipeline 2 Figure 1: An example of a meme (Smug Frog) that provides an intu- ition of what an image, a cluster, and a meme is. meme [52], which includes many variants of the same image (a "smug" Pepe the Frog) and several clusters of variants. Clus- ter 1 has variants from a Jurassic Park scene, where one of the characters is hiding from two velociraptors behind a kitchen counter: the frogs are stylized to look similar to velociraptors, and the character hiding varies to express a particular message. For example, in the image in the top right corner, the two frogs are searching for an anti-semitic caricature of a Jew (itself a meme known as the Happy Merchant [36]). Cluster N shows variants of the smug frog wearing a Nazi officer military cap with a photograph of the infamous "Arbeit macht frei" slogan from the distinctive curved gates of Auschwitz in the back- ground. In particular, the two variants on the right display the death's head logo of the SS-Totenkopfverbande organization responsible for running the concentration camps during World War II. Overall, these clusters represent the branching nature of memes: as a new variant of a meme becomes prevalent, it often branches into its own sub-meme, potentially incorporat- ing imagery from other memes. 2.2 Processing Pipeline Our processing pipeline is depicted in Figure 2. As dis- cussed above, our methodology aims at identifying clusters of similar images and assign them to higher level groups, which are the actual memes. Note that the proposed pipeline is not limited to image macros and can be used to identify any image. We first discuss the types of data sources needed for our ap- proach, i.e., meme annotation sites and Web communities that post memes (dotted rounded rectangles in the figure). Then, we describe each of the operations performed by our pipeline (Steps 1-7, see regular rectangles). Data Sources. Our pipeline uses two types of data sources: 1) sites providing meme annotation and 2) Web communi- ties that disseminate memes. In this paper, we use Know Your Meme for the former, and Twitter, Reddit, /pol/, and Gab for the latter. We provide more details about our datasets in Sec- tion 3. Note that our methodology supports any annotation site and any Web community, and this is why we add the "Generic" sites/communities notation in Figure 2. pHash Extraction (Step 1). We use the Perceptual Hash- ing (pHash) algorithm [65] to calculate a fingerprint of each image in such a way that any two images that look similar to the human eye map to a "similar" hash value. pHash generates a feature vector of 64 elements that de- scribe an image, computed from the Discrete Cosine Trans- form among the different frequency domains of the im- Cluster 1Cluster NImageSmug Frog Meme age matches a cluster if the distance is less than or equal to a threshold θ, which we set to 8, as it allows us to capture the diversity of images that are part of the same meme while maintaining a low number of false positives. As the annotation process considers all the images of a KYM entry's image gallery, it is likely we will get multiple an- notations for a single cluster. To find the representative KYM entry for each cluster, we select the one with the largest pro- portion of matches of KYM images with the cluster medoid. In case of ties, we select the one with the minimum average Hamming distance. As KYM is based on community contributions it is unclear how good our annotations are. To evaluate KYM entries and our cluster annotations, three authors of this paper assessed 200 annotated clusters and 162 KYM entries. We find that only 1.85% of the assessed KYM entries were regarded as "bad" or not sufficient. When it comes to the clustering annotation, we note that the three annotators had substantial agreement (Fleis agreement score equal to 0.67) and that the clustering accuracy, after majority agreement, of the assessed clusters is 89% . We refer to Appendix B for details about the annotation process and results. Association of images to memes (Step 6). To associate im- ages posted on Web communities (e.g., Twitter, Reddit, etc.) to memes, we compare them with the clusters' medoids, us- ing the same threshold θ. This is conceptually similar to Step 5, but uses images from Web communities instead of images from annotation sites. This lets us identify memes posted in generic Web communities and collect relevant metadata from the posts (e.g., the timestamp of a tweet). Note that we track the propagation of memes in generic Web communities (e.g., Twitter) using a seed of memes obtained by clustering im- ages from other (fringe) Web communities. More specifically, our seeds will be memes generated on three fringe Web com- munities (/pol/, The Donald subreddit, Gab); nonetheless, our methodology can be applied to any community. Analysis and Influence Estimation (Step 7). We analyze all relevant clusters and the occurrences of memes, aiming to assess: 1) their popularity and diversity in each community; 2) their temporal evolution; and 3) how communities influence each other with respect to meme dissemination. 2.3 Distance Metric To better understand the interplay and connections between the clusters, we introduce a custom distance metric, which re- lies on both the visual peculiarities of the images (via pHash) and data available from annotation sites. The distance metric supports one of two modes: 1) one for when both clusters are annotated (full-mode), and 2) another for when one or none of the clusters is annotated (partial-mode). Definition. Let c be a cluster of images and F a set of fea- tures extracted from the clusters. The custom distance metric between cluster ci and cj is defined as: wf × rf (ci, cj) (1) distance(ci, cj) = 1 −(cid:88) f∈F where rf (ci, cj) denotes the similarity between the features 3 Figure 2: High-level overview of our processing pipeline. age. Thus, visually similar images have minor differences in their vectors, hence allowing to search for and detect visu- ally similar images. For example, the string representation of the pHashes obtained from the images in cluster N (see Figure 1) are 55352b0b8d8b5b53, 55952b0bb58b5353, and 55952b2b9da58a53, respectively. The algorithm is also robust against changes in the images, e.g., signal processing opera- tions and direct manipulation [87], and effectively reduces the dimensionality of the raw images. Clustering via pairwise distance calculation (Steps 2-3). Next, we cluster images from one or more Web Communities using the pHash values. We perform a pairwise comparison of all the pHashes using Hamming distance (Step 2). To support large numbers of images, we implement a highly paralleliz- able system on top of TensorFlow [3], which uses multiple GPUs to enhance performance. Images are clustered using a density-based algorithm (Step 3). Our current implementation uses DBSCAN [15], mainly because it can discover clusters of arbitrary shape and performs well over large, noisy datasets. Nonetheless, our architecture can be easily tweaked to support any clustering algorithm and distance metric. We also perform an analysis of the clustering performance and the rationale for selecting the clustering threshold. We re- fer to Appendix A for more details. Screenshots Removal (Step 4). Meme annotation sites like KYM often include, in their image galleries, screenshots of so- cial network posts that are not variants of a meme but just com- ments about it. Hence, we discard social-network screenshots from the annotation sites data sources using a deep learning classifier. We refer to Appendix C for details about the model and the training dataset. Cluster Annotation (Steps 5). Clustering annotation uses the medoid of each cluster, i.e., the element with the minimum square average distance from all images in the cluster. In other words, the medoid is the image that best represents the clus- ter. The clusters' medoids are compared with all images from meme annotation sites, by calculating the Hamming distance between each pair of pHash vectors. We consider that an im- 3. Clustering 1. pHash Extraction2. pHash-based PairwiseDistance CalculationpHashes of some or all Web communities' imagesClusters of images5. Cluster Annotation Pairwise Comparisons of pHashesannotated images 6. Association ofImages to ClustersAnnotated ClusterspHashes of annotated images pHashes (all Web Communities) 7. Analysis andInfluence EstimationOccurrences of Memes in all Web Communities 4. ScreenshotClassifierannotated images pHashes of non-screenshot annotated images Know Your MemeGenericAnnotationSitesMeme Annotation SitesGeneric WebCommunities4chanTwitterRedditGabWeb Communities posting Memesimages mj, for ci and cj, respectively). Specifically, for each cate- gory, we calculate the Jaccard index between the annotations of both medoids, for memes, cultures, and people, thus acquir- ing rmeme, rculture, rpeople, respectively. Modes. Our distance metric measures how similar two clusters are. If both clusters are annotated, we operate in "full-mode," and in "partial-mode" otherwise. For each mode, we use dif- ferent weights for the features in Eq. 1, which we set empiri- cally as we lack the ground-truth data needed to automate the computation of the optimal set of thresholds. Full-mode. In full-mode, we set weights as follows. 1) The features from the perceptual and meme categories should have higher relevance than people and culture, as they are intrin- sically related to the definition of meme (see Section 2.1). The last two are non-discriminant features, yet are informative and should contribute to the metric. Also, 2) rmeme should not outweigh rperceptual because of the relevance that visual similarities have on the different variants of a meme. Like- wise, rperceptual should not dominate over rmeme because of the branching nature of the memes. Thus, we want these two categories to play an equally important weight. There- fore, we choose wperceptual=0.4, wmeme=0.4, wpeople=0.1, wculture=0.1. This means that when two clusters belong to the same meme and their medoids are perceptually similar, the distance be- tween the clusters will be small. In fact, it will be at most 0.2 = 1 − (0.4 + 0.4) if people and culture do not match, and 0.0 if they also match. Note that our metric also assigns small distance values for the following two cases: 1) when two clusters are part of the same meme variant, and 2) when two clusters use the same image for different memes. Partial-mode. In this mode, we associate unannotated images with any of the known clusters. This is a critical component of our analysis (Step 6), allowing us to study images from generic Web communities where annotations are unavailable. In this case, we rely entirely on the perceptual features. We once again use Eq. 1, but simply set all weights to 0, except for wperceptual (which is set to 1). That is, we compare the image we want to test with the medoid of the cluster and we apply Eq. 2 as described above. 3 Datasets We now present the datasets used in our measurements. 3.1 Web Communities As mentioned earlier, our data sources are Web communities that post memes and meme annotation sites. For the former, we focus on four communities: Twitter, Reddit, Gab, and 4chan (more precisely, 4chan's Politically Incorrect board, /pol/). This provides a mix of mainstream social networks (Twitter and Reddit) as well as fringe communities that are often asso- ciated with the alt-right and have an impact on the information ecosystem (Gab and /pol/) [86]. There are several other platforms playing important roles in spreading memes, however, many are "closed" (e.g., Face- book) or do not involve memes based on static images (e.g., Figure 3: Different values of rperceptual (y-axis) for all possible in- puts of d (x-axis) with respect to the smoother τ. represents the relevance of each feature. Note that(cid:80) of type f ∈ F of cluster ci and cj, and wf is a weight that f wf = 1 and rf (ci, cj) = {x ∈ R 0 ≤ x ≤ 1}. Thus, distance(ci, cj) is a number between 0 and 1. Features. We consider four different features for rf∈F, specif- ically, F = {perceptual, meme, people, culture}; see below. rperceptual: this feature is the similarity between two clusters from a perceptual viewpoint. Let h be a pHash vector for an image m in cluster c, where m is the medoid of the cluster, and dij the Hamming distance between vectors hi and hj (see Step 5 in Section 2.2). We compute dij from ci and cj as fol- lows. First, we obtain obtain the medoid mi from cluster ci. Subsequently, we obtain hi=pHash(mi). Finally, we compute dij=Hamming(hi, hj). We simplify notation and use d instead of dij to denote the distance between two medoid images and refer to this distance as the Hamming score. We define the perceptual similarity between two clusters as an exponential decay function over the Hamming score d: rperceptual(d) = 1 − d τ × emax/τ (2) where max represents the maximum pHash distance between two images and τ is a constant parameter, or smoother, that controls how fast the exponential function decays for all val- ues of d (recall that {d ∈ R 0 ≤ d ≤ max}). Note that max is bound to the precision given by the pHash al- gorithm. Recall that each pHash has a size of d=64, hence max=64. Intuitively, when τ << 64, rperceptual is a high value only with perceptually indistinguishable images, e.g., for τ =1, two images with d=0 have a similarity rperceptual=1.0. With the same τ, the similarity drops to 0.4 when d=1. By contrast, when τ is close to 64, rperceptual decays almost linearly. For example, for τ =64, rperceptual(d=0)=1.0 and rperceptual(d=1)=0.98. Figure 3 shows how rperceptual per- forms for different values of τ. As mentioned above, we ob- serve that pairs of images with scores between d=0 and d=8 are usually part of the same variant (see Step 5 in Section 2.2). In our implementation, we set τ =25 as rperceptual returns high values up to d=8, and rapidly decays thereafter. rmeme, rculture, and rpeople: the annotation process (Step 5) provides contextualized information about the cluster medoid, including the name (i.e., the main identifier) given to a meme, the associated culture (i.e., high-level group of meme), and people that are included in a meme. Note that we use all the annotations for each category and not only the representative one (see Step 5). Therefore, we model a different similarity for each of the these categories, by looking at the overlap of all the annotations among the medoids of both clusters (mi, 4 020406000.51τ = 1τ = 25τ = 64 Platform Twitter Reddit /pol/ Gab KYM #Posts #Posts with Images #Images #Unique pHashes 1,469,582,378 242,723,732 114,459,736 74,234,065 40,523,275 30,441,325 1,081,701,536 3,626,184 4,325,648 48,725,043 193,783 235,222 12,395,575 15,584 706,940 597,060 62,321,628 13,190,390 955,440 15,584 Table 1: Overview of our datasets. YouTube, Giphy). In future work, we plan to extend our mea- surements to communities like Instagram and Tumblr, as well as to GIF and video memes. Nonetheless, we believe our data sources already allow us to elicit comprehensive insights into the meme ecosystem. Table 1 reports the number of posts and images processed for each community. Note that the number of images is lower than the number of posts with images because of duplicate im- age URLs and because some images get deleted. Next, we dis- cuss each dataset. Twitter. Twitter is a mainstream microblogging platform, al- lowing users to broadcast 280-character messages (tweets) to their followers. Our Twitter dataset is based on tweets made available via the 1% Streaming API, between July 1, 2016 and July 31, 2017. In total, we parse 1.4B tweets: 242M of them have at least one image. We extract all the images, ultimately collecting 114M images yielding 74M unique pHashes. Reddit. Reddit is a news aggregator: users create submissions by posting a URL and others can reply in a structured way. It is divided into multiple sub-communities called subreddits, each with its own topic and moderation policy. Content popularity and ranking are determined via a voting system based on the up- and down-votes that users cast. We gather images from Reddit using publicly available data from Pushshift [68]. We parse all submissions and comments2 between July 1, 2016 and July, 31 2017, and extract 62M posts that contain at least one image. We then download 40M images producing 30M unique pHashes. 4chan. 4chan is an anonymous image board; users create new threads by posting an image with some text, which others can reply to. It lacks many of the traditional social networking fea- tures like sharing or liking content, but has two characteristic features: anonymity and ephemerality. By default, user iden- tities are concealed and messages by the same users are not linkable across threads, and all threads are deleted after one week. Overall, 4chan is known for its extremely lax moder- ation and the high degree of hate and racism, especially on boards like /pol/ [22]. We obtain all threads posted on /pol/, be- tween July 1, 2016 and July 31, 2017, using the same method- ology of [22]. Since all threads (and images) are removed after a week, we use a public archive service called 4plebs [2] to collect 4.3M images, thus yielding 3.6M unique pHashes. Gab. Gab is a social network launched in August 2016 as a "champion" of free speech, providing "shelter" to users banned from other platforms. It combines social networking 2See [70] for metadata associated with submissions and comments. 5 features from Twitter (broadcast of 300-character messages) and Reddit (content is ranked according to up- and down- votes). It also has extremely lax moderation as it allows ev- erything except illegal pornography, terrorist propaganda, and doxing [77]. Overall, Gab attracts alt-right users, conspiracy theorists, and trolls, and high volumes of hate speech [85]. We collect 12M posts, posted on Gab between August 10, 2016 and July 31, 2017, and 955K posts have at least one image, us- ing the same methodology as in [85]. Out of these, 235K im- ages are unique, producing 193K unique pHashes. Note that our Gab dataset starts one month later than the other ones, since Gab was launched in August 2016. Ethics. Although we only collect publicly available data, our study has been approved by the designated ethics officer at UCL. Since 4chan content is typically posted with expecta- tions of anonymity, we note that we have followed standard ethical guidelines [71] and encrypted data at rest, while mak- ing no attempt to de-anonymize users. 3.2 Meme Annotation Site Know Your Meme (KYM). We choose KYM as the source for meme annotation as it offers a comprehensive database of memes. KYM is a sort of encyclopedia of Internet memes: for each meme, it provides information such as its origin (i.e., the platform on which it was first observed), the year it started, as well as descriptions and examples. In addition, for each entry, KYM provides a set of keywords, called tags, that de- scribe the entry. Also, KYM provides a variety of higher-level categories that group meme entries; namely, cultures, subcul- tures, people, events, and sites. "Cultures" and "subcultures" entries refer to a wide variety of topics ranging from video games to various general categories. For example, the Rage Comics subculture [47] is a higher level category associated with memes related to comics like Rage Guy [48] or LOL Guy [38], while the Alt-right culture [24] gathers entries from a loosely defined segment of the right-wing community. The rest of the categories refer to specific individuals (e.g., Donald Trump [31]), specific events (e.g.,#CNNBlackmail [29]), and sites (e.g., /pol/ [46]), respectively. It is also worth noting that KYM moderates all entries, hence entries that are wrong or incomplete are marked as so by the site. As of May 2018, the site has 18.3K entries, specifically, 14K memes, 1.3K subcultures, 1.2K people, 1.3K events, and 427 websites [39]. We crawl KYM between October and Decem- ber 2017, acquiring data for 15.6K entries; for each entry, we also download all the images related to it by crawling all the pages of the image gallery. In total, we collect 707K images corresponding to 597K unique pHashes. Note that we obtain 15.6K out of 18.3K entries, as we crawled the site several months before May 2018. Getting to know KYM. We also perform a general character- ization of KYM. First, we look at the distribution of entries across categories: as shown in Figure 4(a), as expected, the majority (57%) are memes, followed by subcultures (30%), cultures (3%), websites (2%), and people (2%). Next, we measure the number of images per entry: as shown in Figure 4(b), this varies considerably (note log-scale on x- (a) Categories (b) Images (c) Origins Figure 4: Basic statistics of the KYM dataset. axis). KYM entries have as few as 1 and as many as 8K images, with an average of 45 and a median of 9 images. Larger values may be related to the meme's popularity, but also to the "di- versity" of image variants it generates. Upon manual inspec- tion, we find that the presence of a large number of images for the same meme happens either when images are visually very similar to each other (e.g., Smug Frog images within the two clusters in Figure 1), or if there are actually remarkably differ- ent variants of the same meme (e.g., images in 'cluster 1' vs. images in 'cluster N' in the same figure). We also note that the distribution varies according to the category: e.g., higher-level concepts like cultures include more images than more specific entries like memes. We then analyze the origin of each entry: see Figure 4(c). Note that a large portion of the memes (28%) have an un- known origin, while YouTube, 4chan, and Twitter are the most popular platforms with, respectively, 21%, 12%, and 11%, fol- lowed by Tumblr and Reddit with 8% and 7%. This confirms our intuition that 4chan, Twitter, and Reddit, which are among our data sources, play an important role in the generation and dissemination of memes. As mentioned, we do not currently study video memes originating from YouTube, due to the in- herent complexity of video-processing tasks as well as scala- bility issues. However, a large portion of YouTube memes ac- tually end up being morphed into image-based memes (see, e.g., the Overly Attached Girlfriend meme [44]). 3.3 Running the pipeline on our datasets For all four Web communities (Twitter, Reddit, /pol/, and Gab), we perform Step 1 of the pipeline (Figure 2), using the ImageHash library.3After computing the pHashes, we delete the images (i.e., we only keep the associated URL and pHash) due to space limitations of our infrastructure. We then perform Steps 2-3 (i.e., pairwise comparisons between all images and clustering), for all the images from /pol/, The Donald subred- dit, and Gab, as we treat them as fringe Web communities. Note that, we exclude mainstream communities like the rest of Reddit and Twitter as our main goal is to obtain clusters of memes from fringe Web communities and later characterize all communities by means of the clusters. Next, we go through Steps 4-5 using all the images obtained from meme annotation websites (specifically, Know Your Meme, see Section 3.2) and the medoid of each cluster from /pol/, The Donald, and Gab. 3https://github.com/JohannesBuchner/imagehash Platform #Images Noise #Clusters /pol/ T D Gab 4,325,648 1,234,940 235,222 63% 64% 69% 38,851 21,917 3,083 #Clusters with KYM tags (%) 9,265 (24%) 2,902 (13%) 447 (15%) Table 2: Statistics obtained from clustering images from /pol/, The Donald, and Gab. Finally, Steps 6-7 use all the pHashes obtained from Twitter, Reddit (all subreddits), /pol/, and Gab to find posts with images matching the annotated clusters. This is an integral part of our process as it allows to characterize and study mainstream Web communities not used for clustering (i.e., Twitter and Reddit). 4 Analysis In this section, we present a cluster-based measurement of memes and an analysis of a few Web communities from the "perspective" of memes. We measure the prevalence of memes across the clusters obtained from fringe communities: /pol/, The Donald subreddit (T D), and Gab. We also use the dis- tance metric introduced in Eq. 1 to perform a cross-community analysis, then, we group clusters into broad, but related, cat- egories to gain a macro-perspective understanding of larger communities, including Reddit and Twitter. 4.1 Cluster-based Analysis We start by analyzing the 12.6K annotated clusters consist- ing of 268K images from /pol/, The Donald, and Gab (Step 5 in Figure 2). We do so to understand the diversity of memes in each Web community, as well as the interplay between vari- ants of memes. We then evaluate how clusters can be grouped into higher structures using hierarchical clustering and graph visualization techniques. 4.1.1 Clusters Statistics. In Table 2, we report some basic statistics of the clusters obtained for each Web community. A relatively high percentage of images (63% -- 69%) are not clustered, i.e., are la- beled as noise. While in DBSCAN "noise" is just an instance that does not fit in any cluster (more specifically, there are less than 5 images with perceptual distance ≤ 8 from that particu- lar instance), we note that this likely happens as these images are not memes, but rather "one-off images." For example, on 6 MemesSubculturesEventsCulturesSitesPeople01020304050% of KYM entries100101102103104# of images per KYM entry0.00.20.40.60.81.0CDFAllMemesSubculturesCulturesSitesPeopleEventsUnknownYoutube4chanTwitterTumblrRedditFacebookNiconicoYtmndInstagram0510152025% of KYM entries (a) (b) Figure 5: CDF of KYM entries per cluster (a) and clusters per KYM entry (b). /pol/ there is a large number of pictures of random people taken from various social media platforms. Overall, we have 2.1M images in 63.9K clusters: 38K clus- ters for /pol/, 21K for The Donald, and 3K for Gab. 12.6K of these clusters are successfully annotated using the KYM data: 9.2K from /pol/ (142K images), 2.9K from The Donald (121K images), and 447 from Gab (4.5K images). Examples of clus- ters are reported in Appendix D. As for the un-annotated clus- ters, manual inspection confirms that many include miscella- neous images unrelated to memes, e.g., similar screenshots of social networks posts (recall that we only filter out screenshots from the KYM image galleries), images captured from video games, etc. KYM entries per cluster. Each cluster may receive multiple annotations, depending on the KYM entries that have at least one image matching that cluster's medoid. As shown in Fig- ure 5(a), the majority of the annotated clusters (74% for /pol/, 70% for The Donald, and 58% for Gab) only have a single matching KYM entry. However, a few clusters have a large number of matching entries, e.g., the one matching the Con- spiracy Keanu meme [30] is annotated by 126 KYM entries (primarily, other memes that add text in an image associated with that meme). This highlights that memes do overlap and that some are highly influenced by other ones. Clusters per KYM entry. We also look at the number of clus- ters annotated by the same KYM entry. Figure 5(b) plots the CDF of the number of clusters per entry. About 40% only an- notate a single /pol/ cluster, while 34% and 20% of the entries annotate a single The Donald and a single Gab cluster, respec- tively. We also find that a small number of entries are asso- ciated to a large number of clusters: for example, the Happy Merchant meme [36] annotates 124 different clusters on /pol/. This highlights the diverse nature of memes, i.e., memes are mixed and matched, not unlike the way that genetic traits are combined in biological reproduction. Top KYM entries. Because the majority of clusters match only one or two KYM entries (Figure 5(a)), we simplify things by giving all clusters a representative annotation based on the most prevalent annotation given to the medoid, and, in the case of ties the average distance between all matches (see Sec- tion 2.2). Thus, in the rest of the paper, we report our findings based on the representative annotation for each cluster. In Table 3, we report the top 20 KYM entries with respect to the number of clusters they annotate. These cover 17%, 23%, and 27% of the clusters in /pol/, The Donald, and Gab, respectively, hence covering a relatively good sample of our datasets. Donald Trump [31], Smug Frog [52], and Pepe the Frog [45] appear in the top 20 for all three communities, while the Happy Merchant [36] only in /pol/ and Gab. In particu- lar, Donald Trump annotates the most clusters (207 in /pol/, 177 in The Donald, and 25 in Gab). In fact, politics-related entries appear several times in the Table, e.g., Make America Great Again [40] as well as political personalities like Bernie Sanders, Barack Obama, Vladimir Putin, and Hillary Clinton. When comparing the different communities, we observe the most prevalent categories are memes (6 to 14 entries in each community) and people (2-5). Moreover, in /pol/, the 2nd most popular entry, related to people, is Adolf Hilter, which supports previous reports of the community's sympathetic views toward Nazi ideology [22]. Overall, there are several memes with hateful or disturbing content (e.g., holocaust). This happens to a lesser extent in The Donald and Gab: the most popular people after Donald Trump are contemporary politicians, i.e., Bernie Sanders, Vladimir Putin, Barack Obama, and Hillary Clinton. Finally, image posting behavior in fringe Web communi- ties is greatly influenced by real-world events. For instance, in /pol/, we find the #TrumpAnime controversy event [55], where a political individual (Rick Wilson) offended the alt- right community, Donald Trump supporters, and anime fans (an oddly intersecting set of interests of /pol/ users). Simi- larly, on The Donald and Gab, we find the #Cnnblackmail [29] event, referring to the (alleged) blackmail of the Reddit user that created the infamous video of Donald Trump wrestling the CNN. 4.1.2 Memes' Branching Nature Next, we study how memes evolve by looking at variants across different clusters. Intuitively, clusters that look alike and/or are part of the same meme are grouped together under the same branch of an evolutionary tree. We use the custom distance metric introduced in Section 2.3, aiming to infer the phylogenetic relationship between variants of memes. Since there are 12.6K annotated clusters, we only report on a subset of variants. In particular, we focus on "frog" memes (e.g., Pepe 7 100101102# of KYM entries per cluster0.00.20.40.60.81.0CDF/pol/T_DGab0100101102# of clusters per KYM entry0.00.20.40.60.81.0CDF/pol/T_DGab /pol/ T D Gab Category Clusters (%) Entry Entry Category Clusters (%) People Donald Trump People 25 (5.6%) 177 (6.1%) Donald Trump Memes Happy Merchant 10 (2.2%) Memes 78 (2.7%) Happy Merchant Smug Frog Memes 7 (1.5%) Memes 63 (2.1%) Demotivational Posters Computer Reaction Faces Memes 6 (1.3%) Memes 61 (2.1%) Pepe the Frog Feels Bad Man/ Sad Frog Memes 6 (1.3%) Events 50 (1.7%) #Cnnblackmail Events 6 (1.3%) 31 (1.0%) 2016 US election I Know that Feel Bro Memes Memes Tony Kornheiser's Why 6 (1.3%) Sites 27 (0.9%) Know Your Meme Bait/This is Bait Memes 6 (1.3%) Sites 24 (0.8%) Tumblr #TrumpAnime/Rick Wilson Events 5 (1.1%) Cultures 24 (0.8%) Feminism 5 (1.1%) People 20 (0.7%) Barack Obama Reaction Images Memes Make America Great Again Memes 5 (1.1%) Memes 18 (0.6%) Smug Frog Counter Signal Memes Memes Subcultures 5 (1.1%) 18 (0.6%) rwby 5 (1.1%) People 16 (0.5%) Kim Jong Un Memes Pepe the Frog Spongebob Squarepants Subcultures 5 (1.1%) Memes 15 (0.5%) Murica Doom Paul its Happening Memes 5 (1.1%) 15 (0.5%) UA Passenger Removal Events People Adolf Hitler 4 (0.9%) 15 (0.5%) Make America Great Again Memes pol Sites 15 (0.5%) Bill Nye People 4 (0.9%) Memes Dubs Guy/Check'em 4 (0.9%) Cultures 15 (0.5%) Trolling 4 (0.9%) Sites 15 (0.5%) 4chan Memes Smug Anime Face Warhammer 40000 Subcultures 3 (0.7%) 15 (0.5%) Furries Cultures Total 121 (27.1%) Table 3: Top 20 KYM entries appearing in the clusters of /pol/, The Donald, and Gab. We report the number of clusters and their respective percentage (per community). Each item contains a hyperlink to the corresponding entry on the KYM website. Category Clusters (%) Entry People 207 (2.2%) Donald Trump Memes 124 (1.3%) Smug Frog 114 (1.2%) Pepe the Frog Memes 112 (1.2%) Feels Bad Man/ Sad Frog Memes 94 (1.0%) Make America Great Again Memes 90 (1.0%) Bernie Sanders People Events 89 (1.0%) 2016 US Election Memes 84 (0.9%) Counter Signal Memes Events 76 (0.8%) #Cnnblackmail Sites 73 (0.8%) Know Your Meme Memes 72 (0.8%) Angry Pepe 72 (0.8%) Demotivational Posters Memes Sites 65 (0.7%) 4chan Sites 61 (0.7%) Tumblr Events 57 (0.6%) Gamergate Memes 56 (0.6%) Colbertposting 53 (0.6%) Donald Trump's Wall Memes People 53 (0.6%) Vladimir Putin People 51 (0.6%) Barack Obama 51 (0.6%) Hillary Clinton People 1,638 (17.7%) 695 (23.9%) apustaja sad-frog savepepe pepe smug-frog-a smug-frog-b anti-meme Figure 6: Inter-cluster distance between all clusters with frog memes. Clusters are labeled with the origin (4 for 4chan, D for The Donald, and G for Gab) and the meme name. To ease readability, we do not display all labels, abbreviate meme names, and only show an excerpt of all relationships. the Frog [45]); as discussed later in Section 4.2, this is one of the most popular memes in our datasets. The dendrogram in Figure 6 shows the hierarchical rela- tionship between groups of clusters of memes related to frogs. Overall, there are 525 clusters of frogs, belonging to 23 differ- ent memes. These clusters can be grouped into four large cat- egories, dominated by Apu Apustaja [26], Feels Bad Man/Sad Frog [34], Pepe the Frog [45], and Smug Frog [52]. The dif- ferent memes express different ideas or messages: e.g., Apu Apustaja depicts a simple-minded non-native speaker using broken English, while the Feels Bad Man/Sad Frog (ironically) expresses dismay at a given situation, often accompanied with text like "You will never do/be/have X." The dendrogram also shows a variant of Smug Frog (smug-frog-b) related to a vari- ant of the Russian Anti Meme Law [51] (anti-meme) as well as relationships between clusters from Pepe the Frog and Isis meme [37], and between Smug Frog and Brexit-related clus- ters [56], as shown in Appendix E. The distance metric quantifies the similarity of any two vari- ants of different memes; however, recall that two clusters can be close to each other even when the medoids are perceptu- ally different (see Section 2.3), as in the case of Smug Frog variants in the smug-frog-a and smug-frog-b clusters (top of Figure 6). Although, due to space constraints, this analysis is limited to a single "family" of memes, our distance metric can actually provide useful insights regarding the phylogenetic re- lationships of any clusters. In fact, more extensive analysis of these relationships (through our pipeline) can facilitate the un- derstanding of the diffusion of ideas and information across the Web, and provide a rigorous technique for large-scale analysis of Internet culture. 4.1.3 Meme Visualization We also use the custom distance metric (see Eq. 1) to vi- sualize the clusters with annotations. We build a graph G = (V , E), where V are the medoids of annotated clusters and E 8 4@kermitD@jeffreyfrog4@apustaja4@warhammerD@apustaja4@apustaja4@apustajaD@apustajaD@apustaja4@apustaja4@apustajaD@sad-frogD@sad-frogD@pepe4@pepeD@sad-frogD@sad-frog4@sad-frog4@sad-frogD@sad-frogD@sad-frogD@sad-frogD@sad-frogD@sad-frog4@sad-frogD@sad-frogD@sad-frog4@sad-frog4@sad-frog4@sad-frogD@sad-frog4@sad-frog4@sad-frog4@sad-frogD@sad-frogD@sad-frogG@sad-frog4@pepe4@pepe4@pepe4@pepeD@pepeD@pepe4@pepe4@pepeD@pepeD@pepe4@pepe4@pepe4@pepeD@pepeG@pepe4@pepe4@pepeD@pepe4@pepeD@pepeD@smug-frogD@smug-frogD@smug-frogD@smug-frog4@smug-frogD@smug-frog4@smug-frog4@smug-frogD@smug-frog4@smug-frogD@smug-frog4@smug-frogD@smug-frogD@smug-frogD@smug-frog4@smug-frogD@smug-frog4@smug-frog4@smug-frog4@smug-frogD@smug-frog4@smug-frogD@anti-memeD@smug-frog4@smug-frog4@smug-frog4@smug-frog4@smug-frog4@smug-frogG@[email protected] Figure 7: Visualization of the obtained clusters from /pol/, The Donald, and Gab. Note that memes with red labels are annotated as racist, while memes with green labels are annotated as politics (see Section 4.2.1 for the selection criteria). the connections between medoids with distance under a thresh- old κ. Figure 7 shows a snapshot of the graph for κ = 0.45, chosen based on the frogs analysis above (see red horizontal line in Figure 6). In particular, we select this threshold as the majority of the clusters from the same meme (note coloration in Figure 6) are hierarchically connected with a higher-level cluster at a distance close to 0.45. To ease readability, we filter out nodes and edges that have a sum of in- and out-degree less than 10, which leaves 40% of the nodes and 92% of the edges. Nodes are colored according to their KYM annotation. NB: the graph is laid out using the OpenOrd algorithm [63] and the distance between the components in it does not exactly match the actual distance metric. We observe a large set of discon- nected components, with each component containing nodes of primarily one color. This indicates that our distance metric is indeed capturing the peculiarities of different memes. Finally, note that an interactive version of the full graph is publicly available from [1]. 4.2 Web Community-based Analysis We now present a macro-perspective analysis of the Web communities through the lens of memes. We assess the pres- ence of different memes in each community, how popular they are, and how they evolve. To this end, we examine the posts from all four communities (Twitter, Reddit, /pol/, and Gab) that contain images matching memes from fringe Web com- munities (/pol/, The Donald, and Gab). 4.2.1 Meme Popularity Memes. We start by analyzing clusters grouped by KYM 'meme' entries, looking at the number of posts for each meme in /pol/, Reddit, Gab, and Twitter. In Table 4, we report the top 20 memes for each Web com- munity sorted by the number of posts. We observe that Pepe the Frog [45] and its variants are among the most popular memes for every platform. While this might be an artifact of using fringe communities as a "seed" for the clustering, re- call that the goal of this work is in fact to gain an understand- ing of how fringe communities disseminate memes and influ- ence mainstream ones. Thus, we leave to future work a broader analysis of the wider meme ecosystem. Sad Frog [34] is the most popular meme on /pol/ (4.9%), the 3rd on Reddit (1.3%), the 10th on Gab (0.8%), and the 12th on Twitter (0.5%). We also find variations like Smug Frog [52], Apu Apustaja [26], Pepe the Frog [45], and Angry Pepe [25]. Considering that Pepe is treated as a hate symbol by the Anti-Defamation League [58] and that is often used in hateful or racist, this likely indicates that polarized commu- nities like /pol/ and Gab do use memes to incite hateful con- versation. This is also evident from the popularity of the anti- semitic Happy Merchant meme [36], which depicts a "greedy" and "manipulative" stereotypical caricature of a Jew (3.8% on /pol/ and 1.1% on Gab). By contrast, mainstream communities like Reddit and Twit- 9 Smug FrogBait this is BaitHappy MerchantDoom Paul ItsHappeningMake AmericaGreat AgainReaction ImagesApuApustajaComputer Reaction FacesSad FrogPepe the FrogCounter Signal MemesTony Kornheiser'sWhyMuricaCostanzaPolandballDubs/Check'emInto the Trashit goesBaneposting60's SpidermanI Know that Feel BroAngry PepeLaughing TomCruiseSpurdoSpardeDemotivationalPostersHe will not divide usColbertpostingAbsolutely DisgustingForty KeksWojak/Feels GuyFeels GoodSmug Anime FaceAutistic ScreechingDonald Trump'sWall /pol/ Reddit Gab Twitter Entry Entry Entry Posts (%) 454 (1.6%) Roll Safe 414 (1.5%) Evil Kermit 392 (1.4%) Arthur's Fist 391 (1.4%) Nut Button 378 (1.3%) Spongebob Mock 297 (1.1%) Reaction Images 274 (1.0%) Conceited Reaction 235 (0.9%) Expanding Brain 207 (0.8%) Demotivational Posters 206 (0.8%) Cash Me Ousside/Howbow Dah Entry Posts (%) 12,540 (2.2%) Jesusland (P) 7,626 (1.3%) Demotivational Posters 7,240 (1.3%) Smug Frog 7,147 (1.3%) Based Stickman (P) 5,032 (0.9%) Pepe the Frog 4,642 (0.8%) Happy Merchant (R) 4,523 (0.8%) Murica 4,491 (0.8%) And Its Gone Posts (%) Posts(%) 64,367 (4.9%) Manning Face Feels Bad Man/Sad Frog 55,010 (5.9%) 63,290 (4.8%) That's the Joke Smug Frog 50,642 (5.4%) Happy Merchant (R) 49,608 (3.8%) Feels Bad Man/ Sad Frog 37,591 (4.0%) 29,756 (2.2%) Confession Bear Apu Apustaja 13,598 (1,5%) Pepe the Frog 25,197 (1.9%) This is Fine 11,136 (1,2%) Make America Great Again (P) 21,229 (1.6%) Smug Frog 9,387 (1.0%) Angry Pepe 9,106 (1.0%) Bait this is Bait 8,701 (0.9%) 7,781 (0.8%) I Know that Feel Bro Cult of Kek 5,972 (0.6%) Laughing Tom Cruise 5,375 (0.6%) 186 (0.6%) Feels Bad Man/ Sad Frog 4,991 (0.5%) Awoo Tony Kornheiser's Why 183 (0.6%) Math Lady/Confused Lady 4,722 (0.5%) Picardia (P) 156 (0.5%) Computer Reaction Faces 4,720 (0.5%) 149 (0.5%) Clinton Trump Duet (P) 3,901 (0.4%) Big Grin / Never Ever Reaction Images 148 (0.5%) Kendrick Lamar Damn Album Cover 3,656 (0.4%) Computer Reaction Faces 3,363 (0.3%) 144 (0.5%) What in tarnation Wojak / Feels Guy 3,164 (0.3%) 140 (0.5%) Harambe the Gorilla 3,137 (0.3%) 131 (0.4%) I Know that Feel Bro Absolutely Disgusting Spurdo Sparde 3,094 (0.3%) 131 (0.4%) This is Fine Total 249,047 (26.4%) Table 4: Top 20 KYM entries for memes that we find our datasets. We report the number of posts for each meme as well as the percentage over all the posts (per community) that contain images that match one of the annotated clusters. The (R) and (P) markers indicate whether a meme is annotated as racist or politics-related, respectively (see Section 4.2.1 for the selection criteria). 20,485 (1.5%) Roll Safe 16,686 (1.2%) Rage Guy 14,490 (1.1%) Make America Great Again (P) 4,440 (0.8%) Make America Great Again (P) 14,428 (1.1%) Fake CCG Cards 14,312 (1.1%) Confused Nick Young 13,767 (1.0%) Daily Struggle 13,577 (1.0%) Expanding Brain 13,540 (1.0%) Demotivational Posters 12,893 (1.0%) Actual Advice Mallard 12,608 (0.9%) Reaction Images 12,247 (0.9%) Handsome Face 11,682 (0.9%) Absolutely Disgusting 11,436 (0.8%) Pepe the Frog 9,581 (0.7%) Pretending to be Retarded 4,438 (0.8%) Feels Bad Man/ Sad Frog 4,024 (0.7%) Trump's First Order of Business (P) 192 (0.7%) Salt Bae 4,015 (0.7%) Kekistan 3,757 (0.7%) Picardia (P) 3,419 (0.6%) Things with Faces (Pareidolia) 3,293 (0.6%) Serbia Strong/Remove Kebab 2,959 (0.5%) Riot Hipster 2,675 (0.5%) Colorized History 2,674 (0.5%) Most Interesting Man in World 2,672 (0.5%) Chuck Norris Facts 2,462 (0.4%) Roll Safe 445,179 (33.4%) 94,069 (16.7%) 4,808 (17.0%) ter primarily share harmless/neutral memes, which are rarely used in hateful contexts. Specifically, on Reddit the top memes are Manning Face [41] (2.2%) and That's the Joke [53] (1.3%), while on Twitter the top ones are Roll Safe [50] (5.9%) and Evil Kermit [33] (5.4%). Once again, we find that users (in all communities) post memes to share politics-related information, possibly aiming to enhance or penalize the public image of politicians (see Ap- pendix E for an example of such memes). For instance, we find Make America Great Again [40], a meme dedicated to Donald Trump's US presidential campaign, among the top memes in /pol/ (1.6%), in Reddit (0.8%), and Gab (0.8%). Similarly, in Twitter, we find the Clinton Trump Duet meme [28] (0.4%), a meme inspired by the 2nd US presidential debate. People. We also analyze memes related to people (i.e., KYM entries with the people category). Table 5 reports the top 15 KYM entries in this category. We observe that, in all Web Communities, the most popular person portrayed in memes is Donald Trump: he is depicted in 4.6% of /pol/ posts that contain annotated images, while for Reddit, Gab, and Twitter the percentages are 6.1%, 6.1%, and 1.3%, respectively. Other popular personalities, in all platforms, include several politi- cians. For instance, in /pol/, we find Mike Pence (0.3%), Jeb Bush (0.3%), Vladimir Putin (0.2%), while, in Reddit, we find Steve Bannon (0.6%), Chelsea Manning (0.6%), and Bernie Sanders (0.3%), in Gab, Mitt Romney (1.7%) and Barack Obama (0.4%), and, in Twitter, Barack Obama (0.6%), Kim Jong Un (0.5%), and Chelsea Manning (0.4%). This highlights the fact that users on these communities utilize memes to share information and opinions about politicians, and possibly try to either enhance or harm public opinion about them. Finally, we note the presence of Adolf Hitler memes on all Web Com- munities, i.e., /pol/ (0.6%), Reddit (0.3%), Gab (0.4%), and Twitter (0.2%). We further group memes into two high-level groups, racist and politics-related. We use the tags that are available in our KYM dataset, i.e., we assign a meme to the politics-related group if it has the "politics," "2016 us presidential election," "presidential election," "trump," or "clinton" tags, and to the racism-related one if the tags include "racism," "racist," or "an- tisemitism," obtaining 117 racist memes (4.4% of all memes that appear in our dataset) and 556 politics-related memes (21.2% of all memes that appear on our dataset). In the rest of this section, we use these groups to further study the memes, and later in Section 5 to estimate influence. 4.2.2 Temporal Analysis Next, we study the temporal aspects of posts that contain memes from /pol/, Reddit, Twitter, and Gab. In Figure 8, we plot the percentage of posts per day that include memes. For all memes (Figure 8(a)), we observe that /pol/ and Reddit follow a steady posting behavior, with a peak in activity around the 2016 US elections. We also find that memes are increasingly more used on Gab (see, e.g., 2016 vs 2017). As shown in Figure 8(b), both /pol/ and Gab include a sub- stantially higher number of posts with racist memes, used over time with a difference in behavior: while /pol/ users share them in a very steady and constant way, Gab exhibits a bursty behavior. A possible explanation is that the former is inher- ently more racist, with the latter primarily reacting to particu- lar world events. As for political memes (Figure 8(c)), we find a lot of activity overall on Twitter, Reddit, and /pol/, but with different spikes in time. On Reddit and /pol/, the peaks coin- cide with the 2016 US elections. On Twitter, we note a peak that coincides with the 2nd US Presidential Debate on October 2016. For Gab, there is again an increase in posts with political memes after January 2017. 4.2.3 Score Analysis As discussed in Section 3.1, Reddit and Gab incorporate a voting system that determines the popularity of content within the Web community and essentially captures the appreciation of other users towards the shared content. To study how users 10 /pol/ Reddit Gab Twitter Entry Posts (%) Entry Posts (%) Entry Donald Trump Adolf Hitler Mike Pence Jeb Bush Vladimir Putin Alex Jones Ron Paul Bernie Sanders Massimo D'alema Mitt Romney Chelsea Manning Hillary Clinton A. Wyatt Mann Ben Carson Filthy Frank 60,611 (4.6%) Donald Trump Steve Bannon 8,759 (0.6%) 4,738 (0.3%) Stephen Colbert 4,217 (0.3%) Chelsea Manning 3,218 (0.2%) Ben Carson 3,206 (0.2%) Bernie Sanders 3,116 (0.2%) Ajit Pai 3,022 (0.2%) Barack Obama 2,725 (0.2%) Gabe Newell 2,468 (0.2%) Bill Nye 2,403 (0.2%) Hillary Clinton 2,378 (0.2%) Death Grips 2,110 (0.2%) Adolf Hitler 1,780 (0.1%) Mitt Romney 1,598 (0.1%) Eminem Isis Daesh 34,533 (6.1%) Donald Trump 3,733 (0.6%) Mitt Romney 3,121 (0.6%) Bill Nye 2,261 (0.4%) Adolf Hitler 2,148 (0.4%) Barack Obama 1,757 (0.3%) 1,658 (0.3%) Death Grips 1,628 (0.3%) Eminem 1,518 (0.3%) Kim Jong Un 1,478 (0.3%) Ajit Pai 1,468 (0.3%) 1,463 (0.3%) Bernie Sanders 1,449 (0.3%) Alex Jones 1,294 (0.2%) Hillary Clinton 1,274 (0.2%) Anita Sarkeesian Pewdiepie Entry Posts (%) 1,665 (6.1%) Donald Trump 455 (1.7%) Barack Obama 370 (1.3%) Chelsea Manning 106 (0.4%) Kim Jong Un 104 (0.4%) Anita Sarkeesian 92 (0.3%) Bernie Sanders 91 (0.3%) Vladimir Putin 89 (0.3%) Billy Mays 87 (0.3%) Adolf Hitler 76 (0.3%) Kanye West 73 (0.3%) Bill Nye 71 (0.3%) Mitt Romney 70 (0.3%) Filthy Frank 59 (0.2%) Hillary Clinton 54 (0.2%) Ajit Pai Posts(%) 10,208 (1.3%) 5,187 (0.6%) 4,173 (0.5%) 3,271 (0.4%) 2,764 (0.3%) 2,277 (0.3%) 1,733 (0.2%) 1,454 (0.2%) 1,304 (0.2%) 1,261 (0.2%) 968 (0.2%) 923 (0.1%) 777 (0.1%) 758 (0.1%) 715 (0.1%) Table 5: Top 15 KYM entries about people that we find in each of our dataset. We report the number of posts and the percentage over all the posts (per community) that match a cluster with KYM annotations. (a) all memes (b) racist (c) politics Figure 8: Percentage of posts per day in our dataset for all, racist, and politics-related memes. (a) Reddit (b) Gab Figure 9: CDF of scores of posts that contain memes on Reddit and Gab. react to racist and politics-related memes, we plot the CDF of the posts' scores that contain such memes in Figure 9. For Reddit (Figure 9(a)), we find that posts that contain politics-related memes are rated highly (mean score of 224.7 and a median of 5) than posts that contain non-politics memes (mean 124.9, median 4). On the contrary, posts that contain racist memes are rated lower (average score of 94.8 and a me- dian of 3) than other non-racist memes (average 141.6 and median 4). On Gab (Figure 9(b)), posts that contain politics- related memes have a similar score as non-political memes (mean 87.3 vs 82.4). However, this does not apply for racist and non-racist memes, as non-racist memes have over 2 times higher scores than racist memes (means 84.7 vs 35.5). Overall, this suggests that posts that contain politics-related memes receive high scores by Reddit and Gab users, while for racist memes this applies only on Reddit. 4.2.4 Sub-Communities Among all the Web communities that we study, only Red- dit is divided into multiple sub-communities. We now study which sub-communities share memes with a focus on racist and politics-related content. In Table 6, we report the top ten subreddits in terms of the percentage over all posts that con- tain memes in Reddit for: 1) all memes; 2) racist ones; and 3) politics-related memes. three groups, is The Donald with 12.5%, 9.3%, and 26.4%, respectively. Inter- estingly, AdviceAnimals, a general-purpose meme subreddit, is among the top-ten sub-communities also for racist and po- litical memes, highlighting their infiltration in otherwise non- hateful communities. the most popular subreddit For all Other popular subreddits for racist memes include conspir- acy (2.0%), me irl (1.8%), and funny (1.4%) subreddits. For 11 07/1609/1611/1601/1703/1705/1707/170.00.51.01.52.0% of posts/pol/RedditTwitterGab07/1609/1611/1601/1703/1705/1707/170.0000.0250.0500.0750.1000.1250.1500.175% of posts/pol/RedditTwitterGab07/1609/1611/1601/1703/1705/1707/170.00.10.20.30.40.50.60.7% of posts/pol/RedditTwitterGab100101102103104105Score0.00.20.40.60.81.0CDFPoliticsNon-PoliticsRacismNon-RacismAll memes100101102103Score0.00.20.40.60.81.0CDFPoliticsNon-PoliticsRacismNon-RacismAll memes All Memes Racism-Related Memes Politics-Related Memes Subreddit The Donald AdviceAnimals me irl politics funny dankmemes EnoughTrumpSpam pics AskReddit HOTandTrending conspiracy Posts (%) Subreddit 82,698 (12.5%) The Donald 35,475 (5.3%) AdviceAnimals 15,366 (2.3%) 8,875 (1,3%) me irl 8,508 (1.3%) funny 7,744 (1,1%) CringeAnarchy 6,973 (1.1%) EDH 5,945 (0.9%) magicTCG dankmemes 5,482 (0.8%) ImGoingToHellForThis 4,674 (0.7%) politics Posts (%) Subreddit 359 (9.3%) The Donald 87 (2.2%) 76 (2.0%) EnoughTrumpSpam 70 (1.8%) TrumpsTweets 56 (1.4%) AdviceAnimals 43 (1.1%) USE2016 43 (1.1%) PoliticsAll dankmemes 42 (1.1%) 40 (1.0%) pics 39 (1.0%) me irl Posts (%) 24,343 (26.4%) 2,751 (3.0%) 2,679 (2.9%) 2,363 (2.5%) 1,740 (1.9%) 1,653 (1.8%) 1,401(1.5%) 881 (0.9%) 877 (0.9%) 873 (0.9%) Table 6: Top ten subreddits for all memes, racism-related memes, and politics-related memes. politics-related memes, the majority of the subreddits are re- lated to Donald Trump, while there also are general subreddits that talk about politics, e.g., the politics (3.0%) and the Poli- ticsAll subreddit (1.5%). 4.3 Take-Aways In summary, the main take-aways of our analysis include: 1. Fringe Web communities use many variants of memes related to politics and world events, possibly aiming to share weaponized information about them (Appendix E include some examples of such memes). For instance, Donald Trump is the KYM entry with the largest num- ber of clusters in /pol/ (2.2%), The Donald (6.1%), and Gab (2.2%). 2. /pol/ and Gab share hateful and racist memes at a higher rate than mainstream communities, as we find a consid- erable number of anti-semitic and pro-Nazi clusters (e.g., The Happy Merchant meme [36] appears in 1.3% of all /pol/ annotated clusters and 2.2% of Gab's, while Adolf Hitler in 0.6% of /pol/'s). This trend is steady over time for /pol/ but ramping up for Gab. 3. Seemingly "neutral" memes, like Pepe the Frog (or one of its variants), are used in conjunction with other memes to incite hate or influence public opinion on world events, e.g., with images related to terrorist organizations like ISIS or world events such as Brexit. 4. Our custom distance metric successfully allows us to study the interplay and the overlap of memes, as show- cased by the visualizations of the clusters and the dendro- gram (see Figs. 6 and 7). 5. Reddit users are more interested in politics-related memes than other type of memes. That said, when look- ing at individual subreddits, we find that The Donald is the most active one when it comes to posting memes in general. It is also the subreddit where most racism and politics-related memes are posted. Influence Estimation 5 So far we have studied the dissemination of memes by looking at Web communities in isolation. However, in reality, these in- fluence each other: e.g., memes posted on one community are often re-posted to another. Aiming to capture the relationship between them, we use a statistical model known as Hawkes Processes [61, 62], which describes how events occur over 12 time on a collection of processes. This maps well to the posting of memes on different platforms: each community can be seen as a process, and an event occurs each time a meme image is posted on one of the communities. Events on one process can cause impulses that can increase the likelihood of subsequent events, including other processes, e.g., a person might see a meme on one community and re-post it, or share it to a dif- ferent one. This approach allows us to assess the causality of events, hence it is a far better approach when compared to sim- ple approaches like looking at the timeline of specific memes or pHashes. 5.1 Hawkes Processes To model the spread of memes on Web communities, we use a similar approach as in our previous work [86], which looked at the spread of mainstream and alternative news URLs. Next, we provide a brief description, and present an improved method for estimating influence. We use five processes, one for each of our seed Web com- munities (/pol/, Gab, and The Donald), as well as Twitter and Reddit, fitting a separate model for each meme cluster. Fitting the model to the data yields a number of values: background rates for each process, weights from each process to each other, and the shape of the impulses an event on one process causes on the rates of the others. The background rate is the expected rate at which events will occur on a process without influence from the communities modeled or previous events; this cap- tures memes posted for the first time, or those seen on a com- munity we do not model and then reposted on a community we do. The weights from community-to-community indicate the effect an event on one has on the others; for example, a weight from Twitter to Reddit of 1.2 means that each event on Twit- ter will cause an expected 1.2 additional events on Reddit. The shape of the impulse from Twitter to Reddit determines how the probability of these events occurring is distributed over time; typically the probability of another event occurring is highest soon after the original event and decreases over time. Figure 10 illustrates a Hawkes model with three processes. The first event occurs on process B, which causes an increase in the rate of events on all three processes. The second event then occurs on process C, again increasing the rate of events on the processes. The third event occurs soon after, on process A. The fourth event occurs later, again caused by the background arrival rate on process B, after the increases in arrival rate from the other events have disappeared. /pol/ 1,574,045 Twitter 865,885 Reddit 581,803 T D 81,924 Gab 44,918 Table 7: Events per community from the 12.6K clusters. substantial improvement over the influence estimation in [86], which used the weights from source to destination community, multiplied by the number of events on the source to estimate influence. However, this only looks at influence across a single "hop" and would not allow us to understand the source com- munity's influence as memes spread onwards from the desti- nation community. The new method allows us to gain an un- derstanding of where memes that appear on a community orig- inally come from, and how they are likely to spread from com- munity to community from the original source. 5.2 Influence We fit Hawkes models using Gibbs sampling as described in [62] for the 12.6K annotated clusters; in Table 7, we report the total number of meme images posted to each community in these clusters. As seen in Table 7, /pol/ has the greatest num- ber of memes posted, followed by Twitter and then Reddit. In terms of total images collected (see Table 1), Twitter and Reddit have many more than /pol/. However, many of the im- ages on these communities might not be memes; additionally, because our clusters are created from the memes present on only /pol/, The Donald, and Gab (as these are the communi- ties primarily of interest in this paper), it is possible that there are memes on Twitter and Reddit that are not included in the clusters. This yields an additional interesting question: how ef- ficient are different communities at disseminating memes? First, we report the source of events in terms of the percent of events on the destination community. This describes the re- sults in terms of the data as we have collected it, e.g., it tells us the percentage of memes posted on Twitter that were caused by /pol/. The second way we report influence is by normal- izing the values by the total number of events in the source community, which lets us see how much influence each com- munity has, relative to the number of memes they post -- in other words, their efficiency. We first look at the influence of all clusters together. Fig- ure 11 shows the percent of events on each destination commu- nity caused by each source community. The values from one community to the same community (for example, from /pol/ to /pol/) include both events caused by the background rate of that community and events caused by previous events within that community; these values are the largest influence for each community. After this, /pol/ is the strongest source of influence for Reddit, The Donald, and Gab, but not for Twitter, which is most influenced by Reddit. Interestingly, although Twitter has a greater number of memes posted than Reddit, it causes less influence. Perhaps there is less original content posted directly to Twitter. Next, we look at the normalized influence of all clusters to- gether. Figure 12 shows the influence that a source commu- nity has on a destination community, normalized by the total number of memes posted on the source community. The val- Figure 10: A Hawkes model with three processes. Events cause im- pulses that increase the rate of subsequent events in the same or other processes. By looking at the impulses present when events occur, the probability of a process being the root cause of an event can be de- termined. Note that on the second part of the figure, colors represent events while arrows represent impulses between the events. To understand the influence different communities have on the spread of memes, we want to be able to attribute the cause of a meme being posted back to a specific community. For example, if a meme is posted on /pol/ and then someone sees it there and posts it on Twitter where it is shared several times, we would like to be able to say that /pol/ was the root cause of those events. Obviously, we do not actually know where someone saw something and decided to share it, but we can, using the Hawkes models, determine the probability of each community being the root cause of an event. Looking again at Figure 10, we see that events 1 and 4 are caused directly by the background rate of process B. This is because, in the case of event 1, there are no previous events on other processes, and in the case of event 4, the impulses from previous events have already stopped. Events 2 and 3, however, occur when there are multiple possible causes: the background rate for the community and the impulses from previous events. In these cases, we assign the probability of being the root cause in proportion to the magnitudes of the impulses (including the background rate) present at the time of the event. For event 2, the impulse from event 1 is smaller than the background rate of community C, so the background rate has a higher proba- bility of being the cause of event 2 than event 1. Thus, most of the cause for event 2 is attributed to community C, with a lesser amount to B (through event 1). Event 3 is more com- plicated: impulses from both previous events are present, thus the probability of being the cause is split three ways, between the background rate and the two previous events. The impulse from event 2 is the largest, with the background rate and event 1 impulse smaller. Because event 2 is attributed both to com- munities B and C, event 3 is partly attributed to community B through both event 1 and event 2. In the rest of our analysis, we use this new measure. This is a 13 1234Background rates1234Impulses attime of eventAttributedroot causeABCBBBBACC Figure 11: Percent of destination events caused by the source com- munity on the destination community. Colors indicate the largest-to- smallest influences per destination. Figure 13: Percent of the destination community's racist (R) and non- racist (NR) meme postings caused by the source community. Colors indicate the percent difference between racist and non-racist. Figure 12: Influence from source to destination community, normal- ized by the number of events in the source community. Columns for total influence and total external influence are shown. Figure 14: Percent of the destination community's political (P) and non-political (NP) meme postings caused by the source community. Colors indicate the percent difference between political and non- political. ues can be understood as an indication of how much influence a community has, relative to the frequency of memes posted. For example, the influence Reddit has on Twitter is equal to 5.71% of the total events on Reddit. If the sum of values for a source is less than 100%, it implies that many of the posts on the source community were caused by other communities, or that posts on the source community do not cause many posts on other communities. There are several interesting things to note in Figure 12. First, The Donald has by far the greatest influence for the num- ber of memes posted on it. This is particularly apparent when looking at just external influence, where The Donald has more than 4 times as much influence than the rest of Reddit, the clos- est other community. Memes from this community spread very well to all of the other communities. While /pol/ has a large to- tal influence on the other communities (as seen in Figure 11), when normalized by its size, it has the smallest external influ- ence: just 4.03%. Most of the memes posted on /pol/ do not spread to other communities. Both Gab and Twitter have a to- tal normalized influence of less than 100%; much less in Gab's case, although it has higher external influence. Using the clusters identified as either racist or non-racist (see the end of Section 4.2.1), we compare how the commu- nities influence the spread of these two types of content. Fig- ure 13 shows the percentage of both the destination commu- nity's racist and non-racist meme posts caused by the source community. We perform two-sample Kolmogorov-Smirnov tests to compare the distributions of influence from the racist and non-racist clusters; cells with statistically significant dif- ferences between influence of racist/non-racist memes (with p<0.01) are reported with a * in the figure. /pol/ has the most total influence for both racist and non-racist memes, with the notable exception of Twitter, where Reddit has the most the influence. Interestingly, while the percentage of racist meme posts caused by /pol/ is greater than non-racist for Reddit, Twitter, and Gab, this is not the case for The Donald. The only other cases where influence is greater for racist memes are Reddit to The Donald and Gab to Reddit. When looking at political vs non political memes (Fig- ure 14), we see a somewhat different story. Here, /pol/ influ- ences The Donald more in terms of political memes. Further, we see differences in the percent increase and decrease of in- fluence between the two figures (as indicated by the cell col- ors). For example, Twitter has a relatively larger difference in its influence on /pol/ and Reddit for political and non-political memes than for racist and non-racist memes, but a smaller dif- ference in its influence on Gab and The Donald. This exposes how different communities have varying levels of influence de- pending on the type of memes they post. While examining the raw influence provides insights into the meme ecosystem, it obscures notable differences in the meme posting behavior of the different communities. To explore this, we look at the normalized influence in Fig- ure 15 (racist/non-racist memes) and Figure 16 (political/non- political memes). As mentioned previously, normalization re- 14 /pol/RedditTwitterGabT_DDestination/pol/RedditTwitterGabT_DSource16.34%13.15%3.13%3.88%97.06%8.89%8.92%4.78%90.37%1.21%5.05%9.11%90.75%3.48%0.94%0.56%59.60%0.16%0.15%0.09%69.15%9.22%1.18%2.11%0.71%/pol/RedditTwitterGabT_DTotalTotal ExtDestination/pol/RedditTwitterGabT_DSource4.38%101.44%0.85%0.38%1.72%1.43%97.06%12.34%102.71%1.25%0.69%7.11%90.37%3.28%4.99%95.74%0.48%0.47%90.75%2.34%1.70%9.10%68.70%1.02%59.60%3.07%1.98%3.03%46.07%115.22%69.15%5.05%12.49%14.97%13.55%/pol/RedditTwitterGabT_DDestination/pol/RedditTwitterGabT_DSourceR: 15.04%NR: 16.35%*R: 18.83%NR: 13.08%R: 4.31%NR: 3.12%*R: 6.36%NR: 3.86%*R: 99.34%NR: 96.97%*R: 9.52%NR: 8.89%*R: 1.29%NR: 9.01%R: 2.48%NR: 4.79%*R: 89.12%NR: 90.38%*R: 0.35%NR: 1.25%*R: 2.10%NR: 5.08%*R: 1.26%NR: 9.21%R: 92.85%NR: 90.74%*R: 2.22%NR: 3.49%*R: 0.20%NR: 0.97%R: 0.22%NR: 0.56%R: 76.08%NR: 59.40%R: 0.06%NR: 0.16%R: 0.54%NR: 0.15%R: 0.05%NR: 0.09%R: 73.13%NR: 69.12%*R: 2.54%NR: 9.30%R: 0.30%NR: 1.19%*R: 1.77%NR: 2.11%*R: 0.06%NR: 0.73%*/pol/RedditTwitterGabT_DDestination/pol/RedditTwitterGabT_DSourceP: 19.79%NP: 14.84%*P: 16.90%NP: 12.09%*P: 6.33%NP: 2.54%*P: 8.72%NP: 3.21%*P: 94.70%NP: 97.56%*P: 7.18%NP: 9.64%*P: 8.79%NP: 8.95%*P: 6.76%NP: 4.42%*P: 78.14%NP: 92.06%*P: 1.70%NP: 1.11%*P: 5.33%NP: 4.94%*P: 8.30%NP: 9.34%*P: 83.77%NP: 92.03%P: 7.63%NP: 2.91%*P: 1.81%NP: 0.75%*P: 0.37%NP: 0.64%*P: 56.08%NP: 60.60%*P: 0.13%NP: 0.16%*P: 0.16%NP: 0.15%*P: 0.10%NP: 0.08%*P: 67.33%NP: 69.95%*P: 9.93%NP: 9.02%*P: 3.01%NP: 0.85%*P: 5.34%NP: 1.66%*P: 1.69%NP: 0.50%* in terms of influence while The Donald is the most efficient. This provides new insight into the meme ecosystem: there are clearly evolutionary effects. Many meme postings do not result in further dissemination, and one of the key components to en- suring they are disseminated is ensuring that new "offspring" are continuously produced. /pol/'s "famed" meme magic, i.e., the propensity to produce and heavily push memes, is thus the most likely explanation for /pol/'s influence on the Web in gen- eral. 6 Related Work We now review prior work studying the detection, evolution, and propagation of memes, their popularity, as well as vari- ous case studies. For each work, we also report whether they consider text, images, and/or videos. Detection and Propagation of Memes. Leskovec et al. [60] perform large-scale tracking of text-based memes, focusing on news outlets and blogs. Ferrara et al. [17] detect text memes using an unsupervised framework based on clustering tech- niques. Dang et al. [11] study memes on Reddit by cluster- ing submissions and using a set of similarity scores based on Google Tri-grams. Ratkiewicz et al. [69] introduce Truthy, a framework supporting the analysis of the diffusion of text- based, politics-related memes on Twitter. Babaei et al. [5] study Twitter users' preferences, with respect to information sources, including how they acquire memes. Romero et al. [72] study meme propagation on Twitter via hashtags, finding dif- ferences according to the topic and that politically-related hashtags, mainly about controversial topics, are persistent on the platform. Dubey et al. [14] extract a rich semantic em- bedding corresponding to the template used for the creation of meme images, using deep learning and optical character recognition techniques. They demonstrate the efficacy of their approach on a variety of tasks ranging from image clustering to virality prediction on datasets obtained from Reddit as well as scraped data from sites for generating meme images like memegenerator.net and quickmeme.com. By contrast, we fo- cus on the detection and propagation of image-based memes without limiting our scope to image macros. To this end, we re- duce the dimensionality of raw images using perceptual hash- ing, and use clustering techniques to identify groups of memes. We also detect and study the propagation of memes across multiple Web communities, using publicly available data from memes annotation sites (i.e., KYM). Popularity of Memes. Weng et al. [81, 82] study the popular- ity of memes spreading as hashtags on Twitter. They model virality using an agent-based approach, taking into account that users have a limited capacity in receiving/viewing memes on Twitter. They study the features that make memes popular, finding that those based on network community structures are strong indicators of popularity. Tsur and Rappoport [79] pre- dict popularity of text-based memes on Twitter using linguistic characteristics as well as cognitive and domain features. Ienco et al. [23] study memes propagating via text, images, audio, and video on the Yahoo! Meme platform (a platform discon- tinued in 2012), aiming to predict virality and select memes to Figure 15: Influence from source to destination community of racist and non-racist meme postings, normalized by the number of events in the source community. Figure 16: Influence from source to destination community of polit- ical and non-political meme postings, normalized by the number of events in the source community. veals how efficient the communities are in disseminating memes to other communities by revealing the per meme in- fluence of meme posts. First, we note that the percent change in influence for the dissemination of racist/non-racist memes is quite a bit larger than that for political/non-political memes (again, indicated by the coloring of the cells). More interest- ingly, both figures show that, contrary to the total influence, /pol/ is the least influential when taking into account the num- ber of memes posted. While this might seem surprising, it ac- tually yields a subtle, yet crucial aspect of /pol/'s role in the meme ecosystem: /pol/ (and 4chan in general) acts as an evo- lutionary microcosm for memes. The constant production of new content [22] results in a "survival of the fittest" [16] sce- nario. A staggering number of memes are posted on /pol/, but only the best actually make it out to other communities. To the best of our knowledge, this is the first result quantifying this analogy to evolutionary pressure. Take-Aways. There are several take-aways from our measure- ment of influence. We show that /pol/ is, generally speak- ing, the most influential disseminator of memes in terms of raw influence. In particular, it is more influential in spread- ing racist memes than non-racist one, and this difference is deeper than in any other community. There is one notable ex- ception: /pol/ is more influential in terms of non-racist memes on The Donald. Relatedly, /pol/ has generally more influence in terms of spreading political memes than other communi- ties. When looking at the normalized influence, however, we surface a more interesting result: /pol/ is the least efficient 15 /pol/RedditTwitterGabT_DTotalTotal ExtDestination/pol/RedditTwitterGabT_DSourceR: 1.1NR: 4.5R: 100.4NR: 101.5R: 0.2NR: 0.9*R: 0.2NR: 0.4R: 0.3NR: 1.8*R: 0.4NR: 1.5*R: 99.3NR: 97.0*R: 9.5NR: 12.4R: 98.7NR: 102.7R: 1.4NR: 1.3*R: 0.2NR: 0.7R: 2.9NR: 7.1*R: 89.1NR: 90.4*R: 5.1NR: 3.3*R: 4.7NR: 5.0R: 97.6NR: 95.7R: 0.3NR: 0.5*R: 0.1NR: 0.5R: 92.8NR: 90.7*R: 1.9NR: 2.3*R: 2.4NR: 1.7R: 10.0NR: 9.1R: 86.1NR: 68.5R: 0.2NR: 1.0R: 76.1NR: 59.4R: 0.5NR: 3.1R: 4.0NR: 1.9R: 5.3NR: 3.0R: 23.3NR: 46.2R: 96.4NR: 115.4R: 73.1NR: 69.1*R: 2.3NR: 5.1R: 2.5NR: 12.6*R: 12.2NR: 15.0*R: 6.3NR: 13.6*/pol/RedditTwitterGabT_DTotalTotal ExtDestination/pol/RedditTwitterGabT_DSourceP: 7.7NP: 3.7P: 102.4NP: 101.2P: 1.8NP: 0.7*P: 0.6NP: 0.3*P: 3.1NP: 1.4*P: 2.2NP: 1.3*P: 94.7NP: 97.6*P: 23.2NP: 10.8P: 101.4NP: 102.9P: 2.5NP: 1.1*P: 1.2NP: 0.6*P: 12.8NP: 6.3*P: 78.1NP: 92.1*P: 6.6NP: 2.8*P: 9.3NP: 4.2P: 93.1NP: 96.2P: 1.0NP: 0.4*P: 0.6NP: 0.4*P: 83.8NP: 92.0P: 4.0NP: 2.0*P: 3.7NP: 1.3*P: 6.5NP: 9.9P: 62.5NP: 70.5P: 0.9NP: 1.0*P: 56.1NP: 60.6*P: 1.7NP: 3.5*P: 1.1NP: 2.2*P: 2.7NP: 3.1*P: 54.0NP: 42.6P: 121.3NP: 112.6P: 67.3NP: 69.9*P: 4.0NP: 5.5*P: 16.2NP: 10.9*P: 15.2NP: 14.9*P: 18.7NP: 11.3* be shown to users after login. Coscia [10] studies meme im- ages and distinguishes the traits that make them more likely to be popular on the Web, presenting a case study on the Quick- meme generator site. Whereas, we also study the popularity of memes, however, unlike previous work, we rely on a multi-platform approach, encompassing data from /pol/, Reddit, Twitter, and Gab, and show that the popularity of memes depends on the Web com- munity and its ideology. For instance, /pol/ is well-known for its anti-semitic ideology and in fact the "Happy Merchant" meme [36] is the 3rd most popular meme on /pol/. Evolution of Memes. Adamic et al. [4] study the evolution of text-based memes on Facebook, showing that it can be mod- eled by the Yule process. They find that memes significantly evolve and new variants appear as they propagate, and that specific communities within the network diffuse specific vari- ants of a meme. Bauckhage [6] study the temporal dynamics of 150 memes using data from Google Insights as well as so- cial bookmarking services like Digg, showing that different communities exhibit different interests/behaviors for different memes, and that epidemiology models can be used to predict the evolution and popularity of memes. Simmons et al. [76] focus on detecting and studying the evolution of memes that are propagated via quoted text, finding that mutations of text are surprisingly frequent. By contrast, we study the temporal aspect of memes using Hawkes processes. This statistical framework allows us to as- sess the causality of the posting of memes on various Web communities, thus modeling their evolution and their influence across multiple communities. Generating Memes. Oliveira et al. [66] study the challenges of creating memes, both for humans and automated bots. They build and test an automated meme creator bot, which com- bines a headline with an image macro and posts the resulting meme on Twitter: while generated posts are easily recogniz- able as memes, the bot fails to produce humorous memes -- a task that is challenging for humans too. Wang and Wen [80] study memes from sites like memegenerator.net that have im- ages embedded with text, focusing on the correlations between the text and the characteristics of the image, ultimately propos- ing a non-paranormal approach for generating text from an im- age macro. Case Studies. Heath et al. [20] present a case study of how people perceive memes with a focus on urban legends, finding that they are more willing to share memes that evoke stronger disgust. Shifman and Thelwall [75] study the diffusion, evo- lution, and translation of single memes (i.e., specific jokes) by relying on a mixed-methods approach based on clustering and search engine queries on the Web. Shifman [74] analyzes 30 video memes on YouTube, both qualitatively and quantita- tively, finding that meme videos have several common features like humor, simplicity, and repetitiveness. Xie et al. [83] also focus on YouTube memes, performing a large-scale keyword- based search for videos related to the Iranian election in 2009, extracting frequently used images and video segments. They show that most of the videos are not original, thus, meme- related techniques can be exploited to deduplicate content and capture the content diffusion on the Web. Finally, Dewan et al. [13] study the sentiment and content of images that are dis- seminated during crisis events like the 2015 Paris terror at- tacks. They analyze 57K images related to the attacks, finding instances of misinformation and conspiracy theories. We also present a case study focusing on image memes of Pepe the Frog (see the discussion about Figure 6). This show- cases both the overlap and the diversity of certain memes, as well as how memes can be influenced by real-world events, with new variants being generated. For instance, after the UK Brexit referendum in 2016, memes with Pepe the Frog started to be used in the Brexit context (see Appendix E). This also demonstrates how our processing pipeline can effectively un- cover interesting overlaps and characteristics across memes. Fringe Communities. Previous work has also shed light on fringe Web communities like 4chan, Gab, and sub- communities within Reddit. Bernstein et al. [7] study the ephemerality and anonymity features of the 4chan community using data from the Random board (/b/). Hine et al. [22] focus on /pol/, analyzing 8M posts and detecting a high volume of hate speech as well as the phenomenon of "raids," i.e., coor- dinated attacks aimed at disrupting other services. Zannettou et al. [85] analyze 22M posts from 336K users on Gab, find- ing that hate speech occurs twice as much as in Twitter, but twice less than /pol/. They also highlight a strong presence of alt-rights users previously banned from mainstream social net- works. Snyder et al. [77] measure doxing on 4chan and 8chan, while Chandrasekharan et al. [8] introduce a computational approach to detect abusive content also looking at 4chan and Reddit. Finally, Hawkes processes have also been used to quan- tify influence of fringe Web communities like /pol/ and The Donald to mainstream ones like Twitter in the context of misinformation [86]. We follow a similar approach here, but use an improved method of determining the influence of the different communities. 7 Discussion & Conclusion In this paper, we presented a large-scale measurement study of the meme ecosystem. We introduced a novel image process- ing pipeline and ran it over 160M images collected from four Web communities (4chan's /pol/, Reddit, Twitter, and Gab). We clustered images from fringe communities (/pol/, Gab, and Reddit's The Donald) based on perceptual hashing and a cus- tom distance metric, annotated the clusters using data gathered from Know Your Meme, and analyzed them along a variety of axes. We then associated images from all the communities to the clusters to characterize them through the lens of memes and the influence they have on each other. Our analysis highlights that the meme ecosystem is quite complex, with intricate relationships between different memes and their variants. We found important differences between the memes posted on different communities (e.g., Reddit and Twitter tend to post "fun" memes, while Gab and /pol/ racist or political ones). When measuring the influence of each commu- nity toward disseminating memes to other Web communities, 16 we found that /pol/ has the largest overall influence for racist and political memes, however, /pol/ was the least efficient, i.e., in terms of influence w.r.t. the total number of memes posted, while The Donald is very successful in pushing memes to both fringe and mainstream Web communities. Our work constitutes the first attempt to provide a multi- platform measurement of the meme ecosystem, with a focus on fringe and potentially dangerous communities. Consider- ing the increasing relevance of digital information on world events, our study provides a building block for future cultural anthropology work, as well as for building systems to protect against the dissemination of harmful ideologies. Moreover, our pipeline can already be used by social network providers to assist the identification of hateful content; for instance, Face- book is taking steps to ban Pepe the Frog used in the context of hate [59], and our methodology can help them automatically identify hateful variants. Finally, our pipeline can be used for tracking the propagation of images from any context or other language spheres, provided an appropriate annotation dataset. Performance. We also measured the time that it takes to asso- ciate images posted on Web communities to memes. All other steps in our system are one-time batch tasks, only executed if the annotations dataset is updated. To ease presentation, we only report the time to compare all the 74M images from Twit- ter (the largest dataset) against the medoids of all 12K an- notated clusters: it took about 12 days on our infrastructure, equipped with two NVIDIA Titan Xp GPUs. This corresponds to 14ms per image, or 73 images per second. Note that, if new GPUs are added to our infrastructure, the workload would be divided equally across all GPUs. Future work. In future work, we plan to include memes in video format, thus extending to other communities (e.g., YouTube). We also plan to study the content of the posts that contain memes, incorporating OCR techniques to capture as- sociated text-based features that memes usually contain, and improving on KYM annotations via crowdsourced labeling. While shedding light on the Internet meme ecosystem, our findings yield a number of future directions exploring, e.g., where memes are first created, understanding components of a meme that might increase/decrease its chance of dissemina- tion, gaining a better understanding of the various families of memes, how they influence public opinion, and so on. Acknowledgments. We thank the anonymous reviewers and our shepherd Christo Wilson for their insightful feedback. This project has received funding from the European Union's Hori- zon 2020 Research and Innovation program under the Marie Skłodowska-Curie ENCASE project (Grant Agreement No. 691025). We also gratefully acknowledge the support of the NVIDIA Corporation, for the donation of the two Titan Xp GPUs used for our experiments. Finally, we want to thank /pol/'s anonymous users for their "creativity" and "invaluable" input to this paper (in meme form; see Appendix E). References [1] Cluster Visualization. https://memespaper.github.io/. [2] 4plebs. 4chan archive. http://4plebs.org/. [3] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard, et al. TensorFlow: A System for Large-Scale Machine Learning. In OSDI, 2016. [4] L. A. Adamic, T. M. Lento, E. Adar, and P. C. Ng. Information Evolution in Social Networks. In WSDM, 2016. [5] M. Babaei, P. Grabowicz, I. Valera, K. P. Gummadi, and M. Gomez-Rodriguez. On the Efficiency of the Information Networks in Social Media. In WSDM, 2016. [6] C. Bauckhage. Insights into Internet Memes. In ICWSM, 2011. [7] M. S. Bernstein, A. Monroy-Hern´andez, D. Harry, P. Andr´e, K. Panovich, and G. G. Vargas. 4chan and/b: An Analysis of Anonymity and Ephemerality in a Large Online Community. In ICWSM, 2011. [8] E. Chandrasekharan, M. Samory, A. Srinivasan, and E. Gilbert. The bag of communities: Identifying abusive behavior online with preexisting Internet data. In CHI, 2017. [9] F. Chollet. Keras. https://github.com/fchollet/keras, 2015. [10] M. Coscia. Competition and Success in the Meme Pool: A Case Study on Quickmeme.com. ArXiv 1304.1712, 2013. [11] A. Dang, A. Mohammad, A. A. Gruzd, E. E. Milios, and R. Minghim. A visual framework for clustering memes in social media. In ASONAM, 2015. [12] R. Dawkins. The selfish gene. Oxford university press, 1976. [13] P. Dewan, A. Suri, V. Bharadhwaj, A. Mithal, and P. Ku- maraguru. Towards Understanding Crisis Events On Online So- cial Networks Through Pictures. In ASONAM, 2017. [14] A. Dubey, E. Moro, M. Cebrian, and I. Rahwan. MemeSe- In quencer: Sparse Matching for Embedding Image Macros. WWW, 2018. [15] M. Ester, H.-P. Kriegel, J. Sander, X. Xu, et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In KDD, 1996. [16] C. Faife. How 4Chan's Structure Creates a 'Survival of the Fittest' for Memes. https://motherboard.vice.com/en us/article/ ywzm8m/how-4chans-structure-creates-a-survival-of-the- fittest-for-memes, 2017. [17] E. Ferrara, M. JafariAsbagh, O. Varol, V. Qazvinian, F. Menczer, and A. Flammini. Clustering Memes in Social Me- dia. In ASONAM, 2013. [18] G. Graham. Genes: A Philosophical Inquiry. Routledge, 2005. [19] D. Haddow. Meme warfare: how the power of mass replication has poisoned the US election. https://www.theguardian.com/us- news/2016/nov/04/political-memes-2016-election-hillary- clinton-donald-trump, 2016. [20] C. Heath, C. Bell, and E. Sternberg. Emotional selection in memes: the case of urban legends. Journal of Personality and Social Psychology, 2001. [21] G. E. Hine, J. Onaolapo, E. D. Cristofaro, N. Kourtellis, I. Leon- tiadis, R. Samaras, G. Stringhini, and J. Blackburn. A Longitu- dinal Measurement Study of 4chan's Politically Incorrect Fo- rum and its Effect on the Web. ArXiv 1610.03452, 2016. [22] G. E. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis, I. Leontiadis, R. Samaras, G. Stringhini, and J. Blackburn. Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web. In ICWSM, 2017. [23] D. Ienco, F. Bonchi, and C. Castillo. The Meme Ranking Prob- lem: Maximizing Microblogging Virality. In ICDMW, 2010. [24] Know Your Meme. Alt-Right Culture. http://knowyourmeme. com/memes/cultures/alt-right, 2018. [25] Know Your Meme. Angry Pepe Meme. http://knowyourmeme. com/memes/angry-pepe, 2018. [26] Know Your Meme. Apu Apustaja Meme. http:// 17 knowyourmeme.com/memes/apu-apustaja, 2018. [27] Know Your Meme. Bad Luck Brian Meme. knowyourmeme.com/memes/bad-luck-brian, 2018. http:// [28] Know Your Meme. http:// knowyourmeme.com/memes/make-america-great-again, 2018. [29] Know Your Meme. #CNNBlackmail. http://knowyourmeme. Clinton/Trump Duet Meme. com/memes/events/cnnblackmail, 2018. [30] Know Your Meme. Conspiracy Keanu Meme. knowyourmeme.com/memes/conspiracy-keanu, 2018. [31] Know Your Meme. Donald Trump Meme. http:// http:// knowyourmeme.com/memes/people/donald-trump, 2018. [32] Know Your Meme. Dubs Guy/Check Em Meme. http:// knowyourmeme.com/memes/dubs-guy-check-em, 2018. From the European Union / Brexit Meme. //knowyourmeme.com/memes/events/united-kingdom- withdrawal-from-the-european-union-brexit, 2018. http: [57] Know Your Meme. X delivers Y at Z Meme. knowyourmeme.com/memes/x-delivers-y-at-z, 2018. https:// [58] A.-D. League. Pepe the Frog. https://www.adl.org/education/ references/hate-symbols/pepe-the-frog, 2018. [59] S. Lerner. Facebook To Ban Pepe The Frog Images Used In The Context Of Hate. http://www.techtimes.com/articles/228632/ 20180525/facebook-publishes-official-policy-on-pepe-the- frog.htm, 2018. [60] J. Leskovec, L. Backstrom, and J. M. Kleinberg. Meme-tracking and the Dynamics of the News Cycle. In KDD, 2009. [33] Know Your Meme. Evil Kermit Meme. http://knowyourmeme. [61] S. W. Linderman and R. P. Adams. Discovering Latent Network com/memes/evil-kermit, 2018. [34] Know Your Meme. Feels Bad Man / Sad Frog Meme. http: //knowyourmeme.com/memes/feels-bad-man-sad-frog, 2018. http:// Goofy's Time Meme. knowyourmeme.com/memes/its-goofy-time, 2018. [35] Know Your Meme. [36] Know Your Meme. Happy Merchant Meme. knowyourmeme.com/memes/happy-merchant, 2018. http:// [37] Know Your Meme. ISIS / Daesh Meme. http://knowyourmeme. com/memes/people/isis-daesh, 2018. [38] Know Your Meme. LOL Guy Meme. http://knowyourmeme. com/memes/lol-guy, 2018. [39] Know Your Meme. Main page of KYM entries. http:// knowyourmeme.com/memes/, 2018. [40] Know Your Meme. Make America Great Again Meme. http:// knowyourmeme.com/memes/make-america-great-again, 2018. http:// [41] Know Your Meme. Manning Face Meme. knowyourmeme.com/memes/manningface, 2018. [42] Know Your Meme. Maxvidya Meme. https://knowyourmeme. com/memes/maxvidya, 2018. [43] Know Your Meme. Nut Button Meme. http://knowyourmeme. com/memes/nut-button, 2018. [44] Know Your Meme. Overly Attached Girlfriend Meme. http:// knowyourmeme.com/memes/overly-attached-girlfriend, 2018. http:// [45] Know Your Meme. Pepe the Frog Meme. knowyourmeme.com/memes/pepe-the-frog, 2018. Structure in Point Process Data. In ICML, 2014. [62] S. W. Linderman and R. P. Adams. Scalable Bayesian Infer- ence for Excitatory Point Process Networks. ArXiv 1507.03228, 2015. [63] S. Martin, W. M. Brown, R. Klavans, and K. W. Boyack. OpenOrd: An Open-source Toolbox for Large Graph Layout. In Visualization and Data Analysis 2011, 2011. [64] A. Marwick and R. Lewis. Media manipulation and disinfor- mation online. https://datasociety.net/pubs/oh/DataAndSociety MediaManipulationAndDisinformationOnline.pdf, 2017. [65] V. Monga and B. L. Evans. Perceptual Image Hashing Via IEEE Feature Points: Performance Evaluation and Tradeoffs. Transactions on Image Processing, 2006. [66] H. G. Oliveira, D. Costa, and A. M. Pinto. One does not simply produce funny memes! - Explorations on the Automatic Gener- ation of Internet humor. In ICCC, 2016. [67] D. Olsen. How memes are being weaponized for political pro- paganda. https://www.salon.com/2018/02/24/how-memes-are- being-weaponized-for-political-propaganda/, 2018. [68] Pushshift. Reddit Data. http://files.pushshift.io/reddit/, 2018. [69] J. Ratkiewicz, M. Conover, M. R. Meiss, B. Gonalves, S. Patil, A. Flammini, and F. Menczer. Detecting and Tracking the Arxiv Spread of Astroturf Memes in Microblog Streams. 1011.3768, 2010. [70] Reddit. Reddit JSON Documentation. https://github.com/ [46] Know Your Meme. /pol/ KYM entry. http://knowyourmeme. reddit-archive/reddit/wiki/JSON, 2018. com/memes/sites/pol, 2018. [47] Know Your Meme. Rage Comics Subculture. http:// knowyourmeme.com/memes/subcultures/rage-comics, 2018. [48] Know Your Meme. Rage Guy Meme. http://knowyourmeme. com/memes/rage-guy-fffffuuuuuuuu, 2018. [49] Know Your Meme. Rickroll Meme. http://knowyourmeme. com/memes/rickroll, 2018. [50] Know Your Meme. Roll Safe Meme. http://knowyourmeme. com/memes/roll-safe, 2018. [51] Know Your Meme. Russian Anti-Meme Law Meme. http: //knowyourmeme.com/memes/events/russian-anti-meme-law, 2018. [52] Know Your Meme. Smug Frog Meme. http://knowyourmeme. com/memes/smug-frog, 2018. [53] Know Your Meme. That's The Joke Meme. http:// knowyourmeme.com/memes/thats-the-joke, 2018. [54] Know Your Meme. Trollface / Coolface / Problem? Meme. http://knowyourmeme.com/memes/trollface-coolface- problem, 2018. [55] Know Your Meme. #TrumpAnime / Rick Wilson Contro- versy. http://knowyourmeme.com/memes/events/trumpanime- rick-wilson-controversy, 2018. [56] Know Your Meme. United Kingdom Withdrawal [71] C. M. Rivers and B. L. Lewis. Ethical research standards in a world of big data. F1000Research, 2014. [72] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the Mechanics of Information Diffusion Across Topics: Idioms, Po- litical Hashtags, and Complex Contagion on Twitter. In WWW, 2011. [73] J. Scott. Information Warfare: The Meme is the Embryo of the Narrative Illusion. Institute for Critical Infrastructure Technol- ogy, 2018. [74] L. Shifman. An anatomy of a YouTube meme. New Media & Society, 2012. [75] L. Shifman and M. Thelwall. Assessing global diffusion with Web memetics: The spread and evolution of a popular joke. Journal of the Association for Information Science and Tech- nology, 2009. [76] M. Simmons, L. Adamic, and E. Adar. Memes online: Ex- tracted, subtracted, injected, and recollected. In ICWSM, 2011. [77] P. Snyder, P. Doerfler, C. Kanich, and D. McCoy. Fifteen min- utes of unwanted fame: Detecting and characterizing doxing. In IMC, 2017. [78] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. Dropout: A simple way to prevent neural networks from overfitting. JMLR, 2014. 18 [79] O. Tsur and A. Rappoport. Don't Let Me Be #Misunderstood: Linguistically Motivated Algorithm for Predicting the Popular- ity of Textual Memes. In ICWSM, 2015. [80] W. Y. Wang and M. Wen. I Can Has Cheezburger? A Nonpara- normal Approach to Combining Textual and Visual Information for Predicting and Generating Popular Meme Descriptions. In HLT-NAACL, 2015. [81] L. Weng, A. Flammini, A. Vespignani, and F. Menczer. Com- In petition among memes in a world with limited attention. Scientific Reports, 2012. [82] L. Weng, F. Menczer, and Y.-Y. Ahn. Predicting Successful Memes Using Network and Community Structure. In ICWSM, 2014. [83] L. Xie, A. Natsev, J. R. Kender, M. L. Hill, and J. R. Smith. Tracking Visual Memes in Rich-Media Social Communities. In ICWSM, 2011. [84] I. Yoon. Why is it not just a joke? Analysis of Internet memes associated with racism and hidden ideology of colorblindness. Journal of Cultural Research in Art Education, 33, 2016. [85] S. Zannettou, B. Bradlyn, E. De Cristofaro, M. Sirivianos, G. Stringhini, H. Kwak, and J. Blackburn. What is Gab? A Bas- tion of Free Speech or an Alt-Right Echo Chamber? In WWW Companion, 2018. [86] S. Zannettou, T. Caulfield, E. De Cristofaro, N. Kourtellis, I. Leontiadis, M. Sirivianos, G. Stringhini, and J. Blackburn. The Web Centipede: Understanding How Web Communities In- fluence Each Other Through the Lens of Mainstream and Alter- native News Sources. In IMC, 2017. [87] C. Zauner, M. Steinebach, and E. Hermann. Rihamark: percep- tual image hash benchmarking. In Media Forensics and Secu- rity, 2011. A Clustering Parameter Selection Our implementation uses the DBSCAN algorithm with a clus- tering threshold equal to 8. To select this threshold, we perform the clustering step while varying the distances. Table 8 shows the number of clusters and the percentage of images that are regarded as noise by the clustering algorithm for varying dis- tances. We observe that, for distances 2-4, we have a substan- tially larger percentage of noise, while with distance 10 we have the least percentage of noise. With distances between 6 and 8 we observe that we get a larger number of clusters than the other distances, while the noise percentages are 73% and 63%, respectively. To further evaluate the clustering performance for varying distances, we randomly select 200 clusters and manually cal- culate the number of images that are false positives within each cluster. Figure 17 shows the CDF of the false positive fraction in the random sample of clusters for distances 6, 8, and 10 (we disregard distances 2-4 due to the high percentage of noise). Distance 10 yields a high number of false positives, while dis- tances 6-8 the overall false positives are below 3%. Therefore, we investigate the impact of these false positives in the overall dataset, looking at all posts that contain false and true posi- tives in the random sample of 200 clusters, using distance 8. We find that the false positives have little impact as they occur substantially fewer times than true positives: the percentage of true positives over the set of false positives and true positives is 99.4%. Thus, due to the larger number of clusters, the accept- 19 Distance 2 4 6 8 10 #Clusters %Noise 30,327 34,146 37,292 38,851 30,737 82.9% 78.5% 73.0% 62.8% 27.8% Table 8: Number of clusters and percentage of noise for varying clus- tering distances. Figure 17: Fraction of false positives in clusters with varying cluster- ing distance. able false positive performance, and the smaller percentage of noise (when compared to distances 2-6), we elect to use as a threshold the perceptual distance that is equal to 8. B KYM and Clustering Annotation Evaluation While KYM might not be a household name, the site is seem- ingly the largest curated collection of memes on the Web, i.e., KYM is as close to an "authority" on memes as there is. That said, crowdsourcing is an aspect of how KYM works, and thus there might be questions as to how "legitimate" some of the content is. To this end, we set out to measure the quality of KYM by sampling a number of pages and manually examin- ing them. This is clearly a subjective task, and a fully specified definition of what makes a valid meme is approximately as dif- ficult as defining "art." Nevertheless, the authors of this paper have, for better or worse, collectively spent thousands of hours immersed in the communities we explore; thus, while we are not confident in providing a strict definition of a meme, we are in claiming that we know a meme when we see it. Using the same randomly selected 200 clusters as men- tioned in Appendix A, we visited each KYM page the cluster was tagged with and noted whether or not it properly docu- mented what we consider an "actual" meme. The 200 clus- ters were mapped to 162 unique KYM pages, and of these 162 pages, 3 (1.85%) we decided were "bad." This is mainly due to the lack of completeness and relatively high number of ran- dom images in the gallery (see [42, 57] for some examples of "bad" KYM entries). Next, we set out to determine whether the label (i.e., KYM page) assigned to each of our randomly sampled clusters was appropriate. Using three annotators, for each cluster we exam- ined the KYM page, the medoid of the cluster, and the im- 0.00.10.20.30.40.50.60.70.8Fraction of false positives0.00.20.40.60.81.0CDFdistance = 6distance = 8distance = 10 Figure 18: Architecture of the deep learning model for detecting screenshots from Twitter, /pol/, Reddit, Instagram, and Facebook. ages in the cluster itself and noted whether the label does in fact apply to the cluster. Here, again, there is a great degree of subjectivity. To reign some of the subjectivity in, we used the following guidelines: Platform Twitter 4chan # images 14,602 10,127 Reddit Facebook Instagram Other 2,181 497 10,630 1,414 Table 9: Curated dataset used to train the screenshot classifier. 1. If the exact image(s) in the cluster appear in the KYM gallery, then the label is correct. 2. For images that do not appear in the KYM gallery, if the label is appropriate, then it is a correct labeling. There are some important caveats with these guidelines. First, KYM galleries are crowdsourced, and while curated to some extent, the possibility for what amounts to random im- ages in a gallery does exist; however, based on our assessment of KYM page validity, this occurs with low probability. Sec- ond, we considered a label correct if it was appropriate, even if it was not necessarily the best possible label. For example, as our results show, many memes are related, and many images mix and match pieces of various memes. While it is definitely true that there might be better labels that exist for a given clus- ter, this straightforward and comprehensible labeling process is sufficient for our purposes. We leave a more in-depth study of the subjective nature of memes for future work. Finally, it is important to note that memes are a cultural phenomenon, and thus the potential for cultural bias in our annotation is possible. Note that our annotators were born in three different countries (USA, Italy, and Cyprus), only one is a native English speaker, and two have spent substantial time in the US. After annotating clusters, we compute the Fleis agreement score (κ). With our cluster samples, we achieve κ=0.67, which is considered "substantial" agreement. Finally, for each cluster we obtain the majority agreement of all annotators to assess the accuracy of our annotation process; we find that 89% of the clusters had a legitimate annotation to a specific KYM entry. C Screenshot Classifier We now provide details on our screenshot classifier mentioned in Step 4 in Figure 2). Dataset. Table 9 summarizes the dataset used for training the classifier. It includes 28.8K images that depict posts from Twit- ter, 4chan, Reddit, Facebook, and Instagram, which we collect from public sources. First, we download images from specific subreddits that only allow screenshots from a particular com- munity. For example, the 4chan subreddit require all submis- sions to be of a screenshot of a 4chan thread. Next, we use the Pinterest platform to download specific boards that contain mostly screenshots from the communities we study. Also, we Figure 19: ROC curve of the screenshot classifier. search and obtain image datasets that are publicly available on Web archiving services like the Wayback Machine. We then manually filter out images that were misplaced. Finally, we in- clude 10K random images posted on /pol/ (i.e., a subset of the 4.3M images collected for our measurements). Classifier. To detect screenshots that contain images from one of the social networks included in our dataset, we use Convolu- tional Neural Networks. Figure 18 provides an overview of our classifier's architecture. It includes two Convolutional Neural Networks, each followed by a max-pooling layer. The output of these layers is fed to a fully-connected dense layer compris- ing 512 units. Finally, we have another fully-connected layer with two units, which outputs the probability that a particular image is a screenshot from one of the five social networks and the probability that an image is a random one. To avoid overfit- ting on the two last fully-connected layers, we apply Dropout with d = 0.5 [78]. This means that, while training, 50% of the units are randomly omitted from updating their parameters. implementation Experimental Evaluation. Our uses Keras [9] with TensorFlow as the backend [3]. To train our model, we randomly select 80% of the images and evaluate based on the rest 20% out-of-sample dataset. Figure 19 shows the ROC curve of the model. We observe that the devised classifier exhibits acceptable performance with an Area Under the Curve (AUC) of 0.96. We also evaluate our model in terms of accuracy, precision, recall, and F1-score, which amount to 91.3%, 94.3%, 93.5%, and 93.9%, respectively. 20 0.00.20.40.60.81.0False Positive Rate0.00.20.40.60.81.0True Positive Rate Figure 20: Images that are part of the Dubs Guy/Check Em Meme. Figure 22: Images that are part of the Goofy's Time Meme. Figure 21: Images that are part of the Nut Button Meme. D Clusters examples As anticipated in Section 4.1, we also present some examples of clusters showcasing how the proposed pipeline can effec- tively detect and group images that belong to the same meme. Specifically, Figure 20 shows a subset of the images from the Dubs Guy/Check Em meme [32], Figure 21 a subset of images that belong to the Nut Button meme [43], while Fig- ure 22 -- to the Goofy's Time meme [35]. Note that all these images are obtained from /pol/ clusters. In all clusters, we observe similar variations, i.e., variations of Donald Trump, Adolf Hitler, The Happy Merchant, and Pepe the Frog appear in all examples. Once again, this em- phasizes the overlap that exists among memes. E Interesting Images Finally, we report some "interesting" examples of images from our frogs case study (see Section 4.1.2), as well as an exam- ple of an image for enhancing/penalizing the public image of specific politicians (as discussed in Section 4.2.1). Specifically, Figure 23 shows an image connecting the Smug Frog [52] and the ISIS memes [37]. Also, Figure 24 shows an image connecting the Smug Frog and the Brexit meme [56]. Finally, Figure 25 shows a graphic image found in /pol/ that aims to attack the image of Hillary Clinton, while boosting that of Donald Trump. (The image depicts Hillary Clinton as a monster, Medusa, while Donald Trump is pre- sented as Perseus, the hero who beheaded Medusa.) Furthermore, some of the communities we study in the cur- rent work have taken an interest in our previous work. /pol/ has taken a particular interest, and as additional evidence to the community's meme creating "ability," Figures 26 and 27 are two sample memes created in response to our work. Figure 26 is a manipulated photo of the 6th author, originally taken as part of an interview for Nature News. /pol/ seized upon this opportunity and, during the course of one discussion thread4, decided that he "definitely masturbates to beavers," creating Figure 26 to prove the point. Figure 27, which appeared in a recent /pol/ thread5, is an edited version of a photo, related to a Simpsons derived meme, of the 3rd author giving a talk on our previous work. In addition, after the release of the initial version of this pa- per, /pol/ quickly picked up and its users started generating memes. For example, they photoshopped the face of the first author on top of a "comfy pepe" meme, the particular variant of which is actually a screenshot from our previous work [21], hence creating the new "very comfy Savvas Zannettou" vari- ant in Figure 28.6 At the same time, Figure 7 from the current work became a meme itself, as /pol/ users treated it as a base upon which to build further memes. Figure 29 shows the graph with /pol/'s "logo," Figure 30 the graph combined with a vari- ation of the Smug Frog Meme, Figure 31 the same gra[h with the "comfy pepe" meme, while the newly created "very comfy Savvas Zannettou" appears as a variant too (see Figure 32). To conclude, our work also attracted the interest of the press, and journalists have created their own memes about our paper. For instance, in a Quartz article7, an Expanding Brain meme was created and shared showing the use of memes by peo- ple, while in an IFLSCIENCE article8 a Distracted Boyfriend Meme was shared showing our particular value to the scien- tific community: we have, in large part, quantified some fun- damental aspects of memes on the Internet, leaving the rest of the community to focus on other areas of curiosity. 4http://archive.4plebs.org/pol/thread/129243152/ 5http://archive.4plebs.org/pol/thread/172617415/ 6http://archive.4plebs.org/pol/thread/175115412 7https://goo.gl/KubZjX 8https://goo.gl/YKVjw2 21 Figure 23: Image that exists in the clusters that are connected with frogs and Isis Daesh. Figure 27: A meme of the 3rd author of this paper created by /pol/. Figure 24: Image that exists in the clusters that are connected with frogs and Brexit. Figure 28: A meme of the 1st author of this paper created by /pol/ via modification of a Figure from the "Rare Pepe" appendix in [21]. This new variant, "a very comfy Savvas Zannettou," is a modification of the "comfy pepe" meme. Figure 25: Meme that is used for enhancing/penalizing the public im- age of specific politicians. Hillary Clinton is represented as Medusa, a monster, while Donald Trump is presented as Perseus (the hero who beheaded Medusa). Figure 26: A meme of the 6th author of this paper created by /pol/. 22 Figure 29: A meme created by /pol/ users combining Figure 7 with /pol/'s logo. Figure 30: A meme created by /pol/ combining Figure 7 with the Smug Frog Meme. Figure 31: A meme created by /pol/ users combining Figure 7 with the "comfy pepe" meme. Figure 33: A variant of the "expanding brain" meme created by QZ in an article about this paper. The meme illustrates a progression of "intelligence," starting from people that just look at memes and cul- minating in those that write a paper about memes (i.e., the authors of this paper). Figure 32: A meme created by /pol/ users combining Figure 7 with the "very comfy Savvas Zannettou" variant from Fig 28. Figure 34: A meme created by IFLSCIENCE in an article featuring this paper. 23
1806.06813
1
1806
2018-06-18T16:41:28
"What's ur type?" Contextualized Classification of User Types in Marijuana-related Communications using Compositional Multiview Embedding
[ "cs.SI" ]
With 93% of pro-marijuana population in US favoring legalization of medical marijuana, high expectations of a greater return for Marijuana stocks, and public actively sharing information about medical, recreational and business aspects related to marijuana, it is no surprise that marijuana culture is thriving on Twitter. After the legalization of marijuana for recreational and medical purposes in 29 states, there has been a dramatic increase in the volume of drug-related communication on Twitter. Specifically, Twitter accounts have been established for promotional and informational purposes, some prominent among them being American Ganja, Medical Marijuana Exchange, and Cannabis Now. Identification and characterization of different user types can allow us to conduct more fine-grained spatiotemporal analysis to identify dominant or emerging topics in the echo chambers of marijuana-related communities on Twitter. In this research, we mainly focus on classifying Twitter accounts created and run by ordinary users, retailers, and informed agencies. Classifying user accounts by type can enable better capturing and highlighting of aspects such as trending topics, business profiling of marijuana companies, and state-specific marijuana policymaking. Furthermore, type-based analysis can provide more profound understanding and reliable assessment of the implications of marijuana-related communications. We developed a comprehensive approach to classifying users by their types on Twitter through contextualization of their marijuana-related conversations. We accomplished this using compositional multiview embedding synthesized from People, Content, and Network views achieving 8% improvement over the empirical baseline.
cs.SI
cs
"What's ur type?" Contextualized Classification of User Types in Marijuana-related Communications using Compositional Multiview Embedding Ugur Kursuncu1,3, Manas Gaur1, Usha Lokala1, Anurag Illendula1, Krishnaprasad Thirunarayan1, Raminta Daniulaityte1,2, Amit Sheth1 & I. Budak Arpinar3 8 1 0 2 n u J 8 1 ] I S . s c [ 1 v 3 1 8 6 0 . 6 0 8 1 : v i X r a Abstract- With 93% of pro-marijuana population in US favoring legalization of medical marijuana1, high expectations of a greater return for Marijuana stocks2, and public actively sharing information about medical, recreational and business aspects related to marijuana, it is no surprise that marijuana culture is thriving on Twitter. After the legalization of marijuana for recreational and medical purposes in 29 states3, there has been a dramatic increase in the volume of drug-related communication on Twitter. Specifically, Twitter accounts have been established for promotional and informational purposes, some prominent among them being American Ganja, Medical Marijuana Exchange, and Cannabis Now. Identification and characterization of different user types can allow us to conduct more fine-grained spatiotemporal analysis to identify dominant or emerging topics in the echo chambers of marijuana-related communities on Twitter. In this research, we mainly focus on classifying Twitter accounts created and run by ordinary users, retailers, and informed agencies. Classifying user accounts by type can enable better capturing and highlighting of aspects such as trending topics, business profiling of marijuana companies, and state-specific marijuana policymaking. Furthermore, type-based analysis can provide more profound understanding and reliable assessment of the implications of marijuana-related communications. We developed a comprehensive approach to classifying users by their types on Twitter through contextualization of their marijuana-related conversations. We accomplished this using compositional multiview embedding synthesized from People, Content, and Network views achieving 8% improvement over the empirical baseline. Index Terms- Semantic Social Computing, Compositional Multiview Embedding, Emoji Embedding, Network Embed- ding, Marijuana, User classification I. INTRODUCTION "It's 4/20, and that means everyone is talking about marijuana4," highlights the state of marijuana-related com- munication on Twitter, especially around the time marijuana legalization polls were conducted in the USA. As more evidence is gathered through research studies on the safety and benefits of the medical and recreational uses of cannabis, 1 Kno.e.sis Center, Wright State University, Dayton, OH, USA {ugur,manas,usha,anurag,tkprasad,amit}@knoesis.org State University, Dayton, OH, USA CITAR, Wright 2 3 Dept. of Computer Science, University of Georgia, Athens, GA, USA [email protected] {kursuncu,budak}@uga.edu 1https://goo.gl/um2dDE 2https://goo.gl/spSnVX 3https://goo.gl/CJVX5a 4https://goo.gl/JGSs3X there is a rise in public demand for broader legalization of marijuana and its variants. Accordingly, it is useful to study the engagement of users on social media to understand public opinion and its influence on policies better. Characterization of marijuana concentrate users on social media can enable researchers and analysts to describe the patterns of use, reasons of symptoms, and side effects as well as identify the predictor of risks with the help of spatiotemporal analysis. Specifically, classification of user types in marijuana communications on social media can aid in analyzing content-network dynamics at a user level, through an assessment of homophily in marijuana-related communities. Further, assessing the differences concerning marijuana conversations, the information flow, and interac- tions between user types, such as retail, informed agency and personal accounts, can help better situate their characteristics and understand the implications. For instance, in the case of predicting the outcome of a state legalization process[1], understanding the public opinions of the residents, assessing trending marijuana related topics in their conversations and monitoring their implications, are relevant and critical, as these opinions translate to votes. We associate personal user type (P) with an account handled by an individual user expressing their opinions, retail user type (R) with an account managed by a business entity to promote and market marijuana-related products, and informed agency user type (I) with an account handled by a group or organization to disseminate marijuana related information. Throughout the paper, we use informed agency & media interchangeably to refer to the same user type. In this study, we are proposing a user classification ap- proach exploiting the multiview aspect of the Twitter data and features extracted from people, content, and network dimensions. The multiview stems from the inclusion of text, image (profile pictures), emoji and network interactions among accounts of different user types [2]. Hence, for a reliable classification, we use Compositional Multiview Embedding(CME) that combines different elements of the context such as text, image, emoji and network activities. This study addresses two key challenges: (i) The im- balanced dataset due to the relatively few users pertaining to Retail and Informed Agency user types, and (ii) Lack of proper use of different contextual dimensions, precisely, by incorporating Person-Content-Network views in compo- sitional multiview embedding, for interpreting marijuana- related Twitter data. We create compositions of vector embeddings of these views of the Twitter data, called Compositional Multiview Embedding(CME), as it can represent the context in a more coherent manner [3]. In our approach, we create two CMEs: (i) one using tweet text, emoji and network interactions of users, and (ii) another using user description and emoji. In Section V-B, we explain the correlation analysis performed on various feature combinations to assess their relationship. For instance, we found that descriptions and network inter- actions of users are highly correlated, suggesting that their combination can affect the performance of the classifier over the validation and test data. Therefore, we did not create the embedding using these two views. We evaluated the classifiers based on the individual F-scores of user type classes. We also generated word embedding vectors for profile pictures of users, which significantly improved the performance of classification of the informed agency user type. Details of our approach and results are discussed in Sections V and VI respectively. The remainder of the paper is organized as follows: In Section II, we explain related works on the marijuana-related user classification. In Section III, we provide preliminaries about the concepts and technologies used. In Section IV, we provide an exploratory analysis that includes statistics about our dataset. Section V explains features and our experimental settings, and Section VI discusses the results of our analysis. Section VII concludes the paper with a summary and future research directions. II. RELATED WORK In this section, we describe prior studies that are broadly related to user classification, under three prominent sub- headings: (i) Embedding based Approaches to User Clas- sification, (ii) Diverse Features for User Classification, and (iii) User-level Approaches. A. Embedding based Approaches to User Classification The profile of a user on Twitter consists of user descrip- tion, tweets exchanged with their followers/friends, profile picture. Researchers [4] utilized user tweets to learn an embedding model using Long Short-Term Memory (LSTM) and Recurrent Neural Network (RNN) to classify users based on their gender and age information achieving an accuracy of 91% and 82% respectively. In contrast, [5] employed interactional features to generate embeddings for a semi-supervised approach. Specifically, they utilize a small number of seed users with labels (e.g., news agency, person, genres) and interactions with "mentions" in their tweets. [6] proposed an approach to learn the interactional features of the users by optimizing the structural and attribute level prop- erties of their networks that characterizes homophily in their communication. In another study [2], researchers utilized person-level multiview embedding to predict engagement, friend selection and demographic information of users. In contrast, our study gleans person, content and network-level features, creating a composition of multiview embeddings through vector addition operation that characterizes users in the context of marijuana-related communications on social media. B. Diverse Features for User Classification Prior work related to user classification on social media has involved different sets of features. Person-level features included profile [7], user behavior, first and last names [8], demographics, Content level features including linguistic, domain-specific and generic LDA topics, and Network level features comprising follower-followee connections [7]. These features were utilized to glean political affinity, ethnicity, and favorability towards a particular profession, to generate machine-readable user-profiles for improving the user classi- fication [7], and to cluster users based on their conversations and predict demographics [8]. Combination of these features with network interactions results in a better-contextualized representation of the dataset [9]. They claimed that their model provides an in-depth analysis of users' communication from both content and network perspective, and improves user classification. C. User-level Approaches For particular problems such as identification of user interests and event detection, user-level understanding of the content as well as the network dynamics is pivotal. In [10], they classified users into three classes, namely, organization, journalist (or media personnel), and an ordinary person, to identify variation in characteristics across multiple events. Engagement of users on a particular subject on social media is considered as an important signal in social media analytics, and has been used for user classification in [11]. The authors developed a working model to categorize a user as Idea Starter, Commentator, Curator, Amplifier, and Viewer. In the election domain, political homophily on social media forms a feature for user classification, and [12] illustrates its significance for resolving reciprocated or non-reciprocated ties in the network of users. Homophily creates social echo chambers which polarizes the world of users. This fact can be used to discriminate ordinary users (or information seekers) from information providers (e.g., topical analysis of the user- generated content can be informative about their intentions. In [13], topic-centric Naive Bayes classifier was developed to identify the topics to categorize unknown users based on the closeness of their topics to those of the users in the training dataset. In recent years, there has been a surge in the use of e- cigarettes among smokers, and Twitter has emerged as a cost- effective platform for sharing and promoting information. In [14], a user classification approach has been designed employing metadata and tweeting behavior to classify users as individuals, informed agencies, marketers, spammers, and vapor enthusiasts. journalist). Moreover, III. PRELIMINARIES Our approach uses several building blocks for an in- depth analysis of tweet content to extract relevant context in marijuana dataset. Specifically, we discuss the people- content-network paradigm [15] and compositional word em- beddings for expressiveness, EmojiNet for interpreting emoji, Clarifai for processing profile pictures, and SMOTE for oversampling. A. People-Content-Network On social media, communities are being formed around various topics of interest through network interactions [15]. The information being shared in tweets by a user in the marijuana community displays an intent that depends on the user's type [16]. For instance, personal users share their ex- periences and opinions on marijuana, retail accounts usually promote the use of marijuana and other related products that they sell, and media accounts disseminate information on marijuana-related events and festivals, legalization processes. Accordingly, as these user types show different characteris- tics, it is critical to bring to bear different perspectives, such as person, content, and network, for reliable analysis and insights. We describe a systematic organization and analysis of features in Section V-C. B. EmojiNet Emoji are a pictorial representation of facial expressions, places, foods and other objects. These are often used by mar- ijuana community on social media to express opinions and emotions about marijuana-related topics. Emoji contribute to the interpretation of the content created by the users and can contribute to the better recognition of the characteristics of user types. To achieve this goal, we make use of EmojiNet [17] which gathers meanings of 2,389 emoji. Specifically, EmojiNet provides a set of words (e.g., smile), associated POS tags (e.g., verb), and their sense definitions. It maps 12,904 sense definitions to 2,389 emoji, to capture platform- specific interpretations. C. Word Embedding Model A word embedding model created using word2vec can learn a rich low dimensional representation of words in a tweet corpus. Initially, the word embedding procedure was developed to generate distributional representations over corpora such as Wikinews, News articles, and Google News corpus that represent the current state-of-the-art. [18] also shows that vector arithmetic over the word vectors can be used to generate analogies. For instance, word embedding of "Queen" can be obtained by summing the word embeddings of "Man" and "Woman" and subtracting from it the word embedding of "King." In recent studies [19], [20], the researchers have shown that word embedding models perform well over short texts. In another study [21], the authors have created a named entity recognition shared task for data from microblogging plat- forms using distributed word representations. These recent and prior successes in modeling words as computable vectors have encouraged us to utilize a pre-trained word2vec model trained over a generic Twitter corpus [21] or train a new word-embedding model over our domain-specific Twitter corpus. Depending on the type of the corpus (characterized using sentence level statistics and word frequency counts), we can use one of two neural network architectures for learn- ing word2vec embeddings: (i) Continuous Bag-Of-Words Fig. 1. Word Cloud of tweets from Informed Agency. model [18] (CBOW) (ii) Skip-gram model [18]. In our study we have used skip-gram architecture. D. Compositional Word Embedding In our study, we utilize compositional word embedding [3] to combine feature-level embedding vectors and to generate a comprehensive representation of a data point (e.g., user, tweet, user descriptions). Specifically, we employ weighted vector addition, a linear composition function detailed in [3]. Formally, we define Z, the weighted composition of word embeddings of U and V as follows: Z = W0 · U + W1 · V , where U,V ∈ Rm×300(m represent number of users) are two embeddings which are composed by weight-based (e.g., cosine similarity matrix) modulation using W0,W1 ∈ Rm×m, respectively. Note that in such a composition, the dimension of input and output representation is unaltered. As detailed in Section V-B, it is essential to consider the correlation between different view embeddings before composing them. For instance, in Z the weight matrices will be optimized through an optimization function; however, if the embed- dings U and V are uncorrelated, it is computationally hard to generate the representation of Z as such optimization function over the two uncorrelated embeddings, will fail to converge. Hence, we performed a linear composition, vector addition, to generate the representation of Z. Since the classification is insensitive to the position of emoji and words in the content, we consider such composition as appropriate. Formally, Z= U+V is a vector addition of U and V. IV. EXPLORATORY ANALYSIS We have conducted an analysis of our dataset by extracting statistical, textual and topical information. Fig 1 captures the word cloud synthesized using the tweets from the Informed Agency user type that can be used to glean related topics. We have three classes of user types, namely, Personal Accounts (P), Informed Agency (I), and Retail Accounts (R). Our corpus contains tweets crawled in Summer 2017 that includes the months of June, July, and August, covering all states in the U.S. During this time frame, the volume of communication-related to marijuana was high due to ongoing events (e.g. Cannabis Cup, The 420 Games)5. Data collection involved semantic filtering [22] utilizing the DAO6 ontology on the eDrugTrends7/Twitris platform8. The corpus comprised of a total of 4,106,566 tweets from 1,066,615 5https://goo.gl/Xzsd5V 6https://goo.gl/9cXQcT 7http://wiki.knoesis.org/index.php/EDrugTrends 8http://twitris.knoesis.org unique users. Out of nearly 4.1M tweets, 1,895,777 tweets were identified as unique through tweet id and the content. TABLE I DESCRIPTIVE INFORMATION ON THE TRAINING SET. Features ('#' is "number of") #Tweets (T) #Profile Pictures (PP) #Users use Emoji (E) #Users with Descriptions (D) #Retweets #Mentions P 9836 4394 1085 3884 955 94 R 1928 476 37 461 24 6 I 338 111 17 108 964 307 Total 12102 4981 1139 4453 1943 407 We randomly selected a set of 4982 users with 12,103 tweets from our pool of 1M unique users to be considered as the training set. The domain experts from CITAR9 annotated the 4982 users in our training dataset as one of the following three types: Personal Accounts, Informed Agency, and Retail Accounts. After the annotation process, the distribution per user type was as follows: 4395 personal, 476 informed agency, and 111 retail accounts. Effectively, the distribution of user types in the training set is highly skewed. The reason for sparsity among retailers (i.e., retail business twitter accounts) is that marijuana is a schedule I10 drug according to the federal law, and thus its promotion of social media platforms is complicated due to its federal status as an illegal drug. Similarly, media accounts are significantly smaller compared to personal accounts, but still significantly higher than the retail accounts. Such data imbalance poses a serious risk in biasing the classifier towards the majority class. Upon our initial exploratory analysis of the corpus, we saw that the content in tweets and description of users are adequate to identify the characteristics of different user types. The average number of words in descriptions and tweets are 9.6 and 12.8, while the average number of emoji in descriptions and tweets are 0.46 and 0.26, respectively. 88% of the users have their descriptions complete, and these user descriptions carry information containing emoji and text that can be utilized for classification. Further, interactions among users can play an essential role in disseminating the information and influence other connected users in the network. The median number of followers and friends for users are 367 and 376 respectively, and the average number of tweets per user is 3.85. Our corpus includes 2,837,734 interactions (mentions, retweets) between users, 83% of which are retweets, and the rest are mentions. This statistics suggests that there is much communication among users that can contribute to the classification of user types. V. METHODOLOGY The novelty in our approach to the user classification problem is to leverage the multiview aspect of the Twitter data by creating compositions of embeddings for different views. As depicted in the overall architecture of our approach in Fig 2, this section provides details of critical steps in our approach. 9https://medicine.wright.edu/citar 10https://goo.gl/UQhR4D Overall Architecture and Processing showing composition of Fig. 2. embeddings across People-Content-Network views for User Classification A. Preprocessing At this stage, we trained two Word Embedding(WE) mod- els for Content and People views using our domain-specific Twitter corpus. (i) The Content WE model is based on 1.8M unique pre-processed tweets, and (ii) The People WE model is based on pre-processed user descriptions of 1M unique users. We built such two separate WE models because we observed that user descriptions were more complete and contained less jargon and slang terms as compared to tweets. To obtain discriminative features for user classification, we removed stop words, punctuations, and alphanumeric characters from tweets and user descriptions. We also ex- tracted URLs, mentions of screen names, retweeted user screen names, contact information (e.g., phone number, email and web address), and emoji. After that, we lemmatized the tweets and user descriptions corpus. Moreover, we employ EmojiNet [17] to retrieve senses and keywords from emoji, and Clarifai11 to process profile pictures. The overall goal is to enable gleaning of semantically relevant information about users from their tweets for reliable determination of user types. B. Correlation Analysis In this study, we perform correlation analysis between embeddings of features from different views to assess which compositional operation is appropriate. The similarity be- tween embedding vectors derived from the textual repre- sentation of features constrains the operations that can be used to combine them since the resulting vector needs to be representative of the components. For example, when two embedding vectors are highly uncorrelated, dimensionality reduction does not generate representative vector space. However, uncorrelated embeddings can be composed merely with vector addition, to make resulting vector space more representative. For instance, researchers [23] made use of operations such as addition and concatenation, to combine word embedding vectors of the input text. These word embeddings were generated from text corpora and knowledge bases for more contextually rich representation of the input text. Similarly, [24] retrofits word vectors, using the WordNet embeddings to enrich the word embeddings of the input text. The creation of embedding vectors is performed through probabilistic calculations [25], and the embedding of each 11https://www.clarifai.com/demo view (Section V-D) may or may not correlate with that of the other views. TABLE II SPEARMAN (ρ) CORRELATION ANALYSIS FOR VIEW PAIRS View Pairs User Description & Emoji Tweets & Emoji Tweets & Network User Description & Network ρ 0.002 0.02 0.04 0.0001 p-value < 0.01 < 0.01 < 0.01 > 0.01 We conducted correlation analysis between different pairs of view embedding vectors as shown in Table II. The table shows Spearman correlation and their corresponding p values for these pairs. We use Spearman as our correlation metric to measure the similarity between view embeddings at each data point since our embeddings do not follow the Gaussian distribution. In this analysis, our alternative hypothesis (H1) is that the two embedding vectors are uncorrelated, and similarly the null hypothesis (H0) is that they are correlated. Having the p- value, less than 0.01 suggests the rejection of H0. Hence, based on Spearman, we see from the Table II that for the first three pairs the null hypothesis of correlation H0 can be rejected, while for the pair User description and Network, we are unable to reject the null hypothesis of correlation (H0). In fact, the data indicates that people interact closely based on their similar user characteristics rather than the shared tweet content in marijuana-related communications. C. Feature Engineering In our analysis, we have organized our features under three main categories: Person, Content, and Network, since we consider these as the main views of the Twitter communica- tion that contribute to the context. Fig. 3. Example profile pictures(2 each) of P(left), R(center) and I(right) 1) People: This set of features are user-level that con- tributes to differentiating the user types from each other on social media. Specifically, it includes user descriptions, name, screen name, contact information and profile pictures. • User Descriptions: This field holds the description of the account that was defined by the user. As this metadata carries information on characteristics of the user, we exploit the elements of this feature such as text, emoji, and contact information by employing text processing techniques. • Name: This field holds the name of each user where users can enter their full personal, business, or or- ganization name, or have an arbitrary entry. We use this information to discriminate person users utilizing a lexicon12 of commonly used person's first and last names. In fact, we found that 68% of the person users can be identified using names listed in the lexicon. • Contact Information: We extract this information from the description of users as it includes a phone number, 12https://goo.gl/8MY5Cz email and web addresses. Usually, retail accounts pro- vide this information in their profile for their customers to reach out to them, making this feature a discrimina- tive factor in classification. • Profile Pictures: This visual form of Twitter data can reflect feelings, emotions, intentions, and other charac- teristics of a user. We consider this feature as discrimi- native as there is a noticeable difference in profile pic- tures of personal, retail, and informed agency accounts. See Fig 3 for examples. 2) Content: To glean discriminatory features from tweet content, we first separated text, emoji and URLs, and then processed them separately. • Tweet text: We first extracted tweet text, by filtering other elements such as mentions, URLs, and emoji, and concatenate tweets of each user. Then we created word embedding vectors out of this textual data. • URLs: Users usually provide URLs in their character- limited tweets to refer to a more detailed version of their stories. For instance, retail and media accounts use URLs in their tweets to direct clients to their web page, more often than personal accounts. The number and frequency of URLs in a tweet can help to discriminate among user types. • Emoji: The use of emoji provides a concise and pre- cise expression of opinions, reactions, sentiments, and emotions concerning a topic of discussion. It is a discriminative feature in our study capturing the number and senses of emoji used by different user types. 3) Network: As users on Twitter primarily interact using replies, mentions, and retweets, we utilize these interactions as our features to identify communication patterns for each user type. We consider replies as mentions. In our ex- ploratory data analysis of marijuana-related communications, we found that the following features are prominent. • Mentions: It is a derived feature where the author men- tions the screen-name of another user and is considered as direct interaction. • Retweets: It is a derived feature where the retweeting user forwards another users tweet and is considered a direct interaction between these two users. We generate network embeddings by creating the adjacency matrix based on these interactions between users. This pro- cedure is further explained in Section V-D.2 D. Compositional Multiview Embedding (CME) The Twitter data contains multiple dimensions that we call views, such as People, Content, and Network. These views can be leveraged to contextualize a comprehensive and multi- level analysis of the Twitter social network. In our study, we employed the Content and People WE models for generating embeddings for Content view (e.g., Tweets) and People view (e.g., User Descriptions and Profile Pictures), respectively. As described in Section III-B, the tweet content and user descriptions involve emoji, which we regard as critical for interpreting the meaning. For this reason, we extracted the textual representation of emoji from EmojiNet, and generated cumulative emoji embeddings utilizing a pre-trained word embedding model that was trained over Wikinews corpus[26] as explained in [27]. We also generated word embeddings for profile pictures of users. As Clarifai provides a set of tags that textually represents the profile images, we input these tags into the People WE model because we consider profile pictures as related to the People view. Then we generated CMEs by combining the embeddings at the intersection of different views of the Twitter data, as formulated below. For Person and Content views (T), word embedding vector (WV ) in each data point (WVTi, i represents an index of a data point in a view) is calculated by averaging the word-vectors of each word that is present in the view. For instance, we preprocess the tweets of a user and generate word vectors of each word in 300 dimensions. Then we sum these vectors and divide by the number of words to generate the embedding vector for tweets of the user. However, while we perform the average operation to generate embedding vectors for Person and Content views, we do not perform average for the Network view. For generation of network embeddings, we utilized interactional features (mentions and retweets) and performed t-SVD to generate dense embeddings, where each embedding has 300 dimensions. The procedure is detailed in Section V-D.2. We formally define the calculation of WVTi as WVTi = ∑w∈Ti∩V (cid:126)vw , where (cid:126)vw is the embedding of word w and V is Ti∩V the vocabulary of the Content WE model trained over the marijuana-related tweet corpus. Fig. 4. Creation of CMEs for Tweet, Description, Emoji and Network 1) Tweet-Emoji(T+E) & User Description-Emoji(D+E): We explained the procedure for generating WEs for Tweets, User Descriptions and Emoji earlier in this section, and we explain here how we generate CMEs for Tweet & Emoji, and User Description & Emoji. As depicted in Fig. 4, to generate the Tweet-Emoji CME, we combine the WE vectors, which we generated for Tweets and Emoji, by performing the vector addition operation. Similarly for User Description-Emoji CME, we combine the WE vectors for User Descriptions and Emoji via the vector additon. 2) Network Embedding (N): The user types that we characterize in this study have different volumes of network activities. For instance, while average retweet and mention rates (derived from Table I) per user are 0.9 and 0.09 respectively on personal accounts, they are 11.08 and 3.53 on informed agency accounts. Clearly, the network activity can be used to distinguish and recognize these user types. Thus, combining the network activity information with tweet content and user information can contribute to a reliable classification. For representing the network activities of users, we created the weighted adjacency matrix of interactions; however, the adjacency matrix was sparse that made the generalization of the classifier difficult. Hence, creating dense vectors is imperative for better representation. For generating a low dimensional dense vector, we utilize truncated Singular Value Decomposition (t-SVD) which has proven to generate dense embedding in NLP and network embedding tasks [28]. Formally, we define the adjacency matrix as A ∈ Rm×n, where m and n denote source users and target users respec- tively (capturing direction of communication). Aui,u j = InteractionCountui,u j (1) where, for a pair of users ui,u j, Aui,u j represents a cell in the matrix A of dimension m×n representing interaction counts, which includes both retweets and mentions, for the corresponding users. The adjacency matrix A is sparse and non-stochastic j=1 Ai, j (cid:54)= 1). As we need to create a dense and stochastic (∑n representation of the network activities, we normalize the values in a row such that they will all sum up to 1. This normalization is done by diving every value by the sum of all values in a row, and this process makes the matrix stochastic. As the number of sources and target users is mostly different in A (1149× 1701), we convert A to square cosine matrix, denoted by Acosine ∈ Rm×m obtaining a matrix 1149× 1149, since we want to measure the similarity between users in our training set. Transformation of A to Acosine is formulated as follows: Acosine = A·AT AAT. Each cell value in Acosine lies between 0 and 1 and is symmetric. As our adjacency matrix Acosine is 1149× 1149, we need to reduce its dimension down to 300 for us to perform composition of the network embedding with other word embeddings. Therefore, we apply t-SVD over the matrix Acosine resulting three square matrices: U, Σ, U T ∈ Rm×m, where Σ ={σ1,σ2, ...,σm} is a set of m singular values. After we apply the dimensionality reduction, the reduced matrix becomes of dimension m × 300. We denote the reduced matrix as Areduced ∈ Rm×300 and its value is determined by: Areduced = Um×300 · (Σ−1 The 300 dimensional embeddings in Areduced is considered as the network embedding of users, and is used to create a CME in our user type classification. 300×300)T . 3) Network-Tweet-Emoji(N+T+E): After we generate the network embeddings(NE) of users, we combine the WEs for Tweets and User Descriptions, and NE to generate the Network-Tweet-Emoji CME by performing the vector addition operation. Embeddings for Network, Tweets and Emoji are all in 300 dimensions. E. Experimental Setting In building the Content and Person WE models, we used Skip-gram model with negative sampling. The rate of negative sampling was set to 10 and the window size was set to 5. Such a set up is desirable for datasets of average- size [18]. The Content WE model was trained on a pre- processed corpus of 1.8M unique tweets generated from 1M unique users creating a vocabulary (V) of 16,531 words. The People WE model was trained on 946,975 pre-processed user descriptions obtained from 1M unique users, generating a vocabulary (V) of 16,903 words. Apart from linguistic differences between user descriptions and tweets, another reason to build two WE models is multiview aspect of our dataset that also includes profile pictures and emoji in a profile that reflect different contextual meanings as compared to the tweets of a user. In order to create an embedding of a profile picture, we used Clarifai to generate text caption and then apply the Person WE model on the text caption. Empirical Baseline: To the best of our knowledge, the problem of user type classification in marijuana-related com- munications on Twitter that we address in this study has not been investigated before. For this reason, we created an empirical baseline that utilizes word embeddings of the textual content of tweets and descriptions. We conducted two sets of experiments depending on the inclusion of CME with network level features. The first set of experiments do not include the CME with network level features, and we incrementally include the Person and Content level features. We utilize all data points in our training set that comprises of 4982 users. As discussed in earlier sections, interactions also play an essential role in forming the characteristics of user types. Therefore, the second set of experiments included CMEs which contain Network level features, where we take the best performing classification setting from the first set of experiments as a baseline for comparison. At this stage, we had to reduce the size of the training set down to 1149 users where the sizes of P, I, and R classes were 1045, 87 and 17 respectively. Since our training set was highly imbalanced, we applied the oversampling algorithm SMOTE to avoid bias towards the majority class at the expense of the minority classes. In our experiments, to illustrate the improvement that the domain specific WE models provides, we also utilized a generic word2Vec model, called Tweet2Vec [21], for a comparison, which is explained in detail in Section VI. VI. RESULTS TableIII and Table IV present the results of the two sets of experiments. The first set of experiments involve only user profile and tweet content level features, whereas the second set of experiments involve the addition of network features. To illustrate the improvement obtained by the addition of network level features into the classification, we take the best performing approach of the first set of experiments as the baseline for the second set of experiments. The different feature sets incorporate different views of the data as explained in Section V. We systematically and gradu- ally include person-content-network features to observe their individual contributions to the outcome of the classification. TABLE III RESULTS ON CLASSIFICATION OF USER TYPES WITH 4982 USERS. Feature Set E(T),E(D) T2V(T),T2V(D) E(T+E),E(D+E) E(T+E),E(D+E), TMD,UMD E(T+E),E(D+E), TMD,UMD,PP Precision I 0.86 0.87 0.96 P 0.91 0.89 0.89 R 0.79 0.87 0.88 P 0.99 0.99 0.99 Recall I 0.27 0.10 0.10 R 0.67 0.66 0.60 P 0.95 0.94 0.94 F-score I 0.42 0.18 0.18 R 0.73 0.75 0.71 Avg.F 0.88 0.86 0.85 0.89 0.95 0.84 0.99 0.09 0.63 0.94 0.17 0.72 0.85 0.97 0.99 0.88 0.99 0.77 0.92 0.98 0.87 0.90 0.97 RESULTS FOR CLASSIFICATION OF USER TYPES WITH 1149 USERS TABLE IV Precision P I Recall I F-score I Avg.F R R P R P 1.0 0.95 0.95 0.82 0.97 0.95 0.95 0.72 0.87 0.57 0.99 0.93 0.98 0.96 Feature Set E(T+E),E(D+E), TMD,UMD,PP E(N),E(T+E), E(D+E),TMD UMD,PP E(N+T+E), E(D+E),TMD UMD,PP 0.96 E:Embedding, T:Tweet, D:Description, N:Network, T2V:Tweet2Vec, TMD:Tweet Metadata, UMD:User Metadata, PP: Profile Pictures We evaluated our approach using Average F-score (Avg.F) for each user type (P,I,R). We also report precision, recall, and average F-score, and discuss the overall performance. 0.67 0.87 0.73 0.91 0.96 0.98 0.52 0.80 0.97 0.97 1.0 0.58 0.86 0.98 0.95 The baseline approach that we empirically chose achieved an overall F-score of 88% using the word embeddings of tweets content and user descriptions. The F-scores for individual classes of P, I, and R were 95%, 42%, and 73%, respectively. We generated these embedding vectors using the domain-specific word embedding models. As we see in Table III that the classifier built with the embeddings of tweets and descriptions generated through the Tweet2Vec model obtained an average F-score of 86%, and underperformed for P and I classes. Therefore, we continued experiments using Content and People WE models. As discussed in Section V, to better contextualize different elements of the content such as text and emoji, we have generated CMEs from the tweets and emoji embeddings, and similarly from user descriptions and emoji. Though this experiment has shown a reduction of average F-score by 3%, the precision has been improved by 10% for I and R classes, meaning false positives for I and R are reduced. Given the small size of these classes in our training dataset, such improvement in precision encouraged us to further continue our experiments with the inclusion of CMEs. We have further included the tweet and user metadata to the feature set, and it still did not make a significant differ- ence in the performance. However, the inclusion of profile pictures as a feature in the experiments showed a significant improvement in the overall F-score to 97%, where F-scores for P, I, and R were 98%, 87%, and 90%, respectively. As discussed earlier, we can benefit from the multiview aspect of the Twitter data to cultivate more satisfactory interpretation of the content. The inclusion of textual data, emoji and profile pictures in our approach by combining them through CMEs for classification of user types, has impacted the outcome significantly. Furthermore, recall that, in the second set of experiments, we have extended our study by applying our approach with the addition of network interactions between users. We have generated network embeddings from the interactions between users. We have used the best performing classifier from the first set of experiments(Table III) as a baseline for the second set of experiments, to compare our approach that incorporates the network embeddings. In our second set of experiments, we have first added the network embedding as a separate feature along with the features from the second baseline approach, and it did not affect the performance. Then we created CME from the embeddings of tweets, emoji, and network, and it boosted the performance of each class, P, I, and R in terms of their F- scores, by 1%, 6%, and 4%, respectively. It also improved the overall F-score by 1%. The improvement that we achieved by applying CMEs is significant since the F-score for the second baseline was already significantly high, and our approach has improved upon that performance. VII. CONCLUSION AND FUTURE WORK Our overarching goal was to utilize people, content, and network related features in marijuana-related commu- nications on Twitter to classify the user types into three prominent categories: Personal, Informed Agency, and Retail accounts. Such a classification provides support for under- standing the dynamics of issues related to marijuana and its variants from location and temporal perspectives ultimately. Furthermore, dominant and trending topics can be identified for each user type for more precise and reliable subjective analysis of related events and their impacts. In this paper, we introduced an approach to classify user types utilizing Compositional Multiview Embedding (CME). For this purpose, we learned a domain-specific embedding for tweet text, a separate embedding for user profile descriptions, and a mapping of profile images to tags to obtain their embeddings, while incorporating emojis as words using EmojiNet embeddings. We also incorporated in- teractional features by creating network embeddings. Overall, we achieved 7% improvement over the empirical baseline, when we used the CMEs without network embedding and 8% improvement when we used the CMEs with network embedding. The latter also resulted in an F-score of 0.96. Although we are implicitly addressing the homophily through assessing the similarity between users based on different views, we plan to enhance our work by analyzing homophily in marijuana-related communications on Twitter as a case study by leveraging the approach explained in this paper. Upon the completion of review process, we will out- source our baseline and annotated dataset for reproducibility. ACKNOWLEDGEMENT Research reported in this publication was supported by National Institute on Drug Abuse (NIDA) of the National Institutes of Health (NIH) under award number 5R01DA039454-03. The content is solely the responsibility of the authors and does not necessarily represent the official views of the NIH. REFERENCES [1] U. Kursuncu, M. Gaur, U. Lokala, K. Thirunarayan, A. Sheth, and I. B. Arpinar, "Predictive Analysis on Twitter: Techniques and Appli- cations," in Springer-Nature, 2018. [2] A. Benton, R. Arora, and M. Dredze, "Learning multiview embeddings of twitter users," in ACL, 2016. [3] J. Mitchell and M. Lapata, "Composition in distributional models of semantics," Cognitive science, 2010. [4] D. Zhang, S. Li, H. Wang, and G. Zhou, "User classification with multiple textual perspectives," in COLING, 2016. [5] G. Rizos, S. Papadopoulos, and Y. Kompatsiaris, "Learning to classify users in online interaction networks." [6] L. Liao, X. He, H. Zhang, and T. Chua, "Attributed social network embedding," arXiv preprint arXiv:1705.04969, 2017. [7] P. A. Pennacchiotti, M, "Democrats, republicans and starbucks affi- cionados: user classification in twitter," in ACM SIGKDD, 2011. [8] S. Bergsma, M. Dredze, B. Van Durme, T. Wilson, and D. Yarowsky, "Broadly improving user classification via communication-based name and location clustering on twitter," in NAACL-HLT, 2013. [9] W. Campbell, E. Baseman, and K. Greenfield, "Content+ context networks for user classification in twitter," in NIPS, 2013. [10] M. De Choudhury, N. Diakopoulos, and M. Naaman, "Unfolding the event landscape on twitter: classification and exploration of user categories," in ACM CSCW, 2012. [11] R. Tinati, L. Carr, W. Hall, and J. Bentwood, "Identifying communi- cator roles in twitter," in WWW, 2012. [12] E. Colleoni, A. Rozza, and A. Arvidsson, "Echo chamber or public sphere? predicting political orientation and measuring political ho- mophily in twitter using big data," Journal of Communication, 2014. [13] A. Fang, I. Ounis, P. Habel, C. Macdonald, and N. Limsopatham, "Topic-centric classification of twitter user's political orientation," in ACM SIGIR, 2015. [14] A. Kim, T. Miano, R. Chew, M. Eggers, and J. Nonnemaker, "Classi- fication of twitter users who tweet about e-cigarettes," JMIR, 2017. [15] H. Purohit, Y. Ruan, A. Joshi, S. Parthasarathy, and A. Sheth, "Un- derstanding user-community engagement by multi-faceted features: A case study on twitter," in WWW Workshop SoME, 2011. [16] H. Purohit, G. Dong, V. Shalin, T. Prasad, and A. Sheth, "Intent classification of short-text on social media," in Smart City/SocialCom/SustainCom (SmartCity), 2015 IEEE International Conference on. IEEE, 2015. [17] S. Wijeratne, L. Balasuriya, A. Sheth, and D. Doran, "Emojinet: An open service and api for emoji sense discovery," arXiv preprint arXiv:1707.04652, 2017. [18] T. Mikolov, I. Sutskever, K. Chen, G. Corrado, and J. Dean, "Dis- tributed representations of words and phrases and their composition- ality," in NIPS, 2013. [19] J. Lilleberg, Y. Zhu, and Y. Zhang, "Support vector machines and word2vec for text classification with semantic features," in IEEE ICCI* CC, 2015. [20] P. Wang, B. Xu, J. Xu, G. Tian, C. Liu, and H. Hao, "Semantic expansion using word embedding clustering & convolutional neural text classification," Neurocomputing, network for improving short 2016. [21] F. Godin, B. Vandersmissen, W. De Neve, and R. Van de Walle, "Multimedia lab @ acl wnut ner shared task: Named entity recognition for twitter microposts using distributed word representations," in Proceedings of the Workshop on Noisy User-generated Text, 2015. [22] A. Sheth and P. Kapanipathi, "Semantic filtering for social data," IEEE Internet Computing, 2016. [23] J. Goikoetxea, E. Agirre, and A. Soroa, "Single or multiple? combining word representations independently learned from text and wordnet." in AAAI, 2016. [24] M. Faruqui, J. Dodge, S. K. Jauhar, C. Dyer, E. Hovy, and N. Smith, "Retrofitting word vectors to semantic lexicons," arXiv preprint arXiv:1411.4166. [25] R. Bamler and S. Mandt, "Dynamic word embeddings," in ICML, 2017. [26] T. Mikolov, E. Grave, P. Bojanowski, C. Puhrsch, and A. Joulin, "Advances in pre-training distributed word representations," arXiv preprint arXiv:1712.09405, 2017. [27] S. Wijeratne, L. Balasuriya, A. Sheth, and D. Doran, "A semantics- based measure of emoji similarity," arXiv preprint arXiv:1707.04653, 2017. [28] A. Tsitsulin, D. Mottin, P. Karras, and E. Muller, "Verse: Versatile graph embeddings from similarity measures," in WWW, 2018.
1309.2199
1
1309
2013-09-09T15:47:00
Distinguishing Topical and Social Groups Based on Common Identity and Bond Theory
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Social groups play a crucial role in social media platforms because they form the basis for user participation and engagement. Groups are created explicitly by members of the community, but also form organically as members interact. Due to their importance, they have been studied widely (e.g., community detection, evolution, activity, etc.). One of the key questions for understanding how such groups evolve is whether there are different types of groups and how they differ. In Sociology, theories have been proposed to help explain how such groups form. In particular, the common identity and common bond theory states that people join groups based on identity (i.e., interest in the topics discussed) or bond attachment (i.e., social relationships). The theory has been applied qualitatively to small groups to classify them as either topical or social. We use the identity and bond theory to define a set of features to classify groups into those two categories. Using a dataset from Flickr, we extract user-defined groups and automatically-detected groups, obtained from a community detection algorithm. We discuss the process of manual labeling of groups into social or topical and present results of predicting the group label based on the defined features. We directly validate the predictions of the theory showing that the metrics are able to forecast the group type with high accuracy. In addition, we present a comparison between declared and detected groups along topicality and sociality dimensions.
cs.SI
cs
Distinguishing Topical and Social Groups Based on Common Identity and Bond Theory Przemyslaw A. Grabowicz§ ∗ Luca Maria Aiello† Víctor M. Eguíluz§ Alejandro Jaimes† 3 1 0 2 p e S 9 ] I S . s c [ 1 v 9 9 1 2 . 9 0 3 1 : v i X r a §{pms,victor}@ifisc.uib-csic.es IFISC (CSIC-UIB) Palma de Mallorca, Spain ABSTRACT Social groups play a crucial role in social media platforms because they form the basis for user participation and en- gagement. Groups are created explicitly by members of the community, but also form organically as members in- teract. Due to their importance, they have been studied widely (e.g., community detection, evolution, activity, etc.). One of the key questions for understanding how such groups evolve is whether there are different types of groups and how they differ. In Sociology, theories have been proposed to help explain how such groups form. In particular, the com- mon identity and common bond theory states that people join groups based on identity (i.e., interest in the topics dis- cussed) or bond attachment (i.e., social relationships). The theory has been applied qualitatively to small groups to clas- sify them as either topical or social. We use the identity and bond theory to define a set of features to classify groups into those two categories. Using a dataset from Flickr, we extract user-defined groups and automatically-detected groups, ob- tained from a community detection algorithm. We discuss the process of manual labeling of groups into social or top- ical and present results of predicting the group label based on the defined features. We directly validate the predictions of the theory showing that the metrics are able to forecast the group type with high accuracy. In addition, we present a comparison between declared and detected groups along topicality and sociality dimensions. Categories and Subject Descriptors H.3.5 [Online Information Services ]: Web-based ser- vices; H.1.2 [User/Machine Systems]: Human informa- tion processing; ∗P.A.G. has performed the research while visiting Yahoo! Research Barcelona. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. WSDM’13, February 4–8, 2013, Rome, Italy. Copyright 2013 ACM 978-1-4503-1869-3/13/02 ...$15.00. †{alucca, ajaimes}@yahoo-inc.com Yahoo! Research Barcelona, Spain General Terms Algorithms, Experimentation, Measurement Keywords Social Media, Groups, Bond theory, Identity theory, Flickr 1. INTRODUCTION A longstanding theory about the creation of social com- munities affirms that people join groups driven by either strong personal ties with other members or by the interest in the group as a whole. As a result, depending on the preva- lent motivation of members, spontaneously generated groups can be categorized as either social or topical. This theory is known as “common identity and common bond” [22] and assumes that the two types of groups have distinct and well recognizable traits that characterize them. In recent years, the theory has been widely commented and elaborated by social scientists from a theoretical per- spective and through small-scale experiments [26, 29, 24], but a validation over large-scale datasets together with the development of rigorous, automated methodologies to dis- tinguish the group types is missing. Indeed, the availability of big data from social media platforms provides the op- portunity to study the dynamics of the online communities from a data-mining perspective [19, 21, 14]. None of those experiments, however, have been directly aimed at verifying the common identity and common bond theory. The design of a technique to detect the group type based on the common identity and common bond principles would first contribute to a strong validation of the theory itself and, on the other hand, would provide a general framework for automatic classification of user groups in online social media. Such a classification would have direct impact on the ability of describing the structure of online social networks along the axes of sociality and topicality and, consequently, on the possibility of better user characterization. We contribute to fill this gap by proposing a set of gen- eral metrics based on the theory. We show that the metrics’ values computed on a large corpus of groups extracted from Flickr confirm the cardinal points of the theory and are in- deed good predictors of the group type. In addition, we repeat the same analysis on groups identified by a graph- based community detection algorithm. This allows us to compare the user-generated communities to the automati- cally detected ones not only from a structural perspective but also along the dimensions of sociality and topicality. Since community detection techniques have been largely em- ployed in recent years to describe the structure of complex social systems [8], the need for a clearer assessment of the meaning of the detected clusters has been often expressed from different angles [15, 31], but never completely satis- fied. With our study we also contribute to shed light on this matter. To the best of our knowledge, this is the first attempt of formalization of the common identity and common bond theory, and of its validation over a large and diverse set of user communities. The obtained results can open a new perspective on the semantic interpretation of implicit and explicit user groups in social media. Our main contributions can be summarized as follows: • Translation of the common identity and common bond theory into general metrics applicable to social graphs. An insightful characterization of a large group dataset from Flickr is performed using the proposed metrics. • Comparison between user-defined groups and groups discovered by a community detection algorithm, both in terms of their overlap and their properties of social- ity and topicality. • Design of a method to predict whether a group is social or topical, based on the defined metrics. Prediction on the user-generated groups from the Flickr data yields surprisingly good results. The rest of the paper is structured as follows. In Section 2 we overview related work. In Section 3 we describe the main principles of the common identity and common bond theory and propose their practical translation into general metrics, and in Section 4 we introduce the Flickr dataset we use to test these metrics. In Section 5 we describe the process of gathering a ground truth about group topicality or social- ity through an editorial process. In Section 6 we provide a comparison between user-created Flickr groups and groups identified by a community detection algorithm in terms of their overlap, then we study the properties of the defined metrics computed over declared and detected groups and in particular over the subsets of groups labeled as social or topical in the ground truth that we produced. Finally, in Section 7 we show that we can accurately predict the group type by combining the defined metrics. 2. RELATED WORK The spontaneous aggregation of people in communities has been widely studied in social science as one of the fun- damental processes driving the global dynamics of social ecosystems [18] and as a factor driving the formation of the social identity of individuals [27]. Since the emergence of online social media, the global structure, evolution and dynamics of social groups have been investigated over large-scale and heterogeneous datasets [12]. Evolution of groups has been characterized as a very broad phenomenon [19, 5] that is dependent on the nature of the group [6], its intrinsic fitness [11] and on the density of social ties connecting its members [2]. Dependency of activity and connectivity on group size has been studied in several plat- forms [13, 14, 10], showing relations to Dunbar’s theory on the upper bound of around 150 stable social relationships for an average human [7]. Besides activity, similarity between users is an important dimension in modeling individual users in groups [28], particularly given that, to a large extent, so- cial media users tend to aggregate following the homophily principle [1]. Nevertheless, similarity is not necessarily the best indicator for group activity and longevity, as diversity of content shared between group members is a relevant fac- tor to keep alive the interest of members [17]. At a finer scale, social communities can be described in terms of user engagement. From a quantitative perspective, the amount of participation of members in activities related to the group is varied and dependent on group size [3]. Intra- group activity has been characterized in terms of propensity of people to reply to questions of other members [30], coher- ence of discussion topics [9], or item sharing practices [21]. Modeling inner activity of groups has helped in finding ef- fective strategies to predict future group growth or activ- ity [14], recommend group affiliation, or enhance the search experience on social platforms [20]. Social and thematic components of communities have been widely studied in social science, most of all within the com- mon identity and common bond theory on which the present work is based [22, 26, 24]. Nevertheless, the principles be- hind the theory have never been translated into practical methods to categorize groups, nor tested on large datasets. On the other hand, data-driven studies have investigated social and thematic components separately when character- izing groups [5]. Preliminary insights on the interweavement between such dimensions have been given in exploratory work on Flickr, where signals of correlation between social density and tag dispersion in groups is shown [23]. In this paper, we go far beyond that point, defining metrics that can be used to predict if a group is social or topical and testing their effectiveness against a reliable ground truth. Besides the analysis of user-created groups, the study of automatically detected groups through community detection algorithms has attracted much interest lately [8]. Detected communities are supposed to represent meaningful aggre- gations of people where dense or intense social exchanges take place among members [13]. Nevertheless, even if syn- thetic methods to verify the quality of clusters have been proposed [15], the question of whether such artificial groups capture some notion of community perceived by the users re- mains open. If on the one hand the computation of cluster- goodness metrics over user-created groups can give useful hints about their structural cohesion [31], on the other hand a direct comparison between user-created groups and de- tected communities is still missing, particularly in terms of the amount of sociality or topical coherence they embed. 3. TOPICAL AND SOCIAL GROUPS Notions of community and social group have been widely studied in the behavioral sciences [25, 27]. It has been shown that the internal dynamics of social groups emerge from the combination of complex cognitive processes such as sense of membership, influence between people, fulfillment of in- dividual and collective needs inside the group, and shared emotional connections [18]. Based on such widely accepted theoretical foundations, sociological theories have been for- mulated to disentangle all of these complex aspects. In the following subsections, we provide a high-level de- scription of one of the most known theories on group forma- tion and propose a translation of its main cornerstones into general metrics that can be applied on social graphs. group g as: rint g = Eint,rec g /2 Eint,rec g /2 + Eint,nrec g , (1) 3.1 Identity and Bond Theory The common identity and common bond theory describes social groups along the dimensions of topicality and social- ity [22, 24]. According to the theory, the attachment to a group, as well as the permanence and involvement in it, can be explained in terms of common identity or common bond. Identity-based attachment holds when people join a group based on their interest in the community as a whole or in a well-defined common theme shared by all of the mem- bers. People whose participation is due to identity-based attachment may not directly engage with anyone and might even participate anonymously. Conversely, bond-based at- tachment is driven by personal social relations with other specific members, and thus the main theme of the group may be disregarded. The two processes result in two differ- ent group types, that for simplicity we name “topical ” for identity-based attachment and “social ” for bond-based at- tachment. In practice, groups can be formed from a mix of identity and bond-based attachment, but very often they tend to lean more towards either sociality or topicality. According to the theory, the group type is related with the reciprocity and the topics of discussion. Members of social groups tend to have reciprocal interactions with other members, whereas inter- actions in topical groups are generally not directly recipro- cated. In addition, topics of discussion tend to vary drasti- cally and cover multiple subjects in social groups, while in topical groups discussions tend to be related to the group theme and cover specific areas. According to the theory, so- cial groups are founded on individual relationships between their members, therefore it is harder for newcomers to join and integrate with members that already have strong rela- tionships between each other. One implication of this is that social groups are vulnerable to turnover, since the departure of a person’s friends may influence his own departure. Top- ical groups, on the other hand, are more open to newcomers and more robust to departures. 3.2 From theory to metrics Based on the theoretical principles described above, it is possible to construct metrics to differentiate between the two types of groups. In particular, it is possible to quantify the reciprocity of interactions, and the topicality of the in- formation exchanged between group members. We adopt a very general multidigraph model that fits most of the cur- rent social media platforms. Members are represented as nodes, and each distinct interaction between any two mem- bers is represented by a directed arc. Nodes can belong to multiple groups and we associate, with each group, a bag of user-generated terms (e.g., tags, group posts). Next, we describe: i) reciprocity metrics, used to quanti- fying group sociality, ii) entropy of terms, to determine how much the topics of discussion vary within a group, and iii) activity metrics, to measure the liveliness of the group. 3.2.1 Reciprocity Reciprocity occurs whenever a user interacts with another user and that user responds her at any time later with the same type of interaction. We define intra-reciprocity of a g g and Eint,nrec where Eint,rec are, respectively, the number of reciprocated and non-reciprocated links internal to the group g. Correspondingly, the inter-reciprocity at the bor- der of the group is defined by rext g , accounting for the reci- procity between members and non-members. We normalize the intra-reciprocity score using the average reciprocity value (cid:10)rint g (cid:11) over all groups: tg = rint g (cid:10)rint g (cid:11) . (2) The larger the intra-reciprocity, the higher the probability that the group is social. Alternatively, to compensate for the effect of the correlation between reciprocity and the number of internal interactions, and to account for local effects, the intra-reciprocity can be normalized by the inter-reciprocity: ug = rint g + 1 rext g + 1 . (3) We add 1 to both numerator and denominator to reduce the fluctuations of ug at low values of rext g . This relative reci- procity compares the reciprocity between the members with their reciprocity toward people not belonging to the group. It reflects how sociality of group members distinguishes itself from the environment. 3.2.2 Topicality The set of terms T (g) associated with a group indicates the topical diversity of the group. Thus we measure the entropy of the group as H(g) = − X p(t) · log2 p(t), (4) t∈T (g) where p(t) is the probability of occurrence of the term t in the set T (g). The higher the entropy, the greater is the vari- ety of terms and, according to the theory, the more social the group is. Conversely, the lower the entropy, the more topical the group is. In addition, since not all groups have the same number of terms and the entropy value grows with the total number of terms, we introduce the normalized entropy hg, which is normalized by the average value of entropy for the groups with the same number of terms: hg = H(g) hH(f )iT (g)=T (f ) . (5) 3.2.3 Activity Even if, for the considered theory, activity is not a discrim- inative factor between social and topical groups, it is useful to characterize the liveliness of a community. Activity is quantified in terms of the number of internal interactions normalized by the expected number of internal interactions for a set of nodes with the same degree sequence: ag = (Din g Eint g Dout g . )/E (6) g and Dout Din are total numbers of interactions originated by members of the group g or being targeted to members of g comments favorites contacts 238M 112M 71M decl. g. 504K det. g. 646K Table 1: Total number of interactions and declared/detected groups. Moreover, OSLOM has performed well in recent community detection benchmarks [15] and it outperformed other algo- rithms we tested. OSLOM detected 646K groups. 4.3 Tags this group, where E is the total number of interactions in the network. If this property has a value higher than 1 then the number of interactions internal to the group is higher than the number of interactions expected in a random scenario with the same group activity volume. Another way of measuring activity of a group is by com- paring density of its internal interactions with the density of its external interactions: Eint g /(sg(sg − 1)) Eext g /(2(N − sg)sg) bg = (7) , where sg is the cardinality of group g and N is total number of nodes in the network. Values of bg greater than 1 indicate a density of internal interactions higher than interactions be- tween the group and the rest of the network. This metric effectively compares intensity of interactions between mem- bers of the groups with the intensity of their interactions with the entire network. 4. DATASET AND PREPROCESSING The wide variety of user groups and the richness of inter- action types make Flickr an ideal platform for our study. We use only public, anonymous data retrievable via the Flickr public API, until the end of 2008. Table 1 summarizes the data described below. 4.1 User interactions We collected three types of pairwise, directed interactions: Comments. User u comments on a photo of user v. This interaction is mediated through the photo. We filter out the comments of users on their own photos, obtaining a total of 238M comments. Favorites. User u marks one of user v’s photos as a fa- vorite. The interaction is mediated through the favorited photo. We extract 112M favorite interactions. Contacts. User u adds user v among his contacts. Social contacts in Flickr are directed and may be reciprocated. One person can choose another person as his contact only once and the relation remains in the same state until the contact is removed. There are 71M contacts in our dataset. 4.2 Groups Users of Flickr can create, moderate and administer their own groups. Most groups are open, so users can join without an invitation. Others are only by invitation and joining re- quires the administrator’s permission. There are over 500K groups in our Flickr dataset. In addition to user-created groups (we refer to them as declared ), we analyze the sociality and topicality properties of groups that are not defined by users but are instead found by community detection algorithms (we name these detected groups). We applied the OSLOM community detection al- gorithm [16] over the entire network of social contacts in our dataset. We choose OSLOM because it detects overlap- ping communities, which is a natural feature of real groups. We use tags of the photos as terms for our model. The pri- mary set of photos from which we extract tags is the photo pool of the group (i.e., the photos uploaded to the group by its members). Photo pools are available for declared groups only. In addition, in both declared and detected groups, the interactions between members of the group that are medi- ated through photos (i.e., comments, favorites) result in two additional photo sets from which tags are extracted. We process the three tag sets separately (pool, comments, fa- vorites), and for each of them we compute the normalized entropy (hpool , hcom , hfav g ). g g 5. GROUP LABELING To determine whether the defined metrics correctly cap- ture the sociality and topicality of groups, we compare them against a reliable ground truth. We asked human editors to label groups based on well-defined guidelines extracted directly from the common identity and common bond the- ory [24]. For the labeling we randomly selected groups meet- ing the following requirements: i) more than 5 members, ii) more than 100 internal comments, iii) relative activities acom higher than 102. The third requirement ensured us and bcom that the selected groups were active well above the expected values in a random case. After this selection we obtained over 34K declared groups and over 33K detected groups. We describe the labeling process of such groups in detail in the following subsections. 5.1 Information provided to editors g g The labeling is based on the human capability of process- ing the semantics and sentiment behind text and photos. The labeling was performed to generate a ground truth of “social” and “topical” groups. The editors were asked to make judgments in this respect and were presented with the following information for each group: Group profile. The Flickr group profile consists of the group name, description by the creator of the group, dis- cussion board, photo pool, and map of places where photos uploaded to the group pool were taken. This information is available only for declared groups. Comments. We provide text of all comments that happen between the members. Comments are shown in chronolog- ical order and are grouped by thread, if they appear under the same photo. Additionally we also include a link to the photo. Tags. Editors are shown the list of the 5 most frequent tags attached to the photos that mediate the internal com- ments to the group. The list is sorted alphabetically. 5.2 Labeling guidelines Human labelers were shown the information described above and asked to categorize groups as either social, topical or unknown. The last case is reserved for groups for which text is written in a language unknown to the labeler, making the task impossible to accomplish. Intentionally, no unsure category was allowed to keep the categorization strictly bi- nary, as the theory does. Some groups can be both topical and social, and therefore difficult to categorize, but for the sake of clarity and conformity with the theory we kept the categorization as a binary task. Editors were provided with specific instructions on how to recognize social and topi- cal groups, and on how to perform the categorization. The guidelines are summarized as follows: I. Comments and photos. By examining comments and photos, find traces of people who know each other or who have a personal relationship. Knowing each other’s real names, spending time together, co-appearing in photos, shar- ing common past experiences, referencing mutually known places, and disclosing personal information are all signals of the presence of a social relationship [4]. The predominance of friendly and colloquial comments (e.g., jokes, laughter) is another element distinguishing social groups from topical groups. In topical groups, the atmosphere is more formal and comments tend to be more impersonal [26]. Examples of impersonal comments include expressing appreciation for photos, praising the photographers, thanking them for their work, or commenting on any particular topic in a neutral way. As a rule of thumb, if many personal comments are detected, then the sociality of the group should be consid- ered high. If such comments are not many (e.g., just between small subsets of members), but the overall atmosphere of the interaction is rather personal and friendly, then we consider the sociality of this group as fairly present. If, on the other hand, comments are mainly impersonal and neutral, social- ity has to be considered low, in favor of higher topicality. II. Tags and description. Read the tags and the profile description of the group. If the tags are semantically con- sistent then the topicality of the group should be considered high, and even higher if the name and description of the group corresponds to the content of the tags. In some cases, tags or group descriptions can contain words indicating per- sonal relations or events (e.g., “wedding”, “grandpa”, names, etc.), indicating a higher sociality of the group. Tags can also contain names of specific locations. Geo-characterized tags can be reasserted by looking at the map of places where photos were taken. Such tags are a good indication that the sociality of the group is present, but that has to be confirmed through the inspection of comments. The editors labeled the groups after judging the two as- pects above. If both tags and comments are highly social or topical, then the choice of label is straightforward. If the tags are highly topical and the comments are not social then the group is labeled as topical, and vice versa. If the tags are a bit topical and comments highly social then the group is labeled as social. The labelers were asked to read as many comments as needed to arrive to a fairly clear decision. 5.3 Group examples To provide a sense of how the defined guidelines were ap- plied in practice, we describe two examples. The first one is a group titled “Airlines Austrian”, tagged with labels “air- craft”, “airport” and “spotting.” Photos are from different countries in Europe and the vast majority of them depict airplanes. Members are very active in commenting and writ- ing comments related on the aircraft theme (e.g., “I just love this airplane, the TU-154M is just a plane Boeing or Air- bus could never design”). In this case, all of the features are aligned with the concept of topical group defined in the guidelines. The second group is named “Camp Baby 2008” and it is described in the main page as a collection of photos of a two-day event for young mothers taking place at a spe- 1000 a g s 100 d e t c e t e D 10 100 Declared s g 1000 10 1 1000 c g 100 s d e t c e t e D 10 1 10 100 Declared sg 1000 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 -0.1 1000 b g s 100 d e t c e t e D 10 1 3 10 d s p u o r G 2 10 1 10 0 10 10 -2 e 1 y t i r a l i m i s p u o r G 0.8 0.6 0.4 0.2 0 0.5 0.4 0.3 0.2 0.1 10 100 Declared s g 0 1000 Real groups Random -1 10 Group similarity 0 10 Real groups Random 1 10 2 10 s g 3 10 4 10 Figure 1: Jaccard similarity between declared and detected groups as a function of their sizes. Diagonal shows an inter- esting pattern (a) which is not reproduced by randomized groups (b). We subtract (b) from (a) and plot the result in (c), and a histogram of similarity values for a sample of groups lying at the diagonal in (d). For groups of various sizes, we plot 91th and 99th percentiles of similarity between declared and detected groups (e). cific location. Photos depict people attending the event and interacting with each other with a friendly attitude. Tags and comments often contain names of individuals and refer- ences to past common experiences (e.g., “I love Mindy and can not wait to see her again!!”). Although the group has a specific topic, its social component is very strong. In practice, more ambiguous cases can occur and, ulti- mately, the decision of the labeler has an arbitrary compo- nent, as in every complex annotation process. Nevertheless, the defined guidelines gave the labelers precise instructions and, as described next, we recurred to multiple independent editors to assess the quality of the extracted ground truth. 5.4 Labeling outcome A total of 101 declared groups and 69 detected groups were labeled by 3 people: two of the authors and an inde- pendent labeler who was not aware of the type of study nor of the purpose of the labeling. The inter-labeler agreement, measured as Fleiss’ Kappa, is 0.60 for the declared groups, meaning that there exists good agreement between labelers. In order to assess the quality of the labels, we also counted the number of messages exchanged between group members. The counting was done anonymously in aggregate and the content of the messages was not accessed. Groups labeled as social contain around twice as many messages between their members compared to topical groups of similar size. Even if this does not constitute a proof of higher sociality, intuitively people who get in touch via one-on-one communication are more likely to have a more intimate social relationship. The Kappa value for detected groups is around 0.44, re- vealing lower agreement. A factor that partially determined a 3 2.5 2 〉 g t 〈 1.5 1 0.5 0 1.1 〉 g h 〈 1 0.9 0.8 108 106 c e 〉 g 104 a 〈 Declared groups Detected groups b Photo pool d f Comments Favorites Contacts Randomized 102 100 100 101 102 sg 103 104 100 101 102 sg 103 104 Figure 2: Dependency of normalized reciprocity (a-b), nor- malized entropy (c-d) and relative activity (e-f) on size of groups for comments, favorites, contacts and photo pools, for declared and detected groups. Blue dashed line is for randomized photos (c-d) and groups (e-f). such result is the lack of information about the group’s pro- file, since it is not available for detected groups. Another cause of the disagreement is a higher variability in the com- ments. This may be because we use a network of contacts for the purpose of finding clusters and defining detected groups, which may not be the best proxy of personal relations. In total we label 565 distinct declared groups and 126 dis- tinct detected groups. We characterize them in the following section. 6. CHARACTERIZATION OF GROUPS We begin the analysis with a direct comparison of the overlap between the declared and detected groups. Then we characterize the two sets of groups in terms of the metrics we introduced in Section 3.2. Finally, we study the relation between the labels of the declared groups annotated by the editors and the values of the metrics. Additionally, we report ratios of groups labeled as social and topical among both declared, and detected groups. 6.1 Membership overlap of declared and de- tected groups The groups from the two sets share typical properties of groups found in on-line social networks. The distribution of sizes of groups in both cases is heavy-tailed and close to power-laws (not shown due to space limits). Declared groups tend to be much bigger, having on average 61 members ver- sus 7 members in detected groups. To test if the groups from the two sets overlap, and to what extent, we measure the Jaccard similarity between their sets of members. Similarity is computed for all declared- detected group pairs and for each detected group we select the declared one with the highest similarity value as the best match. We plot the average similarity of the best matches 1.1 1.05 1 g h 0.95 0.9 0.85 0 Declared groups Detected groups a Commented photos Favorited photos Photos in pool 1 2 3 tg 4 5 6 0 1 2 3 4 5 6 tg b 1.1 1.05 1 0.95 0.9 0.85 7 Figure 3: Correlation between reciprocity of comments in- side a group and entropy of photos commented or favorited between its members, or belonging to the photo pool of this group, for declared and detected groups. as a function of the size of groups in Fig. 1a. Zero values of similarity are not taken into account for these averages. For the purpose of comparison with a null model, in Fig. 1b we draw the same plot after randomly reshuffling the members of detected groups, while preserving their sizes. We observe that the two plots differ in values significantly along the di- agonal, and that the difference between them is substantial, as shown in Fig. 1c, meaning that indeed detected groups are, to some extent, similar to the declared ones. Further insights are shown in Fig. 1d, where we depict the distribu- tion of similarities of pairs of groups extracted from a small sector of the diagonal, having between 32 and 64 members. The figure shows that there exist multiple detected groups which overlap significantly with declared groups, and that randomized groups do not show this pattern. This holds for groups of all sizes, as shown in Fig. 1e, in which we plot the 91th and 99th percentiles of the best match sim- ilarity for detected groups of various sizes (e.g., 1% of de- tected groups of size 20 have similarity with declared groups higher than 0.75, while for the randomized case 1% of the groups have similarity higher than just 0.05). Therefore, in some cases the community detection algorithm finds groups which are also defined by users (i.e., declared groups). We present evidences that this does not occur by chance through the comparison with the randomized case. Nevertheless, a substantial overlap is found for just a small percentage of groups. Most of the group pairs have similarity close to 0. Consequently, the similarity of detected groups to the best- matching declared groups is 0.082, while for the randomized detected groups it is not much lower, yielding 0.058. 6.2 Statistical properties of metrics Besides directly comparing membership overlap, we study the variation of the metrics defined in Section 3.2 with the group size. Reciprocity and normalized entropy have a wide local maximum for groups of sizes between 50 and 100 mem- bers, both for declared and detected groups, as shown in Figs. 2a-d. This holds for all interactions and all sets of tags, with the exception of contacts, for which the curves are relatively flat. A similar local maximum has been found in a recent study [13] for pairwise interactions in Twitter by various community detection algorithms. We perform a ran- domization of photos between groups, keeping the number of photos per group fixed. The normalized entropy calculated for the shuffled photos stays close to 1, as expected, and the maximum disappears. A possible interpretation of the exis- tence of the maximum is that these sizes tend to correspond to social groups, while bigger groups are more frequently Interaction a 104 g i l 103 Topical Social b c 102 104 g i l 103 102 103 g i l 102 g a g a 101 101 102 sg 103 101 105 104 g a 103 102 104 103 102 101 104 103 102 101 Activity 106 105 104 103 102 b g 104 g b 103 102 d e f g b 104 Reciprocity j k l g t g t g h i 4 3 2 1 0 3 2 1 0 2.5 g t 2 1.5 1.3 1.25 1.2 1.15 1.1 1.05 1 g u 1.15 g u 1.1 1.05 1 1.25 g u 1.2 1.15 m n o ) g ( H ) g ( H ) g ( H 103 103 101 102 sg 102 sg 103 1 101 102 sg 103 1.1 101 102 sg 103 7 6.5 6 5.5 6.5 6 5.5 5 4.5 4 5.5 5 4.5 4 3.5 3 101 Entropy 1.1 p q r 1.05 g h 1 0.95 0.9 g h 1.05 1 0.95 0.9 0.85 1.05 g h 1 0.95 s t u C o m m e n t s F a v o r i t e s C o n t a c t s 102 sg 103 101 102 sg 103 Figure 4: Averages of various properties of topical (black circles) and social (blue squares) groups as a function of their size. Each point corresponds to 30 groups. topical. Further findings to support this interpretation are presented in the next subsection. Strong correspondence of the maxima for normalized en- tropy and reciprocity suggests that these properties are cor- related, as shown in Fig. 3. While it may be natural to ex- plain the correlation between reciprocity of comments and normalized entropy based on commented photos, it is not clear why we also find a positive correlation with normalized entropy based on other sets of photos. A possible interpre- tation is that high intra-reciprocity leads to wider variety of topics covered inside of that group, and vice versa. The values of relative activity both in declared and de- tected groups are very high, as presented in Figs. 2e,f. As ex- pected, activity of randomized groups exhibits values around 1 for all group sizes. For real groups instead, the value of relative activity decreases with the size of groups and gets close to 1 for very large ones. This may be caused by the fact that larger groups cannot be as integrated as smaller groups and the social commitment of their members towards other members of the group drops due to limited human capabil- ities. Additionally, we observe that the activity decay for declared groups occurs sharply between groups of size 100 and 200, in agreement with Dunbar’s theory on the upper bound of the number of stable relationships manageable by a human. The activity drop for detected groups is contin- uous and much more moderate (Fig. 2f), since community detection algorithms tend by design to output node clusters with high numbers of connections between them. 6.3 Relation between metrics and group label Here we analyze properties and values of the metrics for groups labeled through the editorial process. First, the ra- tio of groups labeled as social differs between declared and detected groups. In declared groups we find around 48% social groups, whereas among detected groups almost 69% are labeled as social. Additionally, we picked 50 detected groups among the ones that are the most similar to declared groups. Specifically, we selected them randomly from the 99th percentile shown in Fig. 1. These groups have signif- icant overlap with declared groups and should share simi- lar properties. Indeed, the ratio of groups labeled as social among them is closer to that of declared groups and equal to 53%. We conclude that detected groups are more likely to be social than declared ones. It is a somewhat expected result, since clustering algorithms detect dense parts of a network, and so they are inclined to detect areas with more reciprocal connections. Note that the theory envisions more recipro- cal relations in social groups. Thus, community detection algorithms are more likely to find social groups, however, determining to what extent it happens is not trivial. One of the expectations is that bond-based groups should not be very large, as the human capacity for stable relation- ships is limited. As pointed in Section 6.2, the Dunbar num- ber can be considered as a possible cap for the size of such groups, while topical groups do no yield such a restriction. In line with this expectation, we find that declared groups la- beled as social have on average 35 members, whereas groups labeled as topical have on average around 172 members. We find insightful differences and similarities in various properties, which we explore in detail in Fig. 4. We plot them as a function of the size of groups as they vary dras- tically with it, and one needs to compare groups of similar sizes in order to draw unbiased conclusions. First, there are almost no differences in the number of photos (not shown), favorites, and contacts (as in Figs. 4b,c) inside social and topical groups. The number of comments is, however, around 2 times higher in social groups than in topical groups of similar size (Fig. 4a). More differences can be found when looking at relative activity metrics (Figs. 4d- i), which compare number of internal interactions with an expectation. In all three types of interaction the relative activity metrics for social groups yield values from 2 to over 10 times higher than for topical groups. The activity metric bg compares density of interactions internal to the group with the density external to it. Therefore this result reflects a stronger focus or even an isolation of members belonging to social groups from the rest of people they interact with. More importantly, we observe large differences in values of reciprocity and relative reciprocity of comments and fa- vorites. Social groups exhibit significantly higher reciprocity than topical groups (Figs. 4j-o), in line with common iden- tity and common bond theory. There is no difference in s p u o r g l a i c o s f o % 1 0.8 0.6 0.4 0.2 0 100 a b c d e f g h Comments Favorites Contacts Photo pool 102 101 sg 101 102 lig 103 101 102 103 ag 102 103 bg 104 0 1 2 3 4 5 tg 0.9 1 1.1 1.2 1.3 ug 1 2 3 4 5 6 7 8 H(g) 0.7 0.8 0.9 1 1.1 hg 0 0.2 0.4 0.6 0.8 1 s p u o r g l a c i p o t f o % Figure 5: Dependence of fraction f of groups labeled as social on various metrics: based on comments, favorites, contacts and photo pools. The remaining (1 − f ) groups are topical. Each point corresponds to 50 groups. reciprocity of contacts. A plausible interpretation is that contacts do not reflect personal relations between connected users, as users often add people they do not know and do not interact with as contacts in order to follow their con- tent. Finally, we observe much higher values of entropy and normalized entropy in social groups than in topical ones (Figs. 4p,q,s,t). This holds for the tags extracted from pho- tos commented, and favorited between members. Assum- ing that tags of photos represent topics of interaction, the result is consistent with bond attachment. It is expected for members of bond-based groups to cover many different topics and areas in their interactions, whereas members of identity-based groups focus their interactions on specific top- ics. However, this effect is weaker for the tags extracted from photo pool of the group (Figs. 4r,u). Apparently, the content of the photo pool does not always reflect well the interactions and relations between members of the group. g Additionally, we plot the fraction of groups labeled as so- cial with respect to group size, activity, reciprocity, and entropy (Fig. 5). The fraction correlates negatively with group size, as expected (Fig. 5a). The correlations with the number of interactions and relative activity ag are rather weak (Figs. 5b,c), whereas, surprisingly, there is a strong dependency on relative activity bg (Fig. 5d). For the low- est values of bcom , 95% of the groups are topical, while for the highest, 80% of the groups are social. High values of bg can mean stronger group-focus, or even an isolation of the group members from the rest of people they interact with. It may relate to the fact that it is hard to enter bond- based groups due to strong relations existing between their members and because high investment is required to create such relations with them [24]. Direct reciprocity of inter- actions, with the exception of contacts, correlates strongly with social groups (Figs. 5e,f). We strongly expected this result based on bond attachment. Furthermore, we found that the entropy of tags correlates with social groups, but entropy based on other sources does not (Fig. 5g). However, we find that our normalized entropy performs much better than this, and a strong correlation is found both for tags extracted from comments and from favorites (Fig. 5h). This shows that the normalized entropy of tags may be the most proper way of measuring topical diversity of communications of a set of people. 7. GROUP TYPE DETECTION The properties of labeled social and topical groups tend to confirm the validity of the principles identified by the common identity and common bond theory. A further con- firmation comes from the ability of the defined metrics to predict the tendency of a group towards sociality or topical- ity. To this end, we propose and compare two methods to predict the group type and we test their accuracy over the corpus of the labeled groups. 7.1 Prediction methodology The first approach we use is a linear combination of the metrics. To this end, we select the features that are the most related to the sociological theory and for which we built specific metrics, i.e., tg, ug and hg. Each of them is applied to the 3 different interaction types and bags of tags, which produces a total of 9 values. We transform the val- ues of the metrics into their t-statistics by subtracting the average value and dividing them by the standard deviation of the distribution. Then we weight the normalized scores evenly by dividing them by the total number of metrics con- sidered and we finally sum them up to obtain a single score Sg. All of the components are supposed to score high for social groups. Therefore, the higher the value of the score, the higher the chance that the group is social rather than topical. To convert the score into a binary label, a fixed threshold above which groups are predicted to be social must be selected. Using this approach, we aim at testing if those metrics, based on the theory, can be successful in predicting the type of group (social or topical). The second approach relies on machine-learning methods that use the metrics’ values as features. Features are com- bined in a classifier that is first trained on a sample of labeled data to learn a prediction model. The trained classifier then outputs a binary prediction for any new group instance de- fined in the same feature space. Due to the limited size of our corpus of labeled groups, we estimate the classifier per- formance using 10-fold cross validation. We report results on a Rotation Forest classifier, which performed best in com- parison to several algorithms implemented in WEKA. For the classifier we used a wider set of features than for the lin- ear combination approach, namely: group size sg and Eint g , ag, bg, tg, ug, H(g), hg, each applied to the 3 different in- teraction types and bags of tags. This results in a total of 22 features. We selected such a wide set of features to test if indeed the metrics proposed to distinguish between the social and topical groups are the best ones for the task. The relative predictive power of the features is measured through a feature selection algorithm. 7.2 Prediction results The ratio of groups labeled as social increases quickly with the score Sg, as shown in Fig. 6a. This summarizes the find- ings of previous sections, suggesting that the features em- bedded in the score are able to capture well the nature of the groups. The higher the score, the higher the probability that the group is social; the lower, the more topical. When the score is around zero, groups can be either social or top- Editorial labeling Score Classifier 1 a s p u o r g l a i c o s f o o i t a R 0.8 0.6 0.4 0.2 0 -1.5 -1 -0.5 0 0.5 1 Sg y c a r u c c a , t n e m e e r g A 1 0.8 0.6 0.4 0.2 0 -1.5 b Agreement between editors Score accuracy Classifier accuracy -1 -0.5 0 Sg 0.5 1 e t a r e v i t i s o p e u r T 1 0.8 0.6 0.4 0.2 0 0 c AUC = 0.879 AUC = 0.749 Score Classifier 0.4 0.2 0.8 False positive rate 0.6 1 Figure 6: Comparison between prediction methods. a) Ratio of groups labeled as social versus the score. The same ratio is plotted for the score-based (threshold at 0) and trained classifier predictions. b) The accuracy of prediction of the two techniques and agreement between two of the labelers against the Sg values. c) ROC curves for the prediction with the two different techniques. ical, or both, meaning that a decision on the nature of the group may be more difficult. If we fix the threshold for the Sg value in order to perform a binary group classification, it is clear that several misclassifications will occur, especially around the threshold value. An example for threshold at 0 is shown in Fig. 6a. Conversely, the classifier performs much better and achieves the ratio that adheres much more to the actual ratio of social and topical groups. Both methods, however, fail more frequently for groups with mixed social and topical features. The prediction ac- curacies of the classifier and of the score-based predictions have an evident drop of performance around 0 (Fig. 6b). The accuracy at the extreme values of the score is close to 0.95, while it falls below 0.6 for groups with a score close to 0. On the other hand, this drop appears also in the agreement between two of the human labelers, measured as a ratio of groups that have been given the same label. Apparently, this is a shortcoming of the binary classification itself, as opposed to multi-label classification. The overall performance of the two approaches can be compared fairly through ROC curves (Fig. 6c), which astray from the selection of a fixed threshold. The curve for the classifier (computed for the 10-fold cross validation) always performs better, and this is reflected in the considerably higher AUC value and accuracy, as shown in Tab. 2. , hfav g g g , ucom g , and bcom In addition, to determine the most predictive features, we rank the features using Chi-square feature selection. The top 5 features are, in decreasing order of importance: hcom , tcom . The selected set is the optimal g for the prediction performance: retraining the classifier on such restricted set of features results in stable performance, as shown in Tab. 2. The top 4 most predictive features correspond directly to the expectations of the theory and results of the analysis from Section 6. Reciprocity-based metrics and normalized entropy are significantly more pre- dictive than other features. The high position of relative activity bcom is rather unexpected. However, we have al- ready remarked on its importance and commented on its interpretation in Section 6. g Method Score Classifier Classifierχ2 top5 Accuracy AUC 0.749 0.879 0.872 0.763 0.801 0.803 Table 2: Group type prediction performance using i) the score with threshold at 0, ii) 10-fold cross validation on a Rotation Forest classifier trained on all the features, or iii) the same classifier trained on the set of top-5 predictive fea- tures, according to the Chi Squared feature selection. high-level characterization of topical and social groups. We propose metrics capturing reciprocity of interactions and en- tropy of user-generated terms, to realize the concepts dis- cussed in the theory and to measure sociality and topicality of groups. We label a number of groups from Flickr as ei- ther topical or social and we leverage this ground truth to show that the metrics, combined with a machine-learning approach, predict the group type with high accuracy. More- over, we note that the degree of isolation of the group activ- ity from the rest of the social network, measured in terms of more personal interactions, is a good predictor of the group type, in addition to the elements identified in the theory. Besides the main prediction results, the supporting analysis of the group properties in terms of the identified dimen- sions confirms the theory from different angles and high- lights other interesting findings. In particular, dependencies of the metrics with the group size confirm previous obser- vations about the effective size of social communities, peak- ing around rather small sizes and being limited by a cap of 100-200 members. The study is complemented with a comparison of the structure and sociality and topicality traits between declared groups and groups from community detection algorithms. Detected groups do not overlap much with declared groups on average, but they match sensibly more than the random case for groups of comparable sizes. Furthermore, detected groups are more often social than the declared ones. Findings from the present work open new opportunities for characterization of social communities and of their mem- bers. Extensions to the study include a more exhaustive ex- traction of detected groups using a different network than the network of contacts e.g., we find mutual comments to carry more social traits than the contacts do. Another inter- esting extension could be multi-label classification of groups, in order to better categorize groups with mixed social and topical components. Acknowledgments The authors would like to thank Gideon Zenz for his help- ful suggestions and contributions. This research is partially supported by EU’s FP7/2007-2013 under the ARCOMEM and SOCIALSENSOR projects, by the CDTI (Spain) under the CENIT program, project CEN-20101037 “Social Media”, and by MICINN (Spain) through Grant TIN2009-14560- C03-01, and by MINECO (Spain) and FEDER (EU) through projects MODASS (FIS2011-247852) and FISICOS (FIS2007- 60327). P.A.G. acknowledges support from the JAE Predoc program of CSIC (Spain). 8. CONCLUSIONS Common identity and common bond theory indicates a 9. REFERENCES [1] L. M. Aiello, A. Barrat, R. Schifanella, C. Cattuto, B. Markines, and F. Menczer. Friendship prediction and homophily in social media. ACM Trans. Web, 6(2):9:1–9:33, 2012. [2] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In 12th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD’06, page 44, New York, New York, USA, 2006. [3] L. Backstrom, R. Kumar, C. Marlow, J. Novak, and A. Tomkins. Preferential behavior in online groups. In International conference on Web search and web data mining - WSDM’08, pages 117–128, New York, NY, USA, 2008. [4] N. L. Collins and L. C. Miller. Self-disclosure and liking: A meta-analytic review. Psychological Bulletin, 166(3):457–475, 1994. [5] A. Cox, P. Clough, and S. Siersdorfer. Developing metrics to characterize Flickr groups. Journal of the American Society for Information Science and Technology, 62(1):493–506, 2011. [6] J. N. Cummings, B. Butler, and R. Kraut. The quality of online social relationships. Comm. of the ACM, 45(7):103–108, 2002. [7] R. I. M. Dunbar. The social brain hypothesis. Evolutionary Anthropology, 6:178–190, 1998. community participation using uniqueness and group dissimilarity. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’04, pages 631–638, New York, NY, USA, 2004. [18] D. W. McMillan and D. M. Chavis. Sense of community: A definition and theory. Journal of Community Psychology, 14(1):6–23, 1986. [19] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In 7th ACM SIGCOMM conference on Internet measurement - IMC ’07, pages 29–42, San Diego, California, USA, 2007. [20] R.-A. Negoescu, B. Adams, D. Phung, S. Venkatesh, and D. Gatica-Perez. Flickr hypergroups. In 17th ACM international conference on Multimedia, MM’09, pages 813–816, New York, NY, USA, 2009. [21] R. A. Negoescu and D. Gatica-Perez. Analyzing flickr groups. In International conference on Content-based image and video retrieval, CIVR’08, pages 417–426, New York, NY, USA, 2008. [22] D. A. Prentice, D. T. Miller, and J. R. Lightdale. Asymmetries in attachments to groups and to their members: Distinguishing between common-identity and common-bond groups. Personality and Social Psychology Bulletin, 20(5):484–493, 1994. [23] C. Prieur, N. Pissard, J. Beuscart, and D. Cardon. Thematic and social indicators for Flickr groups. In Proceedings of International Conference on Weblogs and Social Media - ICWSM’08, 2008. [8] S. Fortunato. Community detection in graphs. Physics [24] Y. Ren, R. Kraut, and S. Kiesler. Applying Common Reports, 486(3-5):75–174, 2010. [9] P. A. Gloor and Y. Zhao. Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis. In Conference on Information Visualization, IV ’06, pages 130–135, Washington, DC, USA, 2006. [10] B. Goncalves, N. Perra, and A. Vespignani. Modeling Users’ Activity on Twitter Networks: Validation of Dunbar’s Number. PLoS ONE, 6(8):e22656, 2011. [11] P. A. Grabowicz and V. M. Egu´ıluz. Heterogeneity shapes groups growth in social online communities. Europhys. Lett., 97(2):28002, 2012. [12] P. A. Grabowicz, J. J. Ramasco, and V. M. Eguiluz. Dynamics in online social networks. arXiv:1210.0808, 2012. Identity and Bond Theory to Design of Online Communities. Organization Studies, 28(3):377–408, 2007. [25] S. Riger and P. J. Lavrakas. Community ties: Patterns of attachment and social interaction in urban neighborhoods. American Journal of Community Psychology, 9:55–66, 1981. [26] K. Sassenberg. Common bond and common identity groups on the Internet: Attachment and normative behavior in on-topic and off-topic chats. Group Dynamics Theory Research And Practice, 6(1):27–37, 2002. [27] H. Tajfel. Social identity and intergroup relations. Cambridge University Press, 1982. [13] P. A. Grabowicz, J. J. Ramasco, E. Moro, J. M. Pujol, [28] L. Tang, X. Wang, and H. Liu. Group profiling for and V. M. Eguiluz. Social Features of Online Networks: The Strength of Intermediary Ties in Online Social Media. PLoS ONE, 7(1):e29358, 2012. [14] S. R. Kairam, D. J. Wang, and J. Leskovec. The life and death of online groups: predicting group growth and longevity. In 5th ACM international conference on Web search and data mining, WSDM’12, pages 673–682, New York, NY, USA, 2012. [15] A. Lancichinetti, S. Fortunato, and F. Radicchi. Benchmark graphs for testing community detection algorithms. Physical Review E, 78:046110, 2008. [16] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and S. Fortunato. Finding Statistically Significant Communities in Networks. PLoS ONE, 6(4):e18961, 2011. [17] P. J. Ludford, D. Cosley, D. Frankowski, and L. Terveen. Think different: increasing online understanding social structures. ACM Trans. Intell. Syst. Technol., 3(1):15:1–15:25, 2011. [29] S. Utz and K. Sassenberg. Distributive justice in common-bond and common-identity groups. Group Processes and Intergroup Relations, 5(2):151–162, 2002. [30] H. T. Welser, E. Gleave, D. Fisher, and M. Smith. Visualizing the Signatures of Social Roles in Online Discussion Groups. The Journal of Social Structure, 8(2), 2007. [31] J. Yang and J. Leskovec. Defining and evaluating network communities based on ground-truth. In Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, MDS’12, pages 3:1–3:8, New York, NY, USA, 2012.
1812.10962
1
1812
2018-12-28T11:53:08
A Variational Topological Neural Model for Cascade-based Diffusion in Networks
[ "cs.SI", "cs.LG", "stat.ML" ]
Many works have been proposed in the literature to capture the dynamics of diffusion in networks. While some of them define graphical markovian models to extract temporal relationships between node infections in networks, others consider diffusion episodes as sequences of infections via recurrent neural models. In this paper we propose a model at the crossroads of these two extremes, which embeds the history of diffusion in infected nodes as hidden continuous states. Depending on the trajectory followed by the content before reaching a given node, the distribution of influence probabilities may vary. However, content trajectories are usually hidden in the data, which induces challenging learning problems. We propose a topological recurrent neural model which exhibits good experimental performances for diffusion modelling and prediction.
cs.SI
cs
A Variational Topological Neural Model for Cascade-based Diffusion in Networks Sylvain Lamprier Sorbonne Universit´e, LIP6, F-75005, Paris, France [email protected] December 31, 2018 Abstract Many works have been proposed in the literature to capture the dynamics of dif- fusion in networks. While some of them define graphical markovian models to extract temporal relationships between node infections in networks, others consider diffusion episodes as sequences of infections via recurrent neural models. In this paper we pro- pose a model at the crossroads of these two extremes, which embeds the history of diffusion in infected nodes as hidden continuous states. Depending on the trajectory followed by the content before reaching a given node, the distribution of influence probabilities may vary. However, content trajectories are usually hidden in the data, which induces challenging learning problems. We propose a topological recurrent neu- ral model which exhibits good experimental performances for diffusion modelling and prediction. 1 Introduction The recent development of online social networks enabled researchers to suggest methods to explain and predict observations of diffusion across networks. Classical cascade mod- els, which are at the heart of the research literature on information diffusion, regard the phenomenon of diffusion as an iterative process in which information transits from users to others in the network (Saito et al., 2008; Gomez-Rodriguez et al., 2011), by a so-called word-of-mouth phenomenon. In this setting, diffusion modeling corresponds to learning probability distributions of content transmission. Various cascade models have been pro- posed in the literature, each inducing its own learning process to explain some observed diffusion episodes and attempting to extract the main dynamics of the network. However, most of these models rely on a strong markovian assumption for which the probabilities of next infections1 only depend on who is already infected at the current step, not on the past trajectories of the diffused content. We claim that the history of spread contains much valuable information that should be taken into account by the models. Past trajectories of the diffusion can give insights about the different natures of the contents. Also, the content may be changed during the diffusion, with different transformations depending on which nodes re-transmit the information. On the other hand some recent approaches rely on representation learning and recurrent neural networks (RNN) to predict the future spread of diffusion given the past. A naive possibility would be to consider diffusion episodes as sequences of infections and propose temporal point process approaches to model the dynamics. Using the Recurrent Marked Temporal Point Process model (Du et al., 2016), the current hidden state of the RNN would embed the history of the whole diffusion sequence, which would be used to output the next infected node and its time of infection. However, since diffusion episodes are not 1Throughout this paper, we refer to infection for denoting the participation of a node of the network in the diffusion. 1 sequences but trees, naive recurrent methods usually fail in capturing the true dynamics of the networks. Embedding the whole past in the state of a given node rather than restraining it to its specific ancestor branch leads to consider many independent and noisy events for future predictions. A model that would consider the true diffusion paths would be more effective, by focusing on the useful past. If the true diffusion paths were known, it would be possible to adapt works on recurrent neural models for tree structures such as successfully proposed in (Tai et al., 2015) for NLP tasks. Unfortunately, in most of applications the topology of diffusion is unknown while learning. In the task considered in this paper, the only observations available are the timestamps of the infected nodes. To cope with it, (Wang et al., 2017a) proposed Topo-LSTM, a Long-Short Time Memory network that considers a known graph of relationships between nodes to compute hidden states and cells of infected nodes. The hidden state and cell of a given node at t depend on those from each of its predecessors that have been infected before t. Since nodes may have multiple predecessors that are infected at time t, the classical LSTM cannot be applied directly. Instead, (Wang et al., 2017a) proposed a cell function that aggregates infector candidate states via mean pooling. This allows to take the topology of the possible diffusion into account, but not the past trajectory of the content (it averages all possible paths). To overcome this, (Wang et al., 2017b) proposed a cascade attention-based RNN, which defines a neural attention mechanism to assign weights to infector candidates before summing their contribution in the new hidden state at t. The attention network is supposed to learn to identify from whom comes the next infection based on past states. However, such an approach is likely to converge to most of attention weight vectors in the center of the simplex, since diffusion is a stochastic process with mostly very weak influence probabilities. The deterministic inference process of the approach limits its ability to produce relevant states by mixing from multiple candidates rather than sampling the past trajectories from their posterior probabilities. Note the similar approach in (Wang et al., 2018), which does not use a RNN but defines a composition module of the past via attention networks to embed the episode in a representation space from which the probability of the next infected node can be deduced. Beyond the limits discussed above w.r.t. deterministic mixing of diffusion trajectories, no delay of infection is considered in this work, which makes it impossible to use for diffusion modeling purposes. Recently, many works in representation learning used random walks on graphs to sample trajectories that can be used to learn a network embedding which respects some topological constraints. While DeepWalk (Perozzi et al., 2014) only uses structural information, models proposed in (Nguyen et al., 2018) or (Shi et al., 2018) include temporal constraints in ran- dom walks to sample feasible trajectories w.r.t. observed diffusion episodes. The approach DeepCas from (Li et al., 2016) applies this idea for the prediction of diffusion cascades. How- ever, such approaches require a graph of diffusion relations as input, which is not always available (and not always representative of the true diffusion channels of the considered net- work as reported in (Ver Steeg & Galstyan, 2013)). In our work, we consider that no graph is available beforehand. Moreover, no inference process is introduced in DeepCas to sample trajectories from their posterior probabilities given the observed diffusion sequences. The sampling of trajectories is performed in an initialization step, before learning the parameters of the diffusion model. In this paper, we propose the first bayesian topological recurrent neural network for sequences with tree dependencies, which we apply for diffusion cascades modelling. Rather than building on a preliminary random walk process, the idea is to consider trajectory inference during learning, in order to converge to better representations of the infected nodes. Following the stochastic nature of diffusion, the model infers trajectories distributions from observations of infections, which are in turn used for the inference of infection probabilities in an iterative learning process. Our probabilistic model, based on the famous continuous- time independent cascade model (CTIC) (Saito et al., 2009) is able to extract full paths of diffusion from sequential observations of infections via black-box inference, which has 2 multiple applications in the field. Our experiments validate the potential of the approach for modeling and prediction purposes. The remaining of the paper is structured as follows. Section 2 presents some background and notations of the approach. Section 3 presents the proposed model. Section 4 reports experimental results of the approach compared to various baselines. 2 Background 2.1 Information Diffusion Information diffusion is observed as a set of diffusion episodes D. Classically, episodes considered in this paper only contain the first infection event of each node (the earlier time a content reached the node). Let U = {u0, u1, ...., uN −1} be a set of N nodes, u0 standing for the world node, used to model influences from external factors or spontaneous infections (as done in (Gruhl et al., 2004) for instance). A diffusion episode D = (U D, T D) reports the diffusion of a given content in the network as a sequence of infected nodes U D = (cid:16)U D u ∈ N + ∞u ∈ U} of infection time-stamps for all u ∈ U. U D is ordered chronologically w.r.t. the infection time-stamps T D. Thus, U D i ∈ U corresponds to the i-th infected node in D for all i ∈ {0, ..., D − 1}, with D the number of infected nodes in the diffusion. Every episode in D starts by the world node u0 (i.e., U D u the infection time-stamp in D for any node in U, ∞ for nodes not infected in D. Time-stamps are relative w.r.t. to tD 1 , arbitrarily set to tD 0 = 0 for every episode D. In the following, Di = (U D ) denotes the i − th infected node in U with its associated time-stamp. D−1(cid:17) and a set T D = {tD 1 = 1 in the data. Note that we also set tD 0 = u0 for all episodes D). We note tD 0 , ..., U D i , tD U D i is the infector of U D Cascades are richer structures than diffusion episodes, since they describe how a given diffusion happened. The cascade structure stores the first transmission event (u → v) that succeeded from any node u to each infected node v. Thus, a cascade C D = (U D, T D, I D) corresponds to a transmission tree rooted in u0 and reaching nodes in U D during the dif- fusion, according to a sequence I D of infector indices in U D: for any j ∈ {1, ..., D − 1} and any i ∈ {0, ..., D − 2}, I D in the diffusion D (i.e., U D 0 = 0 (no infector for the world node). i Note that I D 1 is always equal to 0, since there is no other candidate for being the infector of U D for 1 i ∈ {0, ..., D − 1}. Note that the cascade structures respect that tD for every D and all j ∈ {1, ..., D − 1} (the infector of a node v is mandatory a node that was infected before v). Several different cascade structures are possible for a given diffusion episode. Cascade models usually perform assumptions on these latent diffusion structures to learn the diffusion parameters. than the world u0. For convenience, we note I D(i) ∈ U D the infector of U D i j ). We arbitrarily set I D j was infected by U D i j equals i iff U D ID (j) < tD U D j 2.2 Cascade Models The Independent Cascade model (IC) (Goldenberg et al., 2001) considers the spread of diffusion as cascades of infections over the network. We focus in this paper on cascade models such as IC, which tend to reproduce realistic temporal diffusion dynamics on social networks (Guille et al., 2013). The classical version of IC is an iterative process in which, at each iteration, every newly infected node u gets a unique chance to infect any other node v of the network with some probability θu,v. The process iterates while new infections occur. Since the expectation-maximization algorithm proposed in (Saito et al., 2008) to learn its parameters, IC has been at the heart of diffusion works. However, in real life, diffusion occurs in continuous time, not discrete as assumed in IC. (Lamprier et al., 2016) proposed DAIC, a delay-agnostic version of IC, where diffusion between nodes is assumed to follow uniform delay distributions rather than occurring in successive discrete time-steps. A representation learning version of DAIC has been proposed 3 in (Bourigault et al., 2016), where nodes are projected in a continuous space in a way that the distance between node representations render the probability that diffusion occurs between them. This allowed the authors to obtain a more compact and robust model than the former version of DAIC. Beyond uniform time delay distributions, two main works deal with continuous-time diffusion. NetRate (Gomez-Rodriguez et al., 2011) learns parametric time-dependent distributions to best fit with observed infection time-stamps. As NetRate, CTIC (Saito et al., 2009) uses exponential distributions to model delays of diffusion between nodes, but rather than a single parameter for each possible relationship, delays and influence factors are considered as separated parameters, which leads to more freedom w.r.t. to observed diffusion tendencies. Delays and influence parameters are learned conjointly by an EM-like algorithm. Note the continuous-time cascade model extension in (Zhang et al., 2018), which embeds users in a representation space so that their relative positions both respect some structural community properties and can be used to explain infection time- stamps of users. In our model we consider that diffusion probabilities from any infected node v depend on a latent state associated to v, which embeds the past trajectory of the diffused content. This state depends on the state of the node u who first transmitted the content to v. Therefore, we need to rely on a continuous-time model such as CTIC (Saito et al., 2009), which serves as a basis for our work. In CTIC, two parameters are defined for each pair (u, v) of nodes in the network: ku,v ∈]0; 1[, which corresponds to the probability that node u succeeds in infecting v, and ru,v > 0, which corresponds to a time-delay parameter used in an exponential distribution when u infects v. If u succeeds in infecting v in an episode D, v is infected at time tD u + δ, where δ ∼ ru,v exp (−ru,vδ). These parameters are learned via maximizing the following likelihood on a set of episodes D: v = tD p(D) = YD∈D v Yv6∈U D v stands for the probability that v is infected at tD v is the probability that v is not infected by any infected node in D. p(D) = YD∈D Yv∈U D where hD D and gD v by previous infected nodes in hD gD v (1) We build on this in the following, but rather than considering a pair of parameters ku,v and ru,v for each pair of nodes (u, v) (which implies 2×U×(U−1) parameters to store), we propose to consider neural functions which output the corresponding parameters according to the hidden state of the emitter u, depending on its ancestor branch in the cascade, and a continuous embedding of the receiver v. 3 Recurrent Neural Diffusion Model This section first presents our recurrent generative model of cascades. Then, it details the proposed learning algorithm. 3.1 Recurrent Diffusion Model As discussed above, we consider that each infected node v in an episode D owns a state v ∈ Rd depending on the path the content followed to reach v in D, with d the dimension zD of the representation space. Knowing the state zD u of the node u that first infected v, the state zD v is computed as: v = fφ(zD zD u , ω(f ) v ) (2) with fφ : Rd × Rd → Rd a function, with parameters φ, that transforms the state of u according to a shared representation ω(f ) v ∈ Rd of the node v. This function can either be an Elman RNN cell, a multi-layer perceptron (MLP) or a Gated Recurrent Unit (GRU). An LSTM could also be used here, but zD v should include both the cell and the state of v in that case. 4 Given a state z for an infected node u in D, the probability that u succeeds in transmit- ting the diffused content to v is given by: ku,v(z) = σ(cid:16)< z, ω(k) where σ(.) stands for the sigmoid function and ω(k) v ∈ U. v v >(cid:17) (3) an embedding of size d for any node Similarly to the CTIC model, if a node u succeeds in infecting another node v, the delay of infection depends on an exponential distribution with parameter ru,v. To simplify learning, we assume that the delay of infection does not depend on the history of diffusion, only the probability of infection does. Thus, for a given pair (u, v), the delay parameter is the same for every episode D: ru,v = exp(− < ω(r,1) u , ω(r,2) v > ) (4) with x the absolute value of a real scalar x and ω(r,1) correspond to two embed- dings of size d for any node u ∈ U, ω(r,1) for the source of the transition and ω(r,2) for its destination in order to enable asymmetric behavior. )u∈U , (ω(r,2) u )u∈U , (ω(r,1) )u∈U , (ω(k) and ω(r,2) u u u v u )u∈U(cid:17) as the parameters of We set Θ = (cid:16)φ, z0, (ω(f ) our model. The generative process, similar to the one of CTIC, is given in appendix in algorithm 1. In this process, the state of the initial node, the world node u0, is a parameter vector z0 to be learned. The process iterates while there remains some nodes in a set of infectious nodes (initialized with u0). At each iteration, the process selects the infectious node u with minimal time-stamp of infection, removes it from the set of infectious nodes, records it as infected and attempts to infect each non infected node v according to the probability ku,v(zD u ). If it succeeds, a time t is sampled for v with an exponential law with parameter ru,v. If the new time t for v is lower than its current time tD v (initialized with v = ∞), this new time is stored in tD tD v , v is added to the set of infectious nodes and its new state zD v is computed according to its new infector u. 3.2 Learning the Model As in CTIC, we need to define the probability that the node u ∈ U D infects the node v ∈ U D at time tD v with our model. Given a state z for u in D, we have: u,v(z) = ku,v(z)ru,v exp−ru,v (tD aD v −tD u ) (5) Also, the probability that u does not infect v before tD v given a state z for u in D is: u,v(z) = 1 − ku,v(z)Z tD v bD tD u ru,v exp−ru,v (t−tD u ) dt = ku,v(z) exp−ru,v (tD v −tD u ) +1 − ku,v(z) (6) The probability density that node v is infected at time tD nodes infected before v is: v given a set of states z for all hD v (z) = = Pu∈U ,tD Qx∈U ,tD x <tD v u <tD v bD x∈U \{u},tD x <tD v aD u,v(zu)/bD u,v(zu) x,v(zx) Pu∈U ,tD u <tD v aD u,v(zu) bD x,v(zx) Q (7) (8) where zu is the state of node u in z. Similarly, the probability density that node v is not infected in D at the end of observation time T given a set of states z for all nodes infected in D is: gD v (z) = Yu∈U D (ku,v(zu) exp−ru,v(T −tD u ) +1 − ku,v(zu)) ≈ Yu∈U D (1 − ku,v(zu)) (9) 5 where the approximation is done assuming a sufficiently long observation period. The learning process of our model is based on a likelihood maximization, similarly to maximizing eq.1 in the classical CTIC model. However, in our case the infection probabilities depend on hidden states z associated to the infected nodes. Since observations only contain infection time-stamps, this requires to marginalize over every possible sequence of ancestors I for every D ∈ D: log p(D) = PD∈D log p(D) = XD∈D log XI∈ID p(D, I) (10) where I D is the set {v ∈ ND−1v0 = 0∧∀i > 0, vi < i} of all possible ancestors sequences for D. p(D, I) corresponds to the joint probability of the episode D and an ancestor sequence I ∈ I D. Taking p(D, I) = p(I)p(DI) would lead to an intractable computation of p(DI) using our recurrent cascade model, since it would imply to estimate the probability of any infection in D according to the full ancestors sequence. Fortunately, using the bayesian chain rule, the joint probability can be written as: D−1 p(D, I) = Qi=1 p(DiD<i, I<i) p(IiD≤i, I<i) Qv6∈U D p(v 6∈ U DD≤D−1, I) (11) where D<i = (Dj)j∈{0,...,i−1} corresponds to the sequence of the i first components of D (the i first components in U D with their associated time-stamps) and I<i = (Ij )j∈{0,...,i−1} stands for the vector containing the i first components of I. We have for every i ∈ {1, ..., D − 1}: p(DiD<i, I<i) = hD <i is a set containing the states of the i first U D i infected nodes in D, which can be deduced from D<i and I<i using the equation 2. We also have: p(v 6∈ U DD≤D−1, I) = gD ≤i). The probability p(IiD≤i, I<i) is the conditional probability that I(U D i , given all the previous infection events and the fact that U D by one of the previously infected nodes in D. It can be obtained, according to formula 8, via: i ) was the node who first infected U D i was infected at tD U D i (zD <i), where zD v (zD p(IiD≤i, I<i) = aD I(U D i ),U D i (cid:16)zD Pu∈U ,tD u <tD i U D i )(cid:17) /bD I(U D aD u,U D i I(U D i ),U D u ) /bD (zD i )(cid:17) i (cid:16)zD I(U D (zD u ) u,U D i (12) with I(U D i ) ∈ U D the infector of U D i stored in I. Unfortunately the log-likelihood from formula 10 is still particularly difficult to optimize directly since it requires to consider every possible vector I ∈ I D for each training episode D at each optimization iteration. Moreover, the probability products in formula 11 would lead to zero gradients because of decimal representation limits. Therefore, we need to define an approach where the optimization can be done via trajectory sampling. Different choices would be possible. First, MCMC approaches such as the Gibbs Sampling EM could be used, but they require to sample from the posteriors of the full trajectories of the cascades, which is very unstable and complex to perform. The full computation of the posterior distributions could be avoided by using simpler propositional distributions (such as done for instance via importance sampling with auxiliary variables in (Farajtabar et al., 2015) for diffusion source detection), but this would face a very high variance in our case. Another possibility is to adopt a variational approach (Kingma & Welling, 2013), where an auxiliary distribution q is learned for the inference of the latent variables. As done in (Krishnan et al., 2016) for the inference in sequences, a smoothing strategy could be developed by relying on a bi-directional RNN that would consider past and future infections for the inference of the ancestors of nodes via q(IiD, I<i) for every infected node i in an episode D. However, learning the parameters of such a distribution is particularly difficult (episodes of different lengths, cascades considered as sequences, etc.). Also, another possibility for smoothing would be to define an independent distribution qD for every episode D ∈ D and every i 6 infection i ∈ {1, ..., D−1}. However, this induces a huge number of variational parameters, increasing with the size of the training set (linearly in the number of training episodes and quadratically in the size of the episodes). Thus, we propose to rather rely on the conditional distribution of ancestors given the past for sampling (i.e, qD i (Ii) = p(IiD≤i, I<i)), which corresponds to a filtering inference process. From the Jensen inequality on concave functions, we get for a given episode D: log p(D) = log XI∈ID p(D, I) ≥ E I∼qD (cid:2)log p(D, I) − log qD(I)(cid:3) D−1 Xi=1 log p(DiD<i, I<i) + Xv6∈U D = EI∼qD   ∆= L(D; Θ) log p(v 6∈ U DD≤D−1, I)  (13) D−1 Qi=1 where qD = p(IiD≤i, I<i). This leads to a lower-bound of the log-likelihood, which corresponds to an expectation from which it is easy to sample: at each new infection of a node i in a episode D, we can sample from a distribution depending on the past only. Maximizing this lower-bound (also called the ELBO) encourages the process to choose trajectories that explain the best the observed episode. To maximize it via stochastic optimization, we refer to the score function estimator (Ranganath et al., 2014), which leverages the derivative of the log-function (∇θ log p(x; θ) = ∇θ p(x;θ) p(x;θ) ) to express the gradient as an expectation from which we can sample. Another possibility would have been to rely on the Gumbel-Softmax and the Concrete distribution with reparametrization such as done in (Maddison et al., 2016), but we observed greatly better results using the log-trick. The gradient of the ELBO function for all the episodes is given by: ∇ΘL(D; Θ) = XD∈D E I∼qD (cid:2)(cid:0)log pI (D) − b(cid:1) ∇Θ log qD(I) + ∇Θ log pI (D)(cid:3) (14) where pI(D) is a shortcut for QD−1 i=1 p(DiD<i, I<i)Qv6∈U D p(v 6∈ U DD≤D−1, I) and b is a moving-average baseline of the ELBO per training episode, used to reduce the variance (taken over the 100 previous training epochs in our experiments). This stochastic gradient formulation enables to obtain unbiased steepest ascent directions despite the need to sample the ancestor vectors for the computation of the node states (with the replacement of expec- tations by averages over K samples for each episode). It contains two terms: while the first one encourages high conditional probabilities for ancestors that maximize the likelihood of the full episodes, the second one leads to improve the likelihood of the observed infections regarding the past of the sampled diffusion path. The optimization is done using the ADAM optimizer (Kingma & Ba, 2014) over mini- batches of M episodes ordered by length to avoid padding (M = 512 and K = 1 in our experiments). Our full efficient algorithm is given in appendix. 4 Experiments 4.1 Setup We perform experiments on two artificial and three real-world datasets: • Arti1: Episodes generated on a scale-free random graph of 100 nodes. The generation process follows the CTIC model. But rather than only one transmission probability k parameter per edge, we set 5 different ki depending on the diffusion nature. Before 7 each simulation a number i ∈ {1, ..., 5} is sampled, which determines the parameters to use. 10000 episodes for training, 5000 for validation, 5000 for testing. Mean length of the episodes=7.55 (stdev=5.51); • Arti2: Episodes sampled on the same graph as Arti1, also with CTIC but where each ku,v is a function of the transmitted content and the features of the receiver v. A content z ∈ R5 is sampled from a Dirichlet with parameter α = 0.1 before each simulation and the sigmoid of the dot product between this content and the edge features determines the transmission probabilities. Features of the hub nodes (nodes with a degree greater than 30) are sampled from a Dirichet with α = 10 (multi-content nodes), while those of other nodes are sampled from a Dirichet with α = 0.1 (content- specific nodes). 10000 episodes for training, 5000 for validation, 5000 for testing. Mean length of the episodes=6.89 (stdev=7.7). • Digg: Data collected from the Digg stream API during one month. Infections are the "diggs" posted by users on links published on the media. We kept the 100 most active users from the collected data. 20000 episodes for training, 5000 for validation, 5000 for testing. Mean length of the episodes=4.26 (stdev=9,26). • Weibo: Retweet cascades extracted from the Weibo microbloging website using the procedure described in (Leskovec et al., 2009). The dataset was collected by (Fu et al., 2013). 4000 nodes, 45000 episodes for training, 5000 for validation, 5000 for testing. Mean length of episodes=4.58 (stdev=2.15). • Memetracker: The memetracker dataset described in (Leskovec et al., 2009) contains millions of blog posts and news articles. Each website or blog stands as a user, and we use the phrase clusters extracted by Leskovec et al. (2009) to trace the flow of information. 500 nodes, 250000 for training, 5000 for validation, 5000 for testing. Mean length of episodes=8.68 (stdev=11.45). We compare our model recCTIC to the following temporal diffusion baselines: • CTIC: the Continuous-Time Independent Cascade model in its original version (Saito et al., 2009); • RNN: the Recurrent Temporal Point Process model from (Du et al., 2016) where episodes are considered as sequences that can be treated with a classical RNN out- putting at each step the probability distributions of the next infected node and its time-stamp; • CYAN: Similar to RMTPP but with an attention mechanism to select previous states (Wang et al., 2017b); • CYAN-cov: The same as Cyan but with a more sophisticated attention mechanism using an history of attention states, to give more weights to important nodes; • DAN: the attention model described in (Wang et al., 2018). It is very similar to CYAN but uses a pooling mechanism rather than a recurrent network to consider the past in the predictions. In the version of (Wang et al., 2018), the model only predicts the next infected node at each step, not its time of infection. To enable a comparison with the other models, we extended it by adding a time prediction mechanism similar to the temporal head of CYAN. • EmbCTIC: a version of our model where the node state z is replaced in the diffusion probability computation (eq. 3) by a static embedding for the source (similarly to the formulation of the delay parameter in eq. 4). This corresponds to an embedded version of CTIC, similarly to the embedded version of DAIC from (Bourigault et al., 2016). 8 Note that to adapt baselines based on RNN for diffusion modeling and render them comparable to cascade-based ones, we add a "end node" at the end of each episode before training and testing them. In such a way, these models are able to model the end of the episodes by predicting this end node as the next event (no time-delay prediction for this node however). Our model and the baselines were tuned by a grid search process on a validation set for each dataset (although the best hyper-parameters obtained for Arti1 remained near optimal for the other ones). For every model with an embedding space (i.e., all except CTIC), we set its dimension to d = 50 (larger dimensions induce a more difficult convergence of the learning without significant gain in accuracy). The reported results for our model use a GRU module as the recurrent state transformation function fφ. We evaluate our models on three distinct tasks: tive log-likelihood of the test episodes (i.e., N LL = −(1/Dtest)PD∈Dtest • Diffusion modelling: the performances of the methods are reported in term of nega- log p(D)). Lower values denote models that are less surprised by test episodes than others, ren- dering their generalization ability. The NLL measure depends on the model, but for each it renders the probability of an episode to be observed according to the model, both on which nodes are eventually infected and at what time. For our model which has to sample trajectories, the NLL is approximated via importance sampling by con- p(D,I (s)) sidering p(D) ≈ 1 qD (I (s)) computed on S infector vectors sampled from qD. We used S = 100 in our experiments; S PS s=1 • Diffusion generation: the models are compared on their ability to simulate realistic cascades. The aim is to predict the marginal probabilities of nodes to be eventu- ally infected. The results are reported in term of Cross-Entropy (CE) taken over Dtest×U PD∈Dtest Pu∈U log p(u ∈ the whole set of nodes for each episode: CE = U D)I(u∈U D) + log p(u 6∈ U D)I(u6∈U D ), where I(.) stands for the indicator function re- turning 1 if its argument is true, 0 else. p(u ∈ U D) is estimated via Monte-Carlo simulations (following the generation process of the models and counting the rate of simulations in which u is infected). 1000 simulations are performed for each test episode in our experiments. 1 • Diffusion Path prediction: 1 PD∈Dtest the models are assessed on their ability to choose the true infectors in observed diffusion episodes. This is only considered on the ar- tificial dataset for which we have the ground truth on who infected whom. The INF measure corresponds to the expectation of the rate of true infectors chosen by the models: IN F = (D−1) PD∈Dtest Pi∈{1,...,D−1} p(Ii = inf (i, D)D≤i), with inf (i, D) the true infector of the i-th infected node in the episode D. For RNN, their is no selection mechanism, it is excluded from the results for this mea- sure. For models with attention (CYAN and DAN), we consider the attention weights as selection probabilities. For cascade based models which explicitly model this, we directly use the corresponding probability p(Ii = inf (i, D)D≤i). In our model, this corresponds to an expectation over previous infectors in the cascade (i.e., 1 s=1 p(Ii = inf (i, D)D≤i, I (s) <i )), with I (s) the s-th sampled vector from qD. S PS For each task, we report results with different amounts of initial observations from test episodes: infections occurred before a given delay τ from the start of the episode are given as input to the models, from with they infer internal representations, evaluation measures are computed on the remaining of the episode. In tables 1 to 4, 0 means that nothing was initially observed, the models are not conditioned on the start of the episodes. 1 means that infections at the first time stamp are known beforehand, prediction and modeling results thus concern time-stamps greater than 1 (models are conditioned on diffusion sources). 2 and 3 mean that infections occurred respectively before a delay of τ = maxT /10 and a delay 9 Arti 1 Arti 2 0 NLL 25,99 rnn 27,85 cyan 26,68 cyan-cov 24,77 dan ctic 21,00 embCTIC 20,96 recCTIC 19,62 0 CE 0,47 rnn 0,40 cyan 0,50 cyan-cov 0,40 dan ctic 0,31 embCTIC 0,47 recCTIC 0,31 0 INF 0,38 cyan 0,39 cyan-cov 0,42 dan ctic 0,64 embCTIC 0,62 recCTIC 0,65 1 23,9 25,82 24,58 22,69 18,56 18,53 14,42 1 0,28 0,28 0,27 0,93 0,36 0,35 0,23 1 0,26 0,27 0,26 0,54 0,51 0,56 2 16,03 17,71 16,64 14,96 10,81 10,78 9,87 2 0,18 0,21 0,18 0,69 0,65 0,25 0,12 2 0,29 0,29 0,22 0,55 0,49 0,58 3 11,35 12,67 11,84 10,5 7,48 7,49 6,87 3 0,14 0,16 0,14 0,44 0,45 0,18 0,08 3 0,32 0,32 0,21 0,58 0,51 0,62 0 NLL 19,72 rnn 18,78 cyan 19,55 cyan-cov 18,71 dan ctic 20,08 embCTIC 19,90 recCTIC 17,39 0 CE 79,0 rnn 86,9 cyan 91,7 cyan-cov 97,9 dan ctic 63,1 embCTIC 65,8 68,7 recCTIC 0 INF cyan 0,30 0,29 cyan-cov 0,42 dan ctic 0,73 embCTIC 0,73 recCTIC 0,90 1 14,55 13,62 14,35 13,49 14,26 14,13 11,59 1 21,0 19,6 27,8 98,6 23,2 22,6 15,9 1 0,15 0,14 0,31 0,67 0,67 0,88 2 11,78 11,04 11,56 10,86 10,18 10,11 8,31 2 14,2 14,4 19,7 75,7 24,7 17,2 11,2 2 0,11 0,10 0,23 0,61 0,61 0,86 3 7,65 7,09 7,41 6,84 5,99 5,97 4,97 3 9,3 9,4 12,4 43,8 21,8 12,1 8,3 3 0,11 0,10 0,20 0,58 0,58 0,84 Table 1: Results on the artificial datasets. of τ = maxT /20 from the start of the episode are known and used to condition the models. Details on how conditioning our model and the baselines w.r.t. starts of episodes are given in the appendix. 4.2 Results Results on the two artificial datasets are given in table 1. While our approach shows significant improvements over other models for NLL and CE results on the Arti1 dataset (except for CE with weak conditioning), its potential is fully exhibited on the Arti2 dataset, where embedding the history for predicting the future of diffusion looks of great importance. Indeed, in this dataset, there exists some hub nodes through which most of the diffusion episodes transit, whatever the nature of the diffusion. In that case, the path of the diffusion contains very useful information that can be leveraged to predict infections after the hub node: the infection of the hub node is a necessary condition for the infection of its successors, but not sufficient since this node is triggered in various kinds of situations. Depending on who transmitted the content to it, different successors are infected then. Markovian cascade models such as CTIC or embCTIC cannot model this since infection probabilities only depend on disjoint past events of infection, not on paths taken by the propagated content. RNN-based models are better armed for this, but their performances are undermined by their way of aggregating past information. Attention mechanisms of CYAN and DAN attempt to overcome this, but it looks quite unstable with errors accumulating through time. Our approach appears as an effective compromise between both worlds, by embedding past as RNN approaches, while maintaining the bayesian cascade structures of the data. Its results on the INF measure are very great compared to the other approaches. This is especially true on the Arti2 dataset, which highlights its very good ability for uncovering the dynamics of diffusion, even for such complex problems with strong entanglement between diffusions of different natures. The good behavior of the approach is not only observed on the artificial datasets, which have been generated by the cascade model of CTIC on a graph of relationships, but also on 10 0 NLL 31,03 rnn 16,82 cyan 21,36 cyan-cov 18,47 dan ctic 27,70 embCTIC 15,98 recCTIC 15,67 1 26,18 11,56 16,83 13,52 22,07 10,31 10,30 2 24,15 9,32 14,50 11,43 19,20 7,92 7,86 3 23,02 8,03 13,31 10,29 17,74 6,75 6,74 0 CE 0,46 rnn 0,43 cyan 0,43 cyan-cov 0,44 dan ctic 0,45 embCTIC 0,43 recCTIC 0,43 1 0,28 0,25 0,23 0.25 0,31 0,31 0,27 2 0,24 0,21 0,20 0,22 0,20 0,21 0,17 3 0,22 0,19 0,17 0,19 0,16 0,17 0,14 Table 2: Negative Log-Likelihood (NLL) and Cross Entropy of Infections (CE) on Digg. 0 NLL 27,58 rnn 29,59 cyan 27,50 cyan-cov 32,35 dan ctic 23,92 embCTIC 24,71 recCTIC 21,72 1 28,98 30,04 29,12 25,02 17,88 18,02 14,08 2 18,62 30,04 29,12 21,97 13,31 13,58 11,29 3 17,15 18,79 18,55 20,39 12,28 12,39 10,34 0 CE 0,59 rnn 0,59 cyan 0,59 cyan-cov dan 0,58 ctic 0,58 embCTIC 0,59 0,59 recCTIC 1 0,37 0,37 0,36 0,26 0,25 0,26 0,24 2 0,30 0,31 0,30 0,26 0,31 0,30 0,21 3 0,28 0,29 0,28 0,24 0,28 0,28 0,20 Table 3: Negative Log-Likelihood (NLL) and Cross Entropy of Infections (CE) on Weibo. real-world datasets. Tables 2 to 4 report results on the three real-world datasets. In these tables, we observe that RNN based approaches have more difficulties to model test episodes than cascade based ones. The attention mechanism of the CYAN and DAN approaches allow them to get sometimes closer to the cascade based results (especially on Digg), but their performances are very variable from a dataset to another. These methods are good for the task they were initially designed - predicting the directly next infection (this had been observed in our experimentations)-, but not for modeling or long term prediction purposes. This is a strong limitation since the directly next infection does not help much to understand the dynamics and to predict the future of a diffusion. Our approach obtains better results than all other methods in most of settings, especially for the dynamics modelling task (NLL), though infection prediction results (CE) are also usually good compared with its competi- tors. Interestingly, while embCTIC usually beats CTIC, recCTIC often obtains even better results. This validates that the history of nodes in the diffusion has a great importance for capturing the main dynamics of the network. Thanks to the black-box inference process and the recurrent mechanism of our proposal, the propositional distribution qD is encouraged to resemble the conditionnal probability of the full ancestors vector. Regarding the results, the inference process looks to have actually converged toward useful trajectories. This enables the model to adapt distributions regarding the diffusion trajectory during learning. This also allows the model to simulate more consistent cascades regarding sources of diffusion. 0 NLL 112,3 rnn 115,2 cyan 95,58 cyan-cov 91,70 dan ctic 52,70 embCTIC 54,18 recCTIC 50,11 1 118,2 113,1 95,05 89,97 55,54 52,29 49,34 2 110,4 109,2 93,64 86,19 48,48 49,68 48,35 3 103,6 102,1 90,20 78,91 44,33 45,15 42,20 0 CE 1,68 rnn 1,66 cyan 1,61 cyan-cov 1,59 dan ctic 1,33 embCTIC 1,59 1,51 recCTIC 1 1,66 1,64 1,59 1,58 1,68 1,66 1,60 2 1,59 1,59 1,52 1,58 1,60 1,57 1,49 3 1,51 1,49 1,39 1,44 1,46 1,39 1,36 Table 4: Negative Log-Likelihood (NLL) and Cross Entropy of Infections (CE) on Meme- tracker. 11 5 Conclusion We proposed a recurrent cascade-based diffusion modeling approach, which is at the cross- roads of cascade-based and RNN approaches. It leverages the best of both worlds with an ability to embed the history of diffusion for prediction while still capturing the tree depen- dencies underlying the diffusion in network. Results validate the approach both for modeling and prediction tasks. In this work, we based the sampling of trajectories on a filtering approach where only the past observations are considered for the inference of the infector of a node. Outgoing works concern the development of an inductive variational distribution that rely on whole observed episodes for inference. References Simon Bourigault, Sylvain Lamprier, and Patrick Gallinari. Representation learning for in- formation diffusion through social networks: an embedded cascade model. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, San Fran- cisco, CA, USA, February 22-25, 2016, pp. 573 -- 582, 2016. doi: 10.1145/2835776.2835817. URL http://doi.acm.org/10.1145/2835776.2835817. Nan Du, Hanjun Dai, Rakshit Trivedi, Utkarsh Upadhyay, Manuel Gomez-Rodriguez, and Le Song. Recurrent marked temporal point processes: Embedding event his- tory to vector. In Proceedings of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '16, pp. 1555 -- 1564, New York, NY, USA, 2016. ACM. ISBN 978-1-4503-4232-2. doi: 10.1145/2939672.2939875. URL http://doi.acm.org/10.1145/2939672.2939875. Mehrdad Farajtabar, Manuel Gomez-Rodriguez, Nan Du, Mohammad Zamani, Hongyuan Source identification in diffusion net- URL CoRR, abs/1501.06582, 2015. Zha, and Le Song. works from partially observed cascades. http://arxiv.org/abs/1501.06582. Back to the past: K. Fu, Chung hong Chan, and M. Chau. Assessing censorship on microblogs in china: Dis- criminatory keyword analysis and the real-name registration policy. Internet Computing, IEEE, 17(3):42 -- 50, May 2013. ISSN 1089-7801. doi: 10.1109/MIC.2013.28. Jacob Goldenberg, Barak Libai, and Eitan Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters, 12(3):211 -- 223, 2001. Manuel Gomez-Rodriguez, David Balduzzi, and Bernhard Scholkopf. Uncovering the tem- poral dynamics of diffusion networks. In Proceedings of the 28th International Conference on Machine Learning (ICML-11), ICML '11, pp. 561 -- 568. ACM, 2011. Daniel Gruhl, R. Guha, David Liben-Nowell, and Andrew Tomkins. Information diffusion through blogspace. In Proceedings of the 13th International Conference on World Wide Web, WWW '04, pp. 491 -- 501, New York, NY, USA, 2004. ACM. ISBN 1-58113-844-X. Adrien Guille, Hakim Hacid, Cecile Favre, and Djamel A. Zighed. Information diffusion in online social networks: A survey. SIGMOD Rec., 42(2):17 -- 28, July 2013. ISSN 0163-5808. doi: 10.1145/2503792.2503797. URL http://doi.acm.org/10.1145/2503792.2503797. Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. Diederik P Kingma and Max Welling. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114, 2013. 12 R. G. Krishnan, U. Shalit, and D. Sontag. Structured Inference Networks for Nonlinear State Space Models. ArXiv e-prints, September 2016. Sylvain Lamprier, Simon Bourigault, and Patrick Gallinari. cascade diffusion models: Analys. Mining, 6(1):93:1 -- 93:16, 2016. doi: https://doi.org/10.1007/s13278-016-0406-1. focus on partial orders of infections. Influence learning for Social Netw. URL 10.1007/s13278-016-0406-1. Jure Leskovec, Lars Backstrom, and Jon Kleinberg. Meme-tracking and the dynamics of the news cycle. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp. 497 -- 506, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-495-9. doi: 10.1145/1557019.1557077. Cheng Li, Jiaqi Ma, Xiaoxiao Guo, and Qiaozhu Mei. Deepcas: CoRR, abs/1611.05373, 2016. an end-to- URL end predictor of http://arxiv.org/abs/1611.05373. information cascades. Chris J. Maddison, Andriy Mnih, and Yee Whye Teh. The concrete distribution: A con- tinuous relaxation of discrete random variables. CoRR, abs/1611.00712, 2016. URL http://arxiv.org/abs/1611.00712. Giang Hoang Nguyen, John Boaz Lee, Ryan A. Rossi, Nesreen K. Ahmed, Eunyee Koh, and Sungchul Kim. Continuous-time dynamic network embeddings. In Compan- ion Proceedings of the The Web Conference 2018, WWW '18, pp. 969 -- 976, Republic and Canton of Geneva, Switzerland, 2018. International World Wide Web Conferences Steering Committee. ISBN 978-1-4503-5640-4. doi: 10.1145/3184558.3191526. URL https://doi.org/10.1145/3184558.3191526. Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk: Online learning of social representations. CoRR, abs/1403.6652, 2014. URL http://arxiv.org/abs/1403.6652. R. Ranganath, S. Gerrish, and D. M. Blei. Black Box Variational Inference. ArXiv e-prints, December 2014. Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. Prediction of information diffusion probabilities for independent cascade model. In Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III, KES '08, pp. 67 -- 75. Springer-Verlag, 2008. Kazumi Saito, Masahiro Kimura, Kouzou Ohara, and Hiroshi Motoda. Learning continuous- time information diffusion model for social behavioral data analysis. In Proceedings of the 1st Asian Conference on Machine Learning: Advances in Machine Learning, ACML '09, pp. 322 -- 337, Berlin, Heidelberg, 2009. Springer-Verlag. ISBN 978-3-642-05223-1. Yong Shi, Minglong Lei, Peng Zhang, and Lingfeng Niu. Diffusion based network embedding. CoRR, abs/1805.03504, 2018. URL http://arxiv.org/abs/1805.03504. Kai Sheng Tai, Richard Socher, and Christopher D. Manning. Improved semantic represen- tations from tree-structured long short-term memory networks. CoRR, abs/1503.00075, 2015. URL http://arxiv.org/abs/1503.00075. Greg Ver Steeg and Aram Galstyan. Information-theoretic measures of influence based on content dynamics. In Proceedings of the sixth ACM international conference on Web search and data mining, WSDM '13, pp. 3 -- 12, New York, NY, USA, 2013. ACM. ISBN 978-1-4503-1869-3. doi: 10.1145/2433396.2433400. Jia Wang, Vincent W. Zheng, Zemin Liu, and Kevin Chen-Chuan Chang. Topological recurrent neural network for diffusion prediction. CoRR, abs/1711.10162, 2017a. URL http://arxiv.org/abs/1711.10162. 13 Yongqing Wang, Huawei Shen, Shenghua Liu, Jinhua Gao, and Xueqi Cheng. Cas- In Pro- the Twenty-Sixth International Joint Conference on Artificial Intelli- URL cade dynamics modeling with attention-based recurrent neural network. ceedings of gence, https://doi.org/10.24963/ijcai.2017/416. IJCAI-17, pp. 2985 -- 2991, 2017b. 10.24963/ijcai.2017/416. doi: Zhitao Wang, Chengyao Chen, and Wenjie Li. Attention network for information diffusion prediction. In Companion Proceedings of the The Web Conference 2018, WWW '18, pp. 65 -- 66, Republic and Canton of Geneva, Switzerland, 2018. International World Wide Web Conferences Steering Committee. ISBN 978-1-4503-5640-4. doi: 10.1145/3184558. 3186931. URL https://doi.org/10.1145/3184558.3186931. Yuan Zhang, Tianshu Lyu, and Yan Zhang. Cosine: Community-preserving social network embedding from information diffusion cascades. In AAAI, 2018. 6 Appendix 6.1 Joint Probability In this section, we detail the derivation of p(D, I) whose formulation is given in equation 11. For each infected node at position i, we need to compute: • the probability for U D i for being infected at its time of infections given the nodes D<i previously infected in D and the states associated to these nodes; • the probability of the ancestor index Ii given the i-th infection Di, and the previous infections D<i associated to their states zD <i; • the probability that not infected nodes are actually not infected by the i-th infected node given its state. This gives: p(D, I) = × × × = p(D0D<0, zD <0)p(I0D≤0, zD p(D1D<1, zD <1)p(I1D≤1, zD p(D2D<2, zD <2)p(I2D≤2, zD ... <0) Qv6∈U D <1) Qv6∈U D <2) Qv6∈U D p(v 6∈ U DD0, zD 0 ) (15) p(v 6∈ U DD1, zD 1 ) p(v 6∈ U DD2, zD 2 ) p(DD−1D<D−1, zD <D−1)p(ID−1D≤D−1, zD <D−1) p(v 6∈ U DDD−1, zD D−1) Qv6∈U D D−1 Qi=1 p(DiD<i, I<i) p(IiD≤i, I<i) Qv6∈U D p(v 6∈ U DD≤D−1, I) 6.2 Generation Process The generation process of our model is given in algorithm 1. The process iterates while there remains some nodes in a set of infectious nodes (initialized with u0). ⊕ denotes the concatenation between two lists. At each iteration, the process selects the infectious node u with minimal time-stamp of infection (all time-stamps but tD u0 are initialized to ∞), removes it from the infectious set and records its infector and infection time-stamp in the cascade. Then, for each node v with time-stamp greater than the one of u, u attempts to infects v according to the probability ku,v(zD u ) (computed with eq 3). If it succeeds, v is inserted 14 u,v. If the new time t for v is lower than its stored time tD in the set of infectious nodes and a time t is sampled for v from an exponential law with parameter rD v , this new time is v , u is stored as the infector of v in the f rom table (used to build I D) and the stored in tD new state zD v is computed according to its new infector u. The generation process outputs a cascade structure (as described in the introduction of the previous section). From the classical CTIC, the only changes are at lines 12, 14 and 19, respectively for the computation of ku,v, ru,v and zD v . Algorithm 1: Cascade Generation Process 1 Input: Θ, U 2 for u ∈ U do 3 tD u = ∞ 4 end 5 U D = (); I D = (); tD 6 while Inf ectious 6= ∅ do u0 = 0; f romu0 = 0; Inf ectious = {u0}; 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 u ← arg min x∈Inf ectious tD x ; Inf ectious ← Inf ectious \ {u}; U D ← U D ⊕ u ; I D ← I D ⊕ f romu ; v > tD for v ∈ U : tD u do x ∼ Bernouilli (ku,v(zu)); if x == 1 then x ∼ Exp (ru,v); t ← tD if t < tD u + t; v then tD v ← t; f romv ← U D − 1; zv = fφ(zu, ω(f ) Inf ectious ← Inf ectious ∪ {v}; v ); end end end 24 end 25 Output: C D = (U D, (tD u )u∈U , I D); 6.3 Learning Process The learning process of our model is depicted in algorithm 2. In this algorithm, the function makeBins first creates minibatches by ordering D in decreasing length and cutting this or- dered list in bins of batchSize episodes each. Each bin contains 3 matrices with batchSize rows (except in the last bin which contains matrices for the remaining D%batchSize episodes): • Inf : a matrix where the cell (i, j) contains the j-infected node in the i-th episode of the bin, or −1 if the corresponding episode contains less than j infected nodes. The width of the matrix is equal to the number of infected nodes in the longest episode in the bin (the episode in the first row of the matrix); • T imes: a matrix where the cell (i, j) contains the infection time-stamp of the j-infected node in the i-th episode of the bin, or −1 if the corresponding episode contains less 15 than j infected nodes. The width of the matrix is equal to the number of infected nodes in the longest episode in the bin (the episode in the first row of the matrix); • N otInf : a binary matrix with U columns where the cell (i, j) equals 0 if the node j is infected in the i-the episode of the bin, 1 otherwise; At each epoch, the algorithm iterates on every bin. For each bin, it first initializes the states of the infected nodes using a function initStates which produces a tensor z of nbRows(Inf ) matrices nbCols(Inf ) × d whose each row is filled by z0 (with nbRows(X) and nbCols(X) respectively the number of rows and columns in matrix X). For every step t of infection in the bin, the prosess first determines in mask the rows of the matrices which correspond to not ended episodes (T imes[:, t] refers to the column t of T imes). Then, if the step is not the initial step t = 0, it uses functions computeLogA and computeLogB with nodes previously infected for each episode Inf [mask, : t] associated to their corresponding states z[mask, : t]. While the function computeLogA returns a nbRow(Inf [mask]) × t matrix where the cell (i, j) contains the log-probability for the j-th node in the i-th episode to infect Inf [i, t] at its infection time-stamp (using a matrix version of equation 5), the function computeLogB returns a same shape matrix where the cell (i, j) contains the log- probability that the j-th node in the i-th episode does not infect Inf [i, t] before its infection time-stamp (using a matrix version of equation 6). Then, ancestors at step t are sampled from categorial distributions parameterized by P (ItD≤t, I<t) (deduced from logits A − B). From them, we compute the log-probability for each infected at step t to be actually infected at their time-stamp of infection by its corresponding sampled infector. (line 19, where sum(X, 1) is a function which returns the vector of the sums of each row from X). This quantity is added to the accumulator ll. Line 22 then computes the states for the nodes infected at step t according to the states of the sampled ancestors in u (via the function computeStates which is a matrix version of equation 2). At the end of each iteration t, the log-likelihood that not infected nodes in N otInf [mask] are actually not infected by infected nodes at step t is computed via computeLogG, which is a matrix version of equation 9. This quantity is added to the accumulator ll. At the end of the bin (when t == nbCols), a control variate baseline is computed by maintaining a list bh of the quantity vectors considered in ∇ΘL(D). The baseline b considered in the stochastic gradient for any episode D is thus equal to the average of (logp(D) − 1) for this specific episode taken over the blength previous epochs. Finally, the gradients are computed and the optimizer ADAM is used to update the pa- rameters of the model. Note that this algorithm does not use the gradient update given in eq. 14. It is based on P (ItD≤t, I<t) and P (Dt, ItD<t, I<t) for every t ∈ {0, ..., nbCols(Inf )} (rather than based on the simplification P (DtD<t, I<t) as given in eq. 13). This is equivalent but greatly more efficient since in both cases P (ItD≤t, I<t) needs to be esti- mated for sampling and P (Dt, ItD<t, I<t) is much easier to compute than P (DtD<t, I<t) (P (Dt, ItD<t, I<t) involves a simple product while P (DtD<t, I<t) involves a sum of prod- ucts). 6.4 Conditioned Models Our experiments in tables 1 to 4 include results obtained with known starts of episodes (columns 1, 2 and 3, for which τ > 1). For these cases, one need to be able to condition the models according to right-censored episodes, which we note Dτ in the following (every infected node in u ∈ U D with tD u ≥ τ is reported as not infected in Dτ ). For the NLL measure, one need to be able to compute the negative log-likelihood of the end of any episode D given the beginning Dτ (which means estimating p(DDτ )). For the CE measure, one need to estimate the probabilities of final infections in any episode D given its beginning Dτ (i.e., estimating p(u ∈ U DDτ ) via Monte-Carlo simulations). 16 Algorithm 2: Learning Process 1 Input: D, U, batchSize, nbEpochs, Θ, b length 2 bins ← makeBins(D, U, batchSize); 3 for epoch ∈ {1, ..., nbEpochs} do 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ibin ← 0; for (Inf,Times,NotInf ) in bins do ll ← (0)nbRows(Inf ); logq ← (0)nbRows(Inf ); z ← initStates(z0, nbRows(Inf ), nbCols(Inf )); for t ∈ {0, ..., nbCols(Inf )} do mask ← (T imes[:, t] >= 0); if t > 0 then A ← computeLogA(z[mask, : t], Inf [mask, : t], Inf [mask, t]); B ← computeLogB(z[mask, : t], Inf [mask, : t], Inf [mask, t]); # Sample from P (ItD≤t, I<t) u ∼ Categorical(logits = (A − B)); logq[mask] ← logq[mask] + logP i[mask, u]; # Compute P (Dt, ItD<t, I<t) H ← A[mask, u] − B[mask, u] + sum(B, 1); ll[mask] ← ll[mask] + H; z[mask, t] ← computeStates(u, z[mask, : t], Inf [mask, : t], Inf [mask, t]); end ll[mask] ← ll[mask] + computeLogG(z[mask, t], Inf [mask, t], N otInf [mask]); end bh[ibin] ← h[ibin] ⊕ (ll − logq − 1); if epoch ≥ b length then bh[ibin].pop(0); end b ← sum(bh[ibin], 1)/min(epoch + 1, b length); [sum((ll − logq − 1 − b) ∇Θlogq + ∇Θ log ll)]; ∇ΘL(D; Θ) ← 1 nbRows(Inf ) Θ ← ADAM (∇ΘL(D; Θ)); ibin ← ibin + 1; end 37 end For models RNN, CYAN and DAN which have deterministic hidden representations, the conditioning on Dτ is direct: it suffices to traverse the episode from the start to the last infected node in Dτ to obtain the full representation of the input. Then, the model can be normally used from it on the remaining of the test episode for modeling or generation purposes (except for the time-stamp of the first next event for which one has to take into account that it cannot happen before τ ). For CTIC and EmbCTIC, the conditioning is also easy since future infections from τ only depend on time-stamps of infections before τ without any need of trajectory modelling. For simulation purposes and the CE measure, the algorithm 1 can be applied with the infection time-stamps and the Inf ectious set initialized according to Dτ . Then, the only difference 17 is that infection delays are sampled from a truncated exponential in order to ensure that new infections can not occur before τ . For the NLL measure, one need to reconsider the computation of the infection probabilities from nodes infected before τ , which must take into account that infections did not happened before τ . For each node v which is not infected in Dτ , its probability aD u,v of being infected by any infected node u in Dτ is divided by the probability that u did not succeed in infecting v before τ : aDDτ u,v = ku,vru,v exp−ru,v(tD v −tD u ) ku,v exp−ru,v (τ −tD u ) +1 − ku,v if tD u < τ, ku,vru,v exp−ru,v (tD v −tD u ) otherwise. (16)   Also, for every v with tD that u does not succeed in infecting v at tD v ≥ τ and every u with tD v as: u < tD v , we rewrite the probability bD u,v bDDτ u,v = ku,v exp−ru,v(tD ku,v exp−ru,v (τ −tD v −tD u ) +1 − ku,v u ) +1 − ku,v 1 − ku,v ku,v exp−ru,v(τ −tD u ) +1 − ku,v ku,v exp−ru,v(tD v −tD u ) +1 − ku,v if tD u < τ and tD v < ∞, if tD u < τ and tD v = ∞, otherwise.   These quantities are used to compute the conditionnal likelihood p(DDτ ): p(DDτ ) = Yv∈U D ,tD v ≥τ hDDτ v Yv6∈U D gDDτ v (17) (18) = Qu∈U D bDDτ where gDDτ CTIC, the conditionnal hDDτ u,v v v and, similarly to eq.8 without the dependency in states z for is given as: hDDτ v = bDDτ x,v Qx∈U ,tD x <tD v Pu∈U ,tD u <tD v aDDτ u,v /bDDτ u,v (19) At last, for the RINF measure, the only modification is that the statistic is computed solely on nodes i ∈ U D such that tD i ≥ τ . For our model, beyond the use of conditionnal probabilities (with similar definitions than those from eq.16, 17 and 19 but with k a function depending on the state z of the emitter such as in the section 3.2), we must consider the conditionnal distribution of the ancestors vector of nodes infected before τ , hereafter noted I τ , given the input Dτ . As done for learning, I τ is sampled from our propositional distribution qDτ <i) and the measures are simple averages on a set of sampled I τ . Given S samples of I τ , the NLL is thus computed as: (I τ ) = QDτ −1 ≤i, I τ i Dτ p(I τ i=1 N LL = −(1/Dtest) XD∈Dtest log = −(1/Dtest) XD∈Dtest log 1 S 1 S S Xs=1 S Xs=1 p(DDτ , I τ,(s)) p(D, I (s)Dτ , I τ,(s)) qD(I (s)I τ,(s)) (20) (21) with qD(I (s)I τ,(s)) = qD(I (s))/qDτ (I τ,(s)) and where p(D, I (s)Dτ , I τ,(s)) is computed same manner as in section 3.2 using conditionnal versions of probability formulations (as given above for CTIC). The last derivation is obtained according to samples of full ancestor vectors 18 I, where I (s) is an ancestor vector starting with I τ,(s) for the infections before τ . Similarly, the CE measure considers marginal probabilities p(u ∈ U DDτ ) for every node u ∈ U defined as averages on simulations performed given Dτ and sampled I τ,(s) as input of the generation algorithm 1. Lastly, the INF measure is evaluated by considering: IN F = PD∈Dtest 1 (D − Dτ ) XD∈Dtest Xi∈{1,...,D−1}, t U D i ≥τ where I (s) is an ancestor vector sampled from qD. p(Ii = f r(i, D)D≤i, I (s) <i ) (22) 19
1306.6259
2
1306
2013-10-08T13:20:54
Highlighting Entanglement of Cultures via Ranking of Multilingual Wikipedia Articles
[ "cs.SI", "cs.IR", "physics.soc-ph" ]
How different cultures evaluate a person? Is an important person in one culture is also important in the other culture? We address these questions via ranking of multilingual Wikipedia articles. With three ranking algorithms based on network structure of Wikipedia, we assign ranking to all articles in 9 multilingual editions of Wikipedia and investigate general ranking structure of PageRank, CheiRank and 2DRank. In particular, we focus on articles related to persons, identify top 30 persons for each rank among different editions and analyze distinctions of their distributions over activity fields such as politics, art, science, religion, sport for each edition. We find that local heroes are dominant but also global heroes exist and create an effective network representing entanglement of cultures. The Google matrix analysis of network of cultures shows signs of the Zipf law distribution. This approach allows to examine diversity and shared characteristics of knowledge organization between cultures. The developed computational, data driven approach highlights cultural interconnections in a new perspective.
cs.SI
cs
Highlighting entanglement of cultures via ranking of multilingual Wikipedia articles Young-Ho Eom1, Dima L. Shepelyansky1,∗ 1 Laboratoire de Physique Th´eorique du CNRS, IRSAMC, Universit´e de Toulouse, UPS, F-31062 Toulouse, France ∗ E-mail: [email protected] Abstract How different cultures evaluate a person? Is an important person in one culture is also important in the other culture? We address these questions via ranking of multilingual Wikipedia articles. With three ranking algorithms based on network structure of Wikipedia, we assign ranking to all articles in 9 multilingual editions of Wikipedia and investigate general ranking structure of PageRank, CheiRank and 2DRank. In particular, we focus on articles related to persons, identify top 30 persons for each rank among different editions and analyze distinctions of their distributions over activity fields such as politics, art, science, religion, sport for each edition. We find that local heroes are dominant but also global heroes exist and create an effective net- work representing entanglement of cultures. The Google matrix analysis of network of cultures shows signs of the Zipf law distribution. This approach allows to examine diversity and shared characteristics of knowledge organization between cultures. The developed computational, data driven approach highlights cultural interconnections in a new perspective. Dated: June 26, 2013 3 1 0 2 t c O 8 ] I S . s c [ 2 v 9 5 2 6 . 6 0 3 1 : v i X r a 2 Introduction Wikipedia, the online collaborative encyclopedia, is an amazing example of human collaboration for knowledge description, characterization and creation. Like the Library of Babel, described by Jorge Luis Borges [1], Wikipedia goes to accumulate the whole human knowledge. Since every behavioral 'footprint' (log) is recorded and open to anyone, Wikipedia provides great opportunity to study various types of social aspects such as opinion consensus [2, 3], language complexity [4], and collaboration structure [5–7]. A remarkable feature of Wikipedia is its existence in various language editions. In a first approximation we can attribute each language to an independent culture, leaving for future refinements of cultures inside one language. Although Wikipedia has a neutral point of view policy, cultural bias or reflected cultural diversity is inevitable since knowledge and knowledge description are also affected by culture like other human behaviors [8–11]. Thus the cultural bias of contents [12] becomes an important issue. Similarity features between various Wikipedia editions has been discussed at [13]. However, the cross-cultural difference between Wikipedia editions can be also a valuable opportunity for a cross-cultural empirical study with quantitative approach. Recent steps in this direction, done for biographical networks of Wikipedia, have been reported in [14]. Here we address the question of how importance (ranking) of an article in Wikipedia depends on cultural diversity. In particular, we consider articles about persons. For instance, is an important person in English Wikipedia is also important in Korean Wikipedia? How about French? Since Wikipedia is the product of collective intelligence, the ranking of articles about persons is a collective evaluation of the persons by Wikipedia users. For the ranking of Wikipedia articles we use PageRank algorithm of Brin and Page [15], CheiRank and 2Drank algorithms used in [16–18], which allow to characterize the information flows with incoming and outgoing links. We also analyze the distribution of top ranked persons over main human activities attributed to politics, science, art, religion, sport, etc (all others), extending the approach developed in [17,19] to multiple cultures (languages). The comparison of different cultures shows that they have distinct dominance of these activities. We attribute belongings of top ranked persons at each Wikipedia language to different cul- tures (native languages) and in this way construct the network of cultures. The Google matrix analysis of this network allows us to find interconnections and entanglement of cultures. We believe that our computational and statistical analysis of large-scale Wikipedia networks, com- bined with comparative distinctions of different languages, generates novel insights on cultural diversity. Method We consider Wikipedia as a network of articles. Each article corresponds to a node of the network and hyperlinks between articles correspond to links of the network. For a given network, we can define adjacency matrix Aij. If there is a link (one or more quotations) from node (article) j to node (article) i then Aij = 1, otherwise, Aij = 0. The out-degree kout(j) is the number of links 3 from node j to other nodes and the in-degree kin(j) is the number of links to node j from other nodes. Google matrix The matrix Sij of Markov chain transitions is constructed from adjacency matrix Aij by nor- malizing sum of elements of each column to unity (Sij = Aij/ Pi Aij, Pi Sij = 1) and replacing columns with only zero elements (dangling nodes) by 1/N , with N being the matrix size. Then the Google matrix of this directed network has the form [15, 20]: Gij = αSij + (1 − α)/N . (1) In the WWW context the damping parameter α describes the probability (1 − α) to jump to any article (node) for a random walker. The matrix G belongs to the class of Perron-Frobenius operators, it naturally appears in dynamical systems [21]. The right eigenvector at λ = 1, which is called the PageRank, has real non-negative elements P (i) and gives a probability P (i) to find a random walker at site i. It is possible to rank all nodes in a decreasing order of PageRank probability P (K(i)) so that the PageRank index K(i) sorts all N nodes i according their ranks. For large size networks the PageRank vector and several other eigenvectors can be numerically obtained using the powerful Arnoldi algorithm as described in [22]. The PageRank vector can be also obtained by a simple iteration method [20]. Here, we use here the standard value of α = 0.85 [20]. To rank articles of Wikipedia, we use three ranking algorithms based on network structure of Wikipedia articles. Detail description of these algorithms and their use for English Wikipedia articles are given in [17–19, 22]. PageRank algorithm PageRank algorithm is originally introduced for Google web search engine to rank web pages of the World Wide Web (WWW) [15]. Currently PageRank is widely used to rank nodes of network systems including scientific papers [23], social network services [24] and even biological systems [25]. Here we briefly outline the iteration method of PageRank computation. The PageRank vector P (i, t) of a node i at iteration t in a network of N nodes is given by P (i, t) = X GijP (j, t − 1) , P (i, t) = (1 − α)/N + α X AijP (j, t − 1)/kout(j) . (2) j j The stationary state P (i) of P (i, t) is the PageRank of node i. More detail information about PageRank algorithm is described in [20]. Ordering all nodes by their decreasing probability P (i) we obtain the PageRank index K(i). The essential idea of PageRank algorithm is to use a directed link as a weighted 'recommenda- tion'. Like in academic citation network, more cited nodes are considered to be more important. In addition, recommendations by highly ranked articles are more important. Therefore high PageRank nodes in the network have many incoming links from other nodes or incoming links from high PageRank nodes. 4 CheiRank algorithm While the PageRank algorithm uses information of incoming links to node i, CheiRank algorithm considers information of outgoing links from node i [16–18]. Thus CheiRank is complementary to PageRank in order to rank nodes in directed networks. The CheiRank vector P ∗(i, t) of a node at iteration time t is given by P ∗(i) = (1 − α)/N + α X AjiP ∗(j)/kin(j) (3) j We also point out that the CheiRank is the right eigenvector with maximal eigenvalue λ = 1 satisfying the equation P ∗(i) = Pj G∗ ijP ∗(j), where the Google matrix G∗ is built for the network with inverted directions of links via the standard definition of G given above. Like for PageRank, we consider the stationary state P ∗(i) of P ∗(i, t) as the CheiRank prob- ability of node i at α = 0.85. High CheiRank nodes in the network have a large out-degree. Ordering all nodes by their decreasing probability P ∗(i) we obtain the CheiRank index K ∗(i). We note that PageRank and CheiRank naturally appear in the world trade network corre- sponding to import and export in a commercial exchange between countries [26]. The correlation between PageRank and CheiRank vectors can be characterized by the cor- relator κ [16–18] defined by κ = N X P (i)P ∗(i) − 1 i (4) The value of correlator for each Wikipedia edition is represented in Table 1. All correlators are positive and distributed in the interval (1, 8). 2DRank algorithm With PageRank P (i) and CheiRank P ∗(i) probabilities, we can assign PageRank ranking K(i) and CheiRank ranking K ∗(i) to each article, respectively. From these two ranks, we can con- struct 2-dimensional plane of K and K ∗. The two dimensional ranking K2 is defined by counting nodes in order of their appearance on ribs of squares in (K, K ∗) plane with the square size grow- ing from K = 1 to K = N [17]. A direct detailed illustration and description of this algorithm is given in [17]. Briefly, nodes with high PageRank and CheiRank both get high 2DRank ranking. Data description We consider 9 editions of Wikipedia including English (EN), French (FR), German (DE), Ital- ian (IT), Spanish (ES), Dutch (NL), Russian (RU), Hungarian (HU) and Korean (KO). Since Wikipedia has various language editions and language is a most fundamental part of culture, the cross-edition study of Wikipedia can give us insight on cultural diversity. The overview summary of parameters of each Wikipedia is represented in Table 1. The corresponding networks of these 9 editions are collected and kindly provided to us by S.Vigna from LAW, Univ. of Milano. The first 7 editions in the above list represent mostly spoken European languages (except Polish). Hungarian and Korean are additional editions representing languages of not very large population on European and Asian scales respectively. 5 They allow us to see interactions not only between large cultures but also to see links on a small scale. The KO and RU editions allow us to compare views from European and Asian continents. We also note that in part these 9 editions reflect the languages present in the EC NADINE collaboration. We understand that the present selection of Wikipedia editions does represent a complete view of all 250 languages present at Wikipedia. However, we think that this selection allows us to perform the quantitative statistical analysis of interactions between cultures making a first step in this direction. To analyze these interactions we select the fist top 30 persons (or articles about persons) appearing in the top ranking list of each of 9 editions for 3 ranking algorithms of PageRank, CheiRank and 2DRank. We select these 30 persons manually analyzing each list. We attribute each of 30 persons to one of 6 fields of human activity: politics, science, art, religion, sport, and etc (here "etc" includes all other activities). In addition we attribute each person to one of 9 selected languages or cultures. We place persons belonging to other languages inside the additional culture WR (world) (e.g. Plato). Usually a belonging of a person to activity field and language is taken from the English Wikipedia article about this person. If there is no such English Wikipedia article then we use an article of a Wikipedia edition language which is native for such a person. Usually there is no ambiguity in the distribution over activities and languages. Thus Christopher Columbus is attributed to IT culture and activity field etc, since English Wikipedia describes him as "italian explorer, navigator, and colonizer". By our definition politics includes politicians (e.g. Barak Obama), emperors (e.g. Julius Caesar), kings (e.g. Charlemagne). Arts includes writers (e.g. William Shakespeare), singers (e.g. Frank Sinatra), painters (Leonardo da Vinci), architects, artists, film makers (e.g. Steven Spielberg). Science includes physicists, philosophers (e.g. Plato), biologists, mathematicians and others. Religion includes such persons as Jesus, Pope John Paul II. Sport includes sportsmen (e.g. Roger Federer). All other activities are placed in activity etc (e.g. Christopher Columbus, Yuri Gagarin). Each person belongs only to one language and one activity field. There are only a few cases which can be questioned, e.g. Charles V, Holy Roman Emperor who is attributed to ES language since from early long times he was the king of Spain. All listings of person distributions over the above categories are presented at the web page given at Supporting Information (SI) and in 27 tables given in SI. Unfortunately, we were obliged to construct these distributions manually following each person individually at the Wikipedia ranking listings. Due to that we restricted our analysis only to top 30 persons. We think that this number is sufficiently large so that the statistical fluctuations do not generate significant changes. Indeed, we find that our EN distribution over field activities is close to the one obtained for 100 top persons of English Wikipedia dated by Aug 2009 [17]. To perform additional tests we use the database of about 250000 person names in English, Italian and Dutch from the research work [14] provided to us by P.Arag´on and A.Kaltenbrunner. Using this database we were able to use computerized (automatic) selection of top 100 persons from the ranking lists and to compare their distributions over activities and languages with our case of 30 persons. The comparison is presented in SI in figures S1,S2,S3. For these 3 cultures we find that our top 30 persons data are statistically stable even if the fluctuations are larger for CheiRank lists. This is in an agreement with the fact that the CheiRank probabilities. related to the outgoing links, are more fluctuating (see discussion at [19]). 6 Of course, it would be interesting to extend the computerized analysis of personalities to a larger number of top persons and larger number of languages. However, the database of persons in various languages still should be cleaned and checked and also attribution of persons to various activities and languages still requires a significant amount of work. Due to that we present here our analysis only for 30 top persons. But we note that by itself it represents an interesting case study since here we have the most important persons for each ranking. May be the top 1000 persons would be statistically more stable but clearly a person at position 30 is more important than a one at position 1000. Thus we think that the top 30 persons already give an interesting information on links and interactions between cultures. This information can be used in future more extended studies of a larger number of persons and languages. Finally we note that the language is the primary element of culture even if, of course, culture is not reduced only to language. In this analysis we use in a first approximation an equivalence between language and culture leaving for future studies the refinement of this link which is of course much more complex. In this approximation we consider that a person like Mahatma Gandhi belongs to EN culture since English is the official language of India. A more advanced study should take into account Hindi Wikipedia edition and attribute this person to this edition. Definitely our statistical study is only a first step in Wikipedia based statistical analysis of network of cultures and their interactions. We note that any person from our top 30 ranking belongs only to one activity field and one culture. We also define local heros as those who in a given language edition are attributed to this language, and non-local heros as those who belong in a given edition to other languages. We use category WR (world) where we place persons who do not belong to any of our 9 languages (e.g. Pope John Paul II belongs to WR since his native language is Polish). Results We investigate ranking structure of articles and identify global properties of PageRank and CheiRank vectors. The detailed analysis is done for top 30 persons obtained from the global list of ranked articles for each of 9 languages. The distinctions and common characteristics of cultures are analyzed by attributing top 30 persons in each language to human activities listed above and to their native language. General ranking structure We calculate PageRank and CheiRank probabilities and indexes for all networks of considered Wikipedia editions. The PageRank and CheiRank probabilities as functions of ranking indexes are shown in Fig. 1. The decay is compatible with an approximate algebraic decrease of a type P ∼ 1/K β, P ∗ ∼ 1/K ∗β with β ∼ 1 for PageRank and β ∼ 0.6 for CheiRank. These values are similar to those found for the English Wikipedia of 2009 [17]. The difference of β values originates from asymmetric nature between in-degree and out-degree distributions, since PageRank is based on incoming edges while CheiRank is based on outgoing edges. In-degree distribution of Wikipedia editions is broader than out-degree distribution of the same edition. Indeed, the CheiRank probability is proportional to frequency of outgoing links which has a more rapid decay compared to incoming one (see discussion in [17]). The PageRank (CheiRank) 7 probability distributions are similar for all editions. However, the fluctuations of P ∗ are stronger that is related to stronger fluctuations of outgoing edges [19]. The top article of PageRank is usually USA or the name of country of a given language (FR, RU, KO). For NL we have at the top beetle, species, France. The top articles of CheiRank are various listings. Since each article has its PageRank ranking K and CheiRank ranking K ∗, we can assign two dimensional coordinates to all the articles. Fig. 2 shows the density of articles in the two dimensional plane (K, K ∗) for each Wikipedia edition. The density is computed for 100 × 100 logarithmically equidistant cells which cover the whole plane (K, K ∗). The density plot represents the locations of articles in the plane. We can observe high density of articles around line K = K ∗ + const that indicates the positive correlation between PageRank and CheiRank. However, there are only a few articles within the region of top both PageRank and CheiRank indexes. We also observe the tendency that while high PageRank articles (K < 100) have intermediate CheiRank (102 < K ∗ < 104), high CheiRank articles (K ∗ < 100) have broad PageRank rank values. Ranking of articles for persons We choose top 30 articles about persons for each edition and each ranking. In Fig. 2, they are shown by red circles (PageRank), green squares (2DRank) and cyan triangles (CheiRank). We assign local ranking RE,A (1 . . . 30) to each person in the list of top 30 persons for each edition E and ranking algorithm A. An example of E = EN and A = P ageRank are given in Table 2. From the lists of top persons, we identify the "fields" of activity for each top 30 rank person in which he/she is active on. We categorize six activity fields - politics, art, science, religion, sport and etc (here "etc" includes all other activities). As shown in Fig. 3, for PageRank, politics is dominant and science is secondarily dominant. The only exception is Dutch where science is the almost dominant activity field (politics has the same number of points). In case of 2DRank, art becomes dominant and politics is secondarily dominant. In case of CheiRank, art and sport are dominant fields. Thus for example, in CheiRank top 30 list we find astronomers who discovered a lot of asteroids, e.g. Karl Wilhelm Reinmuth (4th position in RU and 7th in DE), who was a prolific discoverer of about 400 of them. As a result, his article contains a long listing of asteroids discovered by him giving him a high CheiRank. The change of activity priority for different ranks is due to the different balance between incoming and outgoing links there. Usually the politicians are well known for a broad public, hence, the articles about politicians are pointed by many articles. However, the articles about politician are not very communicative since they rarely point to other articles. In contrast, articles about persons in other fields like science, art and sport are more communicative because of listings of insects, planets, asteroids they discovered, or listings of song albums or sport competitions they gain. Next we investigate distributions over "cultures" to which persons belong. We determined the culture of person based on the language the person mainly used (mainly native language). We consider 10 culture categories - EN, FR, DE, IT, ES, NL, RU, HU, KO and WR. Here "WR" category represents all other cultures which do not belong to considered 9 Wikipedia editions. Comparing with the culture of persons at various editions, we can assign "locality" to each 30 8 top rank persons for a given Wikipedia edition and ranking algorithm. For example, as shown in Table 2, George W. Bush belongs to "Politics", "English" and "Local" for English Wikipedia and PageRank, while Jesus belongs to "Religion", "World" WR and "Non-local". As shown in Fig. 4, regardless of ranking algorithms, main part of top 30 ranking persons of each edition belong to the culture of the edition (usually about 50%). For example, high PageRank persons in English Wikipedia are mainly English (53.3%). This corresponds to the self-focusing effect discussed in [6]. It is notable that top ranking persons in Korean Wikipedia are not only mainly Korean (56.7%) but also the most top ranking non Korean persons in Korean Wikipedia are Chinese and Japanese (20%). Although there is a strong tendency that each edition favors its own persons, there is also overlap between editions. For PageRank, on average, 23.7 percent of top persons are overlapping while for CheiRank , the overlap is quite low, only 1.3 percent. For 2DRank, the overlap is 6.3 percent. The overlap of list of top persons implies the existence of cross-cultural 'heroes'. To understand the difference between local and non-local top persons for each edition quanti- tatively, we consider the PageRank case because it has a large fraction of non-local top persons. From Eq. (2), a citing article j contributes hP (j)/kout(j)i to PageRank of a node i. So the PageRank P (i) can be high if the node i has many incoming links from citing articles j or it has incoming links from high PageRank nodes j with low out-degree kout(j). Thus we can identify origin of each top person's PageRank using the average PageRank contribution hP (j)/kout(j)i by nodes j to person i and average number of incoming edges (in-degree) kin(i) of person i . As represented in Table 3, considering median, local top persons have more incoming links than non-local top persons but the PageRank contribution of the corresponding links are lower than links of non-local top persons. This indicates that local top persons are cited more than non-local top persons but non-local top persons are cited more high weighted links (i.e. cited by important articles or by articles which don't have many citing links). Global and local heroes Based on cultural dependency on rankings of persons, we can identify global and local heroes in the considered Wikipedia editions. However, for CheiRank the overlap is very low and our statistics is not sufficient for selection of global heroes. Hence we consider only PageRank and 2DRank cases. We determine the local heroes for each ranking and for each edition as top persons of the given ranking who belongs to the same culture as the edition. Top 3 local heroes for each ranking and each edition are represented in Table 4 (PageRank), Table 5 (CheiRank) and Table 6 (2DRank), respectively. In order to identify the global heroes, we define ranking score ΘP,A for each person P and each ranking algorithm A. Since every person in the top person list has relative rank- ing RP,E,A for each Wikipedia edition E and ranking algorithm A (For instance, in Table 2, RN apoleon,EN,P ageRank = 1). The ranking score ΘP,A of a person P is give by ΘP,A = X (31 − RP,E,A) E (5) According to this definition, a person who appears more often in the lists of editions and has top ranking in the list gets high ranking score. We sort this ranking score for each algorithm. 9 In this way obtain a list of global heroes for each algorithm. The result is shown in Table 7. Napoleon is the 1st global hero by PageRank and Micheal Jackson is the 1st global hero by 2DRank. Network of cultures To characterize the entanglement and interlinking of cultures we use the data of Fig. 4 and from them construct the network of cultures. The image of networks obtained from top 30 persons of PageRank and 2DRank listings are shown in Fig. 5 (we do not consider CheiRank case due to small overlap of persons resulting in a small data statistics). The weight of directed Markov transition, or number of links, from a culture A to a culture B is given by a number of persons of a given culture B (e.g FR) appearing in the list of top 30 persons of PageRank (or 2DRank) in a given culture A (e.g. EN). Thus e.g. for transition from EN to FR in PageRank we find 2 links (2 French persons in PageRank top 30 persons of English Wikipedia); for transition from FR to EN in PageRank we have 3 links (3 English persons in PageRank top 30 persons of French Wikipedia). The transitions inside each culture (persons of the same language as language edition) are omitted since we are analyzing the interlinks between cultures. Then the Google matrix of cultures is constructed by the standard rule for the directed networks: all links are treated democratically with the same weight, sum of links in each column is renormalized to unity, α = 0.85. Even if this network has only 10 nodes we still can find for it PageRank and CheiRank probabilities P and P ∗ and corresponding indexes K and K ∗. The matrix elements of G matrix, written in order of index K, are shown in Fig. 6 for the corresponding networks of cultures presented in Fig. 5. We note that we consider all cultures on equal democratic grounds. The decays of PageRank and CheiRank probabilities with the indexes K, K ∗ are shown in Fig. 7 for the culture networks of Fig. 5. On a first glance a power decay like the Zipf law [27] P ∼ 1/K looks to be satisfactory. The formal power law fit P ∼ 1/K z, P ∗ ∼ 1/(K ∗)z ∗ , done in log − log-scale for 1 ≤ K, K ∗ ≤ 10, gives the exponents z = 0.85±0.09, z ∗ = 0.45±0.09 (Fig. 7a), z = 0.88 ± 0.10, z ∗ = 0.77 ± 0.16 (Fig. 7b). However, the error bars for these fits are relatively large. Also other statistical tests (e.g. the Kolmogorov-Smirnov test, see details in [28]) give low statistical accuracy (e.g. statistical probability p ≈ 0.2; 0.1 and p ≈ 0.01; 0.01 for exponents z, z ∗ = 0.79, 0.42 and 0.75, 0.65 in Fig. 7a and Fig. 7b respectively). It is clear that 10 cultures is too small to have a good statistical accuracy. Thus, a larger number of cultures should be used to check the validity of the generalized Zipf law with a certain exponent. We make a conjecture that the Zipf law with the generalized exponents z, z ∗ will work in a better way for a larger number of multilingual Wikipedia editions which now have about 250 languages. The distributions of cultures on the PageRank - CheiRank plane (K, K ∗) are shown in Fig. 8. For the network of cultures constructed from top 30 PageRank persons we obtain the following ranking. The node WR is located at the top PageRank K = 1 and it stays at the last CheiRank position K ∗ = 10. This happens due to the fact that such persons as Carl Linnaeus, Jesus, Aristotle, Plato, Alexander the Great, Muhammad are not native for our 9 Wikipedia editions so that we have many nodes pointing to WR node, while WR has no outgoing links. The next node in PageRank is FR node at K = 2, K ∗ = 5, then DE node at K = 3, K ∗ = 4 and only then we find EN node at K = 4, K ∗ = 7. The node EN is not at all at top PageRank positions since it has many American politicians that does not count for links between cultures. After 10 the world WR the top position is taken by French (FR) and then German (DE) cultures which have strong links inside the continental Europe. However, the ranking is drastically changed when we consider top 30 2DRank persons. Here, the dominant role is played by art and science with singers, artists and scientists. The world WR here remains at the same position at K = 1, K ∗ = 10 but then we obtain English EN (K = 2, K ∗ = 1) and German DE (K = 3, K ∗ = 5) cultures while FR is moved to K = K ∗ = 7. Discussion We investigated cross-cultural diversity of Wikipedia via ranking of Wikipedia articles. Even if the used ranking algorithms are purely based on network structure of Wikipedia articles, we find cultural distinctions and entanglement of cultures obtained from the multilingual editions of Wikipedia. In particular, we analyze raking of articles about persons and identify activity field of persons and cultures to which persons belong. Politics is dominant in top PageRank persons, art is dominant in top 2DRank persons and in top CheiRank persons art and sport are dominant. We find that each Wikipedia edition favors its own persons, who have same cultural background, but there are also cross-cultural non-local heroes, and even "global heroes". We establish that local heroes are cited more often but non-local heroes on average are cited by more important articles. Attributing top persons of the ranking list to different cultures we construct the network of cultures and characterize entanglement of cultures on the basis of Google matrix analysis of this directed network. We considered only 9 Wikipedia editions selecting top 30 persons in a "manual" style. It would be useful to analyze a larger number of editions using an automatic computerized selection of persons from prefabricated listing in many languages developing lines discussed in [14]. This will allow to analyze a large number of persons improving the statistical accuracy of links between different cultures. The importance of understanding of cultural diversity in globalized world is growing. Our computational, data driven approach can provide a quantitative and efficient way to understand diversity of cultures by using data created by millions of Wikipedia users. We believe that our results shed a new light on how organized interactions and links between different cultures. Acknowledgments We thank Sebastiano Vigna [29] who kindly provided to us the network data of 9 Wikipedia editions, collected in the frame of FET NADINE project. We thank Pablo Arag´on and An- dreas Kaltenbrunner for the list of persons in EN, IT, NL which we used to obtain supporting Figs.S1,S2,S3. 11 Supporting Information Supporting Information file presents Figures S1, S2, S3 showing comparison between probability distributions over activity fields and language for top 30 and 100 persons for EN, IT, NK respec- tively; tables S1, S2, ... S27 showing top 30 persons in PageRank, CheiRank and 2DRank for all 9 Wikipedia editions. All names are given in English. Supplementary methods, tables, ranking lists and figures are available at http://www.quantware.ups-tlse.fr/QWLIB/wikiculturenetwork/; data sets of 9 hyperlink networks are available at [29] by a direct request addressed to S.Vigna. References 1. Borges JL (1962) The Library of Babel in Ficciones, Grove Press, New York 2. Kaltenbrunner A, Laniado D (2012) There is no deadline - time evolution of Wikipedia discussions, Proc. of the 8th Intl. Symposium on Wikis and Open Collaboration, Wik- iSym12, Linz 3. Torok J, Iniguez G, Yasseri T, San Miguel M, Kaski K, et al. (2013) Opinion, conflicts and consensus: modeling social dynamics in a collaborative enviroment Phys. Rev. Lett. 110: 088701 4. Yasseri T, Kornai A, Kert´esz J (2012) A practical approach to language complexity: a Wikipedia case study PLoS ONE, 7: e48386 5. Brandes U, Kenis P, Lerner U, van Raaij D (2009) Network analysis of collaboration structure in Wikipedia Proc. 18th Intl. Conf. WWW, :731 6. Hecht B, Gergle D (2009) Measuring self-focus bias in community-maintained knowledge repositories Proc. of the Fourth Intl Conf. Communities and technologies, ACM, New York :11 7. Nemoto K, Gloor PA (2011) Analyzing cultural differences in collaborative innovation networks by analyzing editing behavior in different-language Wikipedias Procedia - Social and Behavioral Sciences 26: 180 8. Norenzayan A (2011) Explaining human behavioral diversity, Science, 332: 1041 9. Gelfand MJ, Raver JL, Nishii L, Leslie LM, Lun J et al. (2011) Differences between tight and loose cultures: a 33-nation study, Science, 332: 1100 10. Yasseri T, Spoerri A, Graham M, Kert´esz J (2013) The most controversial topics in Wikipedia: a multilingual and geographical analysis arXiv:1305.5566 [physics.soc-ph] 11. UNESCO World Report (2009) Investing in cultural diversity and intercultural dialogue, Available: http://www.unesco.org/new/en/culture/resources/report/the-unesco-world-report-on-cultural-diversity 12 12. Callahan ES, Herriing SC (2011) Cultural bias in Wikipedia content on famous persons, Journal of the American society for information science and technology 62: 1899 13. Warncke-Wang M, Uduwage A, Dong Z, Riedl J (2012) In search of the ur-Wikipedia: universality, similarity, and translation in the Wikipedia inter-language link network, Pro- ceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration (WikiSym 2012), ACM, New York No 20 14. Arag´on P, Laniado D, Kaltenbrunner A, Volkovich Y (2012) Biographical social networks on Wikipedia: a cross-cultural study of links that made history, Proceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration (WikiSym 2012), ACM, New York No 19; arXiv:1204.3799v2[cs.SI] 15. Brin S, Page L (1998) The anatomy of a large-scale hypertextual Web search engine Com- puter Networks and ISDN Systems 30: 107 16. Chepelianskii AD (2010) Towards physical laws for software architecture arXiv:1003.5455 [cs.SE] 17. Zhirov AO, Zhirov OV, Shepelyansky DL (2010) Two-dimensional ranking of Wikipedia articles, Eur. Phys. J. B 77: 523 18. Ermann L, Chepelianskii AD, Shepelyansky DL (2012) Toward two-dimensional search engines, J. Phys. A: Math. Theor. 45: 275101 19. Eom YH, Frahm KM, Benc´zur A, Shepelyansky DL (2013) Time evolution of Wikipedia network ranking arXiv:1304.6601 [physics.soc-ph] 20. Langville AM, Meyer CD (2006) Google's PageRank and Beyond: The Science of Search Engine Rankings, Princeton University Press, Princeton 21. Brin M, Stuck G (2002) Introduction to dynamical systems, Cambridge Univ. Press, Cam- bridge, UK 22. Ermann L, Frahm KM, Shepelyansky DL (2013) Spectral properties of Google matrix of Wikipedia and other networks, Eur. Phys. J. D 86: 193 23. Chen P, Xie H, Maslov S, Redner S (2007) Finding scientific gems with Google´s PageRank algorithm Jour. Informetrics, 1: 8 24. Kwak H, Lee C, Park H, Moon S (2010) What is Twitter, a social network or a news media?, Proc. 19th Int. Conf. WWW2010, ACM, New York :591 25. Kandiah V, Shepelyansky DL (2013) Google matrix analysis of DNA sequences, PLoS ONE 8(5): e61519 13 26. Ermann L, Shepelyansky DL (2011) Google matrix of the world trade network, Acta Phys- ica Polonica A 120(6A), A158 27. Zipf GK (1949) Human behavior and the principle of least effort, Addison-Wesley, Boston 28. Clauset A, Shalizi CR, Newman MEJ (2009) Power-law distributions in empirical data, SIAM Rev 51(4): 661 29. Vigna S, personal web page, Available: http://vigna.dsi.unimi.it/ ) K P ( 10-2 10-4 10-6 10-8 10-10 10-12 10-14 10-16 ) * K ( * P (a) 14 EN FR DE IT ES NL RU HU KO (b) 10-2 10-4 10-6 10-8 10-10 10-12 10-14 10-16 100 101 102 103 104 105 106 107 100 101 102 103 104 105 106 107 K K* Figure 1. PageRank probability P (K) as function of PageRank index K (a) and CheiRank probability P ∗(K ∗) as function of CheiRank index K ∗ (b). For a better visualization each PageRank P and CheiRank P ∗ curve is shifted down by a factor 100 (EN), 101 (FR), 102 (DE), 103 (IT), 104 (ES), 105 (NL), 106 (RU), 107 (HU), 108 (KO). 15 Figure 2. Density of Wikipedia articles in the PageRank ranking K versus CheiRank ranking K ∗ plane for each Wikipedia edition. The red points are top PageRank articles of persons, the green points are top 2DRank articles of persons and the cyan points are top CheiRank articles of persons. Panels show: English (top-left), French (top-center), German (top-right), Italian (middle-left), Spanish (middle-center), Dutch (middle-left), Russian (bottom-left), Hungarian (bottom-center), Korean (bottom-right). Color bars shown natural logarithm of density, changing from minimal nonzero density (dark) to maximal one (white), zero density is shown by black. 16 Figure 3. Distribution of top 30 persons in each rank over activity fields for each Wikipedia edition. Panels correspond to (a) PageRank, (b) 2DRank, (3) CheiRank. The color bar shows the values in percents. Figure 4. Distributions of top 30 persons over different cultures corresponding to Wikipedia editions, "WR" category represents all other cultures which do not belong to considered 9 Wikipedia editions. Panels show ranking by (a) PageRank, (b) 2DRank, (3) CheiRank. The color bar shows the values in percents. Table 1. Considered Wikipedia networks from language editions: English (EN), French (FR), German (DE), Italian (IT), Spanish (ES), Dutch (NL), Russian (RU), Hungarian (HU), Korean (KO). Here NA is number of articles, NL is number of hyperlinks between articles, κ is the correlator between PageRank and CheiRank. Date represents the time in which data are collected. Edition NA EN FR DE IT ES NL RU HU KO 3920628 1224791 1396293 917626 873149 1034912 830898 217520 323461 NL 92878869 30717338 32932343 22715046 20410260 14642629 17737815 5067189 4209691 κ Date 3.905562 Mar. 2012 3.411864 Feb. 2012 3.342059 Mar. 2012 7.953106 Mar. 2012 3.443931 Feb. 2012 7.801457 Feb. 2012 2.881896 Feb. 2012 2.638393 Feb. 2012 1.084982 Feb. 2012 DE IT (a) FR EN DE IT (b) FR ES NL EN WR RU WR KO HU KO HU 17 ES RU NL Pajek Paje Figure 5. Network of cultures obtained from 9 Wikipedia languages and the remaining world (WR) selecting 30 top persons of PageRank (a) and 2DRank (b) in each culture. The link width and darkness are proportional to a number of foreign persons quoted in top 30 of a given culture, the link direction goes from a given culture to cultures of quoted foreign persons, quotations inside cultures are not considered. The size of nodes is proportional to their PageRank. (a) WR FR DE EN IT RU ES KO HU NL 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 (b) WR EN DE IT RU ES FR NL KO HU 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 WR FR DE EN IT RU ES KO HU NL WR EN DE IT RU ES FR NL KO HU Figure 6. Google matrix of network of cultures from Fig. 5, shown respectively for panels (a), (b). The matrix elements Gij are shown by color at the damping factor α = 0.85, index j is chosen as the PageRank index K of PageRank vector so that the top cultures with K = K ′ = 1 are located at the top left corner of the matrix. 100 ) * K ( * P , ) K P ( 10-1 (a) 10-2 100 100 ) * K ( * P , ) K P ( 10-1 (b) 101 10-2 100 18 101 K, K* K, K* Figure 7. Dependence of probabilities of PageRank P (red) and CheiRank P ∗ (blue) on corresponding indexes K and K ∗. The probabilities are obtained from the network and Google matrix of cultures shown in Fig. 5 and Fig. 6 for corresponding panels (a), (b). The straight lines indicate the Zipf law P ∼ 1/K; P ∗ ∼ 1/K ∗. 10 W R (b) * K (a) * K 10 W R 9 8 7 6 5 4 3 2 1 E N F R D E K O R U H U N L I T E S 1 2 3 4 5 K 6 7 8 9 10 9 8 7 6 5 4 3 2 1 K O H U F R E S D E I T R U N L E N 2 1 3 4 5 K 6 7 8 9 10 Figure 8. PageRank versus CheiRank plane of cultures with corresponding indexes K and K ∗ obtained from the network of cultures for corresponding panels (a), (b). Table 2. Example of list of top 10 persons by PageRank for English Wikipedia with their field of activity and native language. 19 REN,P ageRank 1 2 3 4 5 6 7 8 9 10 Person Napoleon Carl Linnaeus George W. Bush Barack Obama Elizabeth II Jesus William Shakespeare Aristotle Adolf Hitler Bill Clinton Art Culture Field FR Politics WR Science EN Politics EN Politics Politics EN Religion WR EN WR DE EN Science Politics Politics Locality Non-local Non-local Local Local Local Non-local Local Non-local Non-local Local Table 3. PageRank contribution per link and in-degree of PageRank local and non-local heroes i for each edition. [P (j)/k(j)out]L and [P (j)/k(j)out]N L are median PageRank contribution of a local hero L and non-local hero N L by a article j which cites local heroes L and non-local heroes N L respectively. [k(L)in] and [k(N L)in] are median number of in-degree k(L)in and k(N L)in of local hero L and non-local hero N L, respectively. NLocal is number local heroes in given edition. Edition NLocal [P (j)/k(j)out]L [P (j)/k(j)out]N L EN FR DE IT ES NL RU HU KO 16 15 14 11 4 2 18 12 17 1.43 × 10−8 3.88 × 10−8 3.48 × 10−8 7.00 × 10−8 5.44 × 10−8 7.77 × 10−8 6.67 × 10−8 21.1 × 10−8 16.6 × 10−8 < < < < < < < < < 2.18 × 10−8 5.69 × 10−8 4.29 × 10−8 7.21 × 10−8 8.58 × 10−8 14.4 × 10−8 10.2 × 10−8 32.3 × 10−8 35.5 × 10−8 [k(L)in] [k(N L)in] 5.3 × 103 > 3.1 × 103 2.6 × 103 > 2.0 × 103 2.6 × 103 > 2.1 × 103 1.9 × 103 > 1.5 × 103 2.2 × 103 > 1.2 × 103 1.0 × 103 > 6.7 × 102 1.7 × 103 > 1.5 × 103 8.1 × 102 > 5.3 × 102 4.7 × 102 > 2.3 × 102 Table 4. List of local heroes by PageRank for each Wikipedia edition. All names are represented by article titles in English Wikipedia. Here "William the Silent" is the third local hero in Dutch Wikipedia but he is out of top 30 persons. 20 Edition EN FR DE IT ES NL RU HU KO 1st George W. Bush Napoleon Adolf Hitler Augustus Charles V, Holy Roman Emperor William I of the Netherlands Peter the Great Matthias Corvinus Gojong of the Korean Empire 2nd Barack Obama Louis XIV of France Martin Luther Dante Alighieri Philip II of Spain 3rd Elizabeth II Charles de Gaulle Immanuel Kant Julius Caesar Francisco Franco Beatrix of the Netherlands William the Silent Alexander Pushkin Joseph Stalin Szent´agothai J´anos Sejong the Great Stephen I of Hungary Park Chung-hee Table 5. List of local heroes by CheiRank for each Wikipedia edition. All names are represented by article titles in English Wikipedia. Edition 1st C. H. Vijayashankar Jacques Davy Duperron Harry Pepl Nduccio Che Guevara Hans Renders EN FR DE IT ES NL RU HU KO 2nd Matt Kelley Jean Baptiste Ebl´e Marc Zwiebler Vincenzo Olivieri Arturo Mercado Julian Jenner 3rd William Shakespeare (inventor) Marie-Magdeleine Aym´e de La Chevreli`ere Eugen Richter Mina (singer) Francisco Goya Marten Toonder Aleksander Vladimirovich Sotnik Aleksei Aleksandrovich Bobrinsky Boris Grebenshchikov Csernus Imre Lee Jong-wook (baseball) Kati Kov´acs Kim Dae-jung Pl´eh Csaba Kim Kyu-sik Table 6. List of local heroes by 2DRank for each Wikipedia edition. All names are represented by article titles in English Wikipedia Edition 1st 2nd 3rd EN FR DE IT ES NL RU HU KO Frank Sinatra Fran¸cois Mitterrand Adolf Hitler Giusppe Garibaldi Sim´on Bol´ıvar Albert II of Belgium Dmitri Mendeleev Stephen I of Hungary Paul McCartney Jacques Chirac Michael Jackson Honor´e de Balzac Otto von Bismarck Ludwig van Beethoven Raphael Benito Mussolini Francisco Goya Johan Cruyff Peter the Great S´andor Petofi Fidel Castro Rembrandt Yaroslav the Wise Franz Liszt Gojong of the Korean Empire Sejong the Great Park Chung-hee 21 Table 7. List of global heroes by PageRank and 2DRank for all 9 Wikipedia editions. All names are represented by article titles in English Wikipedia. Here, ΘA is the ranking score of the algorithm A (5); NA is the number of appearances of a given person in the top 30 rank for all editions. 2DRank global heroes Carl Linnaeus Aristotle Rank PageRank global heroes ΘP R NA 1st 9 9 2nd 8 3rd 4th 9 9 Wolfgang Amadeus Mozart 5th 8 6th 6 7th 8th 8 7 9th 10th 6 William Shakespeare Alexander the Great 259 239 235 228 200 161 119 111 110 108 Adolf Hitler Julius Caesar William Shakespeare Pope John Paul II Pope John Paul II Ludwig van Beethoven Micheal Jackson Adolf Hitler Julius Caesar Napoleon Jesus Plato Charlemagne Pope Benedict XVI Bob Dylan Θ2D NA 119 5 6 93 5 85 80 4 5 75 4 71 4 69 66 4 3 57 56 3
1203.0135
1
1203
2012-03-01T10:32:02
Optimal Mix of Incentive Strategies for Product Marketing on Social Networks
[ "cs.SI", "physics.soc-ph" ]
We consider the problem of devising incentive strategies for viral marketing of a product. In particular, we assume that the seller can influence penetration of the product by offering two incentive programs: a) direct incentives to potential buyers (influence) and b) referral rewards for customers who influence potential buyers to make the purchase (exploit connections). The problem is to determine the optimal timing of these programs over a finite time horizon. In contrast to algorithmic perspective popular in the literature, we take a mean-field approach and formulate the problem as a continuous-time deterministic optimal control problem. We show that the optimal strategy for the seller has a simple structure and can take both forms, namely, influence-and-exploit and exploit-and-influence. We also show that in some cases it may optimal for the seller to deploy incentive programs mostly for low degree nodes. We support our theoretical results through numerical studies and provide practical insights by analyzing various scenarios.
cs.SI
cs
Optimal Mix of Incentive Strategies for Product Marketing on Social Networks Pankaj Dayama1, Aditya Karnik1 and Y. Narahari2 1 Global General Motors R&D, India Science Lab, GM Technical Center (India), Bangalore 560066, India {pankaj.dayama,aditya.karnik}@gm.com 2 Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560012, India [email protected] Abstract. We consider the problem of devising incentive strategies for viral marketing of a product. In particular, we assume that the seller can influence penetration of the product by offering two incentive programs: a) direct incentives to potential buyers (influence) and b) referral rewards for customers who influence potential buyers to make the purchase (ex- ploit connections). The problem is to determine the optimal timing of these programs over a finite time horizon. In contrast to algorithmic per- spective popular in the literature, we take a mean-field approach and formulate the problem as a continuous-time deterministic optimal con- trol problem. We show that the optimal strategy for the seller has a simple structure and can take both forms, namely, influence-and-exploit and exploit-and-influence. We also show that in some cases it may op- timal for the seller to deploy incentive programs mostly for low degree nodes. We support our theoretical results through numerical studies and provide practical insights by analyzing various scenarios. Keywords: Incentive Strategies, Social Networks, Viral Marketing 1 Introduction A key research topic in multi-agent systems is to understand the effect of mi- crodynamics/interactions between agents on macroscopic properties. Often the agents are a part of a social structure such as a social network. A common ex- ample is that of a social network that consists of potential buyers of a particular new product offering in the market. These buyers interact with each other and influence each others' purchase decisions through word-of-mouth and/or behav- ior. This so-called social influence exerted by agents on their neighboring agents in the network have a significant role to play in generating a network effect on the sales of the product. The idea of viral marketing is to essentially exploit the (macroscopic) network effects that result due to the microdynamics between the agents in the network. Viral marketing is receiving much attention by practicing marketers and aca- demics alike. While not a new idea, it has come to the forefront because of multi- ple effects - products have become more complex, making buyers to increasingly rely on opinions of their peers; consumers have evolved to distrust advertising; and Web2.0 has revolutionized the way people can connect, communicate and share. With power shifting to consumers, it has become important for sellers to devise effective viral marketing strategies [8]. This work is motivated by this urgent need. For social influence to work, there must be seeds, i.e., product advocates to start with. The sellers, therefore, employ two basic strategies. The first is to create advocates, by providing incentives to potential buyers to make an actual purchase. These incentives are typically in the form of discounts, free goodies, etc. The second is to reward product advocates who 'put in a good word' and influence potential buyers to make the purchase. Thus, the latter program helps to exploit the impact of social influence while making a purchasing decision whereas the former program helps to directly influence the buying behavior by offering discounts. Since incentives come at a cost, a seller must balance the revenue she gener- ates through these strategies and the expenditure she incurs in doing so. This poses some non-trivial challenges. The first is determining incentives themselves, since response of an individual is contingent on them (too low a referral reward may not elicit recommendation from an individual since personal reputation is usually at stake). Secondly, the two programs are not necessarily causally con- nected. The reputation of a firm or a brand might create product advocates without incentives, thereby, requiring a seller to launch a referral program di- rectly. This necessitates careful 'timing' of these programs. The objective of this paper is to shed some light on this practically important and theoretically interesting problem. In particular, we seek to determine an optimal timing of these programs over a finite time horizon. 1.1 Related Work In recent years, problems such as these have attracted much attention. Several papers investigate 'influence maximization' (see, for example, Domingos and Richardson [7], Kempe, Kleinberg, and Tardos [11], Bharathi, Kempe, and Salek [4], Chen, Yaun, and Zhang [6]), where the problem is to determine the set of initial adopters who, through an influence process, can maximize the future adoptions of the product. Auriol and Benaim [2] discuss a dynamic model of how standards and norms emerge in decentralized economies. Hartline, Mirrokni, and Sundararajan [10], Arthur, Motwani, Sharma, and Xu [1] consider the problem of 'revenue maximization' for viral marketing and are close in spirit to the problem we consider in this paper. In Hartline et al. [10] a model is proposed in which the purchase decision of a buyer is influenced by individuals who own the product and the price at which the product is offered. An optimal pricing policy is derived using dynamic programming in a symmetric setting (i.e., identical buyers). In a general setting, finding an optimal strategy is shown to be NP-hard and approximation algo- rithms are considered. The authors suggest influence-and-exploit strategy where selected buyers are given the product for free, and the seller extracts revenue by making a random sequence of offers and a greedy pricing strategy for the remaining buyers to compensate for the initial loss. Arthur et al. [1] also considers a model in which a buyer's decision is influ- enced by friends who own the product and price at which the product is offered. Sales are assumed to cascade through the social network. The seller offers cash- back to recommenders and also sets price for each buyer. The authors show that determining an optimal strategy to maximize expected revenue is NP-hard and propose a non-adaptive influence-and-exploit policy, which offers product to the interior nodes of the max-leaf spanning tree of the network for free and later ex- ploits their influence by extracting more revenue from the leaf nodes of the tree. They show that the expected revenue generated from the non-adaptive strategy is within a constant factor of the optimal revenue from an adaptive strategy. 1.2 Our Contributions We consider a seller interested in selling a product to a population of N agents. The product is assumed to be durable and free from network externalities. From the seller's perspective, each agent assumes one of the following types at any point in time: potential buyer (one who is yet to make a purchase), customer (one who has purchased the seller's product) and competitor's customer (one who has purchased a competing product3). A potential buyer makes a purchase decision of her own volition (essentially under external influence) or under so- cial influence. This decision-making is modeled probabilistically, by specifying for both products (the seller's and the competitor's), probabilities of purchase under external influence and social influence. The seller can influence the former through direct incentives (which affect the price) and the latter through referral rewards. The problem she faces is to roll out these programs so as to maximize the profit, which is equal to the revenue obtained by customer acquisition mi- nus the expenditure on direct incentives and referral rewards, over a given time horizon T . In practice sellers have limited knowledge about the social network underlying the population, typically, in the form of a class-level statistical description of it. A class comprises agents who are considered essentially identical on a variety of factors (chosen by the seller), such as demographic, economic level, number of social contacts and so on. In this paper we consider this set-up. However to keep it simple, we assume heterogeneity only in terms of network connections (in particular, probabilities of purchase under either external or social influence are assumed to be the same for all agents); hence classes are based only on the number of social contacts (degrees). The seller thus knows only the degree distribution and degree-degree correlation of the social network. 3 All competitors are aggregated into one single virtual competitor. This class-level statistical description of the agent population allows us to approximate the stochastic evolution of the purchase dynamics by a deterministic process described by ordinary differential equations (ODEs). This is formally established as a mean-field limit, taking the number of agents N → ∞ [3]. With an ODE limit, we pose the problem as a continuous time optimal control problem and employ the well known Pontryagin's Maximum principle [12] to characterize an optimal control. An optimal control specifies for each class the times at which direct incentives and referral rewards programs are to be executed. The following are our main results. 1. We show that an optimal control has a simple structure: the seller needs to run each of the programs at most twice for a certain duration. Moreover, it is non-adaptive (or open-loop). This simplifies the implementation and practically can help a seller pre-allocate the budget for her campaign. 2. While influence-and-exploit strategy turns out to be optimal when social influence is strong in the population, exploit-and-influence strategy can be optimal when the seller has a good reputation. 3. In some settings, the seller may be better off incentivizing low degree nodes as against the popular approach of targeting the influentials (high degree nodes). This, we believe, provides some support to the findings reported in [14] in reference to the influentials hypothesis. The approach we have taken to address the problem is entirely different from the ones in the literature. While a large size of the population presents a challenge to the earlier approaches, it, in fact, aids us in migrating to a simpler deterministic description of the dynamics. The assumption that agents of a class are indistinguishable also fits in naturally with the popular marketing approach of customer segmentation and allows a seller to customize incentives and referral rewards as per these segments. In contrast to earlier papers, we have also modeled competition. This is not only close to reality but interestingly it allows to address some problems in com- pletely different contexts. For example, in limiting the spread of misinformation about an entity or an Internet virus, the objective is to maximize nodes with correct information or security patches by immunizing them (akin to direct in- centives) and/or incentivizing them to spread the information they have to their neighbors (akin to referrals). Our results are, thus, applicable to these problems as well (see [5] for discussion of the influence limitation problem). 2 Problem Formulation Consider a population of N agents, indexed by i = 1, 2, . . . , N . The underlying social network is specified by an undirected graph G = (V, E). Each agent is identified with a node in V and (i, j) ∈ E means that i and j are social contacts and they influence each other in decision-making. si denotes the state of agent i. si can take three values: 0 (indicates potential buyer), 1 (indicates customer) and −1 (indicates competitor's customer). Let s := (s1, s2, . . . , sN ). Each agent makes the purchase decision at a random time point, independent of all others. It suffices to assume that time is discrete (denoted by n = 1, 2, . . .) and at each time step, an agent is chosen uniformly randomly from the popu- lation for a potential state change. Since there are no repeat purchases, 1 and −1 are absorbing states. Therefore, the state change occurs only if the chosen agent is a potential buyer. Suppose agent i is chosen at a time n. Then one of the following happens if i is a potential buyer. 1. i buys the seller's product on her own with probability α (For example, α = 0.08 means that there is 8% chance that a potential buyer will buy the seller's product on her own). 2. i buys the competitor's product on her own with probability δ. 3. i selects one of her social contacts at random. If the selected contact is a customer, i buys the seller's product under social influence with probability β (For example, β = 0.1 means that there is 10% chance that a potential buyer will buy the seller's product if she interacts with someone who has already bought the product). 4. i selects one of her social contacts at random. If the selected contact is a competitor's customer, i buys the competitor's product under social influ- ence with probability γ. Clearly, the state process {s(n), n ≥ 1} is a Markov chain. Now from the seller's perspective, agents having the same degree are indis- tinguishable and the network G is known only statistically, i.e., G is drawn from an ensemble of random undirected graphs of size N , a given degree distribu- tion P (k) (1 ≤ k ≤ K) and degree-degree correlation function P (k′k), which denotes the probability that a given link from a node of degree k is to a node of degree k′. Note that a number of well-known graphs such as homogeneous random graphs, exponential random graphs (e.g., G(n, p) and Watts-Strogatz network), scale-free networks can be represented in this framework. We assume that K remains uniformly bounded as N → ∞. Denote by ik, rk and θk the fraction of degree-k agents who are potential buy- ers, customers and competitor's customers respectively (note that normalization is with respect to the number of class-k agents; hence ik + rk + θk = 1). Let xk := (ik, rk, θk) and x := (x1, . . . , xK ). From the above assumption, it follows that {x(n), n ≥ 1} is a Markov chain (as seen by the seller). The drift of x can be computed considering the four cases described above. Table 1 shows the corresponding probabilities and the change in xk for degree class-k. Consider as an example Case 3. The probability of a randomly selected agent being a potential customer of degree k is P (k)ik. This agent randomly chooses one of her k social contacts. The probability that this chosen one is an existing customer is 1 agent buys the seller's product under the social influence from her contact with j=1 Pk′∈K P (k′k)rk′ = Pk′∈K P (k′k)rk′ . The selected probability β. Thus the probability of Case 3 is βP (k)ikPk′∈K P (k′k)rk′ . One k Pk agent changes her state from 0 (potential customer) to 1 (customer). Hence the effect on xk is (−1, 1, 0). 1 N Pk We now make the dependence on the population size N explicit and denote by F N (x) := [F N k (x)]K k=1 the drift of x. F N k (x) is as follows. 1 N   −βik Pk′∈K P (k′k)rk′ −γik Pk′ ∈K P (k′k)θk′ −(α+δ)ik βik Pk′ ∈K P (k′k)rk′ +αik γik Pk′ ∈K P (k′k)θk′ +δik   Observe that (i) the number of transitions per agent per time slot is of the order of 1 N (ii) the second moment of number of agent transitions per time slot is bounded and (iii) F N (x) is a smooth function of 1 N and x. Let F (x) = F N (x) limN→∞ 1/N . It then follows from Theorem 1 of [3] that the time evolution of x(n) can be approximated by the following system of ODEs (with the same initial conditions). x = F (x) (1) More explicitly, for 1 ≤ k ≤ K ik = −βikRk − γikΘk − (α + δ)ik rk = βikRk + αik θk = γikΘk + δik where, Rk := Pk′∈K P (k′k)rk′ and Θk := Pk′∈K P (k′k)θk′ . The seller offers direct incentives and referral rewards to increase α and β respectively. We model this as follows. A referral reward of c results in an increase of ǫ1 in β and a direct incentive of c′ causes α to increase by ǫ2. Thus, for the duration of the referral reward program, social influence rate of (β +ǫ1) is operational and the seller incurs a cost of c for every successful referral. Similarly, Case Probability 1 2 3 4 αP (k)ik δP (k)ik βP (k)ik Pk′∈K P (k′k)rk′ γP (k)ik Pk′∈K P (k′k)θk′ Effect on xk 1 N P 1 k N P 1 k N P 1 k N P k (−1, 1, 0) (−1, 0, 1) (−1, 1, 0) (−1, 0, 1) Table 1. Probability and effect on xk for different cases if the direct incentive program is executed for some duration, the take-rate for seller's product increases to (α + ǫ2) for that duration, incurring her a cost of c′ for every sale. We normalize c and c′ with respect to the product price. Thus the price is fixed to 1. The seller's problem of maximizing her profit (revenue minus cost) over a fixed time horizon T by optimally timing the two program can now be stated formally as follows. Let uk(t) (resp. vk(t)) denote the control variable indicating whether or not the referral reward program (resp. direct incentive program) is offered to class-k at time t. The cost incurred in running the referral reward program is Z T 0 K Xk=1 P (k)uk(t)c(β + ǫ1)ik(t)Rk(t)dt (2) Recall that the conversion rate of potential buyers under the program is c(β + ǫ1)ik(t)Rk(t). The cost incurred in the direct incentives program is Z T 0 K Xk=1 P (k)vk(t)c′(α + ǫ2)ik(t)dt (3) Since the product price is unity, the revenue obtained is proportional to the k=1 P (k)rk(T ). Denoting the total number of customers at the end of horizon, PK cost (2)+(3) by C(T ) the problem is Maximize K Xk=1 P (k)rk(T ) − C(T ) subject to ik = −(β + ukǫ1)ikRk − (α + vkǫ2)ik − γikΘk − δik rk = (β + ukǫ1)ikRk + (α + vkǫ2)ik θk = γikΘk + δik for 1 ≤ k ≤ K and a given initial condition x(0). Three remarks are in order. The assumption of heterogeneity only in the number of social contacts is mainly to keep the formulation simple and high- light the impact of network structure. Extending this formulation to a general setting is straightforward and will be taken up in a longer version of the paper. Our random interaction model essentially means that the social influence on a potential buyer is the average influence from her neighbors. This, we believe, is reasonable since we have also assumed presence of external influence (through α) on agents4. In the above formulation we consider fixed rewards and incentives pay-outs (c and c′). This simplifies implementation in practice. Calibration of c and c′ can be carried out through numerical studies. 4 For the lack of clear empirical evidence, one may also consider total influence from the neighbors. Mathematically, it is a simple modification to our formulation. 3 Structure of Optimal Control In this section we mathematically prove the structural properties of an optimal control. To keep the proof simple, we will assume that the network G is drawn randomly from a set of regular networks of size N and degree k. This is without loss of generality. Let i(t), r(t) and θ(t) denote the fraction of population in states {0, 1, −1} at time t respectively. Let u(t) ∈ {0, 1} denote whether or not the referral reward program is offered at time t and let v(t) ∈ {0, 1} denote whether or not the direct incentive program is offered at time t. The purchase dynamics under the influence of these programs are given as follows: i = −(β + uǫ1)ir − (α + vǫ2)i − γiθ − δi r = (β + uǫ1)ir + (α + vǫ2)i θ = γiθ + δi (4) (5) (6) From (4), (5), and (6), observe that i + r + θ = 0. Therefore, it suffices to consider any two equations. Let Ω := {(i, r)i + r ≤ 1, i ≥ 0, r ≥ 0}. Let x(t) := (i(t), r(t)) ∈ Ω denote the state variable. The optimal control problem in this simpler setting is as follows. Maximize r(T ) −Z T 0 cu(t)(β + ǫ1)i(t)r(t)dt −Z T 0 c′v(t)(α + ǫ2)i(t))dt (7) subject to (4), (5) and the following constraints on state and control variables: for all 0 ≤ t ≤ T , x(t) ∈ Ω, u(t) ∈ {0, 1} and v(t) ∈ {0, 1}. Our main result is given in Proposition 1. It shows that an optimal strategy for the seller is to deploy the two incentive programs for at most two distinct time periods. Proposition 1. 1. There exist τ1, τ2 (0 ≤ τ1 ≤ τ2 ≤ T ) such that u∗(t) = 0 for τ1 < t ≤ τ2 and u∗(t) = 1 else. 2. There exist τ3, τ4 (0 ≤ τ3 ≤ τ4 ≤ T ) such that v∗(t) = 0 for τ3 < t ≤ τ4 and v∗(t) = 1 else. Proof. i(0) > 0 otherwise there is no problem to solve. Observe that Ω is pos- itively invariant. Therefore a solution starting from any initial point x(0) ∈ Ω remains confined to Ω. This allows us to disregard state constraints from the control formulation. Let u(t), v(t) ∈ [0, 1] for all t ∈ [0, T ] (This relaxation allows us to establish existence of an optimal control. We show that the optimal controls are indeed 'bang-bang', i.e., u∗(t), v∗(t) ∈ {0, 1} for all t). Writing the problem in Mayer form, it can be seen that the state space (appropriately expanded with additional variables) is bounded and positively invariant (thus, state trajectories remain bounded for all admissible pairs); and the system is affine in controls (see (7), (4) and (5)). Existence of an optimal control is now established by Filippov- Cesari theorem. From (4), (5), and (7), the Hamiltonian is written as follows. H(x, p, u, v) = −cu(β + ǫ1)ir − c′v(α + ǫ2)i −p1[(β + uǫ1)ir + (α + vǫ2)i + γiθ + δi] +p2[(β + uǫ1)ir + (α + vǫ2)i] (8) p := (p1, p2) denotes co-state variables. Then according to Pontryagin's Maxi- mum Principle, there exist continuous and piecewise continuously differentiable co-state functions p1 and p2 that satisfy p1 = − ∂H ∂i = [cβ − (p2 − p1 − c)ǫ1]ru + [c′α − (p2 − p1 − c′)ǫ2]v +(p1 − p2)(βr + α) + p1(γ(1 − 2i − r) + δ) p2 = − ∂H ∂r = [cβ − (p2 − p1 − c)ǫ1)]ui + (p1 − p2)βi − p1γi, (9) (10) at all t ∈ [0, T ] where u and v are continuous and satisfy the following transversality condition p∗ 1(T ) = 0, p∗ 2(T ) = 1. and also satisfy, for all t ∈ [0, T ], u(t) ∈ [0, 1] and v(t) ∈ [0, 1], H(x∗(t), p∗(t), u∗(t), v(t)) ≥ H(x∗(t), p∗(t), u(t), v(t)) H(x∗(t), p∗(t), u(t), v∗(t)) ≥ H(x∗(t), p∗(t), u(t), v(t)). From (8) and (12), we get the following form for controls. 0 if (p∗ u∗(t) = (cid:26) 1 if (p∗ v∗(t) = (cid:26) 1 if (p∗ 0 if (p∗ 2(t) − p∗ 2(t) − p∗ 2(t) − p∗ 2(t) − p∗ 1(t) − c)ǫ1 > cβ 1(t) − c)ǫ1 < cβ 1(t) − c′)ǫ2 > c′α 1(t) − c′)ǫ2 < c′α (11) (12) (13) (14) In case of equality in the conditions specified in equations (13) and (14), u∗(t) and v∗(t) may take any arbitrary values in [0, 1]. Let φ(t) := (p∗ We denote by H ∗ 1(t) − c′)ǫ2 − c′α. t the Hamiltonian along optimal state-control trajectory at time t. The following lemma proves that Hamiltonian will always remain positive. 1(t) − c)ǫ1 − cβ and ψ(t) := (p∗ 2(t) − p∗ 2(t) − p∗ Lemma 1. H ∗ t > 0 ∀ t ∈ [0, T ]. Proof. From (8) and (11), we have H ∗ T = [(1 − c)ǫ1 − cβ]i∗(T )r∗(T )u∗(T ) +[(1 − c′)ǫ2 − c′α]i∗(T )v∗(T ) +(βi∗(T )r∗(T ) + αi∗(T )) r(t) is non-decreasing whereas i(t) ↓ 0 and i(t) > 0 for all t since i(0) > 0. Therefore, H ∗ T > 0. The conclusion follows by noting that the Hamiltonian is constant for autonomous systems. ⊓⊔ The lemma below shows that the co-state variables remain positive for the whole duration. Lemma 2. p∗ 1(t), p∗ 2(t) > 0 ∀ t ∈ [0, T ). 1(T ) = 0). Then p∗ 2(τ ) > 0 otherwise H ∗ 1(t) ≤ 0 for all t and let p∗ Proof. Suppose p∗ 1(t) = 0 at t = τ (at least one τ exists since p∗ τ < 0 since u∗(τ ) = 0. Observe from (9) that p1 < 0 if p1 = 0. Strict inequality in (13) implies that at τ , u∗(·) 1(t1) ≤ 0 is continuous. Therefore, implies p∗ 1(T ) 6= 0 which violates (11). It follows that 1(t) > 0 for all t ∈ [0, T ). This in turn implies that p∗ p∗ 2(t) > 0 for all t otherwise H ∗ t < 0. ⊓⊔ p1 < 0 in the neighborhood of 0. Thus p∗ 1(t) < 0 for all t > t1 and p∗ Lemma 3. p∗ 2(t) > p∗ 1(t) ∀ t ∈ [0, T ]. Proof. Suppose not. Let p∗ u∗(τ ) = 0. (8) then yields H ∗ 2(t) < p∗ 1(t) at t = τ . Then φ(τ ) < 0 and, therefore, ⊓⊔ τ < 0, a contradiction. Let ζ(t) := (p∗ 2(t) − p∗ 1(t))i∗(t). The lemma that follows shows that ζ(t) is a decreasing function. Lemma 4. ζ(t) < 0 ∀ t ∈ [0, T ]. Proof. From (4), (9), and (10) we get ζ(t) = −[c(ǫ1 + β)u∗(t)r∗(t) + φ(t)u∗(t)i∗(t) +c′(ǫ2 + α)v∗(t) +p∗ 2(t)(γ(1 − i∗(t) − r∗(t)) + δ)]i∗(t) Lemma follows by noting that all terms inside the bracket are non-negative. ⊓⊔ Now consider φ(t). From (9), (10), and (8) we get φ(t) = [ H ∗ t i∗(t) − φ(t)i∗(t)u∗(t) − (p∗ 2(t) − p∗ 1(t))βi∗(t)]ǫ1 2(t) − p∗ (p∗ exponentially (i∗(t) < i∗(0)e−(α+δ)t). H ∗ 1(t))i∗(t) is monotonically decreasing (Lemma 4). From (4) i∗(t) ↓ 0 t is a positive constant (Lemma 1). Assume that φ(t) = 0 at three points in time τ1, τ2, τ3. Therefore, φ(τ ) > 0 for either τ = τ1 or τ = τ2. Without loss of generality, let us say φ(τ2) > 0. From the above equation it follows that φ(τ3) > 0 which is not feasible as φ(τ − 3 ) > 0. It follows that φ(t) = 0 at at most two points in time. Therefore, there exist 0 ≤ τ1 ≤ τ2 ≤ T such that u∗(t) = 1 for 0 ≤ t ≤ τ1 and τ2 < t ≤ T , and 0 elsewhere. Similarly, one can show that there exist 0 ≤ τ3 ≤ τ4 ≤ T such that v∗(t) = 0 for τ3 < t ≤ τ4 and v∗(t) = 1 otherwise. The proposition is, thus, established. Proposition 1 implies that both the referral reward and direct incentives programs are to be deployed at most twice for certain durations, one in the beginning and the other at the end. It may happen that both the durations are of length 0 which means that a program is not deployed at all. On the other hand, it could also get deployed over the complete time horizon T . This gives a simple and elegant marketing strategy which is easy to implement for the seller. The structure of the above optimal control is quite intuitive. In the case of the referral reward program, the cost is proportional to the product of number of potential buyers and customers. Hence to keep the cost low, rewards are declared in the initial stage (when the number of customers is less) to motivate product advocates and may also be paid at the end (when the number of potential buyers is less) to acquire some additional customers. In the case of direct incentives, the cost is proportional to the number of potential buyers. If the initial take rate for the product is less, this program may get executed at initial stages to quickly acquire customers whose social influence can be exploited in the later stages; otherwise more agents may buy competitor's product and attract other potential buyers. Towards the end of the campaign, the number of potential buyers is less; hence direct incentives may be offered to attract additional customers. 4 Numerical Results The simple structure of optimal controls given by Proposition 1 allows one to devise incentives programs quite easily by numerical optimization of τ 's. Here we obtain an independent validation of optimal controls by discretizing (7), casting it as a nonlinear constrained optimization problem and using a gradient descent approach to find an optimal solution. (For discussion on various numerical so- lution techniques for such problems refer to [12]). For all our experiments, the time horizon T and discretization step-size are fixed at 10 and 0.1 respectively. The NLP formulation is not convex. Therefore, we use a multi-start mechanism to determine an optimal solution. Results are also verified using the commercial package PROPT which uses pseudospectral methods for solving such problems. In this paper, we will primarily investigate the initial condition i(0) = 1. This captures the case when the seller and the competitor(s) enter the market with substitutable products at around the same time (e.g., gaming technologies) or when the seller introduces an independent product into the market (e.g., a book). Of course, similar results can be obtained for the case where seller and/or competitor already have some presence in the market (r(0) > 0 and/or θ(0) > 0). We fix ǫ1 = ǫ2 = 0.05, γ = 0.1, δ = 0.1 for all numerical studies, and consider β = 0.1, α = 0.08, c = 0.25 and c′ = 0.3 as the base scenario (These parameter values are arbitrary and only roughly based on some available data). The optimal marketing strategy is shown in Figure 1. It is optimal for the seller to run both the incentive programs initially for some duration, stop and then run the programs again towards the end. Note that the optimal strategy is open loop; hence estimates of i and r are not required for implementation. 1 0.8 s e v i t n e c n i t c e r i D 0.6 0.4 0.2 0 0 0 Direct incentives Referral program 1 1 2 2 3 3 4 4 5 5 Time 6 6 7 7 8 8 9 9 1 0.8 0.6 0.4 m a r g o r p l a r r e f e R 0.2 0 10 10 Fig. 1. Optimal marketing strategy for the base scenario It is, thus, possible for the seller to determine the timing of her incentives programs numerically. Experimentation with different values of pay-outs c and c′ (which essentially fix ǫ1 and ǫ2) can be used to understand trade-offs and optimize these pay-outs. In the following we undertake an investigation of two important questions pertaining to the interplay between the two incentives programs and the impact of network structure on the them. The former question is important because influence-and-exploit strategy has received much attention in the literature. As we show below, exploit-and-influence strategy can also come into play for some parameter settings. The second question is linked to the so-called influentials hy- pothesis which informally says that high degree agents (hubs) play significant role in product diffusion, and, therefore, are natural targets for incentives (direct or referral rewards). We show that in some cases the seller is better off incentivizing low degree agents (more than high-degree ones). Thus, our results highlight the need for a careful consideration of the network structure while making incentive decisions. 1 0.8 s e v i t n e c n i t c e r i D 0.6 0.4 0.2 0 0 0 Direct incentives Referral program 1 1 2 2 3 3 4 4 5 5 Time 6 6 7 7 8 8 9 9 1 0.8 0.6 0.4 m a r g o r p l a r r e e R f 0.2 0 10 10 Fig. 2. Influence-and-exploit strategy is optimal when β is increased to 0.13 1 0.8 s e v i t n e c n i t c e r i D 0.6 0.4 0.2 0 0 0 Direct incentives Referral program 1 1 2 2 3 3 4 4 5 5 Time 6 6 7 7 8 8 9 9 1 0.8 0.6 0.4 m a r g o r p l a r r e f e R 0.2 0 10 10 Fig. 3. Exploit-and-influence strategy is optimal when α is increased to 0.09 4.1 Interplay between Referral and Direct Incentive Programs When social influence is strong in the population, i.e., β is higher, the seller needs to employ only direct incentives initially. For example, if β is set to 0.13 in the base scenario then it is optimal to offer referral rewards only at the end and that too for a short period as shown in Figure 2. This can be seen as a manifestation of the influence-and-exploit strategy. On the other hand, if the seller has established a good reputation in the market, translating into a higher value of α, an initial influence step through direct incentives may not even be required. See from Figure 3 that when α = 0.09 in the base scenario, it is optimal for the seller to offer direct incentives only at the end. In this case, for most portion of the time horizon, the seller must exploit connections of existing customers and only at the end must she impart direct influence on potential buyers. We call it the exploit-and-influence strategy for the seller. 1 0.8 s e v i t n e c n i t c e r i D 0.6 0.4 0.2 0 0 0 Direct incentives Referral program 1 1 2 2 3 3 4 4 5 5 Time 6 6 7 7 8 8 9 9 1 0.8 0.6 0.4 m a r g o r p l a r r e e R f 0.2 0 10 10 Fig. 4. Influence-and-exploit strategy is optimal with pay- outs: c = 0.3, c′ = 0.3 1 0.8 s e v i t n e c n i t c e r i D 0.6 0.4 0.2 0 0 0 Direct incentives Referral program 1 1 2 2 3 3 4 4 5 5 Time 6 6 7 7 8 8 9 9 1 0.8 0.6 0.4 m a r g o r p l a r r e f e R 0.2 0 10 10 Fig. 5. Exploit-and-influence strategy is optimal with pay- outs: c = 0.25, c′ = 0.35 We also observe from Figures 4 and 5 that influence-and-exploit and exploit- and-influence are optimal strategies for the seller if she incurs high per conversion pay-outs for referral and incentive programs respectively. 4.2 Impact of Network Structure on Incentive Programs Real-world networks show strong degree correlation amongst connected nodes. Some networks show assortative mixing of nodes by degrees where high-degree nodes have most of their connections to other high-degree nodes. Others show disassortative mixing where high-degree nodes have most of their connections to low-degree nodes ([13]). In this section, we examine the impact of network structure on incentives programs. We consider an undirected correlated network with nodes belonging to either of two classes A and B with probability P (A) and P (B) respectively. Class A nodes are of high degree, say kA and class B nodes are of low degree, say kB. P (AB) is the probability that a given link from class B node points to a class A node. P (BA) can be computed from the following balance equation: kAP (BA)P (A) = kBP (AB)P (B) (15) We consider two types of network structures. One structure represents assor- tative mixing whereas the other one represents disassortative mixing. To keep things simple and derive key insights, we assume that the seller is optimizing im- plementation of only one incentives program, namely, referral rewards program. The seller can offer referral rewards to class A and/or class B nodes to increase their social influence rate (β) by ǫ. As earlier, she incurs a per conversion cost of c after normalizing with respect to product price. We fix α = 0.1, δ = 0.1, β = 0.1, γ = 0.15, ǫ = 0.08, kA = 10, kB = 2, P (A) = 0.1, P (B) = 0.9 for our numerical studies. For disassortative network, we set P (BA) = 0.9 whereas for assortative network, we set P (BA) = 0.1. The optimal timing of referral reward program for disassortative network is shown in Figure 6. The seller's optimal strategy is to offer referral rewards to class B nodes for the complete duration whereas rewards to class A nodes are offered initially for a short duration and then again towards the end for a short duration. In this case, class B nodes have almost half of their connections going to class A nodes. Also, major fraction of the population is from class B. So, referral rewards are offered to class B nodes for entire duration as it increases influence not only on class B nodes but also on class A nodes. Class A nodes are not rewarded for the entire duration in order to control the cost. In the case of assortative network, the optimal strategy changes completely (see Figure 7). The seller offers referral rewards to class A nodes for the complete duration whereas rewards to class B nodes are offered initially for some duration and then again towards the end. In this case, nodes from both the classes are well connected amongst themselves with very few connections going across the classes. So, the optimal reward strategies for both the classes are essentially independent. For this particular scenario, it turns out that it is optimal to offer rewards to class A nodes for the entire duration as the cost incurred is not much. Whereas in the case of class B nodes, referral rewards are discontinued for some duration in the middle as the cost overshoots the potential revenue. The results show that networks with different structures can result in different optimal strategies for the seller. In some scenarios, the seller may be better off incentivizing low degree nodes as against the popular approach of targeting the influentials (high degree nodes), thus, providing some support to the finding in [14]. In some scenarios, the seller may be better off targeting influentials thus supporting the results in [9]. Thus, our results highlight the need for a careful consideration of the network structure while making incentive decisions. 5 Conclusion In this paper we have addressed the problem of optimal timing of two incentive programs, namely, direct incentives and referral rewards, for product diffusion A − m a r g o r p l a r r e e R f 1 0.8 0.6 0.4 0.2 0 0 0 Referral program−A Referral program−B 1 1 2 2 3 3 4 4 5 5 Time 6 6 7 7 8 8 9 9 1 0.8 0.6 0.4 0.2 B − m a r g o r p l a r r e e R f 0 10 10 Fig. 6. Optimal marketing strategy on a network with disas- sortative mixing A − m a r g o r p l a r r e f e R 1 0.8 0.6 0.4 0.2 0 0 0 Referral program−A Referral program−B 1 1 2 2 3 3 4 4 5 5 Time 6 6 7 7 8 8 9 9 1 0.8 0.6 0.4 0.2 B − m a r g o r p l a r r e f e R 0 10 10 Fig. 7. Optimal marketing strategy on a network with assor- tative mixing through social networks. Taking a deviation from the existing approaches, we formulate the problem as a continuous-time deterministic optimal control prob- lem. The optimal strategy for the seller is to deploy these programs in at most two distinct time periods. The simplicity of this structure and non-adaptive na- ture makes them ideal for implementation in practice. We further show that if the seller has good reputation in the market, exploit-and-influence strategy can be optimal whereas if social influence is strong in the population, influence-and- exploit strategy can be optimal for the seller. In the case of correlated networks, our numerical studies show that the seller need not necessarily offer more fre- quent referral reward programs to high degree nodes to maximize her profit. There are two immediate directions for future work: (i) extend heterogeneity of agents to include their external and social influence probabilities and (ii) devise procedures to estimate model parameters. References [1] D. Arthur, R. Motwani, A. Sharma, and Y. Xu. Pricing strategies for viral marketing on Social Networks. In Proceedings of Workshop on Internet and Network Economics, pages 101 -- 112, 2009. [2] E. Auriol and M. Benaim. Standardization in decentralized economies. American Economic Review, 90(3):550 -- 570, 2000. [3] M. Benaim and J. Y. Le Boudec. A Class of Mean Field Interaction Models for Computer and Communication Systems. Performance Evaluation, 65: 823 -- 838, 2008. [4] S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks. In Proceedings of Workshop on Internet and Network Economics, pages 306 -- 311, 2007. [5] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the Spread of Mis- information in Social Networks. In Proceedings of the 20th International Conference on World Wide Web, pages 665 -- 674, 2011. [6] W. Chen, Y. Yaun, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In Proceedings of 10th Interna- tional Conference on Data Mining, 2010. [7] P. Domingos and M. Richardson. Mining the Network Value of Customers. In 7th International Conference on Knowledge Discovery and Data Mining, pages 57 -- 66, 2001. [8] D. Godes, D. Mayzlin, Y. Chen, S. Das, C. Dellarocas, B. Pfeiffer, B. Libai, S. Sen, M. Shi, and P. Verlegh. The Firm's Management of Social Interac- tions. Marketing Letters, 16(3/4):415 -- 428, 2005. [9] J. Goldenberg, S. Han, D. R. Lehmann, and J. W. Hong. The Role of Hubs in the Adoption Processes. Journal of Marketing, 73:1 -- 13, March 2009. [10] J. Hartline, V. S. Mirrokni, and M. Sundararajan. Optimal Marketing Strategies over Social Networks. In Proceedings of 17th International Con- ference on World Wide Web, pages 189 -- 198, 2008. [11] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the Spread of Influence through a Social Network. In Proceedings of Knowledge Discovery and Data Mining, pages 137 -- 146, 2003. [12] D. E. Kirk. Optimal Control Theory: An Introduction. Dover, 1970. [13] M. E. J. Newman. Assortative Mixing in Networks. Physics Review Letters, 89(20), November 2002. [14] D. Watts and P. S. Dodds. Influentials, Networks, and Public Opinion Formation. Journal of Consumer Research, 34, December 2007.
1609.09547
1
1609
2016-09-29T23:34:02
Competitive Propagation: Models, Asymptotic Behavior and Multi-stage Games
[ "cs.SI", "cs.MA", "math.DS" ]
In this paper we propose a class of propagation models for multiple competing products over a social network. We consider two propagation mechanisms: social conversion and self conversion, corresponding, respectively, to endogenous and exogenous factors. A novel concept, the product-conversion graph, is proposed to characterize the interplay among competing products. According to the chronological order of social and self conversions, we develop two Markov-chain models and, based on the independence approximation, we approximate them with two respective difference equations systems. Theoretical analysis on these two approximation models reveals the dependency of the systems' asymptotic behavior on the structures of both the product-conversion graph and the social network, as well as the initial condition. In addition to the theoretical work, accuracy of the independence approximation and the asymptotic behavior of the Markov-chain model are investigated via numerical analysis, for the case where social conversion occurs before self conversion. Finally, we propose a class of multi-player and multi-stage competitive propagation games and discuss the seeding-quality trade-off, as well as the allocation of seeding resources among the individuals. We investigate the unique Nash equilibrium at each stage and analyze the system's behavior when every player is adopting the policy at the Nash equilibrium.
cs.SI
cs
Competitive Propagation: Models, Asymptotic Behavior and Multi-stage Games ∗ Wenjun Mei Francesco Bullo † June 28, 2021 Abstract In this paper we propose a class of propagation models for multiple competing products over a social network. We consider two propagation mechanisms: social conversion and self conversion, corresponding, respectively, to endogenous and exogenous factors. A novel concept, the product-conversion graph, is proposed to characterize the interplay among competing products. According to the chronological order of social and self conversions, we develop two Markov-chain models and, based on the independence approximation, we approximate them with two respective difference equations systems. Theoretical analysis on these two approximation models reveals the dependency of the systems' asymptotic behavior on the structures of both the product-conversion graph and the social network, as well as the initial condition. In addition to the theoretical work, accuracy of the independence approximation and the asymptotic behavior of the Markov-chain model are investigated via numerical analysis, for the case where social conversion occurs before self conversion. Finally, we propose a class of multi-player and multi- stage competitive propagation games and discuss the seeding-quality trade-off, as well as the allocation of seeding resources among the individuals. We investigate the unique Nash equilibrium at each stage and analyze the system's behavior when every player is adopting the policy at the Nash equilibrium. Keywords: competitive propagation, independence approximation, network structure, stability analysis, multi-stage uncooperative game, seeding, product quality 1 Introduction a) Motivation and problem description It is of great scientific interest to model some sociological phenomenon as dynamics on networks, such as consensus, polarization, synchronization and propagation. Indeed, the past fifteen years have witnessed a flourishing of research on propagation of diseases, opinions, commercial products etc, collectively referred to as memes, on social networks. Much progress has been made both statistically [9 -- 12] and theoretically [3, 18, 19, 32]. In a more recent set of extensions, scientists have begun studying the simultaneous propagation of multiple memes, in which not only the interaction between nodes (or equivalently referred to as individuals) in the network, but also the interplay of multiple memes, plays an important role in determining the system's dynamical behaviors. These two forms of interactions together add complexity and research value to the multi-meme propagation model. This paper proposed a series of mathematical models on the propagation of competing products. Three key elements: the interpersonal network, the individuals and the competing products, are modeled respec- tively as a graph with fixed topology, the nodes on the graph, and the states of nodes. Our models are based on the characterization of individuals' decision making behaviors under the social pressure. Two fac- tors determine individuals' choices on which product to adopt: the endogenous factor and the exogenous factor. The endogenous factor is the social contact between nodes via social links, which forms a tendency ∗This material is based upon work supported by, or in part by, the U. S. Army Research Laboratory and the U. S. Army Research Office under grant number W911NF-15-1-0577, and the UCSB Institute for Collaborative Biotechnology under grant W911NF-09-D-0001 from the U.S. Army Research Office. The content of the information does not necessarily reflect the position or the policy of the Government, and no official endorsement should be inferred. This paper is related to an early conference article [22]: this article treats a more general and different set of phenomena, with new results on theoretical analysis, complete proofs and new simulation results. †Wenjun Mei and Francesco Bullo are with the Department of Mechanical Engineering and with Center for Con- trol, Dynamical Systems, and Computation, University of California, Santa Barbara, Santa Barbara, CA 93106, USA, [email protected], [email protected] 1 of imitation, referred to as social pressure in this paper. The exogenous factor is what is unrelated to the network, e.g., the products' quality. In the microscopic level, we model the endogenous and exogenous factors respectively as two types of product-adoption processes: the social conversion and the self conversion. In social conversion, any node randomly picks one of its neighbors and follows that neighbor's state with some given probability characterizing how open-minded the node is. In the self conversion, each node independently converts from one product to another with some given probability depending on the two products involved. Although individuals exhibit subjective preferences when they are choosing the products, statistics on a large scale of different individuals' behaviors often reveal that the relative qualities of the competing products are objective. For example, although some people may have special affections on feature phones, the fact that more people have converted from feature phones to smart phones, rather than the other way around, indicates that the latter is relatively better. We assume that the transit probabilities between the competing products are determined by their relative qualities and thus homogeneous among the individuals. b) Literature review: Various models have been proposed to describe the propagation on networks, such as the percolation model on random graphs [23, 24], the independent cascade model [6, 16, 20], the linear threshold model [1, 2, 35] and the epidemic-like mean-field model [31, 33, 36]. The first two are stochastic models while the linear threshold model is usually deterministic. The epidemic-like model is an ODE system as the approximation of a Markov chain, which gives the dynamics of any node's state probability distribution. As extensions to the propagation of a single meme, some recent papers have discussed the propagation of multiple memes, e.g., see [4, 5, 8, 14, 15, 17, 25, 26, 28 -- 30, 34]. Some of these papers adopt a Susceptible- Infected-Susceptible (SIS) epidemic-like model and discuss the long-term coexistence of multiple memes in single/multiple-layer networks, e.g., see [5,25,26]. Some papers focus instead on the strategy of initial seeding to maximize or prevent the propagation of one specific meme in the presence of adversaries [8, 14, 17, 28]. Among all these papers mentioned in this paragraph, our model is most closely related to the work by Stanoev et. al. [29] but the social contagion process in [29] is different from our model and theoretical analysis on the general model is not included c) Contribution: Firstly we propose a generalized and novel model for the competitive propagation on social networks. By taking into account both the endogenous and exogenous factors and considering the individual variance as well as the interplay of the competing products, our model is general enough to describe a large class of multi-meme propagation processes. Moreover, in the modeling of multi-meme contagions, many models come across the problem of dealing with multiple contagions to one node by different memes at a single time step, which is usually avoided by assuming the infinitesimal step length so that it only allows for a single contagion at every step. Differently from these models, the problem of multiple contagions does not occur in our model since we model the contagion process as the individual's initiative choice under the social pressure, which is more suitable for the product-adoption process. In addition, compared with the independent cascade model, in which individuals' choices are irreversible, our models adopt a more realistic assumption that conversions from one product to another are reversible and occur persistently. Secondly, we propose a new concept, the product-conversion graph, to characterize the interplay between the products. There are two graphs in our model: the social network describing the interpersonal connections, and the product-conversion graph defining the transitions between the products in self conversion, which in turn reflect the products' relative quality. Thirdly, starting from the description of individuals' behavior, we develop two Markov-chain competi- tive propagation models different in the chronological order of the social conversion and the self conversion processes. Applying the independence approximation, we propose two respective network competitive prop- agation models, which are difference equations systems, such that the dimension of our problem is reduced and some theorems in the area of dynamical systems can be applied to the analysis of the approximation models. Fourthly, both theoretical analysis and simulation results are presented on the dynamical properties of the network competitive propagation models. We discuss the existence, uniqueness and stability of the fixed point, as well as how the systems' asymptotic state probability distribution is determined by the social network structure, the individuals' open-mindedness, the initial condition and, most importantly, the structure of the product-conversion graph. We find that, if the product-conversion graph contains only one absorbing strongly connected component, then the self conversion dominates the system's asymptotic behavior; With multiple absorbing strongly connected components in the product-conversion graph, the system's asymptotic state probability distribution also depends on the initial condition, the network topology and the individual open-mindedness. In addition, simulation results are presented to show the high accuracy of the independence approximation and reveal that the original Markov-chain model also exhibits the same 2 asymptotic behavior. At last, based on the network competitive propagation model, and according to what actions can be taken by the players, we propose two different models of multi-player and multi-stage non-cooperative games, in which the players are the competing companies with bounded investment budgets. Each company can invest on seeding, e.g., advertisement and promotion, or its product's quality. For each game model, we investigate the unique Nash equilibrium at each stage. Theoretical analysis reveals some strategic insights on the seeding-quality trade-off and the allocation of seeding resources. The insights are directive and realistic. We also discuss the systems' behaviors if every player is adopting the policy at the Nash equilibrium. d) Organization: The rest of this paper is organized as follows. Section II give the assumptions of two Markov-chain propagation models. Section III and IV discuss the approximation of these two models separately. In Section V, we discuss the multi-player and multi-stage competitive propagation games. Section VI is the conclusion. 2 Model Description and Notations The row-normalized adjacency matrix is denoted by A = (aij)n×n, where aij = 1 Ni a) Social network as a graph: In this model, a social network is considered as an undirected, unweighted, fixed-topology graph G = (V, E) with n nodes. The nodes are indexed by i ∈ V = {1, 2, . . . , n}. The adjacency matrix is denoted by A = (aij)n×n with aij = 1 if (i, j) ∈ E and aij = 0 if (i, j) /∈ E. j=1 aij. The graph G = (V, E) is always assumed connected and there is no self loop, i.e., aii = 0 for any i ∈ V . H1, H2, . . . , HR, propagating in the network. We consider a discrete-time model, i.e., t ∈ N, and assume refer to all the states as "products". Denote by Di(t) the state of node i after time step t. For any t ∈ N, Di(t) ∈ {H1, H2, . . . , HR}. For simplicity let Θ = {1, 2, . . . , R}, i.e., the set of the product indexes. c) Nodes' production adoption behavior: Two mechanisms define the individuals' behavior: the social conversion and the self conversion. The following two assumptions propose respectively two models different in the chronological order of the social and self conversions. aij with Ni =(cid:80)n b) Competing products and the states of nodes: Suppose there are R competing products, denoted by the products are mutually exclusive. We do not specify the state of adopting no product and collectively Assumption 1 (Social-self conversion model). Consider the competitive propagation of R products in the network G = (V, E). At time step t + 1 for any t ∈ N, suppose the previous state of any node i is Di(t) = Hr. Node i first randomly pick one of its neighbor j and following j's previous state, i.e., Di(t + 1) = Dj(t), with probability αi. If node i does not follow j's state in the social conversion, with probability 1 − αi, then node i converts to product Hs with probability δrs for any s (cid:54)= r, or stay in Hr with probability δrr. Assumption 2 (Self-social conversion model). At any time step t + 1, any node i with Di(t) = Hr converts to Hs with probability δrs for any s (cid:54)= r, or stay in the state Hr with probability δrr. If node i stays in Hr in the process above, then node i randomly picks a neighbor j and following Dj(t) with probability αi, or still stay in Hr with probability 1 − αi. Assumptions 1 and 2 are illustrated by Figure 1 and Figure 2 respectively. By introducing the parameters δrs we define a directed and weighted graph with the adjacency matrix ∆ = (δrs)R×R, referred to as the product-conversion graph. Figure 3 gives an example of the product-conversion graph for different smart phone operation systems. Based on either of the two assumptions, ∆ is row-stochastic. In this paper we discuss several types of structures of the product-conversion graph, e.g., the case when it is strongly connected, or consists of a transient subgraph and some isolated absorbing subgraphs. The parameter αi characterizes node i's inclination to be influenced by social pressure. Define α = (α1, α2, . . . , αn)(cid:62) as the individual open-mindedness vector. Assume 0 < αi < 1 for any i ∈ V . d) Problem description: According to either Assumption 1 or Assumption 2, at any time step t + 1, the probability distribution of any node's states depends on its own state as well as the states of all its neighbors at time t. Therefore, the collective evolution of nodes' states is a Rn-state discrete-time Markov chain. Define pir(t) as the probability that node i is in state Hr after time step t, i.e., pir(t) = P[Di(t) = Hr]. We aim to understand the dynamics of pir(t). Since the Markov chain models have exponential dimensions and are difficult to analyze, we approximate it with lower-dimension difference equations systems and analyze instead the dynamical properties of the approximation systems. e) Notations: Before proceeding to the next section, we introduce some frequently used notations in Table 1. 3 Figure 1: Diagram illustration for the social-self conversion model Figure 2: Diagram illustration for the self-social conversion model 4 Di(t)=HrrandomlypickneighborjDi(t+1)=Di(t)Di(t+1)=Dj(t)Di(t+1)=H1Di(t+1)=H2Di(t+1)=HR1↵i↵ir1r2rRsocial conversionself conversionDi(t+1)=H1Di(t+1)=HrDi(t)=HrDi(t+1)=HRr1rrrRrandomlypickneighborj1↵i↵iDi(t+1)=Di(t)Di(t+1)=Dj(t)self conversionsocial conversion Figure 3: An example of the product-conversion graph for different smart phone operation systems. Table 1: Notations frequently used in this paper (cid:23) ((cid:22)) (cid:31) (≺) 1n, 0n entry-wise no less(greater) than entry-wise strictly greater(less) than (1, 1, . . . , 1)(cid:62) Rn×1 ∈ Rn×1, (0, 0, . . . , 0)(cid:62) ∈ 0n×m (0)n×m Snm(a) The set Snm(a) The set {X ∈ {X ∈ xr The r-th column vector of the matrix (cid:23) (cid:23) w(M ) The normalized dominant left eigenvec- Rn×m X 0n×m, X1m = a} for any a ∈ Rn Rn×m X 0n×m, X1m (cid:22) a} for any a ∈ Rn tor for matrix M ∈ Rl×l if it has one X ∈ Rn×m x(i) The i-th row vector of the matrix X ∈ Rn×m x(−i) The the ma- (cid:80)n trix AX ∈ Rn×m, i.e., x(−i) = (x−i1, x−i2, . . . , x−im) where x−ir = j=1 aijxjr i-th row vector of G(A) The graph with the adjacency matrix A 5 1Android2iOS3Blackberry4Blackberry122124424334144113312332 3 Network Competitive Propagation Model with Social-self con- version This section is based on Assumption 1. We first derive an approximation model for the time evolution of pir(t), referred to as the social-self conversion network competitive propagation model (social-self NCPM), and then analyze the asymptotic behavior of the approximation model and its relation to the social network topology, the product-conversion graph, the initial condition and the individuals open-mindedness. Further simulation work is presented in the end of this section. 3.1 Derivation of the social-self NCPM Some notations are used in this section. Notation 3. For the competitive propagation of products {H1, H2, . . . , HR} on the network G = (V, E), (1) define the random variable X r i (t) by (cid:40) 1, 0, X r i (t) = if Di(t) = Hr, if Di(t) (cid:54)= Hr. According to the mutual exclusiveness of the competing products, for any i ∈ V , if X r for any s (cid:54)= r; nodes except node i after time step t; i (t) = 0 (2) Define the n − 1 tuple D−i(t) = (D1(t), . . . , Di−1(t), Di+1(t), . . . , Dn(t)), i.e., the states of all the (3) Define the following notations for simplicity: i (t) = 1, then X s ij (t) = P[X r P rs i (t;−i) = P[X r P r i (t; s,−i) = P[X r Γr i (t) = 1 X s i (t) = 1 D−i(t)], i (t + 1) = 1 X s j (t) = 1], i (t) = 1, D−i(t)]. In the derivation of the network competitive propagation model, the following approximation is adopted: Approximation 4 (Independence Approximation). For the competitive propagation of R products on the network G = (V, E), when deriving the equation for pir(t), approximate the conditional probability P ms ij (t) by its corresponding total probability pim(t) for any m, s ∈ Θ and any i, j ∈ V . With the independence approximation, the social-self NCPM is presented in the theorem below. Theorem 5 (Social-self NCPM). Consider the competitive propagation based on Assumption 1, with the social network and the product-conversion graph represented by their adjacency matrices A = (aij)n×n and ∆ = (δrs)R×R respectively. The probability pir(t) satisfies ij (t)pjs(t)(cid:1) ij (t)pjr(t) − P rs pir(t + 1) − pir(t) aij αi = (cid:0)P sr n(cid:88) j=1 (cid:88) (cid:88) s(cid:54)=r + s(cid:54)=r (1 − αi)(δsrpis(t) − δrspir(t)), (1) for any i ∈ V and r ∈ Θ. Applying the independence approximation, the approximation model for equa- tion (1), i.e., the social-self NCPM, is pir(t + 1) = αi n(cid:88) j=1 R(cid:88) s=1 δsrpis(t). aijpjr(t) + (1 − αi) (2) 6 Proof. By definition, pir(t+1) − pir(t) = E[X r = E(cid:2)E[X r i (t + 1) − X r i (t)] i (t + 1) − X r i (t) D−i(t)](cid:3), E[X r where the conditional expectation is given by i (t+1) − X r i (t) D−i(t)] = P[X r i (t + 1) − X r (cid:88) − P[X r i (t + 1) − X r (cid:88) i (t; s,−i)P s Γr s(cid:54)=r − Γs i (t; r,−i)P r = s(cid:54)=r i (t;−i) i (t;−i). i (t) = 1 D−i(t)] i (t) = −1 D−i(t)] According to Assumption 1, (cid:88) i (t; s,−i)P s Γr = αi i (t;−i) j (t)P s aijX r Therefore, j E[Γr i (t; s,−i)P s i (t;−i)] = αi One the right-hand side of the equation above, E[P s i (t;−i) + (1 − αi)δsrP s i (t;−i). aijE[X r (cid:88) j (t)P s + (1 − αi)δsrE[P s i (t;−i)]. i (t;−i)] = pis(t). Moreover, i (t;−i)] j E[X r j (t)P s i (t;−i)] P[X s (cid:88) (cid:88) · P[D−i−j(t) = d−i−j, X r d−i−j P[X s = = i (t) = 1 D−i−j(t), X r j (t) = 1] j (t) = 1] i (t) = 1, X r j (t) = 1, D−i−j(t) = d−i−j] d−i−j = P sr (cid:80) ij (t) by pis(t) and pir(t) respectively and according to the equations (cid:80) Apply the same computation to E[Γs and P rs i (t; r,−i)P r ij (t)pjr(t). i (t;−i)] and then we obtain equation (1). Replace P sr ij (t) s(cid:54)=r pis(t) = 1 − pir(t) and s(cid:54)=r δrs = 1 − δrr, we obtain equation (2). The derivation of Theorem 5 is equivalent to the widely adopted mean-field approximation in the modeling of the network epidemic spreading [7, 27, 31]. Notice that the independence approximation neither neglects the correlation between any two nodes' states, nor destroys the network topology, since pjr(t), pjs(t) and aij all appear in the dynamics of pir(t). 3.2 Asymptotic behavior of the social-self NCPM Define the map f : Rn×R → Rn×R by According to equation (2), the matrix form of the social-self NCPM is written as f (X) = diag(α) AX + (I − diag(α))X∆. P (t + 1) = f(cid:0)P (t)(cid:1), 7 (3) (4) where P (t) = (pir(t))n×R. We analyze how the asymptotic behavior of system (4), i.e., the existence, uniqueness and stability of the fixed point of the map f , is determined by the two graphs introduced in our model: the social network with the adjacency matrix A, and the product-conversion graph with the adjacency matrix ∆. 3.2.1 Structures of the social network and the product-conversion graph Assume that the social network G( A) has a globally reachable node. As for the product-conversion graph, we consider the more general case. Suppose that the product-conversion graph G(∆) has m absorbing strongly connected components (absorbing SCCs) and a transient subgraph. Re-index the products such that the product index set for any l-th absorbing SCCs is given by Θ1 = {1, 2, . . . , k1}, and Θl = { ku + 1, l−1(cid:88) u=1 l−1(cid:88) u=1 ku + 2, . . . , l(cid:88) u=1 ku}, for any l ∈ {2, 3, . . . , m}, and the index set for the transient subgraph is Λ = { 2, . . . , R}. then the adjacency matrix ∆ of the product-conversion graph takes the following form: (cid:20) (cid:21) ¯∆ ∆ = Bk0×(R−k0) 0(R−k0)×k0 ∆0 , (5) (cid:80)m l=1 kl + 1, . . . ,(cid:80)m l=1 kl + where ¯∆ = diag[∆1, ∆2, . . . , ∆m] and B = [B1, B2, . . . , Bm], with Bl ∈ Rk0×k1 for any l ∈ {1, 2, . . . , m}, is nonzero and entry-wise non-negative. Matrix ∆l = (δΘl for any l ∈ {2, 3, . . . , m}, is the adjacency matrix of the l-th absorbing SCC, and is thus irreducible and row-stochastic. The following definition classifies four types of structures of G(∆). u=1 ku+r,(cid:80)l−1 rs = δ(cid:80)l−1 u=1 ku+s rs )kl×kl , with δΘ1 rs = δrs and δΘl Definition 6 (Four sets of product-conversion graphs). Based on whether the product-conversion graph G(∆) has a transient subgraph and a single or multiple absorbing SCCs, we classify the adjacency matrix ∆ into the following four cases: (i. Case 1 (single SCC): The graph G(∆) is strongly connected, i.e., ∆ = ∆1, with k1 = R; (ii. Case 2 (single SCC + transient subgraph): The graph G(∆) contains one absorbing SCC and a transient subgraph, i.e., ¯∆ = ∆1 and k0 ≥ 1; with(cid:80)m l=1 kl = R; (iii. Case 3 (multi-SCC): The graph G(∆) contains m absorbing SCCs, i.e., ∆ = diag[∆1, ∆2, . . . , ∆m], (iv. Case 4 (multi-SCC + transient subgraph): The graph G(∆) contains m absorbing SCCs and a transient subgraph, with ∆ given by equation (5). 3.2.2 Stability analysis of the social-self NCPM The following theorem states the distinct asymptotic behaviors of the social-self NCPM, with different structures of the product-conversion graph. Theorem 7 (Asymptotic behavior for social-self NCPM). Consider the social-self NCPM on a strongly connected social network G( A), with the product-conversion graph G(∆). Assume that (i. Each absorbing SCC G(∆l) of G(∆) is aperiodic; (iii. For any r ∈ Λ,(cid:80) s∈Λ δrs < 1, i.e., ∆01k0 ≺ 1k0. (ii. For any ∆l, l ∈ {1, 2, . . . , m}, as least one column of ∆l is entry-wise strictly positive; Then, for any P (0) ∈ SnR(1n), the solution P (t) to equation (4) has the following properties, depending upon the structure of ∆: 8 (i. in Case 1, P (t) converges to P ∗ = 1n∆(cid:62) exponentially fast, where P ∗ is the unique fixed point in SnR(1n) for the map f defined by equation (3). Moreover, the convergence rate is (∆) = αmax + (1 − αmax)ζ(∆), where αmax = maxi αi and ζ(∆) = 1 − r=1 mins δsr; (cid:80)R (ii. in Case 2, for any i ∈ V , lim t→∞ pir(t) = (cid:40) 0, wr(∆1), for any r ∈ Λ, for any r ∈ Θ1; (cid:1)w(cid:62) (∆l), (iii. in Case 3, for any l ∈ {1, 2, . . . , m} and i ∈ V , t→∞ pΘl(i)(t) =(cid:0)w(cid:62) ir (t)(cid:1) where M = diag(α) A + I − diag α and P Θl(t) = (cid:0)pΘl (M )P Θl (0)1kl lim n×kl pΘl(i)(t) being the i-th row of P Θl (t); , with pΘl ir (t) = pi,(cid:80)l−1 u=1 ku+r(t) and (iv. in Case 4, for any l ∈ {1, 2, . . . , m} and i ∈ V , 0, γlwr(∆l), where γl depends on A, Bl, P Θl (0), P Λ(0) and satisfies(cid:80)m lim t→∞ pir(t) = for any r ∈ Λ, for any r ∈ Θl, l=1 γl = 1. (cid:40) Before proving the theorem above, a useful and well-known lemma is stated without the proof. Lemma 8 (Row-stochastic matrices after pairwise-difference similarity transform). Let M ∈ Rn×n be row- stochastic. Suppose the graph G(M ) is aperiodic and has a globally reachable node. Then the nonsingular matrix −1 Q = 1/n . . .  (cid:21) 1 . . . . . . −1 1/n 1/n 1 (cid:20)Mred 0n−1 c(cid:62) 1 satisfies QM Q −1 = for some c ∈ Rn−1 and Mred ∈ R(n−1)×(n−1). Moreover, Mred is discrete-time exponentially stable. Proof of Theorem 7: (1) Case 1: Since matrix ∆ is row-stochastic, irreducible and aperiodic, according to the Perron-Frobenius theorem, w(∆) ∈ RR is well-defined. By substituting P ∗, defined by p∗(i) = w(∆)(cid:62) for any i ∈ V , into equation (3), we verify that P ∗ is a fixed point of f . For any X and Y ∈ Rn×R, define the distance d(·,·) by d(X, Y ) = (cid:107)X − Y (cid:107)∞. Then (SnR(1n), d) is a complete metric space. For any X ∈ SnR(1n), it is easy to check that f (X) (cid:23) 0n×R and f (X)1R = diag(α) AX1R + (I − diag(α))X1R = 1n. Therefore, f maps SnR(1n) to SnR(1n). For any X ∈ SnR(1n), according to equation (3), )(i)(cid:107)1 ≤ αi(cid:107)x(−i) − p∗(−i)(cid:107)1 + (1 − αi)(cid:107)(x(i) − p∗(i))∆(cid:107)1. (cid:107)f (X)(i)−f (P ∗ 9 (6) The first term of the right-hand side of (6) satisfies (cid:107)x(−i) − p∗(−i)(cid:107)1 = ≤ R(cid:88) R(cid:88) r=1 n(cid:88) n(cid:88) j=1 r=1 j=1 The second term of the right-hand side of (6) satisfies (cid:107)(x(i) − p∗(i))∆(cid:107)1 = aijxjr − wr(∆) aijxjr − wr(∆) ∗ (cid:107)∞. ≤ (cid:107)X − P R(cid:88) r=1 R(cid:88) s=1 (cid:0)xis − ws(∆)(cid:1)δsr. If x(i) = p∗(i), then If x(i) (cid:54)= p∗(i), since x(i)1R = p∗(i)1R = 1, both the set θ1 = {s xis ≥ ws(∆)} and the set θ2 = {s xis < ws(∆)} are nonempty and )(i)(cid:107)1 ≤ αi(cid:107)X − P ∗ ∗ (cid:107)f (X)(i) − f (P (cid:88) (cid:0)xis − ws(∆)(cid:1) = s∈θ1 (cid:107)∞. (cid:1) (cid:88) (cid:0)ws(∆) − xis R(cid:88) s∈θ2 xis − ws(∆). s=1 = 1 2 Therefore, where R(cid:88) R(cid:88) (cid:107)(x(i)−p∗(i))∆(cid:107)1 R(cid:88) r=1 s=1 = − 2 r=1 (cid:88) s∈θ1 min{ xis − ws(∆)δsr min{ (xis − ws(∆))δsr, (ws(∆) − xis)δsr}, s∈θ1 (cid:88) (cid:88) (cid:88) s∈θ2 s∈θ2 (xis − ws(∆))δsr, (ws(∆) − xis)δsr} (7) 1 2 ≥ min s δsr(cid:107)x(i) − p∗(i)(cid:107)1. (cid:17) (cid:16) R(cid:88) 1 − r=1 min δsr s (cid:107)(x(i) − p∗(i))∆(cid:107)1 ≤ (cid:107)x(i) − p∗(i)(cid:107)1. Substituting the inequality above into (7), we obtain Since(cid:80)R is strictly positive,(cid:80)R r=1 δsr = 1 for any s,(cid:80)R r=1 mins δsr > 0. Therefore, r=1 mins δsr is no larger than 1. In addition, since at least one column of ∆ 0 ≤ ζ(∆) = 1 − min s δsr < 1, and R(cid:88) r=1 10 This leads to (cid:107)f (X)(i) − p∗(i)(cid:107)1 ≤ (cid:107)f (X) − f (P ∗ (cid:0)αi + (1 − αi)ζ(∆)(cid:1) )(cid:107)∞ ≤ (∆)(cid:107)X − P ∗ (cid:107)∞. X − P ∗ (cid:107)∞, for any X ∈ SnR(1n) and 0 < (∆) < 1. This concludes the proof for Case 1. For the transient subset Λ, define P Λ(t) = (cid:0)pΛ ir(t)(cid:1) (2) Case 2: r ∈ {1, 2, . . . , k0}. Then, P Λ(t + 1) = diag(α) AP Λ(t) + (I − diag(α))P Λ(t)∆0. According to Assumption (iii) of Theorem 7, k0(cid:88) s=1 c = max r∈{1,2,...,k0} δΛ rs < 1, and ∆01k0 ≤ c1k0. n×k0 , with pΛ ir(t) = pi,r+k1 (t), for any i ∈ V and Therefore, P Λ(t+1)1k0 (cid:16) diag(α) A + c(cid:0)I − diag(α)(cid:1)(cid:17) (cid:16) Since ρ diag(α) A + c(cid:0)I − diag(α)(cid:1)(cid:17) (cid:22) < 1, for any P Λ(0) ∈ Snk0 (1n), P Λ(t) → 0n×k0 exponentially fast. P Λ(t)1k0 . Define P Θ1(t) = (pir(t))n×k1. then we have Since P Λ(t) converges to 0n×k0 exponentially fast, we have: 1) there exists C > 0 and 0 < ξ < 1 such that P Θ1(t + 1) = diag(α) AP Θ1 (t) +(cid:0)I − diag(α)(cid:1)P Θ1 (t)∆1 +(cid:0)I − diag(α)(cid:1)P Λ(t)B. (cid:0)I − diag(α)P Λ(t)B(cid:1) (cid:107)∞ ≤ Cξt; 2) (cid:107)P Θ1(t)1k1 − 1k1(cid:107)∞ → 0 exponentially fast, which implies d(cid:0)P Θ1 (t), Snk1 (1n)(cid:1) (cid:107) For any X ∈ Snk1 (1n), define map f by f (X) = diag(α) AX +(cid:0)I − diag(α)(cid:1)X∆1. → 0 exponentially fast. According to the proof for Case 1, there exists a unique fixed point P ∗ for the map f in Snk1 (1n), given by p∗ ir = wr(∆1). Moreover, there exists 0 <  < 1 such that, for any X ∈ Snk1 (1n), (cid:107)X− P ∗(cid:107)∞ is continuous in Snk1(1n) \ P ∗ and d(cid:0)P Θ1 (t), Snk1(1n)(cid:1) (cid:107)∞ ≤ (cid:107)X − P (cid:107) f (X) − P (cid:107)∞. ∗(cid:107)∞ (cid:107) f (X)− P ∗ ∗ Since the function T > 0 and 0 < η < 1 such that, for any t > T , → 0, there exists For t ∈ N much larger than T , (cid:107) f(cid:0)P Θ1 (t)(cid:1) (cid:107)P Θ1(t) − P (cid:107)∞ ∗ ∗ − P (cid:107)∞ ≤ η(cid:107)P Θ1 (t) − P ∗ (cid:107)∞. ∗ ≤ η(cid:107)P Θ1(t − 1) − P = ηt−T(cid:107)P Θ1 (T ) − P (cid:107)∞ + Cξt ∗ (cid:107)∞ + C ξt − ηt−T ξT . η/ξ 11 Since 0 < η < 1, 0 < ξ < 1 as t → ∞, (cid:107)P Θ1(t) − P ∗ (cid:107)∞ → 0. This concludes the proof for Case 2. (3) Case 3: For any l ∈ {1, 2, . . . , m}, P Θl (t + 1) = f(cid:0)P Θl (t)(cid:1) =(cid:0)I − diag(α)(cid:1)P Θl (t)∆l + diag(α) AP Θl (t), where ∆l1kl = 1kl since Θl is absorbing and strongly connected. Therefore, P Θl (t + 1)1kl = M P Θl (t)1kl , where M = I−diag(α)+diag(α) A is row-stochastic and aperiodic. Moreover, the graph G(M ) has a globally reachable node and therefore the matrix M has a normalized dominant left eigenvector w(M ). Applying the Perron-Frobenius theorem, t→∞ P Θl (t)1kl =(cid:0)w(cid:62) lim (cid:1)1n. (M )P Θl (0)1kl Let cl = w(cid:62)(M )P Θl (0)1kl . Following the same line of argument in the proof for Case 2, f maps Snkl (cl1n) to Snkl (cl1n), and maps Snkl (cl1n) to Snkl(cl1n). Moreover, P ∗ ∈ Rn×kl with p∗(i) = clw(cid:62)(∆l), for any i ∈ V , is the unique fixed point of the map f in Snkl (cl1n). In addition, there exists 0 <  < 1 such that for any X ∈ Snkl (cl1n), The function h(X) = we have P Θl (t)1kl → cl1kl , which implies d(cid:0)P Θl (t), Snkl (cl1kl )(cid:1) (cid:107) f (X)− P (cid:107)X− P ∗(cid:107)∞ is continuous in Snkl (cl1n)\ P ∗. Since for any P Θl (0) ∈ Snkl (cl1n)\ P ∗, → 0 as t → 0. Therefore, there exists (cid:107)∞ ≤ (cid:107)X − P (cid:107) f (X) − P ∗ (cid:107)∞. ∗ 0 < η < 1 and T > 0 such that for any t > T , ∗(cid:107)∞ (cid:107) f(cid:0)P Θl(t)(cid:1) ∗ − P (cid:107)∞ ≤ η(cid:107)P Θl (t) − P ∗ (cid:107)∞. Therefore, P Θl (t) → P ∗ as t → ∞. (4) Case 4: P Θl (t + 1) = diag(α) AP Θl (t) +(cid:0)I − diag(α)(cid:1)P Θl (t)∆l +(cid:0)I − diag(α)(cid:1)P Λ(t)Bl. for any l ∈ {1, 2, . . . , m}. Therefore, (8) where M = diag(α) A + I − diag(α) is row-stochastic and primitive. The vector φ(t) is a vanishing pertur- bation according to the proof for Case 2. Let x(t) = P Θl (t)1kl and y(t) = Qx(t) with Q defined in Lemma 8. Let yerr(t) = (y1(t), y2(t), . . . , yn−1(t))(cid:62), P Θl (t + 1)1kl = M P Θl(t)1kl + φ(t), where yi(t) = xi+1(t) − xi(t) for any i = 1, 2, . . . , n − 1. Then we have −1y(t) + Qφ(t). y(t + 1) = QM Q with ϕi(t) =(cid:80) Let ϕ(t) =(cid:0)ϕ1(t), ϕ2(t), . . . , ϕn−1(t)(cid:1)(cid:62) Moreover,(cid:80) yerr(t + 1) = Mredyerr(t) + ϕ(t). The equation above is an exponentially stable linear system with a vanishing perturbation. Since ρ(Mred) < 1, yerr → 0n−1 as t → ∞, which implies that P Θl (t)1kl → γ1n and γl depends on M , Bl, P Θl (0) and P Λ(0). l γl = 1 since P (t)1R = 1n. Following the same argument in the proof for Case 3, we obtain j Qijφj(t). ϕ(t) is also a vanishing perturbation and t→∞ pΘl(i)(t) = γlw(cid:62) lim (∆l). 12 3.2.3 Interpretations of Theorem 7 Analysis on Case 1 to 4 leads to the following conclusions: 1) The probability of adopting any product in the transient subgraph eventually decays to zero; 2) For the product-conversion graph with only on absorbing SCC G(∆1), the system's asymptotic product-adoption probability distribution only depends on w(∆1). In this case, the self conversion dominates the competitive propagation process; 3) With multiple absorbing SCCs in the product-conversion graph, the initial condition P (t) and the structure of the social network G( A) together determine the fraction each absorbing SCC eventually takes in the total probability 1; 4) In each absorbing SCC G(∆l), the asymptotic adoption probability for each product is proportional to its corresponding entry of ∆l. 3.3 Further simulation work a) Accuracy of the social-self NCPM solution: Simulation results have been presented to compare the solution to the social-self NCPM with the solution to the original Markov chain model defined by Assumption 1. Let the matrix ∆ take the following form ∆1 ∆ = 0 0 0 ∆2 0 B1 B2 ∆0  = 0.6 0.3 0 0  . 0.4 0.7 0 0.8 0 0 1 0 0 0 0 0.2 (9) The Markov-chin solution is computed by the Monte Carlo method. In each sampling, A, α and P (0) are randomly generated and set identical for the Markov chain and the NCPM. The probability p12(t) is plotted for both models on different types of social networks, such as the complete graph, the Erdos-R´enyi graph, the power-law graph and the star graph. As shown in Figure 4 and Figure 5, the solution to the social-self NCPM nearly overlaps with the Markov-chain solution in every plot, due to the i.i.d self conversion process. b) Asymptotic behavior of the Markov chain model In Figure 6 and Figure 7, all the trajectories pir(t), for the Markov-chain model on an Erdos-R´enyi graph with n = 5, p = 0.4 and randomly generated α, are computed by the Monte Carlo method. Figure 6(a) corresponds to the structure of the product-conversion graph defined by Case 4 in Definition 6 with (cid:20)0.6 0.3 (cid:20)∆1 (cid:21) 0.4 0.7 (cid:21) ∆1 = , ∆2 = 1, ∆0 = 0.2, B = [0 0.8 0]. The transient subgraph is only connected to SCC Θ1 and the intial adoption probability for H3 is 0. Fig- ure 6(b) corresponds to the structure of the product-conversion graph defined by Case 3 in Defintion 6 with ∆ = 0 0 ∆2 , ∆1 = 0.4 0.7 , ∆2 = (cid:21) (cid:20)0.6 0.3 (cid:20)0.5 0.1 (cid:21) 0.5 0.9 . The simulation results shows that, in these two cases the Markov-chain solutions converge exactly to the values indicated by the social-self NCPM, regardless of the initial condition. The matrix ∆ used in Figure 7 is given by equation (9). As illustrated by Figure 7, the asymptotic adoption probabilities vary with the initial condition in the Markov-chain model, in consistence with the results of Theorem 7. 4 Analysis on the Self-social Network Competitive Propagation Model In this section we discuss the network competitive propagation model based on Assumption 2, i.e, the case in which self conversion occurs before social conversion at each time step. Similar to what we have done in the last section, firstly we propose an approximation model, referred to as the self-social network competitive propagation model (self-social NCPM), and then analyze the dynamical properties of this approximation model. The following theorem based on Approximation 4 gives the matrix form of the self-social NCPM. 13 (a) n = 5, p = 1 (b) n = 10, p = 0.5 (c) n = 50, p = 0.1 (d) n = 50, p = 1 Figure 4: Difference between the solutions to the social-self NCPM (blue dash) and the original Markov-chain model (red) in complete graphs or Erdos-R´enyi graphs. (a) power-law graph (b) star graph Figure 5: Difference between the solutions to the social-self NCPM (blue dash) and the original Markov- chain model (red) in the power-law graph and the star graph. The power-law graph has 100 nodes, with the degree distribution p(k) = 1010k−2.87. The star graph consists of 10 nodes with node 1 as the center. 14 0102030400.250.30.350.40.45tp12(t)0102030400.250.30.350.40.45tp12(t)0102030400.250.30.350.40.45tp12(t)0102030400.250.30.350.40.45tp12(t)0102030400.20.250.30.350.40.450.5tp12(t)0102030400.20.250.30.350.40.450.5tp12(t) (a) multi-SCC + transient subgraph (b) multi-SCC Figure 6: Asymptotic behavior of the Markov chain model with the production-conversion graphs defined by Case 3 or Case 4 in Defintion 6. Every curve in this plot is a trajectory pir(t) for i ∈ V and r ∈ Θ. Here xlr = w(cid:62)(M )P Θl (0)1kl wr(∆l). (a) initial condition 1 (b) initial condition 2 Figure 7: Asymptotic behavior of the Markov chain model with the production-conversion graph consisting of multiple SCCs and a transient subgraph. Every curve in this plot is a trajectory pir(t) for i ∈ V and r ∈ Θ. 15 010203000.20.40.60.8tpir(t), i∈ V, r∈ Θ w2(∆1)w1(∆1)010203000.10.20.30.40.50.6tpir(t), i ∈ V. r ∈ Θx12x11x21x2202040608010000.20.40.6tpir(t), i ∈ V, r ∈ Θ02040608010000.10.20.30.40.50.6tpir(t), i ∈ V, r ∈ Θ Theorem 9 (Self-social NCPM). Consider the competitive propagation model based on Assumption 2, with the social network and the product-conversion graph represented by their adjacency matrices A and ∆ re- spectively. The probability pir(t) satisfies pir(t + 1) − pir(t) = s(cid:54)=r (cid:88) (cid:0)δsrpis(t) − δrspir(t)(cid:1) (cid:88) (cid:88) n(cid:88) n(cid:88) δssαi s(cid:54)=r j=1 aijpis(t)P rs ji (t) + − δrrαi aijpir(t)P sr ji (t), s(cid:54)=r j=1 for any i ∈ V and r ∈ Θ. Applying the independence assumption, the matrix form of the self-social NCPM is P (t + 1) = P (t)∆ + diag(α) diag(cid:0)P (t)δ(cid:1) AP (t) (10) with P (t) = (pir(t))n×R and δ = (δ11, δ22, . . . , δRR)(cid:62). − diag(α)P (t) diag(δ), It is straightforward to check that, for any P (t) ∈ SnR(1n), P (t + 1) is still in SnR(1n). According to the Brower fixed point theorem, there exists at least one fixed point for the system (10) in SnR(1n). Since the nonlinearity of equation (10) add much difficulty to the analysis of it, in the remaining part of this section we discuss the special case when R = 2. 4.1 Existence and uniqueness of the fixed point For simplicity, in this section, let p(t) = p2(t) =(cid:0)p12(t), p22(t), . . . , pn2(t)(cid:1)(cid:62) always assume that δ22 ≥ δ11. Define the map h : Rn → Rn by . Without loss of generality, we h(x) = δ121n + (1 − δ12 − δ21)x + δ11 diag(α) Ax − δ22 diag(α)x + (δ22 − δ11) diag(α) diag(x) Ax. Then the self-social NCPM for R = 2 is written as p(t + 1) = h(p(t)), (11) (12) and p1(t) is computed by p1(t) = 1n − p(t). First we prove that the two-product self-social NCPM possesses a unique fixed point. Lemma 10 (Invariant domain of map h). The map h defined by equation (11) is a continuous map from [0, 1]n to [0, 1]n itself. Proof. The map h is polynomial and hence continuous. Firstly, we prove that, for any x ∈ [0, 1]n, h(x) (cid:23) 0n. Since and h(x) = δ12(1n − x) + δ11 diag(α) Ax + (1 − δ21)x − δ22 diag(α)x + (δ22 − δ11) diag(α) diag(x) Ax (1 − δ21)x − δ22 diag(α)x (cid:23) (1 − δ21 − δ22)x = 0n, 16 Secondly, we prove that for any x ∈ [0, 1]n, h(x) (cid:22) 1n. Recall that x−i = ( Ax)i =(cid:80) Moreover, since (cid:80) the right-hand side of the expression of h is nonnegative. Therefore, for any x ∈ [0, 1]n, h(x) (cid:23) 0n. j aijxj. That is, x−i is the weighted average of all the xj's except xi and the value of x−i does not depend on xi since aii = 0. j aij = 1 for any i ∈ V , x−i is also in the interval [0, 1]. According to equation (11), rewrite the i-th entry of h(x) as h(x)i = δ12 + δ11αix−i + ηixi, where ηi = 1− δ12− δ21− δ22αi + (δ22− δ11)αix−i. The maximum value of ηi is 1− δ12− δ21− δ11αi, obtained when x−i = 1. Therefore, Then we have ηixi ≤ max(1 − δ12 − δ21 − δ11αi, 0). h(x)i ≤ δ12 + δ11αi + max(1 − δ12 − δ21 − δ11αi, 0) = max(δ22, δ12 + δ11αi) < 1. The inequality above leads to h(x) (cid:22) 1n for any x ∈ [0, 1]n. Theorem 11 (Existence and uniqueness of the fixed point for two-product self-social NCPM). The map h defined by equation (11), with parameters δ11, δ12, δ21, δ22, α1, . . . , αn all in the interval (0, 1) and δ22 ≥ δ11, possesses a unique fixed point point p∗ in [0, 1]n. Proof. According to Lemma 10, for any p(t) ∈ [0, 1]n, p(t + 1) is still in [0, 1]n. According to the Brower fixed point theorem, there exists p∗ such that h(p∗) = p∗. This concludes the proof of the existence of a fixed point. Any fixed point of map h should satisfy h(p∗) = p∗, that is, 0n = δ121n + δ11 diag(α) Ap∗ where K = (δ12 + δ21)I + δ22 diag(α) is a positive diagonal matrix. Define a map T : Rn → Rn by The the existence and uniqueness of the fixed point in [0, 1]n for the map h is equivalent to the existence and uniqueness of the fixed point for the map T . Now we prove that T has a unique fixed point in [0, 1]n by showing that T maps [0, 1]n to [0, 1]n and T is a contraction map. complete metric space. For any x and y ∈ [0, 1]n, define the distance d(x, y) by d(x, y) = (cid:107)x − y(cid:107)∞. Then ([0, 1]n, d) is a According to equation (14), since K−1, diag(α), A, δ22 − δ11 and diag(x) are all nonnegative, for any x, y ∈ [0, 1]n and x (cid:22) y, we have T (x) (cid:22) T (y). Moreover, T (0n) = δ12K −11n (cid:31) 0n, and Since T (1n) = δ12K = δ12K −11n + δ11K −11n + δ22K −1α + (δ22 − δ11)K −1α. −1α T (1n)i = δ12 + δ22αi δ12 + δ21 + δ22αi < 1, 17 Therefore, p∗ = δ12K + (δ22 − δ11) diag(α) diag(p∗ ) Ap∗ − (δ12 + δ21)p∗ − δ22 diag(α)p∗ . −11n + δ11K −1 diag(α) Ap∗ −1 diag(α) diag(p∗ ) Ap∗ , + (δ22 − δ11)K T (x) = δ12K −11n + δ11K −1 diag(α) Ax + (δ22 − δ11)K −1 diag(α) diag(x) Ax. (13) (14) we have T (1n) ≺ 1n. Therefore, for any x ∈ [0, 1]n, T (x) ∈ [0, 1]n, i.e., T maps [0, 1]n to [0, 1]n. Now we prove that T is a contraction map. For any x, y ∈ [0, 1]n, T (x)i − T (y)i = δ11αi (x−i − y−i) Ki (δ22 − δ11)αi + Ki (xix−i − yiy−i). Moreover, and Therefore, x−i − y−i ≤ aijxj − yj n(cid:88) n(cid:88) j=1 j=1 ≤ ( aij) max j xj − yj = (cid:107)x − y(cid:107)∞, xix−i − yiy−i ≤ max(cid:0) max y2 i − min ≤ 2(cid:107)x − y(cid:107)∞. i i (cid:1) x2 i , max i x2 i − min i y2 i where i = (2δ22−δ11)αi y. Let  = maxi i. Then for any x, y ∈ [0, 1]n, δ12+δ21+δ22αi . It is easy to check that i < 1 for any i ∈ V and i does not depend on the x and T (x)i − T (y)i ≤ i(cid:107)x − y(cid:107)∞, Applying the Banach fixed point theorem, we know that the map T possesses a unique fixed point p∗ in [0, 1]n. In addition, for any p(0), the sequence {p(t)}t∈N defined by p(t + 1) = T(cid:0)p(t)(cid:1) satisfies (cid:107)T (x) − T (y)(cid:107)∞ ≤ (cid:107)x − y(cid:107)∞ with  < 1. t→∞ p(t) = p∗ lim . Theorem 11 not only proves the existence and uniqueness of the fixed point p∗ in [0, 1]n, but also implies some properties of p∗ by introducing the map T . Two properties of p∗ are given below. Corollary 12 (Lower and upper bound of the unique fixed point). For the two-product self-social NCPM with δ22 ≥ δ11, the unique fixed point p∗ in [0, 1]n satisfies 1 2 1n (cid:22) p∗ (cid:22) δ12 δ12 + δ21 1n. (15) Proof. One can easily check that when δ22 ≥ δ11, T ( 1 T maps S = {x ∈ Rn 1 point p∗ is in S. 2 1n (cid:22) x (cid:22) δ12 1n. Therefore, 1n} to S itself. Since T is a contraction map, the unique fixed 1n) (cid:22) δ12 2 1n) (cid:23) 1 2 1n and T ( δ12+δ21 δ12+δ21 δ12+δ21 δ12 This corollary has a meaningful interpretation. The condition δ22 ≥ δ11 is equivalent to δ12 ≥ δ21, which means that the nodes in state H1 have a higher or equal tendency of converting to H2 than the tendency of self conversion from H2 to H1. In this sense the product H2 is advantageous to H1 and therefore the fixed point is in favor of H2, that is, p∗ The following corollary gives an upper bound for the difference between p∗ −i =(cid:80) i and p∗ j aijp∗ j . ≥ 1 2 1n. 18 Corollary 13 (Difference between p∗ unique fixed point satisfies, for any i ∈ V , ∗ i − p i and p∗ p −i). For the two-product self-social NCPM with δ22 ≥ δ11, the ∗ −i ≤ 2 αi 1 − 1 αi δ22 − δ11 δ22 + δ11 . (16) Proof. According to equation (13), we have ∗ ∗ ∗ i − C−ip −i = δ12 − δ12p Cip i , where Ci = δ21 + δ22αi and C−i = δ11αi + (δ22 − δ11)αip∗ Firstly we point out that Ci > C−i because i . ∗ Ci − C−i = δ21 + αi(δ22 − δ11)(1 − p i ) > 0. Moreover, ∗ −i ∗ i −p p = = i δ12 − (δ12 + Ci − C−i)p∗ δ12 − (cid:0)δ12 + δ21 + αi(δ22 − δ11)(1 − p∗ i )(cid:1)p∗ C−i δ11αi + (δ22 − δ11)αip∗ i i . 2 ≤ p∗ 2 αi i ≤ δ12 δ22 − δ11 δ22 + δ11 1 − 1 αi The right-hand side of the equation above with 1 δ12+δ21 achieves its maximum value at p∗ i = 1 2 . This concludes the proof. 4.2 Stability of the unique fixed point Notice that any sequence {p(t)}t∈N defined by p(t + 1) = T (p(t)) converging to p∗ does not necessarily lead to the global stability of p∗ for the system (12). Further analysis is needed for the global or local stability of the same fixed point p∗ in system (12). First we consider a special case in which δ11 = δ22. and for any initial condition p(0), the solution sequence {p(t)}t∈N computed by p(t + 1) = h(cid:0)p(t)(cid:1) converges Proposition 14 (Global Stability for the two-product self-social NCPM with δ11 = δ22). For the two-product self-social NCPM given by equation (12), if δ11 = δ22, then the system has a unique fixed point p∗ = 1 2 1n to p∗ exponentially fast. Proof. With δ11 = δ22, the map h becomes h(cid:0)x(cid:1) = x + δ121n − 2δ12x + δ11 diag(α)(cid:0) Ax − x(cid:1). One can easily check that p∗ = 1 Let p(t) = y(t) + 1 2 1n. Then the two-product self-social NCPM becomes 2 1n is a fixed point. According to Theorem 11, the fixed point is unique. y(t + 1) = M y(t), where M = (1 − 2δ12)I + δ11 diag(α) A − δ11 diag(α). For any i ∈ V , if 1 − 2δ12 − δ11αi ≥ 0, then the i-th absolute row sum of M is equal to n(cid:88) j=1 Mij = 1 − 2δ12 − δ11αi + δ11αi = 1 − 2δ12 < 1, 19 and, if 1 − 2δ12 − δ11αi < 0, the i-th absolute row sum satisfies Mij = 2δ12 + δ11αi + δ11αi − 1 < 1. n(cid:88) (cid:80)n j=1 Since ρ(M ) ≤ (cid:107)M(cid:107)∞ = maxi p∗ = 1 2 1n is exponentially stable for any initial condition p(t) ∈ [0, 1]n. j=1Mij, the spectral radius of M is strictly less than 1. The fixed point For the case δ22 > δ11, we give two propositions on the sufficient conditions, which are inequalities on the parameters α, δ11 and δ22, for the local stability and global stability respectively. By "global stability" we mean the stability of p∗ for any p(0) ∈ [0, 1]n. Proposition 15 (Sufficient condition on local stability for two-product self-social NCPM with δ22 > δ11). Consider the two-product self-social NCPM (12) on the connected network represented by the adjacency matrix A. Suppose δ22 > δ11. Then the unique fixed point p∗ is locally stable as long as αi < 8δ11δ22 (δ22 − δ11)2 + 8δ11δ22 . (17) Proof. Let p(t) = y(t) + p∗. Then system (12) becomes y(t + 1) = M y + (δ22 − δ11) diag(α) diag(y(t)) Ay(t). The right-hand side of the equation above is a linear term M y(t) with a constant matrix M , plus a quadratic term. The matrix M can be decomposed as M = M − δ12I and M = M (1) + M (2) is further decomposed into a diagonal matrix M (1) and a matrix M (2) in which all the diagonal entries are 0. Since M (1) = (1 − δ12)I − δ22 diag(α) + (δ22 − δ11) diag(α) diag( Ap∗ ) is a positive diagonal matrix, and M (2) = δ11 diag(α) A + (δ22 − δ11) diag(α) diag(p∗ ) A , 1 N2 , . . . , 1 Nn is a matrix with all the diagonal entries being zero and all the off-diagonal entries being nonnegative, the matrix M = M (1) + M (2) is nonnegative and, thereby, the matrix M is thus a Metzler matrix. Since A = diag( 1 N1 )A, the matrix M can be written in the form DA+E, where A is symmetric and D, E are positive diagonal matrix. One can easily prove that all the eigenvalues of any matrix in the form M = DA + E are real since M is similar to the symmetric matrix D The local stability of p∗ is equivalent to the inequality ρ(M ) < 1, which is in turn equivalent to the First we prove λmax( M ) < 1 + δ12. Since A is irreducible and α (cid:31) 0n, p∗ intersection of the following two conditions: λmax( M ) < 1 + δ12 and λmin( M ) > −1 + δ12. (cid:31) 0n, we have Mij > 0 if and only if aij > 0 for any i (cid:54)= j. In addition, Mii > 0 for any i ∈ V . Therefore, M is irreducible, aperiodic and thus primitive. According to the Perron-Frobenius theorem, λmax( M ) = ρ( M ). We have ρ( M ) ≤ (cid:107) M(cid:107)∞ and for any i ∈ V , 2 (A + D−1E)D 1 2 . 1 (cid:1). ∗ ∗ −i + p i ) − αi j (cid:88) Mij = 1 − δ21 + (δ22 − δ11)(cid:0)αi(p (cid:88) Mij ≤ 1 − δ21 + 1 − δ21 ≤ (δ12 − δ21)2 δ12 + δ21 j αi < 1 + δ12. According to Corollary 12, for any i ∈ V , Therefore, λmax( M ) ≤ 1 − δ21 + (δ12 − δ21)2 δ12 + δ21 αi < 1 + δ12. 20 Now we prove λmin( M ) > −1 + δ12. According to the Gershgorin circle theorem, For any i ∈ V , Mii− (cid:88) Mij). j(cid:54)=i ( Mii − i λmin( M ) ≥ min (cid:88) Mij j(cid:54)=i = 1 − δ21 − δ22αi + (δ22 − δ11)αi (cid:88) j ∗ j aijp According to Corollary 13, ∗ i − δ11αi − (δ22 − δ11)αip = 1 − δ21 − αi(δ22 + δ11) ∗ ∗ −i). i − p − αi(δ22 − δ11)(p p ∗ i − p ∗ −i ≤ 2 αi 1 − 1 αi δ22 − δ11 δ22 + δ11 . Moreover, inequality (17) is necessary and sufficient to Therefore, Mii− 1 − 1 αi (cid:88) Mij 2 αi δ22 − δ11 δ22 + δ11 < 1 − αi αi δ22 + δ11 δ22 − δ11 . j(cid:54)=i > 1 − δ21 − αi(δ22 + δ11) − (1 − αi)(δ22 + δ11) = −1 + δ12, for any i ∈ V . That is to say, the inequality (17) is sufficient to ρ(M ) < 1, i.e., the local stability of p∗. From the proof we know that, around the unique fixed point, the linearized system is y(t + 1) = M y(t), where M is a Metzler matrix and is Hurwitz stable. Usually the Metzler matrices are presented in continuous- time network dynamics models, for example, the epidemic spreading model [13, 21]. In the proof of Propo- sition 15, we provide an example for which the Metzler matrix appears in a stable discrete-time system. In the proposition below, a sufficient condition on the global stability of p∗ is given. Proposition 16 (Sufficient condition on global stability for two-product self-social NCPM with δ22 > δ11). Consider the two-product self-social NCPM on the connected network with adjacency matrix A. Suppose δ22 > δ11. If αi < δ22 + δ11 3δ22 − δ11 , (18) then (i. for any initial condition p(0) ∈ [0, 1]n, the sequence {p(t)}t∈N defined by p(t + 1) = f(cid:0)p(t)(cid:1) satisfies (cid:0) max(i, Kii + Ki − 1)(cid:1), where i and p(t) → p∗ exponentially fast as t → ∞; (ii. and moreover, the convergence rate is upper bounded by maxi Ki are respectively defined by i = (2δ22 − δ11)αi/Ki, and Ki = δ12 + δ21 + δ22αi. Proof. Observe that the maps h and T satisfy the following relation: h(x) = KT (x) + (I − K)x, 21 for any x ∈ [0, 1]n, where K = (δ12 + δ21)I + δ22 diag(α). For any x, y ∈ [0, 1]n, h(x)i−h(y)i = Ki (cid:0)T (x)i − T (y)i (cid:1) + (1 − Ki)(xi − yi). We estimate the upper bound of h(x)i − h(y)i in terms of (cid:107)x − y(cid:107)∞ in two cases. Case 1: δ12 + δ21 + δ22αi < 1 for any i, i.e, αi < δ11 δ22 for any i. First we point out that δ11 δ22 + 1 − 1 δ22 δ22 + 1 − 1 δ11 + δ22 < 3δ22 − δ11 T (x)i − T (y)i ≤ i(cid:107)x − y(cid:107)∞, always holds as long as δ11 < δ22. Then recall that, for any x, y ∈ [0, 1]n, where i = (2δ22−δ11)αi Ki < 1. Therefore, h(x)i − h(y)i ≤ (Kii + 1 − Ki)(cid:107)x − y(cid:107)∞, for any i ∈ V . The coefficient Kii + 1 − Ki is always strictly less than 1 because it is a convex combination of i < 1 and 1. Therefore, h is a contraction map. . In this case, for any such i, Case 2: There exists some i such that δ12 + δ21 + δ22αi ≥ 1, i.e., αi ≥ δ11 h(x)i − h(y)i ≤ (Kii + Ki − 1)(cid:107)x − y(cid:107)∞. δ22 + 1 − 1 δ22 If then we have αi < δ11 + δ22 3δ22 − δ11 , Kii + Ki − 1 = (3δ22 − δ11)αi + δ12 + δ21 − 1 < δ11 + δ22 + δ12 + δ21 − 1 = 1. Therefore, h is also a contraction map. Combining Case 1 and Case 2 we conclude that if αi < δ11+δ22 3δ22−δ11 for any i ∈ V , then h is a contraction map. According to Lemma 10, h maps [0, 1]n to [0, 1]n. Therefore, according to the Banach fixed point theorem, for any initial condition p(0) ∈ [0, 1]n, the solution p(t) converges to p∗ exponentially fast and the (cid:0) max(i, Kii + Ki − 1)(cid:1). convergence rate is upper bounded by maxi Figure 8 plots the right-hand sides of inequalities (17) and (18), respectively, as functions of the ratio , for the case when 0 < δ11 , the sufficient condition δ22 δ11 δ22 we propose for the global stability is more conservative than the sufficient condition for the local stability. < 1. One can observe that, for a large range of δqq δ22 One major difference between the self-social and the social-self NCPM in the asymptotic property is that, in the self-social NCPM, every individual's state probability distribution is not necessarily identical. Moreover, distinct from the social-self NCPM, for any of the four cases of G(∆) defined in Definition 6, the asymptotic behavior of the self-social NCPM depends on not only the structure of G(∆), but also the structure of the social network G( A) and the individual open-mindedness α. 5 Non-cooperative Multi-stage Competitive Propagation Games In this section, based on the social-self NCPM given by equation (4), we propose two types of non-cooperative, multi-player and multi-stage games. The players are the R companies, each of which has a product competing in the social network. At each time step, based on the system's current product-adoption probability distribution, all the companies make decisions on the allocation of their investments, with limited budget, to maximize the probability that their products are adopted after the current time step. In the first subsection we discuss the model in which each company can invest both on seeding, e.g., advertisement and promotion, and on the product's quality; Then, in the second subsection, we discuss the model in which the products' quality is fixed and the companies can only invest on seeding. All the notations in Table 1 and the previous sections still apply and, in Table 2, we introduce some additional notations and functions exclusively for this section. 22 X(t) w(t) c gr(w) ψr(x(i); γ) ψr Table 2: Notations and functions used in Section V (cid:0)xir(t)(cid:1) seeding matrix at time t. X(t) = n×R, where xir(t) ≥ 0 is com- pany r's investment on seeding for in- dividual i. xr(t) is the r-th column of X(t) and x(i)(t) is the i-th column of X(t) the quality investment vector at time t. w(t) ∈ RR×1, and each entry wr(t) ≥ 0 is company r's investment at time t on product Hr's quality the budget vector. c ∈ RR×1 and c (cid:31) 0R. entry cr is the budget limit for company r : R1×R≥0 → R≥0 defined by ψr(x(i); γ) = xir/(x(i)1R + γ), with model parameter γ > 0 gr : RR×1≥0 → R≥0 defined by gr(w) = wr/1(cid:62) Rw, if wr > 0; gr(w) = 0, if wr = 0 (cid:22) c(cid:62) } Ωr n X + w(cid:62) Ω the set of all the players' possible ac- tions. Ω = {(X, w)X (cid:23) 0n×R, w (cid:23) 0R, 1(cid:62) the action space for company r. Ωr = {(xr, wr) xr (cid:23) 0R, wr ≥ 0, 1(cid:62) βr(t) βr(t) = (cid:0)β1r(t), . . . , βnr(t)(cid:1)(cid:62) n xr + wr ≤ cr} Apr(t) = 23 Figure 8: This figure illustrates how the conditions for the local stability and global stability change with the ratio δ11/δ22. Curve (1) is 8δ11δ22/((δ22) − δ11)2 + 8δ11δ22), i.e, corresponding to the condition for local stability. Curve (2) is (δ22 + δ11)/(3δ22 − δ11), corresponding to the condition for global stability. Curve (3) is δ11/δ22. 5.1 Model 1: competitive seeding-quality game a) Model set-up: The multi-stage competitive seeding-quality game is formalized as follows. a.1) Players: The players are the R companies. Each company r has a product Hr competing on the network. n xr(t) + wr(t) ≤ cr. a.2) Players' actions: At each time step, each company r has two types of investments. The investment on seeding, i.e., xr(t), changes the individuals' product-adoption probability in the social conversion process, while the investment on quality, i.e., wr(t), influences the product-conversion graph. The total investment is bounded by a fixed budget cr, i.e., 1(cid:62) (cid:16) a.3) Rules: We model the effect of investment on seeding as follows. For any individual i ∈ V , each (cid:0)x(i)(t); γ(cid:1) for any i ∈ V and r ∈ Θ. The probability that individual i picks individual j in company r's investment xir(t) creates a "virtual node" in the network, who is always adopting the prod- uct Hr. In the social conversion process, the probability that individual i picks any company r's virtual node is ψr aij. As for the investment on prod- the social conversion process is then given by uct quality, we assume that the product-conversion graph is associated with a rank-one adjacency matrix c, which is specified later in this subsection. With each company r's action (cid:0)xr(t), wr(t)(cid:1) at time t, the [δ11n, δ21n, . . . , δR1n] and δr = gr(w(t)) is determined by all the companies' investments on product quality. We exclude the non-realistic case when w = 0R by imposing an additional condition on the budget vector dynamics of the product-adoption probabilities P (t) ∈ Rn×R≥0 n(cid:88) (cid:0)x(i); γ(cid:1)(cid:17) (cid:80)R is given by s=1 ψs 1 − pir(t) = αi x(i)(t)1R + γ γ aikpkr(t − 1) (cid:0)x(i)(t); γ(cid:1) + (1 − αi)gr (cid:0)w(t)(cid:1), k=1 + αiψr for any i ∈ V and r ∈ Θ. adoption probability of Hr, i.e., ur (cid:0)X(t), w(t)(cid:1) = 1(cid:62) a.4) Pay-offs: At each time step t, the pay-off for any company r, denoted by ur (19) (cid:0)X(t), w(t)(cid:1), is the total n pr(t), where pr(t) is the r-th column vector of P (t). 24 00.20.40.60.8100.20.40.60.81δ11/δ22(1)(2)(3) any r, Any Nash equilibrium(cid:0)X∗(t), w∗(t)(cid:1) at stage t for the multi-stage game defined above satisfies that, for for any(cid:0)X(t), w(t)(cid:1) wr(t) (cid:54)= w∗ (t), w∗ ∈ Ω such that xs(t) = x∗ s (t) for any s (cid:54)= r, and xr(t) (cid:54)= x∗ b) Theoretical Analysis of Nash equilibrium and system's dynamical behavior: The following theorem gives a closed-form expression of the Nash equilibrium at each stage and the system's asymptotic behavior when every player is adopting the policy at the Nash equilibrium. (cid:0)X(t), w(t)(cid:1), s(t) and ws(t) = w∗ (t)(cid:1) (cid:0)X r(t) and ≥ ur r (t). (20) ur ∗ Theorem 17 (Competitive seeding-quality game). Consider the R-player multi-stage game described above in this subsection. Further assume that the budget limit cr for any company r satisfies (cid:110) (cid:111) . cr > max nγ 1(cid:62) n (1n − α) 1(cid:62) n α n , ( mini αi − 1)γ i) at each time step t + 1, the Nash equilibrium(cid:0)X∗(t + 1), w∗(t + 1)(cid:1) is given by Then we have the following conclusions: ∗ ir(t + 1) = x ∗ r (t + 1) = w αi n (cid:18) αiγ cr + n 1(cid:62) n α n 1 − (cid:19)(cid:0)cr + 1(cid:62) 1(cid:62) n βr(t) − βir(t)γ, n βr(t)γ(cid:1), (21) (22) (23) (25) (26) (27) and x∗ ir(t) > 0, w∗ ii) if(cid:0)X(t), w(t)(cid:1) =(cid:0)X∗(t), w∗(t)(cid:1) for any t ∈ N and P (0) ∈ SnR(1n), then P (t), for t ≥ 1, is a rank-one (cid:3). Moreover, for any r ∈ Θ, as t → ∞, pr(t) converges to matrix of the form (cid:2)p1(t)1n, p2(t)1n, . . . , pR(t)1n r (t) > 0 for any i ∈ V, r ∈ Θ; cr/1(cid:62) Rc exponentially fast with the rate nγ/(1(cid:62) Rc + nγ). Proof. Since we only discuss time step t + 1 in this proof, for simplicity of notations and without causing any confusion, we use xir (wr, x∗ r resp.) for xir(t + 1) (wr(t + 1), x∗ ir(t + 1), w∗ r (t + 1) resp.). ir, w∗ If company r knows the actions of all the other companies at time step t + 1, i.e., (xs, ws), for any s (cid:54)= r, the optimal response for company r is the solution to the following optimization problem: − 1(cid:62) minimize (x,w)∈Ωr subject to 1(cid:62) n x + w − cr ≤ 0. n pr(t + 1) (24) n xr + µrwr − µrcr, for any i ∈ V and r ∈ Θ. ∂Lr ∂xir n pr(t + 1) + µr1(cid:62) The solution to the optimization problem (24) satisfies Let xir = xir + βir(t)γ and Lr(xr, wr, µr) = −1(cid:62) (cid:80) ((cid:80)R = −αi = −1(cid:62) = 1(cid:62) ∂Lr ∂wr ∂Lr ∂µr According to equation (20), (x∗ r, w∗ n x∗ s, w∗ s ) for any s (cid:54)= r. One immediate result is that 1(cid:62) s(cid:54)=r xis s=1 xis)2 s(cid:54)=r ws (1(cid:62) Rw)2 n xr + wr − cr = 0. n (1n − α) (cid:80) + µr = 0, + µr = 0, (x∗ equation (25), we have that, at the Nash equilibrium at time step t + 1, r ) is the solution to the optimization problem (24) with (xs, ws) = r − cr = 0 for any r ∈ Θ. Then, according to r + w∗ 1 √µr = (cid:80)n k=1 (cid:113) (cid:80) s(cid:54)=r x∗ ks 1 αk 25 R(cid:88) s=1 (cid:0)cs − w n βsγ(cid:1), ∗ s + 1(cid:62) and therefore, for any r, τ ∈ Θ. The equation above leads to = R(cid:80) s=1 is ks αi αi k=1 k=1 αk αk s(cid:54)=r (cid:113) n(cid:80) (cid:80) (cid:114) (cid:80) s(cid:54)=r x∗ x∗ (cid:113) (cid:80) (cid:113) (cid:80) (cid:80)n s(cid:54)=r x∗ (cid:80) (cid:80) s(cid:54)=r x∗ s(cid:54)=τ x∗ (cid:80) (cid:80) s(cid:54)=r x∗ s(cid:54)=r x∗ (cid:80)R (cid:80)R s=1 x∗ s=1 x∗ = js js is is is is is s(cid:54)=r x∗ ks = is = = k=1 k=1 (cid:80)n (cid:80)n (cid:80) (cid:80) s(cid:54)=τ x∗ s(cid:54)=τ x∗ (cid:115)(cid:80) (cid:114) αi (cid:80) s(cid:54)=r x∗ s(cid:54)=r x∗ (cid:0)cr − w αj js is is n βs(t)γ(cid:1) . s=1 αi x∗ s + 1(cid:62) R(cid:80) (cid:0)cs − w∗ (cid:113) (cid:80) (cid:113) (cid:80) (cid:80)n s(cid:54)=τ x∗ s(cid:54)=τ x∗ (cid:113) (cid:80) (cid:113) (cid:80) s(cid:54)=r x∗ s(cid:54)=τ x∗ (cid:80)R (cid:80)R s=1 x∗ s=1 x∗ 2 x∗ x∗ αk αk αk k=1 = = ks ks ks js jr is ir , . , x∗ x∗ ir jr = αi αj , is js ⇒ n βr(t)γ(cid:1). ∗ r + 1(cid:62) (28) (29) The right-hand side of the equation above does not depend on the product index r. Therefore, Since the right-hand side of the equation above does not depend on the individual index i, we have for any r, τ ∈ Θ. Combine the equation above with equation (28) and then we obtain for any r ∈ Θ. Therefore, αi 1(cid:62) n α Combining equation (29) and (26), we obtain ∗ ir = x cr − w∗ r + 1(cid:62) w∗ r n βr(t)γ = cτ − w∗ τ + 1(cid:62) w∗ τ n βτ (t)γ = η, n α/1(cid:62) for any r, τ ∈ Θ and some constant η. Substitute the equation above back into equation (26), we solve that η = 1(cid:62) n (1n − α). Therefore, we obtain equation (23) and by substituting equation (23) into equation (29) we obtain equation (22). Moreover, one can check that equation (21) guarantees x∗ ir > 0 and w∗ r > 0 for any i ∈ V and r ∈ Θ. This concludes the proof for Conclusion i). Substituting euqation (22) and (23) into the dynamical system (19), after simplification, we have Therefore, pr(t + 1) =(cid:0)cr + nγpr(t)(cid:1)/(1(cid:62) pr(t + 1) = to all the results in Conclusion ii). cr + 1(cid:62) 1(cid:62) Rc + nγ n Apr(t)γ 1n = pr(t + 1)1n. Rc + nγ) for any t ≥ 1. One can check that the equation above leads c) Interpretations and Remarks: The basic idea of seeding-quality trade-off in the competitive seeding- quality game is similar to the work by Fazeli et. al. [14] but our model is essentially different from [14] in that our model is multi-stage, and takes the products, rather than the individuals, as the players. Moreover, our model is based on a different network propagation dynamics. Theorem 17 provides some strategic insights on the investment decisions and the seeding-quality trade-off. c.1) Interpretation of βir(t): By definition, βir(t) is the average probability, among all the neighbors of k=1 alkβkr(t)/n is a convext individual i, of adopting product Hr at time step t, while 1(cid:62) combination of all the entries of βr(t) and characterizes the current overall acceptance of product Hr. l=1 n βr(t)/n =(cid:80)n (cid:80)n 26 c.2) Seeding-quality trade-off: According to equation (23), at the Nash equilibrium, the investment on Hr's product quality monotonically decreases with 1(cid:62) n βr. This observation implies that: 1) in a society with relatively low open-mindedness, the competing companies should relatively emphasize more on improving their products' quality, rather than seeding, and vice versa; 2) for products which are currently not widely adopted, seeding is relatively more efficient than improving the product's quality. n α/n, and increases with 1(cid:62) c.3) Allocation of seeding resources among the individuals: According to equation (22), for any company r, at the Nash equilibrium at each time step t + 1, the investment on seeding for any individual i, i.e., xir(t + 1), increases with individual i's open-mindedness, since it is easier for a more open-minded individual to be influence by seeding. Moreover, if we rewrite equation (22) as ∗ ir(t + 1) = x αi n cr + αiγ n βkr(t) − (1 − αi n )γβir(t), one would observe that x∗ ir(t) monotonically decreases with βir(t), which denotes the average probability of adopting Hr among individual i's neighbors. A possible explanation is that, with large βir(t), individual i is very likely to be converted to Hr due to her neighbors, and thereby the seeding for individual i is relatively not necessary. Once again we rewrite equation (22) as (cid:88) k(cid:54)=i n(cid:88) (cid:88) l=1 αiγ n n(cid:88) k(cid:54)=i l=1 ∗ ir(t + 1) = x αi n cr + alipir(t) + αiγ n alkpkl(t) − γ n(cid:88) k=1 aikpkr(t). with (cid:80)n others, and (cid:80)n l=1 alipir(t), in which (cid:80)n On the right-hand side of the equation above, only the second term contains pir(t). Therefore, x∗ ir(t) increases l=1 ali is individual i's in-degree, reflecting i's potential of influencing the l=1 alipir(t) characterizes individual i's potential of converting other individuals to product Hr. c.4) Nash equilibrium on the boundary: Without equation (21), the right-hand sides of equation (22) and (23) could be non-positive. In this case, the analysis becomes more complicated and the Nash equilibrium would be on the boundary of Ω, i.e., some of the x∗ c.5 Preset quality: In order to make the quality function gr(w) smooth at w = 0R, we can modify its definition as gr(w; ξ, u) = (wr + ξru)/(1T Rw + u), where u > 0 and xi (cid:31) 0R are model parameters and 1T Rξ = 1. The parameter ξr characterizes product Hr's preset relative quality. Based on the same argument of the proof for Theorem 17, one can check that, for the Nash equilibrium at which all the individuals' investments on both seeding and quality are positive, w∗ n αξr/n is equal to the right-hand side of equation (23) and thereby any company r's investment on quality decreases with Hr's preset relative quality. r (t + 1) + u1(cid:62) ir(t) or w∗ r (t) should be 0. 5.2 Model 2: competitive seeding game In this subsection we consider the case when the products' relative quality is fixed and the competing companies can only invest on seeding. The model set-up is the same with the game proposed in Section n xr ≤ cr. The dynamics of P (t) =(cid:0)pir(t)(cid:1) V.A, except that the action for any company r is xr ∈ Rn×1≥0 , constrained by 1(cid:62) n×R, with seeding actions X(t), is given by pir(t + 1) = αi γβir(t) + xir(t) x(i)(t)1R + γ R(cid:88) s=1 + (1 − αi) pis(t)δsr. (30) The following theorem gives the closed-form expression of the unique Nash equilibrium at each time step and the system's dynamical behavior if all the companies are adopting the policies at the Nash equilibrium. Theorem 18 (Competitive propagation game with seeding only). Consider the competitive seeding game described in this subsection. Assume that cr > (1(cid:62) n α/ mini αi − 1)γ for any r ∈ Θ. Then we have: 27 i) at each time step, the Nash equilibrium X∗(t) is given by x∗ r(t) = cr + 1(cid:62) n βr(t)γ 1(cid:62) n α α − γβr(t), and x∗ r(t) (cid:31) 0n, for any r ∈ Θ; ii) if X(t) = X∗(t) for any t ∈ N, then the matrix form of system (30) is given by P (t + 1) = diag(α) n ) AP (t) 1nc(cid:62) + γ(1n1(cid:62) 1(cid:62) n c + nγ + (I − diag(α))P (t)∆. ∈ SnR(1n) for the system above, and, for any P (0) ∈ SnR(1n), n c + nγ) + (1− αi)ζ(∆), (31) Moreover, there exists a unique fixed point P ∗ P (t) converges to P ∗ exponentially fast with the convergence rate η = maxi αinγ/(1(cid:62) where 0 ≤ ζ(∆) = 1 − r=1 mins δsr ≤ 1. (cid:80)R Proof of Conclusion i) in Theorem 18 is similar to the proof of Conclusion i) in Theorem 17. As for Conclusion ii) in Theorem 18, following the same line of argument in the proof of Case 1 in Theorem 7 and applying the Banach fixed point theorem, one can check that equation (31) defines a contraction map. Interpretations on the allocation of seeding investments among the individuals, for the competitive seeding-quality game proposed in the previous subsection, also applies to the competitive seeding game proposed in this subsection. One main difference in dynamical property between these two game-theoretic models is that, in the competitive seeding game defined in Section V.B, the matrix P (t) does not become a rank-one matrix with all the players adopting the policies at the Nash equilibrium, and moreover, the fixed point P ∗ for system (31) depends not only on the budgets vector c, but also on α and A. 5.3 Simulation illustration Simulation work has been conducted for the two game-theoretic models analyzed in this section, on a competitive propagation system with R = 2, n = 5 and A being strongly connected. The model parameters are set as α = (0.8, 0.85, 0.75, 0.84, 0.76)(cid:62), γ = 100, c1 = 600, c2 = 900, such that the conditions on cr in Theorem 17 and 18 are satisfied. For the competitive seeding game, ∆ is randomly generated. Figure 9(a) shows that, for the competitive seeding-quality game, the average probability of adopting H1 (H2 resp.) converges to c1/(c1 + c2) (c2/(c1 + c2) resp.), as predicted by Theorem 17. In addition, Figure 9(b) shows that, for the competitive seeding game, the average probability of adopting H1 (or H2 resp.) also converges. Moreover, one can observe, from both Figure 9(a) and 9(b), that the company adopting the Nash policy, with the other company just randomly allocating the investment, has higher pay-off than in the case in which both sides are adopting the policies at the Nash equilibrium. 6 Conclusion This paper discusses a class of competitive propagation models based on two product-adoption mechanisms: the social conversion and the self conversion. Applying the independence approximation we propose two difference equations systems, referred to as the social-self NCPM and the self-social NCPM respectively. Theoretical analysis reveals that the structure of the product-conversion graph plays an important role in determining the nodes' asymptotic state probability distributions. Simulation results reveal the high accuracy of the independence approximation and the asymptotic behavior of the original social-self Markov chain model. Based on the social-self NCPM, we propose a class of multi-stage competitive propagation games and discuss the trade-off between seeding and quality at the unique Nash equilibrium. One possible future work is the deliberative investigation on the Nash equilibrium on the boundary. Another open problem is the stability analysis of the self-social NCPM with R > 2. Simulation results support the claim that, for the self-social NCPM with R > 2, there also exists a unique fixed point P ∗ and, for any initial condition P (0) ∈ SnR(1n), the solution P (t) to equation (10) converges to P ∗. We leave this statement as a conjecture. 28 (a) competitive seeding-quality game (b) competitive seeding game Figure 9: Evolution of the average adoption probabilities 1(cid:62) n pr(t)/n for the two game models proposed in Section V. The solid curves represent the average adoption probability for product H1, while the dash curves represents the average adoption probability for product H2. The blue curves correspond to the case in which both companies are adopting the Nash policies, while the red curves correspond to the case when company 1 is adopting the Nash policy but company 2 is randomly allocating the investment on seeding and product quality. References [1] D. Acemoglu, A. Ozdaglar, and E. Yildiz. Diffusion of innovations in social networks. In IEEE Conf. on Decision and Control, pages 2329 -- 2334, Orlando, FL, USA, December 2011. [2] E. M. Adam, M. A. Dahleh, and A. Ozdaglar. On threshold models over finite networks, 2013. Available at http://arxiv.org/pdf/1211.0654. [3] M. E. Alexander and S. M. Moghadas. Bifurcation analysis of an SIRS epidemic model with generalized incidence. SIAM Journal on Applied Mathematics, 65(5):1794 -- 1816, 2005. [4] K. Apt and E. Markakis. Diffusion in social networks with competing products. Lecture Notes in Computer Science, 6982:212 -- 223, 2011. [5] A. Beutel, B. A. Prakash, R. Rosenfield, and C. Faloutsos. Winner takes all: competing viruses or ideas on fair-play networks. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 426 -- 434, New York, USA, 2012. [6] S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks. In X. Deng and F. Chung Graham, editors, Internet and Network Economics, volume 4858 of Lecture Notes in Computer Science, pages 306 -- 311. Springer, 2007. [7] M. Busch and J. Moehlis. Homogeneous assumption and the logistic behavior of information propaga- tion. Physical Review E, 85(2):026102, 2012. [8] T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen. Maximizing influence in a competitive social network: a follower's perspective. In International Conference on Electronic Commerce, pages 351 -- 360, Minneapolis, MN, USA, 2007. [9] D. Centola. The spread of behavior in an online social network experiment. Science, 329(5996):1194 -- 1197, 2010. [10] N. A. Christakis and J. H. Fowler. The spread of obesity in a large social network over 32 years. New England Journal of Medicine, 357(4):370 -- 379, 2007. 29 [11] N. A. Christakis and J. H. Fowler. Social network sensors for early detection of contagious outbreaks. PLOS ONE, 5(9):e12948, 2010. [12] L. Coviello, Y. Sohn, A. D. I. K. Kramer, C. Marlow, M. Franceschetti, N. A. Christakis, and J. H. Fowler. Detecting emotional contagion in massive social networks. PLOS ONE, 9(3):e90315, 2014. [13] A. Fall, A. Iggidr, G. Sallet, and J.-J. Tewa. Epidemiological models and Lyapunov functions. Mathe- matical Modelling of Natural Phenomena, 2(1):62 -- 68, 2007. [14] A. Fazeli, A. Ajorlou, and A. Jadbabaie. Competitive diffusion in social networks: Quality or seeding? arXiv preprint arXiv:1503.01220, 2015. [15] A. Fazeli and A. Jadbabaie. Game theoretic analysis of a strategic model of competitive contagion and product adoption in social networks. In IEEE Conf. on Decision and Control, pages 74 -- 79, Maui, HI, USA, December 2012. [16] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 12:211 -- 223, 2001. [17] S. Goyal, H. Heidari, and M. Kerans. Competitive contagion in networks. Games and Economc Behavior, 2014. in press. [18] A. Gray, D. Greenhalgh, L. Hu, X. Mao, and J. Pan. A stochastic differential equation SIS epidemic model. SIAM Journal on Applied Mathematics, 71(3):876 -- 902, 2011. [19] H. W. Hethcote. The mathematics of infectious diseases. SIAM Review, 42(4):599 -- 653, 2000. [20] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 137 -- 146, 2003. [21] A. Khanafer, T. Ba¸sar, and B. Gharesifard. Stability properties of infected networks with low curing rates. In American Control Conference, pages 3579 -- 3584, Portland, OR, USA, June 2014. [22] W. Mei and F. Bullo. Modeling and analysis of competitive propagation with social conversion. In IEEE Conf. on Decision and Control, pages 6203 -- 6208, Los Angeles, CA, USA, December 2014. [23] M. E. J. Newman. Spread of epidemic disease on networks. Physical Review E, 66(1):016128, 2002. [24] R. Pastor-Satorras and A. Vespignani. Epidemic spreading in scale-free networks. Physical Review Letters, 86(14):3200 -- 3203, 2001. [25] B. A. Prakash, A. Beutel, R. Rosenfield, and C. Faloutsos. Interacting viruses in networks: Can both In 21st International Conference on World Wide Web, pages 1037 -- 1046, New York, USA, survive? 2012. [26] F. D. Sahneh and C. Scoglio. Competitive epidemic spreading over arbitrary multilayer networks. Physical Review E, 89:062817, 2014. [27] F. D. Sahneh, C. Scoglio, and P. Van Mieghem. Generalized epidemic mean-field model for spreading processes over multilayer complex networks. IEEE/ACM Transactions on Networking, 21(5):1609 -- 1620, 2013. [28] S. Shirazipourazad, B. Bogard, H. Vachhani, A. Sen, and P. Horn. Influence propagation in adversarial setting: how to defeat competition with least amount of investment. In ACM International Conference on Information and Knowledge Management, pages 585 -- 594, Maui, HI, USA, 2012. [29] A. Stanoev, D. Trpevski, and L. Kocarev. Modeling the spread of multiple concurrent contagions on networks. PLOS ONE, 9(6):e95669, 2014. [30] F. Uekermann and K. Sneppen. Spreading of multiple epidemics with cross immunization. Physical Review E, 86(3), 2012. 30 [31] P. Van Mieghem, J. Omic, and R. Kooij. Virus spread in networks. IEEE/ACM Transactions on Networking, 17(1):1 -- 14, 2009. [32] W. Wang and X. Zhao. An epidemic model with population dispersal and infection period. SIAM Journal on Applied Mathematics, 66(4):1454 -- 1472, 2006. [33] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos. Epidemic spreading in real networks: An eigenvalue viewpoint. In IEEE Int. Symposium on Reliable Distributed Systems, pages 25 -- 34, October 2003. [34] L. Weng, A. Flammini, A. Vespignani, and F. Menczer. Competition among memes in a world with limited attention. Scientific Reports, 2(335):1 -- 8, 2012. [35] E. Yildiz, D. Acemoglu, A. Ozdaglar, and A. Scaglione. Diffusions of innovations on deterministic topologies. In IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pages 5800 -- 5803, Prague, Czech Republic, May 2011. [36] M. Youssef and C. Scoglio. An individual-based approach to SIR epidemics in contact networks. Journal of Theoretical Biology, 283(1):136 -- 144, 2011. 31
1906.05063
2
1906
2019-08-21T06:21:34
Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification
[ "cs.SI" ]
Compared with traditional news media, social media nowadays provides a richer and more timely source of news. We are interested in multi-spatial level event detection from geo-tagged tweet streams. Specifically, in this paper we (1) examine the statistical characteristic for the time series of the number of geo-tagged tweets posted from specific regions during a short time interval, e.g., ten seconds or one minute; (2) verify from over thirty datasets that while almost all such time series exhibit self-similarity, those that correspond to events, especially short-term and unplanned outbursts, follow a power-law distribution; (3) demonstrate that these findings can be applied to facilitate event detection from tweet streams. We propose two algorithms---Power-law basic and Power-law advanced, where Power-law basic only checks the existence of power-law distributions in the time series from tweet streams at multi-spatial scales, without looking into the content of each tweet, and Power-law advanced integrates power-law verification with semantic analysis via word embedding. Our experiments on multiple datasets show that by considering spatio-temporal statistical distributions of tweets alone, the seemingly naive algorithm of Power-law basic achieves comparable results with more advanced event detection methods, while the semantic analysis enhanced version, Power-law advanced, can significantly increase both the precision and the recall.
cs.SI
cs
Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification Yi Han, Shanika Karunasekera, Christopher Leckie, Aaron Harwood School of Computing and Information Systems The University of Melbourne {yi.han, karus, caleckie, aharwood}@unimelb.edu.au Parkville, Australia 9 1 0 2 g u A 1 2 ] I S . s c [ 2 v 3 6 0 5 0 . 6 0 9 1 : v i X r a Abstract -- Compared with traditional news media, social media nowadays provides a richer and more timely source of news. We are interested in multi-spatial level event detection from geo- tagged tweet streams. Specifically, in this paper we (1) examine the statistical characteristic for the time series of the number of geo-tagged tweets posted from specific regions during a short time interval, e.g., ten seconds or one minute; (2) verify from over thirty datasets that while almost all such time series exhibit self-similarity, those that correspond to events, especially short- term and unplanned outbursts, follow a power-law distribution; (3) demonstrate that these findings can be applied to facilitate event detection from tweet streams. We propose two algorithms -- Power-law basic and Power-law advanced, where Power-law basic only checks the existence of power-law distributions in the time series from tweet streams at multi-spatial scales, without looking into the content of each tweet, and Power-law advanced integrates power-law verification with semantic analysis via word embedding. Our experiments on multiple datasets show that by considering spatio-temporal statistical distributions of tweets alone, the seemingly naive algorithm of Power-law basic achieves comparable results with more advanced event detection methods, while the semantic analysis enhanced version, Power- law advanced, can significantly increase both the precision and the recall. Index Terms -- self-similarity, power-law distribution, multi- spatial event detection I. INTRODUCTION Social media, especially Twitter, has become an increasingly more popular source of news. Compared with traditional forms of media, such as TV and newspapers, it often provides more timely information about various type of incidents. We are interested in real-life event detection at multi-spatial levels from geo-tagged tweet streams. We initially investigated using Poisson models to monitor the fluctuations in the time series of the number of geo- tagged tweets posted within a bounding box during a short time interval, e.g., ten seconds to one minute. However, our experimental results observe a relatively high false positive rate for this Poisson model based event detection method. This observation motivates us to reexamine the properties of these time series. Specifically, this paper aims to answer the following questions: Section III: What are the statistical characteristics of the time series? A draw of several time series at different time scales, i.e., the number of tweets posted every 1, 10, 60, 1000 seconds, shows that burstiness persists over all these scales, which indicates self-similarity [1], [2]. In order to verify this finding, we collect 33 tweet datasets of different types, generate the corresponding time series by counting the number of tweets posted every minute, and check self- similarity using three popular methods [3], [4]: aggregate variance, R/S and Whittle (please refer to Section II for a more detailed description on self-similarity and the three methods). Our results suggest that all the time series are self-similar. Section IV: Can the time series be better characterised by other models than the Poisson process? The existence of self-similarity suggests that Poisson models are inadequate to capture the underlying dynamics in tweet streams. Instead, we examine whether a power-law distribution can be validated from these time series, and find that when an event occurs, it is indeed more likely to observe a power-law distribution in the time series generated from geo-tagged tweet streams. Section V: Can the answers to the previous two questions be applied for event detection from geo-tagged tweet streams? We propose two event detection methods -- Power- law basic and Power-law advanced: (1) Power-law basic only checks the existence of power-law distributions in the tweet stream at multi-spatial scales, without looking into the content of each tweet, or using any other information except the geo- location. Our experiments demonstrate that when combined with a Quad-tree [5], [6], this seemingly naive approach can achieve comparable performance with Geoburst [7]1, a widely cited event detection algorithm that considers temporal, spatial and semantic information; (2) Power-law advanced improves the algorithm by incorporating semantic analysis via word embedding, and our results suggest that it can significantly increase both the precision and the recall. The remainder of this paper is organised as follows: Sec- tion II provides background information on self-similarity and 1Although the improved versions exist (Geoburst+ [8], TrioVec [9]), we do not use them as baselines in this work as they are supervised approaches. power-law distributions; Section III describes the collected datasets, and checks whether the generated time series exhibit self-similarity; Section IV verifies the power-law hypothesis; Section V proposes two multi-spatial event detection algo- rithms, Power-law basic and Power-law advanced; Section VI summarises related work in event detection from social media; and Section VII concludes the paper and gives directions for future work. II. BACKGROUND ON SELF-SIMILARITY & POWER-LAW DISTRIBUTIONS In this section, we briefly introduce the fundamental con- cepts in self-similarity and power-law distributions, including their definitions and the methods to verify them. A. Self-similarity A straightforward way to visualise a power-law distribution is to draw a log-log plot of the complementary cumulative distribution function (CCDF), and a roughly straight line is expected to be seen in the plot. However, this is only a neces- sary but not sufficient condition for a power-law distribution. In order to validate that a time series X follows a power- law distribution, we first fit a power-law model to X, and then run the Kolmogorov-Smirnov (KS) test [14]. If the p-value of this significance test is below 0.05, the power-law hypothesis is rejected. Note that if a time series follows a power-law distribution, its log-log transformed CCDF is expected to be qualitatively similar at different scales, and hence it also exhibits self-similarity. III. VERIFICATION OF SELF-SIMILARITY IN TWEET STREAMS k k Unlike traditional Poisson traffic, where short-term fluctu- ations average out over a longer period of time, self-similar traffic maintains burstiness at all time scales. = 1 m m·k 1) Definition: Before giving the definition of self-similarity, we first introduce the concept of an aggregated process: given a process X = (Xi : i = 1, 2, 3, ...), its aggregated process is X(m) = (X(m) , k = 1, 2, 3, ...), where m is the block size, X(m) j=m·(k−1)+1 Xj. In other words, X(m) partitions the original series X into non-overlapping segments of size m, and then averages over each segment. A process X is called exactly second-order self-similar [1], [2] with parameter H = 1− β/2, 0 < β < 1, if Rm(k) = R(k) ∼ k−β as k → ∞, where Rm(·) and R(·) are the autocorrelation functions for X(m) and X, respectively. The parameter H is called the Hurst parameter [10], [11], and for a self-similar process, H ∈ (0.5, 1). 2) Methods to Test Self-similarity: SELFIS [3], [4] is a popular tool for testing self-similarity. It provides a number of methods to calculate the Hurst parameter, and the following three widely used methods are selected in this paper. • Aggregate variance. A sufficient condition of self- similarity is Vm = V · m−β, m ∈ Z >1 = {2, 3, ...}, where V (Vm) is the variance of X (X(m)). Therefore, if a log- log plot of Vm/V is drawn against m, then a straight line with slope β larger than −1 indicates self-similarity, and H = 1 − β/2. • R/S. For a self-similar process, its rescaled adjusted range or R/S statistic can be represented by the relation: limn→∞ E( R S (n)) = C · nH, where C is a finite positive constant, and n is the number of points in the process. Therefore, in the log-log plot of S against n, the slope is an estimate of H. R • Whittle. The Whittle method applies maximum likelihood estimation to the spectral density function of X. It not only estimates H, but also produces a confidence interval. B. Power-law Distribution A power-law probability distribution [12], [13] takes the form of p(x) ∝ x−α, where α is a positive constant often known as the exponent or scaling parameter. streams, we have collected the following datasets: In order to study the statistical characteristic of tweet • D1− D30 (public) -- A collection of 30 datasets associated with real-world events from 2012 to 2016, each of which contains from around 2×105 to nearly 3×107 tweets [15]. • D31 (public) -- Twitter event detection dataset, which con- tains more than 120 million tweets (although the majority of these tweets are not associated with any event). The ground truth for 506 events and associated tweets are given [16]. • D32 -- Twitter dataset shared by the authors of [8], which includes 9.5 million geo-tagged tweets from New York between 2014-08-01 and 2014-11-30. from Melbourne between 2014 and 2018. • D33 -- Over 920 thousand geo-tagged tweets collected These datasets cover different types of tweets: D1 − D30 contain tweets that are only associated with specific events, the majority of which have worldwide impact; D31 contains tweets that both do and do not correspond to (mostly) local or less influential events, with the ground truth provided; D32 & D33 include all geo-tagged tweets from a region during a certain period of time. Note that because the original datasets of D1 − D31 only include tweet ids, we have used a tool called "twitter-dataset- collector" [17] to download all the tweets. Since these datasets consist of hundreds of millions of tweets, it is infeasible to use the Twitter API to collect them due to the rate limit -- it takes a significant amount of time to retrieve all the tweets. Instead, the tool crawls the webpages and reconstructs the original tweets. However, some tweets have already been deleted, and hence are not retrievable in this way. Even for those obtained tweets, the collected information is not as rich as in what the API returns. For example, most of the tweets do not have any location information, and the rest only have a location label -- normally a city/town name, rather than specific coordinates. In addition, the second is truncated in the publication time. For each of the above datasets, we count the number of tweets posted every minute, generate the corresponding time series, and test whether they exhibit self-similarity using three methods: aggregate variance, R/S and Whittle. A. Self-similarity in D1 − D30 We start with the 30 datasets of real-world events with wide impact. As can be seen from Fig. 1a, all the estimates of the Hurst parameter are within the range of 0.5 and 1, which indicates that the corresponding time series are self-similar. Since we are more interested in geo-tagged tweets, we further examine the tweets that have a location label. The results in Fig. 1b suggest that these time series are self-similar too. Among the 30 events, eleven of them are relatively short- term (from a few days to a couple of weeks), unplanned outbursts: Boston marathon bombing, Ferguson unrest, Gaza under attack, Ottawa shooting, Sydney siege, Charlie Hebdo shooting, Germanwings crash, Paris attacks, Brussels airport explosion, Cyprus hijacked plane and Lahore blast. This is the type of event that we are mostly interested in detecting from tweet streams. Therefore, for these eleven datasets, we extract tweets from close to where the events occurred, as those tweets will be most helpful in event detection. The results in Fig. 1c show that the corresponding time series exhibit self-similarity as well. Note that for the event of "Gaza under attack", insufficient data are collected locally, and hence it is not included. B. Self-similarity in D31 Next we examine the 506 events in the dataset of D31, the majority of which are local or less influential compared to those in D1− D30. The tool SELFIS requires that a time series should have a minimum length of 64 -- in our case, since we count the number of tweets posted every minute, this means the event needs to last for at least 64 minutes (suggested by the collected data). However, quite a number of events in D31 do not meet this requirement, and hence are not considered. In addition, we also remove events that have less than 50 tweets, or whose time series have a maximum value of less than 10 -- never did 10 or more tweets get posted about the event within one minute. Finally, 62 events satisfy all three requirements, and the estimates of the Hurst parameter for the corresponding time series are shown in Fig. 2. As can be seen from the figure, five out of the 186 estimates are below 0.5. We believe that these outliers can be due to a lack of data for the five events: three of the time series have only 64 data points, while the other two have 128. For all events the length of whose time series is equal to or larger than 256, the estimates are all within the rage of 0.5 and 1. We also calculate the Hurst parameter for the time series of the whole dataset of D31, since the majority of the 120 million tweets are not associated with the 506 events, and the estimates are also between 0.5 and 1. C. Self-similarity in D32 & D33 We further test self-similarity in the datasets of geo-tagged tweets collected from New York and Melbourne. The statistics in Table I suggest that the time series generated from these two datasets also show self-similarity. Specifically, we not only check the overall case (level 0), but also zoom into sub-regions by recursively dividing the area into four equal parts (levels 1 (a) All tweets. (b) Tweets with a location label. (c) Local tweets (tweets close to where the event occurred), i.e., for the events of (1) Boston marathon bombing, (2) Ferguson unrest, (4) Ottawa shooting, (5) Sydney siege, (6) Charlie Hebdo shooting, (7) Germanwings crash, (8) Paris attacks, (9) Brussels airport explosion, (10) Cyprus hijacked plane and (11) Lahore blast, only the tweets from Mas- sachusetts, Ferguson, Ottawa, Sydney, Paris, France, Paris, Brussels, Cyprus, Lahore or Punjab are counted. Fig. 1: Hurst parameter estimates for D1 − D30. Events: 1. Boston marathon bombing; 2. Ferguson unrest; 3. Gaza under attack; 4. Ottawa shooting; 5. Sydney siege; 6. Charlie Hebdo shooting; 7. Germanwings crash; 8. Paris attacks; 9. Brussels airport explosion; 10. Cyprus hijacked plane; 11. Lahore blast; 12. Euro 2012; 13. Ebola outbreak; 14. Hong Kong protests; 15. Refugee Welcome; 16. Panama papers; 17. Hurricane Sandy; 18. Typhoon Hagupit; 19. Hurricane Patricia; 20. Nepal Earthquake; 21. Sismo Ecuador; 22. Mexican election 2012; 23. Obama and Romney 2012; 24. Superbowl 2012; 25. SXSW 2012; 26. US election 2012; 27. Indyref 2014; 28. St. Patrick's Day 2014; 29. Brexit; 30. Irish election 2016. to 3). The results indicate that in the city and all sub-region levels, their corresponding time series are self-similar. Table I lists part of the statistics. 51015202530Dataset Id (D1-30)00.20.40.60.81Hurst parametery = 0.5Aggregate VarianceR/SWhittle51015202530Dataset Id (D1-30)00.20.40.60.81Hurst parametery = 0.5Aggregate VarianceR/SWhittleBoston linebombingFerguson unrestOttawa shootingSydney linesiegeCharlie hebdoshootingGermanwinscrashParis attacksBrussels airportexplosionCyprus hijackedplaneLahore lineblast00.20.40.60.81Hurst parametery = 0.5Aggregate VarianceR/SWhittle Fig. 2: Hurst parameter estimates for D31. Out of the 506 events, 62 of them meet all the three requirements: (1) lasting for a minimum of 64 minutes, (2) having at least 50 tweets, and (3) the maximum value in the time series is not smaller than 10. For a detailed description of the events, please refer [16]. TABLE I: Hurst parameter estimates for D32 − D33. Level 0: the whole area; Level 1: dividing the whole city into four equal sub-regions: 1-1, 1-2, 1-3, 1-4; Level 2: dividing sub-region 1-1 into four equal parts: 2-1, 2-2, 2-3, 2-4; Level 3: dividing sub-region 2-1 into four equal parts: 3-1, 3-2, 3-3, 3-4. (a) Tweets with a location label. For Events 12 (Euro 2012), 23 (Obama and Romney), 24 (Superbowl 2012), 25 (SXSW 2012), 26 (US election) and 28 (St. Patrick's Day 2014), the original p-values of 0.0 are replaced with 0.001, in order for them to be plotted. Level 0 1: 1-1 1: 1-2 1: 1-3 1: 1-4 2: 2-1 2: 2-2 2: 2-3 2: 2-4 3: 3-1 3: 3-2 3: 3-3 3: 3-4 0.68 0.90 0.90 0.92 0.90 0.88 0.90 0.90 0.89 0.85 0.86 0.84 0.87 D32: New York D33: Melbourne Aggregate Variance Aggregate Variance R/S Whittle 0.68 0.78 0.80 0.80 0.79 0.80 0.81 0.82 0.82 0.82 0.82 0.84 0.82 0.97 0.89 0.84 0.84 0.87 0.85 0.82 0.77 0.79 0.82 0.77 0.71 0.75 R/S Whittle 0.75 0.72 0.72 0.66 0.67 0.70 0.71 0.66 0.65 0.67 0.68 0.65 0.59 0.60 0.57 0.57 0.55 0.56 0.56 0.56 0.55 0.55 0.55 0.55 0.56 0.54 0.90 0.87 0.87 0.79 0.82 0.85 0.85 0.77 0.78 0.81 0.80 0.76 0.72 In summary, our results in this section demonstrate that self- similarity widely exists in different types of Twitter datasets, in terms of the number of tweets posted every minute. This conclusion can be extended to different time intervals due to the self-similarity. For example, for D32 & D33, since each tweet's exact publication time (to the precision of a second) is known, we also check the time series of the number of tweets posted every 10 and 100 seconds, and the results also indicate self-similarity. IV. EXISTENCE OF POWER-LAW DISTRIBUTION IN EVENT TWEET STREAMS In this section, we first examine whether the generated time series from Twitter datasets follow a power-law distribution. If this is the case, it explains self-similarity -- a time series that follows a power-law distribution is also self-similar. Second, we reveal an important finding that when an event occurs it is much more likely to observe a power-law distribution in the tweet stream, compared with when no event occurs. This (b) Local tweets (tweets with a location label that is close to where the event occurred) only. Fig. 3: P-values of the significance test for D1 − D30. A p- value of less than 0.05 indicates that the power-law hypothesis should be rejected. finding suggests that the existence of a power-law distribution can be used to help event detection from tweet streams. Recall that in order to test the power-law hypothesis, we fol- low the approach introduced in Section II: run the significance test, calculate the p-value for the fitted power-law model, and reject the hypothesis if the p-value is smaller than 0.05. A. Power-law Distribution in D1 − D30 We still start with the 30 datasets of real-world events (D1 − D30). However, we only check the existence of power- law distribution for tweets with a location label, which are useful in local event detection. Fig. 3 shows the p-values for the time series of (1) the tweets with a location label (Fig. 3a), and (2) the tweets that are close to where the 10 short-term and unplanned outbursts have occurred (Fig. 3b). We can see that in the first case, 24 out of 30 time series pass the significance test, while in the second case, all the 10 time series are with a p-value larger than 0.05. This indicates that when an event occurs, there is high probability that a power-law distribution can be detected in the geo-tagged tweet stream from the surrounding areas. B. Power-law Distribution in D31 We continue the test of a power-law distribution for the dataset D31 of over 500 events to further verify the above 123456789111214151617182022232527293031323536373941454649515253545657596061626364667185919296113119146 157 177 178 188 426 440 475 481Event ID00.20.40.60.81Hurst parametery = 0.5 Aggregate Variance R/S Whittle51015202530Event ID10-310-210-1100p-valuey = 0.05Boston linebombingFerguson unrestOttawa shootingSydney linesiegeCharlie hebdoshootingGermanwinscrashParis attacksBrussels airportexplosionCyprus hijackedplaneLahore lineblast10-210-1100p-valuey = 0.05 TABLE II: Percentage of test windows where a power-law distribution can be observed at different spatial scales in the datasets of D32 − D33. D32: New York D33: Melbourne Level 0: overall Level 1: sub-region 1-1 Level 1: sub-region 1-2 Level 1: sub-region 1-3 Level 1: sub-region 1-4 Level 2: sub-region 2-1 Level 2: sub-region 2-2 Level 2: sub-region 2-3 Level 2: sub-region 2-4 Level 3: sub-region 3-1 Level 3: sub-region 3-2 Level 3: sub-region 3-3 Level 3: sub-region 3-4 48.1 17.1 10.7 12.2 14.0 11.4 7.0 17.1 11.8 10.8 9.9 21.2 10.6 5.2 0.2 0.6 0.0 0.0 0.1 0.2 0.0 0.0 0.1 0.0 0.0 0.0 dataset, and run the significance test on the corresponding time series. The results are listed in Table II. We believe the high percentage for D32 (New York) at Level 0 is because there are significantly more tweets in this dataset, which contains too much noise and leads to false positives. In fact, as can be seen in Table II, if we zoom into a sub-region of New York, and generate the time series by counting the tweets only from there, the percentage decreases quickly. The above experimental results suggest that for a collected set of tweets, if a considerable portion of them are about a certain event, then a power-law distribution is likely to be observed in the corresponding time series. Therefore, we propose to use the existence of a power-law distribution to help detect or verify events from geo-tagged tweet streams. In the next section, we test this idea by building a simple event detection algorithm that ignores the content of a tweet, but only counts the number of tweets posted during a short time period at different geographic scales, and checks whether it follows a power distribution. V. APPLICATION IN EVENT DETECTION This section aims to apply the previous finding of the correlation between the occurrence of an event and a power- law distribution in tweet streams for event detection. We first propose an algorithm Power-law basic and show that by checking power-law distributions alone, it can achieve com- parable results to more complex algorithms that use semantic analysis in addition to spatial clustering, e.g., Geoburst [7], a popular state-of-the-art event detection algorithm. Then we integrate semantic analysis with power-law verification, and show that this improved version, Power-law advanced, can achieve significantly better performance. Fig. 4: P-values of the significance test for D31. For Events 1, 8, 22, 45 and 52, the original p-values of 0.0 are replaced with 0.001, in order for them to be shown in the figure. finding. Note that we only examine the tweets associated with an event according to the provided ground truth. In addition, although most of the tweets in D31 do not have a location label, the majority of the events are regional, and hence it is likely that most of the tweets are posted close to where the events have occurred. As can be seen from Fig. 4, 52 out of the 62 time series pass the significance test. The above statistics in Figs. 3-4 indicate that when an event happens, it is likely that the time series corresponding to the geo-tagged tweets from surrounding areas follows a power-law distribution, and hence exhibits self-similarity. Up till now, we have only considered tweets of certain events. However, can a power-law distribution be observed as well when no event occurs (i.e., false positives)? In order to an- swer this question, we randomly extract 100 two-hour intervals from all tweets with a location label, remove those tweets that are associated with any of the 506 events, and check whether a power-law distribution can be detected within the 100 time series corresponding to the remaining tweets, where each time series counts the number of tweets posted every minute during the two-hour interval. The result shows that only 21 of the time series follow a power-law distribution -- the percentage is much lower than when an event occurs. Finally, we consider the overall case where all tweets are mixed together, no matter if they are associated with any event or not, and check whether a power-law distribution can be detected to further examine the probability of false positives. Specifically, we extract 1000 two-hour intervals (potentially with overlap) randomly from all tweets with a location label, and then validate the existence of a power-law distribution in the generated time series. In this case, 25.0% of them pass the significance test, which is also obviously lower than the percentage when an event occurs. C. Power-law Distribution in D32 & D33 In order to verify the last observation in the above subsec- tion, i.e., the overall case, we further test datasets D32 & D33, both of which include all geo-tagged tweets from a certain area, not just specific to any events. We take the same approach by randomly selecting 1000 two-hour windows from each A. Power-law Basic: Power-law based Multi-scale Spatial Event Detection We start with a brief problem definition of event detec- tion from tweet streams. For a certain region R, given a stream of tweets T = {t1, t2, ..., tn} and a query window W = {tn−m+1, tn−m+2, ..., tn} (m is the number of tweets in W) 123456789111214151617182022232527293031323536373941454649515253545657596061626364667185919296113119146157177178188426440475481Event ID10-310-210-1100P-valuey = 0.05 that represents currently observed tweets, the aim is to identify a set of tweets Ti ⊆ W that are associated with an event as close to where and when the event occurs as possible. To solve the above problem, we propose to create a Quad- tree (QT) for each W, the root of which represents the whole region R. If m exceeds the predefined threshold ms, QT divides R into four equally sized sub-regions, and the process continues until the number of tweets in each leaf node is not larger than the threshold, or the depth of QT reaches the maximum value, i.e., the size of a sub-region has to be larger than a certain value. Once the Quad-tree is built, the detection will be run at all levels, which mitigates the impact of the arbitrary division of space. As shown in Algorithm 1, we check for the existence of a power-law distribution in each node of QT: for a node N, (1) collect tweets from all children nodes recursively (note that once a node is divided, it does not hold any tweet itself, as all its tweets are moved to one of the four child nodes); (2) divide the query window into multiple time intervals of d seconds, and count the number of tweets posted in each interval to generate the time series S (here d does not need to be 60 as in our previous experiments, e.g., a time series of tweets posted every 30 seconds should still follow a power-law distribution); (3) fit a power-law model to S; (4) run the significance test and calculate the p-value; (5) reject the power-law hypothesis if the p-value is less than 0.05, otherwise create a new event with all the tweets and append it to the final result; (6) repeat (1)-(5) for each child node at the lower levels, so that an event can be detected as close to where it happens as possible. 1) Delay in the Validation of a Power-law Distribution: An important question is: how many data points need to be observed (nmin), i.e., the minimum length of the time series, or the delay, to verify a power-law distribution? The answer impacts two important parameters in the above algorithm: the length of the query window, l (in seconds; l is different from m, which is the number of tweets in a query window), and the length of the time interval, d (in seconds), since nmin = l/d. For example, if nmin = 100 and l = 600, then in order to obtain 100 data points from each query window, the algorithm divides the window into 100 intervals, i.e., counts the number of tweets posted every 6 seconds. Our experiments on datasets D1 − D31 suggest that when l and d are chosen properly, so that the majority of the elements in the time series are above zero, then the power- law distribution can be verified using the first 60 data points, i.e., nmin = 60. Normally, a larger value of nmin contributes to a lower false positive rate, but too large a value causes few events to be found, which decreases the precision. In the following experiments, we set 60 ≤ nmin ≤ 300 and 1200 ≤ l ≤ 3600. A more detailed sensitivity analysis is given in the next subsection. B. Experimental Verification In order to demonstrate the performance of Algorithm 1, we have tested it against Geoburst on three datasets (we did 15 16 17 18 19 20 21 22 Algorithm 1: Power-law basic: power-law based multi- scale spatial event detection Input : Geo-tagged tweets in the query window, W; Maximum depth of the Quad-tree (QT), D; Threshold for splitting a node in QT, ms; Length of the query window, l; Time interval to count tweets, d (seconds) Output : Event list, E Create an empty Quad-tree QT; for tweet t in W do 1 Phase 1: Build Quad-tree 2 3 4 5 if child nodes != NULL then Insert t into one of the child nodes based on t's coordinates; 6 7 8 9 10 else if the number of tweets in the current node ≥ ms && QT's depth < D then Split the current node into four nodes; Move all tweets including t into one of the four child nodes according to the coordinates; else Insert t into the current node; for node N in QT do 11 Phase 2: Multi-scale spatial event detection f(N, l) 12 13 14 Collect tweets from all children nodes recursively; Generate the time series S: divide l into multiple intervals of d seconds and count the number of tweets posted during each interval; Fit a power-law model to S; Run the significance test, and calculate the p-value for the fitted model; if p-value < 0.05 then Reject the power-law hypothesis; else Create a new event, append all tweets from children nodes to it, and insert it to E; // Detect events at lower levels recursively for N(cid:48) in child nodes do E .add( f (N(cid:48), l)) 23 return E not choose the improved versions of Geoburst+ [8] and Tri- oVecEvent [9] because they use supervised approaches, while both Geoburst and our method use unsupervised approaches. In addition, the purpose here is just a proof of concept that power-law verification can be used for event detection): • All geo-tagged tweets from Melbourne in Jan 2017, with a size of 23.3K; • All geo-tagged tweets from Los Angeles between 9 February and 22 February 2019, with a size of 13.2K; • All geo-tagged tweets from Sydney between 12 February and 5 April 2019, with a size of 28.4K. These three datasets have different levels of event density: Melbourne > LA > Sydney, and we intend to check the performance of our method in all these settings. Specifically, the Melbourne dataset contains the event of "Melbourne car attack" [18], which is the type of event that we are most interested in detecting. The reason why we do not use D31, although it provides the ground truth, is the lack of accurate location information and publication time: the location is normally a city/town name, and the publication time only has a precision of a minute. As a result, in order to generate a time series with a minimum length of 60, it is necessary to collect tweets for 60 minutes, and since the Quad-tree cannot divide the root node due to the missing coordinates, the algorithm always needs to check the power-law distribution at level 0 against hundreds of thousands of tweets from worldwide, which contains too much noise. 1) Quantitative Analysis: Depending on the density of the data, the parameters are chosen as follows to ensure that there are an appropriate number of tweets in each query window, and sufficient elements in the generated time series are above zero: (1) for the dataset collected from Melbourne, each query window is set to 30 minutes, i.e., l = 1800, nmin is set to 80, and ms = 15; (2) for the dataset collected from LA, l = 1200, nmin = 150, and ms = 50; (3) for the dataset collected from Sydney, l = 3600, nmin = 100, and ms = 50. To make the results comparable, we set the query window to be of the same length for Geoburst, and all other parameters take the default values in the code shared by the author. For each of the three datasets, we run both algorithms on consecutive query windows covering the whole period. For example, the Melbourne dataset lasts 31 days, so there are 31×48 = 1488 query windows. Fig. 5 presents the performance comparison between the two algorithms, which suggests that even though Power-law basic does not check the content of each tweet, it achieves comparable performance with Geoburst, in terms of both precision and recall. Note that since the ground truth of the three datasets are not given, it is difficult to calculate the true recall. Therefore, we adopt a similar approach as in [8], [9] and calculate the pseudo recall = Ntrue/Ntot al, where Ntrue is the number of true events detected by a method, and Ntot al is the number of true events detected by all methods, plus the events hand-picked by us that occurred during the query periods within the chosen cities, including festivals, sport games, natural disasters, etc. Note also that the validity of each event is checked manually. However, we are not claiming that it is sufficient to detect events just by checking the existence of a power-law distribu- tion, and we further improve the algorithm in Section V-C. Sensitivity analysis on nmin. Fig. 6 shows how nmin im- pacts the number of different events detected and the precision for the dataset of Melbourne, when l is set to 30 minutes and ms = 15. As nmin first increases, both the reported events and false positives decrease, and the false positive count decreases (a) Precision. (b) Recall. Fig. 5: Performance comparison of the three event detection algorithms. Fig. 6: Sensitivity analysis on nmin for the Melbourne dataset. The length of the query window l is set to 30 minutes, so nmin = 60, 80, 90, 100, 120, 150 corresponds to counting the number of tweets every 30, 22.5, 20, 18, 15, 12 seconds. faster, so the precision improves. However, as nmin gets too large, i.e., counting the number of tweets too frequently, too many elements of the generated time series become zero, causing too few events to be detected, and the precision drops. Sensitivity analysis on ms. We further analyse the impact of ms. Specifically, Fig. 7 shows for the dataset of Melbourne, when l = 1800 and nmin = 80, how the number of different events detected and the total detection time change with ms. A small ms value means a larger depth of the Quad-tree, and since the detection is running at each node, the total detection time will be longer, but meanwhile more events are likely to be found. MelbourneLos AngelesSydney00.20.40.60.81Precision Power-law basic Geoburst Power-law advancedMelbourneLos AngelesSydney00.20.40.60.81Recall Power-law basic Geoburst Power-law advanced60 80 90 100120150nmin24681012No. of different events detected0.50.60.70.80.9PrecisionNo. of different events detectedPrecision Fig. 7: Sensitivity analysis on ms for the Melbourne dataset. The length of the query window l is set to 1800 (30 minutes), and nmin is set to 80. C. Power-law Advanced: Combining Semantic Analysis with Power-law Verification In order to further improve the performance of the proposed method, we investigate how semantic information can be incorporated to the event detection algorithm. A common class of existing methods that use semantic information is clustering based approaches, where the first step is to cluster posts/tweets according to their semantic, spatial, temporal, frequency information, etc., and then generate a list of event candidates. Once the candidates are found, the second step is to remove non-event clusters among them. Our finding in this paper suggests that checking the existence of a power- law distribution can be used in the second step to test whether a cluster of tweets are about a real event or not. In order to demonstrate the feasibility of the above ap- proach, we design an algorithm Power-law Advanced that combines fastText (the latest word embedding tool developed by Facebook) [19], BIRCH (Balanced Iterative Reducing and Clustering using Hierarchies) [20], and power-law verification, where fastText is for embedding the tweets so that semantically similar tweets would also end up close in the vector space, and BIRCH is for clustering the generated vectors. These two methods are chosen for demonstration purposes only, and they can be replaced by other alternatives. In addition, sliding windows are used: the algorithm keeps the latest NSW query windows, performs event detection, and discards the oldest window while collecting new tweets. In the following experiment, NSW is set to 6, and the size of a query window is set to 30 minutes. Specifically, the algorithm (Algorithm 2: Power-law Ad- vanced) works as described below (also see Fig. 8 for an illustration): • Embedding. The same NLP tool [21] as mentioned in [7] is used to extract entities and noun phrases from the tweets. These generated keywords are then embedded with the fastText algorithm, and each tweet is represented by the average value of the vectors from all its keywords. A pre-trained fastText model is used in our experiment, and it is re-trained incrementally with the new tweets [22]. The re-training is done in parallel, and hence does not delay the detection. Note that the spatial and temporal Fig. 8: An illustration of Power-law Advanced. information is not included in the embedding since the Quad-tree and sliding windows ensure the similarity in terms of space and time. • Clustering. Once the tweets are embedded into vectors, we use the BIRCH algorithm to cluster the vectors. The most important parameter in BIRCH is the threshold of the cluster radius. In our experiment we do not directly set a fixed value. Instead, we start with a value close to zero, and increase it by a small step size until either (1) less than 5% of all items are in small clusters, i.e., clusters with a size less than 10, or (2) over half of the items are in the largest cluster, whichever occurs first. • Power-law detection. The third step is to detect any power-law distribution within each cluster. Note that a Quad-tree is still built and maintained, and the detection is run at all levels of the Quad-tree to mitigate the impact of the arbitrary division of space. • Verification. If any event candidate is found in the last step, we further collect tweets from the verification win- dow which is set to 5 minutes in our experiment, and repeat the above three steps. The only difference is that the keywords are no longer used, and the original text of each tweet is directly embedded -- the rationale is to ensure that both the keywords and texts are semantically close within a cluster. Each event candidate from the last step is then checked against each cluster found in this step. If any two of them share more than half of the tweets, they are considered as a match. If no match is found for a candidate, it will be removed. The verification process is done three times, and an event candidate has to pass all three of them. • Final clean-up. To further decrease the false positive rate, the last step extracts the top X(= 10) hashtags and mentions for each cluster, and if more than half of the tweets contain any of these hashtags or mentions, the cluster is finally considered as an event. We test the above algorithm on the same three datasets, and as can be seen in Fig. 5, this semantic analysis enhanced power-law verification method increases both the precision and the recall in most cases. 101520304050ms56789No. of different events detected891011121314Total detection time (s)No. of different events detectedTotal detection timeSliding windowsCurrent query window3 verification windowsClusterClusterMatchMatchEvent candidates found within the sliding windowsEvent candidates found after adding verification windows Algorithm 2: Power-law advanced: integrating power-law verification with semantic analysis : same as Power-law basic Input Output : Event list, E 1 Extract entities and noun phrases using the NLP tool [21] for each tweet; E .add(Power-law basic(·)); 2 Call fastText to embed the extracted keywords; 3 Cluster the generated vectors using BIRCH; 4 for Cluster c found in the last step do 5 6 for i = 0; i < 3 && E is not NULL do 7 8 9 10 Call fastText to directly embed the text of each tweet; Cluster the generated vectors using BIRCH; for Cluster c(cid:48) found in the last step do E(cid:48).add(Power-law basic(·)); Remove e; for Remaining event candidate e ∈ E do if there is no match in E(cid:48) then 11 12 13 14 for Remaining event candidate e ∈ E do 15 16 K ← Extract the top X(= 10) hashtags and mentions; if More than half of the tweets in e does not contain any element in K then 17 Remove e; 18 return E In summary, this section has demonstrated that the naive algorithm of checking the existence of a power-law distribution can achieve comparable results against more advanced event detection methods, and its performance can be significantly improved by integrating with semantic analysis. VI. RELATED WORK This section briefly reviews the previous work on event detection from social media. Specifically, we take a similar approach as [23] and summarise two types of algorithms: clustering based and anomaly based. In addition, multiscale event detection is also considered. A. Clustering based Event Detection This type of detection method takes into consideration all or a subset of temporal, spatial, semantic, frequency and user information to cluster the tweets [7] -- [9], [24] -- [31]. However, since the generated clusters may correspond to non-events, normally another step is taken to eliminate false positives, e.g., by ranking the candidates based on certain criteria, or training a classifier to decide whether a candidate is a real event. For example, for each pair of tweets, Geoburst [7] uses the Epanechnikov kernel to calculate their geographical impact, and uses the random-walk-with-restart algorithm to to obtain the semantic impact. In this way, they identify a list of clusters of geographically close and semantically coherent tweets, i.e., event candidates. Finally, historical activities are used to rank these candidates and the top K events are returned. As the improved versions, (1) Geoburst+ [8] replaces the ranking algorithm in Geoburst with a candidate classification module, which learns the latent embeddings of tweets and keywords. Then together with the activity timeline, the module extracts spatial unusualness and temporal burstiness to characterise each candidate event; (2) TrioVecEvent [9] learns multimodal embeddings of the location, time and text, and then performs online clustering using a Bayesian mixture model. B. Anomaly based Event Detection This type of method aims to identify abnormal observations in word usage, spatial activity, sentiment levels, etc. For example, Valkanas and Gunopulos [32], [33] use sentiment analysis for event detection, which is based on the idea that the sentiment level fluctuates as people respond to an event to express their opinions. Another example is to detect peaks in Twitter hashtags using a Discrete Wavelet Transformation [34], since these peaks are likely to correspond to real-world events. Specifically, only the hashtags are used, and all the remaining tweet is discarded. In addition, Vavliakis et al. [35] propose Latent Dirichlet Allocation based event detection for MediaEval Benchmark 2012 [36], where the dataset contains 167,000 images from Flickr. They detect peaks in the number of photos assigned to each topic, and identify an event for a topic if it receives an unexpectedly high number of photos. text C. Multiscale Event Detection Running event detection on a fixed spatial resolution may not help in finding events at different scales. For example, using low resolution spatial data might only capture events occurring on the state or the country level, while high res- olution data can help detect events at community or city scales. Therefore, another stream of work intends to detect events at different space resolutions, to better adapt to the unpredictability of real-life events [37] -- [39]. For example, Dong et al. [37] explore the properties of the wavelet transform for the detection of events at different spatio-temporal scales. In addition, Visheratin et al. [39] build a convolutional quad- tree, which instead of dividing a region into four sub-regions of equal size, uses a convolutional neural network to decide a more appropriate division. VII. CONCLUSIONS AND FUTURE WORK In this paper, we have (1) verified in more than 30 datasets the existence of self-similarity in the time series of the number of geo-tagged tweets posted within a short time interval from a certain region; (2) demonstrated that a power-law distribution is much more likely to be observed when an event occurs in tweet streams; (3) proposed two event detection algorithms: Power-law basic and Power-law advanced. Power- law basic is based on the validation of power-law distributions at multi-spatial scales, without checking the content of each tweet, or using any information other than the geo-location. Experimental results on multiple datasets show that it can achieve comparable performance with Geoburst, a widely cited event detection algorithm. Power-law advanced improves the algorithm by incorporating semantic analysis via word embedding, and our results demonstrate that it can significantly increase both the precision and the recall. For future work, we will further study the self-similar patterns in tweet streams. Our current result explains why when an event occurs the corresponding time series shows self-similarity -- it follows a power-law distribution. However, we have not examined why the tweet count time series still exhibits self-similarity when there is no event. In addition, as a separate direction, we will explore other potential ways for embedding and clustering to futher improve the performance of the event detection algorithm. Specifically, in terms of embedding, we are considering (1) dispensing with the Quad-tree and directly embed the location information; (2) representing a tweet using other methods rather than the average value of the vectors for each word that it contains. ACKNOWLEDGEMENT This research is funded in part by the Defence Science and Technology Group, Edinburgh, South Australia, under contract MyIP:7293. REFERENCES [1] M. Crovella and A. Bestavros, "Explaining world wide web traffic self- similarity," Boston University, Tech. Rep., 1995. [2] W. Willinger, M. S. Taqqu, W. E. Leland, and D. V. Wilson, "Self- similarity in high-speed packet traffic: Analysis and modeling of ethernet traffic measurements," Statistical Science, vol. 10, 1995. [3] T. Karagiannis and M. Faloutsos, "SELFIS: A tool for self-similarity and long-range dependence analysis," in 1st Workshop on Fractals and Self-Similarity in Data Mining: Issues and Approaches (IN KDD), 2002. [4] T. Karagiannis, M. Faloutsos, and M. Molle, "A user-friendly self- similarity analysis tool," SIGCOMM Comput. Commun. Rev., vol. 33, no. 3, pp. 81 -- 93, 2003. [5] R. A. Finkel and J. L. Bentley, "Quad trees a data structure for retrieval on composite keys," Acta Inf., vol. 4, no. 1, pp. 1 -- 9, 1974. [6] H. Samet, "The quadtree and related hierarchical data structures," ACM Comput. Surv., vol. 16, no. 2, pp. 187 -- 260, 1984. [7] C. Zhang, G. Zhou, Q. Yuan, H. Zhuang, Y. Zheng, L. Kaplan, S. Wang, and J. Han, "GeoBurst: Real-time local event detection in geo-tagged tweet streams," in Proceedings of SIGIR. ACM, 2016, pp. 513 -- 522. [8] C. Zhang, D. Lei, Q. Yuan, H. Zhuang, L. Kaplan, S. Wang, and J. Han, "GeoBurst+: Effective and real-time local event detection in geo-tagged tweet streams," ACM Trans. Intell. Syst. Technol., vol. 9, no. 3, pp. 34:1 -- 34:24, 2018. [9] C. Zhang, L. Liu, D. Lei, Q. Yuan, H. Zhuang, T. Hanratty, and J. Han, "TrioVecEvent: Embedding-based online local event detection in geo- tagged tweet streams," in Proceedings of the 23rd ACM SIGKDD. ACM, 2017, pp. 595 -- 604. [10] H. Hurst and A. S. of Civil Engineers Hydraulics Division, Long-term Storage Capacity of Reservoirs. American Society of Civil Engineers, 1950. [Online]. Available: https://books.google.com. au/books?id=aKj4HAAACAAJ [11] H. Hurst, R. Black, and Y. Simaika, Long-term storage: an [Online]. Available: https: experimental study. //books.google.ru/books?id=7QgSMwEACAAJ Constable, 1965. [12] A. Clauset, C. R. Shalizi, and M. E. J. Newman, "Power-law distri- butions in empirical data," SIAM Review, vol. 51, no. 4, pp. 661 -- 703, 2009. [13] Y. Virkar and A. Clauset, "Power-law distributions in binned empirical data," The Annals of Applied Statistics, vol. 8, no. 1, pp. 89 -- 119, 2014. [14] W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, Numerical Recipes 3rd Edition: The Art of Scientific Computing. Cam- bridge University Press, 2007. [15] A. Zubiaga, "A longitudinal assessment of the persistence of twitter datasets," Journal of the Association for Information Science and Tech- nology, vol. 69, no. 8, pp. 974 -- 984, 2018. [16] A. J. McMinn, Y. Moshfeghi, and J. M. Jose, "Building a large-scale corpus for evaluating event detection on twitter," in Proceedings of the 22nd ACM CIKM. ACM, 2013, pp. 409 -- 418. [17] P. Symeon, "Twitter-dataset-collector," https://github.com/socialsensor/twitter-dataset-collector, 2019. [18] "January Available: Melbourne car attack&oldid=894478928 [Online]. https://en.wikipedia.org/w/index.php?title=January 2017 2017 melbourne attack," 2019. [19] P. Bojanowski, E. Grave, A. Joulin, and T. Mikolov, "Enriching word car vectors with subword information," arXiv:1607.04606 [cs], 2016. [20] T. Zhang, R. Ramakrishnan, and M. Livny, "BIRCH: An efficient data clustering method for very large databases," in Proceedings of ACM SIGMOD '96. ACM, 1996, pp. 103 -- 114, montreal, Canada. [21] A. Ritter, "Twitter NLP tools. to aritter/twitter nlp development by creating an account on GitHub," 2011. [Online]. Available: https://github.com/aritter/twitter nlp contribute [22] QinLuo, "Library for fast ericxsun/fastText," ericxsun/fastText 2019. text representation and classification.: https://github.com/ [Online]. Available: [23] N. Panagiotou, I. Katakis, and D. Gunopulos, "Detecting events in online social networks: Definitions, trends and challenges," in Solving Large Scale Learning Tasks. Challenges and Algorithms. Springer International Publishing, 2016, pp. 42 -- 84. [24] H. Becker, M. Naaman, and L. Gravano, "Beyond trending topics: Real- world event identification on twitter," in ICWSM 2011, 2011. [25] R. Li, K. H. Lei, R. Khadiwala, and K. C.-C. Chang, "TEDAS: A twitter- based event detection and analysis system," in Proceedings of the 28th IEEE ICDE. IEEE Computer Society, 2012, pp. 1273 -- 1276. [26] O. Ozdikis, P. Senkul, and H. Oguztzn, "Semantic expansion of tweet contents for enhanced event detection in twitter," in ASONAM, 2012, pp. 20 -- 24. [27] H. Abdelhaq, C. Sengstock, and M. Gertz, "EvenTweet: Online localized event detection from twitter," Proc. VLDB Endow., vol. 6, no. 12, pp. 1326 -- 1329, 2013. [28] G. Fuchs, N. Andrienko, G. Andrienko, S. Bothe, and H. Stange, "Tracing the german centennial flood in the stream of tweets: First lessons learned," in Proceedings of GEOCROWD '13. ACM, 2013, pp. 31 -- 38. [29] M. Walther and M. Kaisser, "Geo-spatial event detection in the twitter stream," in Advances in Information Retrieval. Springer Berlin Heidel- berg, 2013. [30] W. Xie, F. Zhu, J. Jiang, E. Lim, and K. Wang, "TopicSketch: Real-time bursty topic detection from twitter," IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 8, pp. 2216 -- 2229, 2016. [31] H. Wei, H. Zhou, J. Sankaranarayanan, S. Sengupta, and H. Samet, "De- tecting latest local events from geotagged tweet streams," in Proceedings of the 26th ACM SIGSPATIAL. ACM, 2018, pp. 520 -- 523. [32] G. Valkanas and D. Gunopulos, "Event detection from social media data," IEEE Data Eng. Bull., vol. 36, no. 3, pp. 51 -- 58, 2013. [Online]. Available: http://sites.computer.org/debull/A13sept/p51.pdf [33] -- -- , "How the live web feels about events," in Proceedings of the 22nd ACM CIKM. ACM, 2013, pp. 639 -- 648. [34] M. Cordeiro and R. Frias, "Twitter event detection: combining wavelet analysis and topic inference summarization," in Doctoral Symposium on Informatics Engineering, DSIE, 2011. [35] K. N. Vavliakis, F. A. Tzima, and P. A. Mitkas, "Event detection via LDA for the MediaEval2012 SED task," in MediaEval, 2012. [36] (2019) MediaEval 2012. [Online]. Available: http://www. multimediaeval.org/mediaeval2012/ [37] X. Dong, D. Mavroeidis, F. Calabrese, and P. Frossard, "Multiscale event detection in social media," Data Min. Knowl. Discov., vol. 29, no. 5, pp. 1374 -- 1405, 2015. [38] J. Capdevila, G. Pericacho, J. Torres, and J. Cerquides, "Scaling DBSCAN-like algorithms for event detection systems in twitter," in Algorithms and Architectures for Parallel Processing. Springer In- ternational Publishing, 2016, pp. 356 -- 373. [39] A. A. Visheratin, K. D. Mukhina, A. K. Visheratina, D. Nasonov, and A. V. Boukhanovsky, "Multiscale event detection using convolutional quadtrees and adaptive geogrids," in Proceedings of LENS '18. ACM, 2018, pp. 1 -- 10.
1809.03648
2
1809
2019-09-09T05:36:33
Who Started It? Identifying Root Sources in Textual Conversation Threads
[ "cs.SI" ]
In textual conversation threads, as found on many popular social media platforms, each particular user text comment either originates a new thread of discussion, or replies to a previous comment. An individual who makes an original comment ---termed as the "root source''---is a topic initiator or even an information source, and identifying such individuals is of particular interest. The reply structure of comments is not always available (e.g. in the proliferation of a news event), and thus identifying root sources is a nontrivial task. In this paper, we develop a generative model based on marked multivariate Hawkes processes, and introduce a novel concept, "root source probability", to quantify the uncertainty in attributing possible root sources to each comment. A dynamic-programming-based algorithm is then derived to efficiently compute root source probabilities. Experiments on synthetic and real-world data show that our method identifies root sources that match ground truth and human intuition.
cs.SI
cs
Who Started It? Identifying Root Sources in Textual Conversation Threads Wei Zhang*, Fan Bu†, Derek Owens-Oas†, Katherine Heller†, and Xiaojin Zhu* *Department of Computer Science, University of Wisconsin-Madison †Department of Statistical Science, Duke University Abstract In textual conversation threads, as found on many popular social media platforms, each particular user text comment either originates a new thread of discussion, or replies to a previous comment. An individual who makes an original comment -- termed as the "root source" -- is a topic initiator or even an information source, and identifying such individuals is of particular interest. The reply structure of comments is not always available (e.g. in the proliferation of a news event), and thus identifying root sources is a nontrivial task. In this paper, we develop a generative model based on marked multivariate Hawkes processes, and introduce a novel concept, root source probability, to quantify the uncertainty in attributing possible root sources to each comment. A dynamic-programming-based algorithm is then derived to efficiently compute root source probabilities. Experiments on synthetic and real- world data show that our method identifies root sources that match ground truth and human intuition. 1 Introduction Textual conversation threads -- individual textual utterances made sequentially by a group in- volved in discussion, in a conversational manner -- are widely observed on social media, in online forums, and in daily conferences and debates. Every textual comment can be thought of as either original or a response, where an original comment may prompt a new branch of discussion in the conversation. The individual responsible for an original comment is thus a topic initiator who potentially shifts the direction of discussion, or even an information source for the community. On the Internet, a term "original poster (OP)" has been developed for those "topic-initiating" indi- viduals, in order to attribute credit when novel ideas or meaningful talking points are brought up, or to lay blames when misinformation is spread. In a news-related user community on Twitter, for example, a journalist exposing the Facebook-Cambridge Analytica data scandal may be the OP for many follow-up posts and discussions, whereas the National Rifle Association account might be an OP of a series of tweets regarding gun violence. In this paper, we use the term "root source" instead of "OP" to accommodate general textual conversation threads, and tackle the task of identifying possible root sources for each comment. Learning root sources is of great interest to a wide audience including sociologists, psychologists and policy makers, and helps solve problems such as credit attribution, rumor tracing, and social power inference Danescu-Niculescu-Mizil et al. (2012). 1 Identifying root sources in general conversation threads, however, presents two major chal- lenges. First, although one can pin down the root sources by back-tracing the direct reply struc- ture to the earliest posts for cascades on online platforms (e.g., Twitter), such clear structure, unfortunately, is almost never available in offline textual conversation threads (e.g., court room transcriptions). Thus, one has to infer the hidden reply structure in order to identify root sources. Second, even though each comment only corresponds to one root comment and thus one root source, there could exist multiple root sources during the whole conversation, as individuals may intermittently start new topics, attempting to alter and lead the direction of discussion. We propose to achieve the goal of root source identification in textual conversation threads using multivariate Hawkes processes (MHPs) with textual marks, a class of mutually-exciting point processes. This model leverages three key aspects of textual conversation threads: (a) temporal locality -- individuals tend to respond to recent comments; (b) individual heterogeneity -- different individuals can have drastically different intrinsic comment rates and tendencies to reply; (c) vocabulary inheritance -- an individual tends to adopt certain vocabulary words from those whom he/she is responding to. To quantify the uncertainty of identified root sources for each comment, we introduce a novel concept, root source probability, and develop an algorithm to compute root source probabilities for all comments efficiently. This allows us to, for example, identify an individual information generator in conversation with high probability. in identifying root sources. Main Contributions: • A generative model based on marked MHPs is proposed. The model captures the three listed essential aspects of textual conversation threads: temporal locality, individual heterogeneity, and vocabulary inheritance. • A novel concept, root source probability, is introduced. It quantifies the posterior uncertainty • An efficient, dynamic-programming algorithm is derived to compute root source probabilities. The rest of the paper is organized as follows. Necessary background is provided in Sec. 2, and the parameterization of the marked MHPs model is described in Sec. 3. Sec. 4 formally defines root source probability and derives an efficient computation algorithm. Sec. 5 explains the parameter estimation procedure for the model, and Sec. 6 discusses related work. Finally, experiments are presented in Sec. 7, followed by conclusions in Sec. 8. is a coupling of S counting processes N(t) (cid:44)(cid:2)N (s)(t)(cid:3) 2 Background 2.1 Marked Multivariate Hawkes Processes An S-dimensional multivariate Hawkes process (MHP) Hawkes (1971b,a); Embrechts et al. (2011) s∈[S], each of which counts up the number of events occurring on source s before time t. We use [n] as a shorthand for the set {1, . . . , n} for any positive integer n and (cid:44) for "is defined as". A sample of an MHP is a sequence of events e1, e2, . . ., where the i-th event ei (cid:44) (ti, si) consists of a timestamp ti and a dimension/source la- bel si, indicating when and from which source the event occurs. The history, Ht− = {ei : ti < t}, is the set of events that occur strictly before t, for any t > 0. The conditional intensity λ(s)(tHt−) 2 for the s-th process of the MHP, for s ∈ [S], takes the form λ(s)(tHt−) (cid:44) µ(s)(t) + λ(s) i (t), (1) (cid:88) ti<t where µ(s)(·) and λ(s) the previous event ei, respectively. i (·) are the base intensity and the excited intensity of source s attributed to An important extension of MHPs is marked MHPs, which introduce to each event ei a mark xi. It is often assumed that mark xi is drawn, conditioned on ti and si, from a mark density P (·ti, si,Hti−). As the notation suggests, in the most general case the mark density may depend on timestamp ti and source label si of the i-th event, as well as all historical events before ti, i.e. Hti−. 2.2 Branching Structure An equivalent view of MHPs is Poisson clustering processes Rasmussen (2011). The Poisson clustering processes start with S inhomogeneous Poisson processes (IPPs), each of which is asso- ciated with a base intensity µ(s)(t) and forms its own cluster. Then the IPPs corresponding to the base intensities begin to generate events, which are called immigrants. Whenever an immigrant i (·), which further generates ei is generated, it adds to each cluster s a new IPP with intensity λ(s) the so-called offsprings. Eventually, the sample comprises all the events -- both immigrants and offsprings -- from all the clusters. This Poisson clustering point of view introduces a latent branching structure, defined by the parental relationship between events in the sample. Specifically, let the one-hot vector zi (cid:44) [zij]i−1 j=0 ∈ {0, 1}i be the parent variable for event ei, such that zi0 = 1 if ei is an immigrant from µ(si)(·), and zij = 1 if ei is an offspring from λ(si) (·). Based on the superposition property of Poisson processes, the distribution of zi conditioned on timestamp ti, source label si, and the history Hti− is j P (ziti, si,Hti−) = µ(si)(ti) λ(si) λ(si)(tiHti−) λ(si)(tiHti−) 0 (ti) j zi0 = 1, zij = 1, o.w. (2) An important property of the branching structure is that an MHP can be viewed as a forest with S trees. This is because the "parent" of each event ei is either an earlier event ej or the base intensity µ(s) (i.e. ei originates directly from source s). Therefore, given a branching structure, each event can be traced back to its "root", the source from which it originates, as illustrated in Figure 1. Given the nature of the branching structure, a more definitive form for the mark density P (·ti, si,Hti−) is often considered, in order to emphasize a direct dependency of the mark of an event on its parent event Rasmussen (2011). Conditioned on the parent variable zi, the mark xi of each event ei is assumed to be drawn from P (·ti, si, zi,Hti−) (cid:44) zi0 = 1, zij = 1, (3) (cid:26)f (·ti, si) f (·ti, si, ej)  3 µ(1)(t) µ(2)(t) µ(3)(t) Figure 1: A branching structure for a MHP. Immigrants and offsprings are pointed by solid and dashed arrows, respectively. Events sharing the same root source are represented with the same marker. For example, all red circles trace back to and thus share the same root source -- source 3 -- even though they are made by different sources. where f (·ti, si) and f (·ti, si, ej) are two parameterized probability densities. Combining (2) and (3) and marginalizing out the parent variable zi lead to P (xiti, si,Hti−) = µ(si)(ti) λ(si)(tiHti−) f (xiti, si) (cid:88) j<i + λ(si) j (ti) λ(si)(tiHti−) f (xiti, si, ej), (4) which implies that this mark density is in fact a mixture with weights proportional to the different intensity components. Unless stated otherwise, in the remaining paper we shall focus on the marked MHP, of which the conditional intensities and mark density are of the forms specified in (1) and (4), respectively. 3 Modeling Conversational Textual Cascades with Marked MHPs In this section, we propose a specific parameterization of marked MHPs to characterize the gen- erative process of textual conversation threads. Suppose there are S individuals participating in a conversation. We denote the i-th comment by ei (cid:44) (ti, si, xi), indicating that it is made by individual si at time ti with textual content xi. We represent the content xi as a bag-of-words vector for a vocabulary of V tokens. Let n be the total number of comments observed in time window [0, T ], and define HT (cid:44) {ei : i ∈ [n]}. Note that, in the rest of the paper, depending on the context, the words "event" and "comment", and "source" and "individual" may be used interchangeably. There are four components of a marked MHP that require a concrete parameterization: base intensity µ(s)(·), exciting intensity λ(s) i (·), mark density for immigrants f (·ti, si), and mark den- sity for offsprings f (·ti, si, ei). Furthermore, it is desired that the parameterization reflects the key aspects (discussed in Sec. 1) of textual conversation threads -- temporal locality, individual heterogeneity, and vocabulary inheritance. 4 We adopt the following factorized forms for µ(s)(·) and λ(s) i (·): (5) µ(s)(t) (cid:44) ρs ¯µ(s)(t), i (t) (cid:44) αs,siβ(xi)κ(s)(ti, t). λ(s) (6) Here ρs and ¯µ(s)(·) are the multiplier and shape function of the base intensity of source s, respec- tively; the matrix A (cid:44) [αss(cid:48)]ss(cid:48) characterizes the strength of mutual excitation between sources; the function β(·) quantifies the impact of different textual contents; and κ(s)(·,·)'s are normalized t κ(s)(t, t(cid:48))dt(cid:48) = 1 for s ∈ [S] and t > 0. Individual heterogeneity is reflected by the source-specific choice of ρ and A, as well as ¯µ(·) and κ(·), and temporal locality is reflected by the decaying property of the kernels κ(·). decay kernels such that(cid:82) ∞ Next, we specify the mark densities based on the multinomial distribution and its mixture. Specifically, let Multi(m, θ) be the multinomial distribution parameterized by m and θ. Condi- tioned on the text length Li for event ei, we consider the mark densities f (·ti, si) (cid:44) Multi(Li, θ(si)), where γ ∈ (0, 1) is a scalar parameter, and x (cid:44) x/(cid:80) f (·ti, si, ej) (cid:44) Multi(Li, (1 − γ)θ(si) + γ xj), v∈[V ] xv is the normalized bag-of-words vector for any x. Note that f (·ti, si, ej) is equivalent to a word-level multinomial mixture; that is, each token made by individual si is drawn i.i.d. from Multi(1, θ(si)) with probability 1 − γ and from Multi(1, xj) with probability γ. Thus, vocabulary inheritance is captured through this word-level mixture design. The graphical model of the above parameterization is included in Appendix A.1. 4 Root Source Probability 4.1 Overview The parental relationship for events of marked MHPs is analogous to the direct replying relation- ship for comments. From the viewpoint of the branching structure (as in Sec. 2.2), a comment that initiates a new topic is an immigrant event, and one that replies to existing comments is an offspring event. Therefore, inference about a marked MHP translates into identifying root sources in textual conversation threads. This motivates us to consider the following (informally defined for now) quantity for each event ei: P r(s is the root source of eiHT ), (7) which is in the form of a probability to address the uncertainty of root source identification. We name this novel quantity root source probability. We propose to tackle the task of identifying root sources with a two-stage approach: first, estimate the parameters of the S-dimensional marked MHP model specified in Sec. 3; second, apply the learned model to compute the root source probability in (7) for each event ei and source s. The first stage, parameter estimation, will be explained in Sec. 5. We shall describe the second stage in the next subsection by formally defining the root source probability and then stating an efficient procedure to compute it. To facilitate narration, we provide a list of notation in Table 1. 5 Notation S Ns(t) ei = (ti, si, xi) t µ(·) λ(·) zI δ·,· ri r(s) i V A γ θ(s) a(s) ρ , bρ a(s) α , bα Description the number of dimension/sources the counting process of the s-th dimension. i-th event time base intensity intensity branch structure Kronecker delta function root source probability s-root probability vocabulary size influence matrix word inheritance rate vocabulary parameter Bayesian prior parameter for base rate Bayesian prior parameter for infectivity Table 1: Table of notation and parameters. 6 4.2 Definition and Computation Suppose that a sample HT of n events is observed for a marked MHP in time window [0, T ]. Let I ⊆ [n] be an index set over events in HT , and zI (cid:44) [zi]i∈I be the collection of parent variables which collectively define the branching structure over all events [ei]i∈I. Define Z(I) as the space be a partition for Z(I) such of all possible zI's. For event index i ∈ I, let Z (1) that , . . . ,Z (S) ,Z (2) i i i Z (s) i (I) (cid:44) {zI ∈ Z(I) s is the root source of ei according to zI}. We define the root source probability as follows. Definition 1. Given an S-dimensional (marked) multivariate Hawkes process with sample HT of n events, the s-root probability of event ei is defined as P (z[n]HT ), (8) (cid:44) (cid:88) r(s) i z[n]∈Z (s) i ([n]) and ri (cid:44) [r(s) i ]s∈[S] is called the root source probability of event ei. i This definition seems to indicate that the computation of root source probability is intractable even for a single event, as it requires summing over all the posterior probabilities of all branching structures in Z (s) ([n]), the size of which grows factorially with the number of events n. However, it is actually feasible to carry out efficient computation for all events, given certain independence properties of the marked MHPs: 1. All parent variables [zi]i∈[n] are mutually independent conditioned on HT ; 2. The parent variables of the existing events z[i] and the future events HT\Hti are independent Let Ht (cid:44) {ei : ti ≤ t} be the historical events up to1 timestamp t for any t > 0. Then, conditioned on Hti for any i ∈ [n]. Furthermore, the following proposition shows that root source probabilities for all events in Both properties can be easily verified from the generative procedure of the marked MHP described in Sec. 2.2. They further imply that P (z[i]Ht) = P (z[i]Hti), for any i ∈ [n] and t ≥ ti. HT can be computed recursively. Proposition 1. Given an S-dimensional marked MHP with a sample HT of n events, the root source probability ri for any i ∈ [n] satisfies (cid:88) + i ∝ δsi,sµ(s)(ti)f (xiti, si) r(s) r(s) j λ(si) j (ti)f (xiti, si, ej), (9) where δx,y (cid:44) I(x = y) is the Kronecker delta function. j<i Thus, the root source probabilities for all events in HT can be efficiently computed via dy- namic programming. The proof of this proposition is in Appendix A.2. 1This notation Ht can include events occurring at t, slightly different from Ht−. 7 5 Parameter Estimation The parameters for the model described in Sec.3 are Θ (cid:44) {ρ, A, θ, γ}. Given the observed event sequence HT , parameters are estimated through maximizing the marginal log-likelihood L(Θ) (cid:44) log P (HTΘ) (cid:16) (cid:88) = log z[n]∈Z([n]) (cid:17) P (HT , z[n]Θ) . Evaluation of L(Θ), however, is intractable since the size of Z([n]) grows factorially with the number of events n. To address this issue, we adopt the variational expectation-maximization (EM) method Beal and Ghahramni (2003), following prior works He et al. (2015); Yang et al. (2013); Hoffman et al. (2013). The main idea of variational EM is to approximate the posterior distribution P (z[n]HT , Θ) with a proposed distribution Q, construct a lower bound surrogate L for L, and maximize L over Θ and Q alternatively. The complete likelihood for an event sequence HT and branching structure z[n] is Rasmussen (2011) (cid:35) P (HT ,z[n]Θ) = exp − λ(s)(tHt−) dt (cid:34) (cid:90) T (cid:88) 0 s (cid:105)zi0 µ(si)(ti)f (xiti, si) λ(si) j (ti)f (xiti, si, ej) (cid:105)zij . × n(cid:89) × n(cid:89) i=1 (cid:104) (cid:89) i=1 j<i (cid:104) n(cid:89) We adopt the mean-field variational approach and choose the proposed distribution Q to be the fully factorized multinomial, Q(z[n]) (cid:44) Multi(zi1, ηi), (10) where ηi ∈ [0, 1]i is the parameter for the i-th multinomial. We then construct a lower-bound surrogate for L(Θ) using the evidence lower bound: i=1 L(Θ) ≥EQ[log P (HT , z[n]Θ)] − EQ[log Q(z[n])] (cid:44) L(Θ, η). Since L(Θ, η) has a tractable, closed form (see Appendix A.3), we are able to estimate Θ by solving the following optimization problem: L(Θ, η). max Θ,η (11) We maximize (11) by block-coordinate ascent with the following updates for each parameter block. 8 Update η Maximizing (11) with respect to ηi's leads to the following closed-form updates: for i ∈ [n] and j ∈ [i − 1], ηi0 ∝ µ(si)(ti)f (xiti, si), ηij ∝ λ(si) (ti)f (xiti, si, ej). j Update ρ and A with Empirical Bayes When prior knowledge about unknown parameters is available, reference priors are often adopted to improve model performance Robbins (1964). We adopt independent Gamma priors on ρ and A, i.e., ρs ∼ Gamma(a(s) ρ , bρ) and αs,s(cid:48) ∼ α , bα). Combining such priors and maximizing the likelihood surrogate L(Θ, η) with Gamma(a(s) respect to ρs and αs,s(cid:48), we obtain the following updates (see Appendix A.4 for details): j<i δsi,sδsj ,s(cid:48)ηij . κ(si)(ti, t) dt ρs = αs,s(cid:48) = , i=1 a(s) a(s) i=1 δsi,sηi0 0 ¯µ(s)(t) dt ρ − 1 +(cid:80)n bρ +(cid:82) T (cid:80) α − 1 +(cid:80)n i=1 δsi,s(cid:48)β(xi)(cid:82) T bα +(cid:80)n n(cid:88) S(cid:88) V(cid:88) V(cid:88) δsi,sg(s) max θ,γ v=1 s=1 i=1 ti s.t. v=1 Update θ and γ To obtain the updates for θ and γ, one needs to solve the following sub- optimization problem: where i,v (θ, γ), v = 1,∀s ∈ [S], θ(s) (cid:104) (1 − γ)θ(s) i,v (θ, γ) (cid:44) ηi0xi,v log θ(s) g(s) v + ηijxi,v log v + γ xj,v (cid:88) j<i (12) (13) (cid:105) . We only sketch the optimization strategy for (12) here and include more details in Appendix j,v ∈ (0, 1) to each logarithm term in the i,v . We then replace i,v 's with their lower bounds in (12), and optimize the new objective. One can show that the A.5. Apply Jensen's Inequality with a coefficient ξ(s) summation of (13); this allows us to construct g(s) all g(s) choice of ξ(s) i,v , a lower bound for each g(s) j,v as where θ(s) and γ is the current estimate of θ(s) and γ, respectively, yields the closed-form updates δsi,s ηi0xi,v + ηij(1 − ξ(s) j,v )xj,v (cid:44) ξ(s) j,v γ xj,v (1 − γ)θ(s) v + γ xj,v , θ(s) v ∝(cid:88) (cid:80)n (cid:80)n γ = i=1 i (cid:104) (cid:80) (cid:80) j<i i=1 j<i (cid:88) j<i (cid:80)V (cid:80)V 9 v=1 ηijxj,vξ(si) j,v v=1 ηijxi,v . (cid:105) , 6 Related Work In recent years there has been growing interest in developing computational methods to enhance the understanding of real-world, social interactions within groups. Danescu-Niculescu-Mizil et al. (2011) developed a probabilistic framework to examine whether the phenomenon of linguistic ac- commodation holds for Twitter conversations. Danescu-Niculescu-Mizil et al. (2012) studied the ability of the change of linguistic style markers to reveal social power difference in textual cas- cades. Blundell et al. (2012) proposed a non-parametric Bayesian model to infer latent groups from interaction data, which is further extended by Tan et al. (2016) to allow time-varying re- ceptivity of each person. Other works such as Guo et al. (2015); Kawabata et al. (2016); Lin- derman and Adams (2014) focused on the problem of "who influences whom?" -- inferring the direct influence among individuals. Our work studies a novel question for textual conversation threads -- "who started it?" -- and provides a principled way to answer this question. On the other side, various methods, mostly non-parametric Lewis and Mohler (2011); Zhou et al. (2013); Bacry et al. (2012); Bacry and Muzy (2014); Xu et al. (2016); Hansen et al. (2015); Reynaud-bouret and Schbath (2010); Lemonnier and Vayatis (2014) have been proposed to es- timate the excitation kernel matrix for multivariate Hawkes processes. While these methods perform well empirically in estimating the trigger kernels, in the context of textual conversa- tion threads, they can only answer the question of "who influences whom?", which is different from ours. Moreover, these methods only consider the unmarked MHPs; for textual conversa- tion threads, however, one has to design an appropriate mark density to reflect subtle but critical linguistic adaptations, as what we do in our model. 7 Experiments This section aims to empirically evaluating the proposed two-stage approach for root source iden- tification (see Sec. 4.1) by answering the following questions: (Q1) How accurate is the parameter estimation procedure? (Q2) Can the root source probabilities computed with the estimated MHP model reliably identify the root sources? (Q3) How does our method perform on real-world data with the ground-truth reply structure? (Q4) How can our method provide insight into real-world conversation threads without the ground truth? We shall answer Q1 and Q2 with experiments on a synthetic dataset in Sec. 7.1, and then answer Q2 -- Q4 with experiments on two real-world datasets in Sec. 7.2. 7.1 Synthetic Data Experimental Setup We consider a synthetic dataset generated by a marked MHP with S = 5 sources. Every source s has the same base intensity function with ¯µ(s)(t) = 1 and ρs = 0.1, and ν (t(cid:48) − t)} with ν = 10. The excitation matrix the same exponential kernel κ(s)(t, t(cid:48)) = 1 A is set to be symmetric with diagonal and off-diagonal entries 0.4 and 0.1, respectively, and the mark impact function β(x) is set to constant 1. The five dimensions have average text lengths of 10, 20, 30, 40, and 50, respectively; they also have a vocabulary inheritance rate of γ = 0.3 and vocabulary parameters θ(s) ∼ Dir(1). The total vocabulary size is V = 5000, and the total number of events is n = 10000. ν exp{− 1 10 Parameter Recovery (Q1) First examine the reduction in the relative square errors (RSEs) for excitation matrix A and for vocabulary parameters θ(s)'s when the number of events increases. As shown in Figure 2, in both cases the RSEs decrease with more events observed, which verifies the effectiveness of the parameter estimation procedure. Overall, estimation for A is more accurate than that for θ(s)'s, which is reasonable since the dimension of θ(s)'s is much larger. Also, RSEs for θ(s)'s are smaller for sources with longer text, suggesting that it is easier to recover the vocabulary parameters for vocal, loquacious individuals. (a) Excitation matrix A (b) Vocabulary parameter θ(∗) Figure 2: Relative error of the estimated parameters on the synthetic data with varying sample size Root Source Identification (Q2) Now validate the ability of our method to identify root sources. To the best of our knowledge, no existing work provides a direct estimation of root source prob- abilities under the novel setting of this work; therefore, we validate the capacity of our method (RP FIT) via comparison with the following baseline families: • Heuristic running window baselines: use the normalized counts of comments from each source over the M most recent events as an estimate of root source probabilities. Set M = 1, 10, and ∞ (denoted as RW 1, RW 10, and RW inf, respectively). • Sub-model baselines: compute root source probabilities with temporal info only (RP TEMP FIT) and with textual info only (RP MARK FIT). That is, root source probabilities are calculated us- ing the following simplified recursive equations: (cid:88) i ∝ δsi,sµ(s)(ti) + (cid:88) ¯r(s) i ∝ δsi,sf (xiti, si) + r(s) j<i ¯r(s) j λ(si) j (ti), j f (xiti, si, ej). r(s) j<i Our method, as well as these baselines, are all compared with an oracle where the root source probabilities are computed using the true model parameters (RP TRUE). Figure 3 shows the accuracy of the root sources identified by the different methods, compared against the true root sources (i.e., the root sources constructed by tracing the true branching struc- ture). The RP-based methods outperform all other baselines in all cases, and as the sample size increases RP FIT converges to RP TRUE, the oracle method. 7.2 Real Data Data Our model is also evaluated on the following two real-world datasets: 11 200040006000800010000# of events0.010.020.03(A)200040006000800010000# of events0.00.51.01.5((*))dim 1dim 2dim 3dim 4dim 5 Figure 3: Accuracy of root source identification for each method on the synthetic data. • Reddit: A collection of comments on 2016 US Election results, extracted from the website • 12 Angry Men: A transcript of the 1957 legal-themed film, 12 Angry Men. Consider each reddit.com Pushshift (2017). Consider each post as an event and each user as a source. juror as a source and each utterance as an event. We defer more details on data collection and processing to Appendix B.1. One distinction between the two datasets is the availability of the ground-truth root sources. Since the direct replying relationship between posts are observed for the Reddit dataset, we are able to construct the ground-truth root sources and use them to quantitatively evaluate model performance. The 12 Angry Men dataset -- which exemplifies a more realistic and practical ap- plication of our method to real-world, off-line textual conversation threads -- does not offer the replying structure for utterances; hence, we provide a comprehensive qualitative analysis of our method on this dataset. Experimental Setup We choose the baseline intensity shape function as ¯µ(s)(t) ≡ 1 for both ν (t(cid:48) − t)} with hyperparameters ν = 450 datasets, and excitation kernels κ(s)(t, t(cid:48)) = 1 and ν = 8 for Reddit and 12 Angry Men, respectively. Other experimental setup is detailed in Appendix B.2. ν exp{− 1 Evaluation Metrics For Reddit, we quantify model performance in root source identification with the following metrics: (a) total predicted log-probability of the true root sources, given by root source probabilities; (b) top-k accuracy, the proportion of true root sources ranked at top k by root source probabilities (k = 1, 10). Results on Reddit (Q2, Q3) Table 2 compares the performance of RP FIT with the three afore- mentioned running window baselines. Our model, RP FIT, attains the best results on all three metrics. The comparable Top-1 accuracy of RW 1 with RP FIT is simply due to the specificity of the dataset -- a large number of posts are original comments, so the author is the root source -- but for those comments with possibly different true root sources, RP FIT performs better. 12 10002000500010000# of events0.20.40.60.8accRP_TRUERP_FITRP_TEMP_FITRP_MARK_FITRW_1RW_10RW_inf Method Log-Prob. Top-1 Acc. Top-10 Acc. 0.77 RW 1 RW 10 0.77 0.30 RW inf 0.79 RP FIT -2300.28 -2807.71 -1807.84 -852.15 0.74 0.11 0.04 0.74 Table 2: Model performance evaluated on Reddit. It is notable that RP FIT far outperforms RW 1 and RW 10 in total log-probability, because the baselines only consider sources that are temporally close, but our method also leverages tex- tual information and accounts for the uncertainty in identification. the sum over the s-root probabilities for all events, i.e.,(cid:80)n Results on 12 Angry Men (Q4) As ground truth is not available for 12 Angry Men, we qual- itatively analyze our model with a proxy task -- inferring social power in conversation threads Danescu-Niculescu-Mizil et al. (2012). We hypothesize that the social power of an individual can be reflected by his/her ability to initiate conversational topics; as a result, for individual s, , may be a good measure for social power. We verify this hypothesis by ranking all jurors in the film using this measure and show the top five jurors in Table 3. Juror 8 and Juror 3 are ranked as the top two, which exactly matches the film plot: the two jurors are the protagonist and antagonist, both heavily engaging in the discussion and frequently bringing up new talking points. The model also correctly ranks Juror 1 among the top, who serves as foreman and is responsible for maintaining order in the jury room. i=1 r(s) i Rank Source Juror 8 Juror 3 Juror 7 Juror 1 Juror 10 1 2 3 4 5 Power Role 269.89 53.34 40.29 36.99 35.78 insists acquittal insists conviction serves as foreman Table 3: The top five most influential jurors in 12 Angry Men ranked by the root source probability measure. We also investigate the "mini-conversations" found by our model; each mini-conversation is defined as a collection of the comments rooted by a comment that initiates a new topic and is 13 constructed by treating the learned variational variables ηi's in (10) as a proxy of the branching structure. We observe that many of these mini-conversations agree with human intuition and exhibit clear vocabulary inheritance. In the mini-conversation shown in Figure 4, for example, the word "witness", the phrase "could they be wrong" and the word "people" are repeated, which verifies the model assumption that a response comment may inherit words from the comment it replies to. Juror 8 Juror 12 Actually those two witnesses were the entire case for the prosecution. Supposing they are wrong... Could they be wrong? They are only people. People make mistakes. Could they be wrong? What do you mean suppos- ing they're wrong? What's the point of having witness at all? Those people sat on the stand under oath! Well, no. I don't think so. Figure 4: Vocabulary inheritance in 12 Angry Men. 8 Conclusion We address the problem of identifying root sources in textual conversation threads. We propose a marked multivariate Hawkes process model to describe the dynamics of textual cascades, and then introduce a novel concept, root source probability, to quantify the uncertainty of identified root sources. An efficient, dynamic-programming-based algorithm is derived to compute root source probabilities, and a parameter estimation procedure based on variational inference is developed. Experiments on synthetic and real-world datasets show that the proposed method can identify root sources that agree with both ground truth and human intuition. 14 References E. Bacry and J. Muzy. Second Order Statistics Characterization of Hawkes Processes and Non- parametric Estimation. arXiv.org, 2014. E. Bacry, K. Dayri, and J. F. Muzy. Non-parametric Kernel Estimation for Symmetric Hawkes Processes. Application to High Frequency Financial Data. The European Physical Journal B, 85(5):1, 2012. M. J. Beal and Z. Ghahramni. The Variational Bayesian EM Algorithm for Incomplete Data: With Application to Scoring Graphical Model Structures. Bayesian Statistics, 7:453 -- 464, 2003. C. Blundell, J. Beck, and K. A. Heller. Modelling Reciprocating Relationships with Hawkes Processes. In Advances in Neural Information Processing System (NeurIPS), pages 2600 -- 2608, 2012. C. Danescu-Niculescu-Mizil, M. Gamon, and S. T. Dumais. Mark My Words! Linguistic Style In Proceedings of the 20th International Conference on Accommodation in Social Media. World Wide Web (WWW), page 745, New York, New York, USA, 2011. ACM Press. C. Danescu-Niculescu-Mizil, L. Lee, B. Pang, and J. M. Kleinberg. Echoes of Power: Language Effects and Power Differences in Social Interaction. In Proceedings of the 21st International Conference on World Wide Web (WWW), New York, New York, USA, 2012. ACM Press. P. Embrechts, T. Liniger, and L. Lin. Multivariate Hawkes Processes: An Application to Financial Data. Journal of Applied Probability, 48(A):367 -- 378, 2011. F. Guo, C. Blundell, H. M. Wallach, and K. Heller. The Bayesian Echo Chamber: Modeling Social Influence via Linguistic Accommodation. In Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS), 2015. N. R. Hansen, P. Reynaud-bouret, and V. Rivoirard. Lasso and Probabilistic Inequalities for Multivariate Point Processes. Bernoulli, 21(1):83 -- 143, Feb. 2015. A. G. Hawkes. Spectra of Some Self-Exciting and Mutually Exciting Point Processes. Biometrika, 58(1):83 -- 90, 1971a. A. G. Hawkes. Point Spectra of Some Mutually Exciting Point Processes. Journal of the Royal Statistical Society. Series B (Methodological), 58(1):83 -- 90, 1971b. X. He, T. Rekatsinas, J. R. Foulds, L. Getoor, and Y. Liu. HawkesTopic - A Joint Model for In Proceedings of the Network Inference and Topic Modeling from Text-Based Cascades. 32nd International Conference on Machine Learning (ICML), 2015. M. D. Hoffman, D. M. Blei, C. Wang, and J. Paisley. Stochastic Variational Inference. Journal of Machine Learning Research, 14(1):1303 -- 1347, 2013. K. Kawabata, V. Berisha, A. Scaglione, and A. LaCross. A Convex Model for Linguistic Influence in Group Conversations. In INTERSPEECH, pages 1442 -- 1446. ISCA, 2016. 15 R. Lemonnier and N. Vayatis. Nonparametric Markovian Learning of Triggering Kernels for In Advances in Mutually Exciting and Mutually Inhibiting Multivariate Hawkes Processes. Knowledge Discovery and Data Mining, pages 161 -- 176. Springer Berlin Heidelberg, Berlin, Heidelberg, 2014. E. Lewis and G. Mohler. A Nonparametric EM algorithm for Multiscale Hawkes Processes. Journal of Nonparametric Statistics, (1):1 -- 20, 2011. S. W. Linderman and R. P. Adams. Discovering Latent Network Structure in Point Process In Proceedings of the 31st International Conference on Machine Learning (ICML), Data. pages 1413 -- 1421, Feb. 2014. Pushshift. Reddit Comment Data, 2017. URL https://files.pushshift.io/reddit/ comments/. J. G. Rasmussen. Bayesian Inference for Hawkes Processes. Methodology and Computing in Applied Probability, 15(3):623 -- 642, Dec. 2011. P. Reynaud-bouret and S. Schbath. Adaptive Estimation for Hawkes Processes; Application to Genome Analysis. The Annals of Statistics, 38(5):2781 -- 2822, Oct. 2010. H. Robbins. The Empirical Bayes Approach to Statistical Decision Problems. The Annals of Mathematical Statistics, 35(1):1 -- 20, 1964. X. Tan, S. A. Z. Naqvi, A. Y. Qi, K. A. Heller, and V. Rao. Content-based Modeling of Reciprocal Relationships Using Hawkes and Gaussian Processes. In Proceedings of the 32nd Conference on Uncertainty in Artificial Intelligence (UAI), 2016. H. Xu, M. Farajtabar, and H. Zha. Learning Granger Causality for Hawkes Processes. In Proceed- ings of the 33rd International Conference on Machine Learning (ICML), pages 1717 -- 1726, 2016. S.-H. Yang, H. Zha, S. Yang, and H. Zha. Mixture of Mutually Exciting Processes for Viral Diffusion. In Proceedings of the 30th International Conference on Machine Learning (ICML), pages 1 -- 9, 2013. K. Zhou, H. Zha, L. Song, and 2013. Learning Triggering Kernels for Multi-dimensional Hawkes Processes. In Proceedings of the 30th International Conference on Machine Learning (ICML), 2013. 16 A Technical Details A.1 Graphical Model for the Proposed Marked MHP Figure 5: The graphical model for the proposed marked MHP for modeling group conversation A.2 Proof of Proposition 1 Proof. First, the space Z (s) ([i]) and Z({i+ 1, . . . , n}). Given the conditional independence of z[i] and z{i+1,...n} for any i, we marginalize the latter term from (8), yielding ([n]) can be rewritten as the Cartesian product of Z (s) i i P (z[i]Hti). (14) (cid:88) r(s) i = z[i]∈Z (s) i ([i]) ([i]) belongs to exactly one of the following two cases: i Note that z[i] ∈ Z (s) 1. zi0 = 1 and si = i. 2. zij = 1 and z[i−1] ∈ Z (s) j ([i − 1]) for some j < i. (cid:88) Thus the right hand side of (14) can be rewritten as (cid:88) z[i−1]∈Z([i−1]) δsi,sP (z[i−1]Hti−)P (zi0 = 1Hti) (cid:88) P (z[i−1]Hti−)P (zij = 1Hti). + j<i z[i−1]∈Z (s) j ([i−1]) Since(cid:80) z[i−1]∈Z (s) j ([i−1]) P (z[i−1]Hti−) is indeed r(s) (cid:88) i = δsi,sP (zi0 = 1Hti) + r(s) j , we have j P (zij = 1Hti). r(s) Finally, since j<i P (ziHti) = P (ziti, si, xi,Hti−) ∝ P (ziti, si,Hti−)P (xizi, ti, si,Hti−), 17 𝑗:𝑡$<𝑡&𝑠=1,⋯,𝑆𝑠=1,⋯,𝑆𝑗:𝑡$<𝑡& 𝑡$ 𝜆$(0) 𝑠$ 𝑡& 𝑠& z& 𝛾 x& x$ 𝜌(0) 𝜽(0)𝐿& A 𝜅 d with (2) -- (4) we have i ∝ δsi,sP (zi0 = 1ti, si,Hti−)f (xiti, si) + r(s) (cid:88) j P (zij = 1ti, si,Hti)f (xiti, si, ej) r(s) ∝ δsi,sµ(si)(ti)f (xiti, si) + j<i (ti)f (xiti, si, ej). r(s) j λ(si) j (cid:88) j<i A.3 The Variational Lower Bound L(Θ, Q) The complete likelihood is P (HT , z[n]Θ) = exp λ(s)(tHt−) dt λ(si)(tiHti−) (cid:88) s (cid:32) × n(cid:89) − (cid:90) T (cid:32) 0 i=1 µ(si)(ti) λ(si)(tiHti−) f (xiti, si) (cid:33) n(cid:89) (cid:33)zi0 ×(cid:89) i=1 j<i (cid:32) λ(si) j (ti) λ(si)(tiHti−) (cid:33)zij . f (xiti, si, ej) Then the complete log likelihood with the parameterization specified in the paper becomes: ti κ(ti, t) dt zij log(cid:2)αsi,sj κ(tj, ti)f (xiti, si, ej)(cid:3) . + + i=1 ρs s 0 s i=1 zi0 log αs,siβ(xi) n(cid:88) (cid:90) T ¯µ(s)(t) dt −(cid:88) = −(cid:88) log P (HT , z[n]Θ) (cid:104) (cid:105) n(cid:88) ρsi ¯µ(si)(ti)f (xiti, si) (cid:90) T n(cid:88) (cid:88) (cid:2)log P (HT , z[n]Θ)(cid:3) − EQ (cid:2)log Q(z[n])(cid:3) ¯µ(s)(t) dt −(cid:88) = −(cid:88) n(cid:88) (cid:104) n(cid:88) ηij log(cid:2)αsi,sj κ(tj, ti)f (xiti, si, ej)(cid:3) − n(cid:88) n(cid:88) Therefore the variational lower bound L(Θ, Q) is L(Θ, Q) (cid:44)EQ (cid:105) ρsi ¯µ(si)(ti)f (xiti, si) (cid:90) T (cid:90) T (cid:88) αs,siβ(xi) ηi0 log i=1 j<i + + s i=1 ρs s 0 i=1 ti i=1 j<i i=1 κ(ti, t) dt (cid:16) ηi0 log ηi0 + (cid:17) . ηij log ηij (cid:88) j<i A.4 Derivation of Updates for ρ and A with Empirical Bayes Priors The modified lower bound using Gamma priors ρs ∼ Gamma(a(s) is ρ , bρ) and αs,s(cid:48) ∼ Gamma(a(s) α , bα) L(Θ, Q) 18 κ(ti, t) dt ηij log(cid:2)αsi,sj κ(tj, ti)f (xiti, si, ej)(cid:3) α − 1) log αs,s(cid:48) − bααs,s(cid:48) (a(s) (cid:105) . s = −(cid:88) n(cid:88) − n(cid:88) (cid:88) i=1 i=1 + + s 0 ti + ρs s i=1 i=1 j<i ηi0 log (cid:90) T (cid:90) T (cid:88) αs,siβ(xi) n(cid:88) (cid:88) n(cid:88) ¯µ(s)(t) dt −(cid:88) (cid:104) (cid:105) ρsi ¯µ(si)(ti)f (xiti, si)  ηi0 log ηi0 + (cid:105) (cid:104) (cid:88) (cid:88) ρ − 1 +(cid:80)n bρ +(cid:82) T α − 1 +(cid:80)n (cid:80) i=1 δsi,s(cid:48)β(xi)(cid:82) T bα +(cid:80)n ρ − 1) log ρs − bρρs (a(s) 0 ¯µ(s)(t) dt i=1 δsi,sηi0 ηij log ηij αs,s(cid:48) = ρs = a(s) a(s) (cid:104) i=1 j<i + s s(cid:48) , j<i δsi,sδsj ,s(cid:48)ηij κ(si)(ti, t) dt ti . Taking first order derivatives regarding ρs and αs,s(cid:48) gives the modified updates (cid:105) ≥ (1 − ξ(s) (cid:34) (cid:88) i,v (θ, γ) as ηijxi,v A.5 Derivation of Updates for Θ and γ For any coefficient ξ(s) j,v ∈ (0, 1), applying Jensen's inequality, we have (cid:104) (1 − γ)θ(s) log v + γ xj,v j,v ) log (1 − γ)θ(s) 1 − ξ(s) v j,v + ξ(s) j,v log γ xj,v ξ(s) j,v , (15) which leads to a lower bound of g(s) i,v (θ, γ) ≥ ηi0xi,v log θ(s) (cid:88) g(s) (cid:104) = ηi0xi,v + v + j<i ηijxi,v(1 − ξ(s) j,v ) (1 − ξ(s) j,v ) log (cid:105) (cid:35) + ξ(s) j,v log γ xj,v ξ(s) j,v (1 − γ)θ(s) 1 − ξ(s) v j,v (cid:88) (cid:88) j<i + ηi0xi,v + (cid:44)(cid:104) Define g(s) j,v log θ(s) v (16) j<i ηijxi,v[(1 − ξ(s) j,v log γ] + const. j,v ) log(1 − γ) + ξ(s) (cid:105) (cid:88) log θ(s) v + ηijxi,v(1 − ξ(s) j,v ) ηijxi,v[(1 − ξ(s) j,v ) log(1 − γ) + ξ(s) j,v log γ]. j<i j<i Solving the optimization problem max θ,γ n(cid:88) S(cid:88) V(cid:88) s=1 i=1 s.t. V(cid:88) v=1 δsi,sg(s) i,v (θ, γ), v = 1,∀s ∈ [S], θ(s) v=1 19 leads to the updates θ(s) v ∝(cid:88) (cid:80)n (cid:80)n γ = i=1 i (cid:88) (cid:80)V (cid:80)V j<i (cid:80) (cid:80) j<i i=1 j<i δsi,s[ηi0xi,v + ηij(1 − ξ(s) j,v )xi,v], v=1 ηijxi,vξ(si) j,v v=1 ηijxi,v . We choose ξ(s) j,v to be ξ(s) j,v = γ xj,v (1 − γ)θ(s) v + γ xj,v , (17) where θ(s) and γ are the current estimate of θ(s) and γ, respectively. This is because this choice makes the inequality in (16) tight with the old estimates and thus guarantees that the objective function increases monotonically. B Experimental Details B.1 Data Collection and Processing Reddit Our Reddit data are constructed from the data dump provided by the website Pushshift (2017). We consider a very popular article, on the politics subreddit, titled, "2016 Election Day Returns Megathread", and extract all comments occurring on the thread from November 8 through November 15 of 2016. This interval begins when the thread opened, on Election Tuesday. We then filter out the authors who commented less than 5 times. Comments that respond to deleted comments are also discarded. As all the comments have already organized in tree hierarchies, we define the root source (as known as O.P) of each comment to be the user of its first level parent comment. 12 Angry Men The transcript of the film 12 Angry Men is obtained from https://github. com/richardkwo/bayesian-echo-chamber/tree/master/data. We label each juror with his juror ID in the film. B.2 Detailed Experimental setup α = Ns, bα = T /(1−c). Empirical Bayes We set the hyperparameters a(s) Here Ns is the total number of events on source s, and c is the expected proportion of baseline events. We choose c = 1/10 to encourage original posts. ρ = Ns, bρ = T /c, a(s) Inference Algorithm Scalability B.3 Algorithm running time is recorded in the synthetic data experiments. As shown in Figure 6, model training time scales linearly with the number of events, support our claim of the efficiency of the proposed dynamic programming algorithm for computing all the root source probabilities. 20 Figure 6: Training time scales linearly with the number of events. B.4 Qualitative Analysis on Reddit We also provide qualitative analysis on Reddit data similar to that on 12 Angry Men. Table 4 shows the top five most influential users in Reddit ranked by the root source probability measure. Our power measure aligns well with the rankings by Reddit Gold, a virtual coin awarded by other users to valued comments. Figure 7 shows incidences of vocabulary inheritance in the text of Reddit comments. We visualize comments of which the root sources are correctly identified by our model. Note inheritance of the word "DNC" in the first branch and the statement "Hillary is president" in the second branch. Rank Source User E User S1 User S2 User S3 User R 1 2 3 4 5 Power Gold Gold Rank 15.94 11.66 10.38 10.32 10.20 385 72 44 73 73 2 17 28 16 15 Table 4: The top five most influential users in Reddit ranked by the root source probability mea- sure. 21 200040006000800010000# of events500010000running time(s) My god, this is what happens when ed- ucation is under- funded. Clinton is still win- ning. Don't quit yet. I'm just appalled its even this close. This is what the DNC gets for their Centrism fetish. Going even further left would not have heled the DNC. Obviously - painfully so! - you are dead, dead wrong. Election Day Mega- thread Bernie Sanders is the most populaer congressman. Pe- riod. Almost at his- torical levels. Just saying. And Hillary is pres- ident. What's your point? What reality are you watching? I'm cur- rently witnessing the apocalypse. Stop being so dra- matic. Go to bed. Wake up, Hillary is president. Bet money, kiddo. Figure 7: Vocabulary inheritance in Reddit. Note inheritance of the word "DNC" in the first branch and the statement "Hillary is president" in the second branch. 22
1208.2518
1
1208
2012-08-13T08:05:18
Software systems through complex networks science: Review, analysis and applications
[ "cs.SI", "cs.SE", "physics.soc-ph" ]
Complex software systems are among most sophisticated human-made systems, yet only little is known about the actual structure of 'good' software. We here study different software systems developed in Java from the perspective of network science. The study reveals that network theory can provide a prominent set of techniques for the exploratory analysis of large complex software system. We further identify several applications in software engineering, and propose different network-based quality indicators that address software design, efficiency, reusability, vulnerability, controllability and other. We also highlight various interesting findings, e.g., software systems are highly vulnerable to processes like bug propagation, however, they are not easily controllable.
cs.SI
cs
Software Systems through Complex Networks Science: Review, Analysis and Applications Lovro Šubelj University of Ljubljana Marko Bajec University of Ljubljana Faculty of Computer and Information Science Tržaška cesta 25, SI-1000 Ljubljana, Slovenia Faculty of Computer and Information Science Tržaška cesta 25, SI-1000 Ljubljana, Slovenia [email protected] [email protected] 2 1 0 2 g u A 3 1 ] I S . s c [ 1 v 8 1 5 2 . 8 0 2 1 : v i X r a ABSTRACT Complex software systems are among most sophisticated human-made systems, yet only little is known about the actual structure of 'good' software. We here study differ- ent software systems developed in Java from the perspec- tive of network science. The study reveals that network theory can provide a prominent set of techniques for the exploratory analysis of large complex software system. We further identify several applications in software engineering, and propose different network-based quality indicators that address software design, efficiency, reusability, vulnerability, controllability and other. We also highlight various interest- ing findings, e.g., software systems are highly vulnerable to processes like bug propagation, however, they are not easily controllable. Categories and Subject Descriptors D.2.8 [Software Engineering]: Metrics -- complexity mea- sures, performance measures, software science General Terms Theory, algorithms, experimentation. Keywords Software systems, Software engineering, Software networks, Network analysis. 1. INTRODUCTION Complex software systems are among most sophisticated systems ever created by human. Nevertheless, only little is known about the actual structure and quantitative proper- ties of large software systems [6]. For instance, in the context of software engineering, one is interested in how 'good' soft- ware looks like. Commonly adopted approaches and tech- niques fail to give a comprehensive answer [5, 7], moreover, there is also a lack of a simple but yet rigorous framework for Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SoftwareMining '12 , August 12, Beijing, China Copyright 2012 ACM 978-1-4503-1560-9/12/08 ...$15.00. software analysis (to our knowledge). The above dilemma was denoted software law problem [6], which urges towards identifying (physical) laws obeyed by software systems that could be used in practical applications. Networks possibly provide the most adequate framework for the analysis of the structure of complex systems like software projects1. Also, due to their simple and intelli- gible form, analysis of different networks has already pro- vided several significant discoveries in the last decade [46, 3, 16, 23]. Note that the adoption of software networks is not novel [35, 27, 19, 39], however, network analysis is still only rarely used in software engineering. The main purpose of this study is thus to highlight different techniques devel- oped in the field of network analysis, and to expose their use in software comprehension, development and engineer- ing. We review most of the past work on different types of software networks, whereas we also include network analysis techniques proposed just recently [23, 44]. (Note that the main focus of the paper is merely a review, rather than a de- tailed comparison of network analysis techniques with other approaches.) The study in the paper analyses software networks on dif- ferent levels of granularity. First, we address the macro- scopic properties of software networks like scale-free and small-world phenomena [46, 3] that are related to the struc- ture and design of the entire project, or projects, represented by the network. Second, we analyze the microscopic prop- erties of individual nodes, with special emphasis on differ- ent dynamical processes occurring on software networks like bug propagation [2, 30]. The above can be related to soft- ware quality, complexity, reusability, robustness, vulnerabil- ity and controllability. Third, we also identify mesoscopic structural modules within software networks [16, 44] and show their applicability in the context of software abstrac- tion and refactoring. The paper thus exposes network analy- sis as a prominent set of techniques for software engineering. The rest of the paper is structured as follows. Section 2 introduces software networks used in the study. Section 3 analyzes different characteristics of adopted networks and discusses their use in software engineering. Some applica- tions of the presented techniques are given in Section 4, while Section 5 concludes the paper. 2. SOFTWARE NETWORKS Various types of networks have been proposed for the analysis of the structure of complex software systems. For 1Throughout the paper, the term project refers to a reposi- tory of software code. Figure 1: (left) A simple Java class and the corresponding part of class dependency network. Direction of links is (mostly) just the opposite to the flow of information. (right) Class dependency network of java (circles) and javax (triangles) namespaces of Java language. Network Project Table 1: Properties of class dependency networks used in the study. A 153 267 357 778 1054 1889 1518 flmng colt jung org weka Weka 3.6.6 (data mining framework) javax Java 1.6.0.7 (javax namespace) [39] Java 1.6.0.7 (java namespace) [39] java Flamingo 4.1 (GUI components) [39] Colt 1.2.0 (scientific computation) [39] JUNG 2.0.1 (network analysis) [39] Java 1.6.0.7 (org namespace) [39] k 3.82 5.93 4.54 10.07 8.60 6.63 13.26 n 141 243 317 709 953 1595 1516 m 269 720 719 3571 4097 5287 10049 LCC 0.88 0.94 0.96 0.69 0.98 0.44 1.00 P 18 21 41 50 84 118 56 instance, software architecture maps [35], software mirror graphs [6], class, method and package collaboration graphs [17], subrutine call graphs [27], inter-package dependency net- works [21], software class diagrams [37] and class depen- dency networks [39], to name just a few. Networks mainly divide whether they are constructed from source code, byte code or program execution traces, and due to the level of software architecture represented by the nodes, and the set of interdependencies represented by the links. For consistency with some previous work [4, 17, 47, 39], we construct networks from the source code of different Java projects2 (Table 1). Due to the object-oriented view of Java language, nodes in the network can represent either project packages, software classes, methods and functions or individual lines of code. We here adopt class dependency networks [39], where nodes represent classes and links cor- respond to different dependencies among them (Figure 1). The latter is based on the following reasons. First, as net- works are constructed merely from the signatures of differ- ent classes, and functions and fields therein, they are only mildly influenced by the subjective nature of each individual developer. (This can be more adequately modeled by, e.g., text mining applied to the names of different programming constructs [20].) Second, mesoscopic structures of class de- pendency networks coincide with project packages [39, 44], which enables various applications in software engineering (Section 4). Third, such networks relate to the information flow between different parts of software project, and also co- incide with the human comprehension of the object-oriented software systems. Note that class dependency networks address only the inter-class structure of the software project, whereas the intra-class dependencies are disregarded. However, similarly as above, the latter reflect also the programming style of a particular developer, rather than the intrinsic structure of the software project alone. Nevertheless, future work will extend the study to inter- and intra-class dependencies us- ing to concepts of interdependent or coupled networks [26, 15]. Formally, let a project consist of classes A = {A1, A2, . . .} and let P be the set of software packages (bottom-most level of the package hierarchy). Corresponding class depen- dency network is then a directed graph G(N, L), with nodes N = {1, . . . , n} and links L (m = L). Node i corresponds to a class Ai, however, since isolated nodes are discarded in the analysis, n ≤ A. A directed link (i, j) ∈ L represent some dependency between classes Ai and Aj: inheritance (Ai inherits or implements Aj), parameter (Ai contains a method, function or constructor that takes Aj as parame- ter), return (Ai contains a method or function that returns Aj) and field (Ai contains a field of type Aj). Denote k to be the average degree in the network (i.e., average num- ber of links incident to a node). Furthermore, let kin and kout be the average in-degree and out-degree of the nodes, k = kin + kout. Hence, kout corresponds to a number of other classes required to implement the functionality of a respective class Ai, while kin corresponds to the number of i classes that use (depend on) Ai. Last, denote LCC to be the fraction of nodes in the largest connected component3. Table 1 shows properties of class dependency networks used in the study. Networks were selected thus to represent a diverse set of software systems including utility libraries i 2Networks are available from http://lovro.lpt.fri.uni-lj.si/. 3All networks in figures are reduced to LCC-s. Figure 2: Degree distributions of weka, javax and java networks. Table 2: Different statistics for class dependency networks used in the study. Network flmng colt jung org weka javax java γ 3.0 2.7 2.5 2.2 3.0 2.6 2.4 C 0.25 0.41 0.37 0.57 0.39 0.38 0.69 D 0.31 0.47 0.42 0.62 0.43 0.44 0.73 CER 0 .03 0 .02 0 .01 0 .01 0 .01 0 .00 0 .01 l 4.05 3.44 4.19 2.68 2.91 3.88 2.18 E 0.03 0.03 0.02 0.03 0.01 0.02 0.02 lER 3 .47 3 .16 3 .88 2 .81 3 .39 3 .16 3 .09 nd/n 0.38 0.30 0.48 0.39 0.12 0.30 0.17 (e.g., flmng and colt networks), complete frameworks (e.g., jung and weka networks) and also the core of Java language itself (i.e., java network). Software networks are compared against Erdos-R´enyi ran- dom graphs [12], where a link are placed between each pair of n nodes with probability k/(n − 1), where k = 2m/n for some n and m. 3. ANALYSIS AND DISCUSSION 3.1 Scale-free networks -- software complexity and reusability k! Simple random graphs experience a Poisson degree dis- tribution pk, pk ∼ λke−λ . On the contrary, pk of most real-world networks including software networks follows a power-law form pk ∼ k−γ [3, 35, 31, 9], where γ is a scale- free exponent, γ > 1. The latter can be clearly observed by a straight line with slope −γ in a log-log plot (Figure 2). Networks with power-law degree distributions are denoted scale-free, while γ can be directly related to the spreading processes occurring on networks [32] (e.g., bug propagation). For γ ∈ (2, 3), even a very small fraction of faulty nodes can already render the entire system inapplicable [30, 32]. Un- fortunately, the latter applies for all software networks used here (Table 2). Scale-free networks are usually considered an artifact of Yule's process or rich get richer phenomena [3]. For class dependency networks, this refers to the fact that highly used classes are, obviously, well known among developers, and would thus also be more commonly adopted in the future. However, power-laws should thus emerge merely in the in- degree distribution pin k that refers to the number of times each class is used [36, 4] (Figure 2). More precisely, scale- free nature of pin k is a result of high code reusability. On the other hand, out-degree distribution pout is related to software complexity, since classes with high kout encompass k i most complex functionality. Here, complexity refers to the number of other classes needed to implement the function- ality of the respective class. For example, most commonly reused class in java network is String, whereas FileDialog is the most complex one (Table 3). k and highly truncated pout Well developed software project should thus exhibit scale- free pin k . Next, lower γ indicates higher code reuse, which also decreases the probability of fault propagation throughout the system. Last, classes with very high kout , and also kin , should be implemented with i extra care (see Section 3.3). i 3.2 Small-world networks -- software structure and design Software networks exhibit small-world phenomena [46] (see [27, 38] and Table 2), which refers to high clustering C [46] and very short average distance between the nodes l [1] (also known as six degrees of separation [25]). C measures tran- sitivity in the network, and is defined as the probability that two neighbors of a node are also linked, C ∈ [0, 1]. i(cid:54)=j dij, where dij is the distance between i in l = j in the respective undirected network (i.e., number of links in the shortest path). Small-world networks most commonly refer to C (cid:29) CER and l ≈ lER [46], where CER and lER are the values for a corresponding random graph. (cid:80) n(n−1) 1 Clustering of software networks can be related to intrinsic characteristics of the underlying systems [43]. For instance, visualization classes usually experience very high clustering, while clustering is almost zero for I/O classes [43, 40]. Average distance l is an important indicator of the struc- tural design of the project, or projects, represented by the network. More precisely, since l ≈ lER, l (cid:29) lER indicates that the underlying software system has divided into several independent parts with rather different functionality (Fig- ure 3). Note also that software networks should never be combined with the core of the language, since the latter Figure 3: A random graph, jung network, jung & colt network and jung & java network. Average distance between the nodes l equals 3.88, 4.19, 5.37 and 2.18. Node symbols correspond to clustering D [33] that ranges between 0 (triangles) and 1 (circles). Figure 4: weka, javax and java networks with highlighted seed nodes. completely obscures its structure and dynamics. 1 ij, where d(cid:48) (cid:80) i(cid:54)=j 1/d(cid:48) It ought to be mentioned that software networks are small- world only in the undirected case [19]. The contrary would imply a cyclic flow of information within the software project. For instance, high-level Java class String does not use the functionality of a lower-level FileDialog. Let E be the ef- ficiency of network information flow [22] defined as E = ij is the distance from i to j in n(n−1) a (directed) network, E ∈ [0, 1]. Small-worlds should result in high flow efficiency E, however, software networks have E ≈ 0 (Table 2). Well designed software project should thus experience C (cid:29) CER, l ≈ lER and E ≈ 0. Also, one should be wary of l (cid:29) lER throughout the project development. 3.3 Network nodes -- software vulnerability and control In the context of spreading processes on software net- works [28, 45] (e.g., bug propagation) and network robust- ness [2, 32] (i.e., software vulnerability), one is interested into so called seed nodes that could originate the propaga- tion of faults through the entire system4. Centrality metrics that measure nodes influence are commonly regarded as a prominent indicator of seed nodes [13, 14]. Denote DCi to be the degree centrality defined as DCi = ki/(n − 1), where ki is the degree of node i, DCi ∈ [0, 1]. Next, denote CCi to be the harmonic closeness centrality defined as the 4Although a poor implementation of any software class al- ready makes the system vulnerable, the problem is even am- plified in the case of, e.g., highly reused classes. (cid:80) i(cid:54)=j 1/d(cid:48) As ki ≈ kin average inverse of distance from i to the rest of the nodes, ij, CCi ∈ [0, 1]. Last, denote BCi to be CCi = 1 n−1 the betweenness centrality defined as the fraction of shortest paths between the nodes that go through i, BCi ∈ [0, 1]. i for software networks, DCi actually identi- fies classes with the highest code reuse or, equivalently, high in-degree kin (Table 3). Similar set of influential classes is re- i ported by BCi (Table 4). On the other hand, CCi identifies classes that somewhat coincide with high complexity classes identified in Section 3.1. BCi (and DCi) thus reveals classes whose faulty implementation could influence the entire sys- tem, whereas CCi exposes classes that are most prone to an arbitrary fault within the system. The former commonly reside in the core of the respective software network, while the latter are found in the periphery (Figure 4). Extra care should be put in the development of classes with high BCi, while high CCi classes can be adopted for an effective, and also efficient, software testing. Network controllability has just recently been proposed for the analysis of directed real-world networks [24, 23]. Here, one is particularly interested in the number of driver nodes nd that one has to govern in order guide the entire sys- tem [23] (i.e., gain control over the output of the system under the assumption of simple linear transformations). For scale-free networks with pin γ > 2 [23]. Note that, contrary to seed nodes (Table 4) and general belief, driver nodes tend to avoid high degree nodes [23, 11]. k equal to pout k , nd/n ≈ ek(γ−2)/(2−2γ), Most software network are not highly controllable, since one would have to manage 30-50% of classes in order to con- Table 3: Hubs (i.e., nodes with very high degree) within weka, javax and java networks. weka javax java Node Instances Instance Capabilities ClassAssigner Filter Classifier kin i 541 381 304 0 0 0 kout i 5 4 4 19 19 18 Node JComponent Accessible ComponentUI JTable JTextPane JMenu kin i 235 222 175 6 0 1 kout i 11 1 2 37 30 26 Node String Class Object FileDialog Frame Dialog kin i 1308 1288 1228 0 4 5 kout i 7 4 1 59 58 57 Table 4: Seed nodes (i.e., very influential nodes) within weka, javax and java networks. weka Node PredictionAppender Classifier Filter Instances RevisionHandler Instance javax java CCi BCi 0.00 0.03 0.03 0.01 0.00 0.03 0.51 0.01 0.26 0.00 0.01 0.13 Node DefaultCellEditor JTable JTextPane JComponent Accessible PrintService CCi BCi 0.00 0.10 0.10 0.12 0.08 0.09 0.23 0.04 0.18 0.01 0.02 0.17 Node FileDialog Dialog Frame String Object Class CCi BCi 0.00 0.09 0.09 0.00 0.00 0.09 0.36 0.02 0.32 0.02 0.02 0.26 trol the entire project (Table 2). Nevertheless, due to high density, the core of Java language can be controlled through merely 17% of classes in java namespace. For comparison, nd/n equals ≈ 80% for regulatory networks, ≈ 50% for the Internet, ≈ 30% for power grids and on-line social networks, while, interestingly, it is below 3% for corporate ownership networks [23]. Controllability of a software system can be limited by de- creasing k or γ, which is achieved by decreasing code com- plexity and increasing code reuse (Section 3.1). 3.4 Network modules -- software aggregation and modularity Packages of the software system reflect in different struc- tural modules within class dependency networks [39, 44]. For instance, visualization classes commonly aggregate into communities of densely connected nodes [16], whereas dif- ferent parsers, transformers or plugins often arrange into functional modules [43] that correspond to (disconnected) groups of nodes with common linkage patterns. Otherwise, clear community structure signifies highly modular struc- ture of the respective software system, while well supported functional modules are related to clear functional roles of the classes within the project [39, 44, 43]. Table 5 compares software packages against network mod- ules identified with MO [8] and CP [42, 41] community de- tection approaches, and MM [29] and GP [44, 43] struc- tural module identification algorithms. Analysis reveals that general structural modules including communities and func- tional modules most accurately model the package structure of the software systems in this study. 4. APPLICATIONS Due to space limitations, the following section only briefly describes different applications of network analysis techniques presented in Section 3. Future work will focus on a more detailed examination and development of supporting imple- mentations that could be easily applied in practice. 4.1 Software project abstraction Figure 5 shows an application of network structural mod- ule detection to software project abstraction. One can iden- tify an entire hierarchy of modules that is consistent with the package hierarchy, while also enclosing class dependencies that go beyond packages decided by the developers. Besides better comprehension, revealed hierarchy enables the predic- tion of dependencies between the classes of a project [43]. 4.2 Software packages refactoring Network module detection algorithms can also be applied for refactoring of software packages [39, 43]. One can adopt a community detection algorithm to reveal highly modular structure (Figure 6, (left)) or a functional module detec- tion algorithm to identify the underlying functional struc- ture (Figure 6, (middle)). General structural module detec- tion algorithms partition software classes according to both modular and functional links that are present among the dependencies of the project (Figure 6, (right)). 4.3 Software packages prediction Table 6 shows classification accuracies for the prediction of software packages for the classes of different systems. Let i be a node corresponding to class Ai. Package of Ai is then predicted to be the most likely package considering nodes within the same structural module as i. The nodes are weighted according to Jaccard similarity [18], which is defined as Γi ∩ Γj/Γi ∪ Γj, where j is a similar node and Γi is the neighborhood of node i. Structural modules are identified with the algorithm in [44, 43]. On average, one can predict software packages with ≈ 80% probability for most classes of the systems considered, whereas complete package hierarchy can be precisely identi- fied for over 60% of the software classes (Table 6). 4.4 Software quality indicators Table 7 and Table 8 show software project and class qual- ity indicators identified in the study. Indicators can be em- ployed to assess project structure and design, code complex- Figure 5: (left) jung network where node symbols represent high-level packages of JUNG framework: visu- alization (circles), io (triangles), graph (squares) and algorithms (diamonds). (right) Hierarchy of structural modules revealed with the algorithm in [43]. Figure 6: (left) Communities representing highly modular structure of the software system [42, 41]. (mid- dle) Functional modules that represent highly functional partitioning of the system [44, 43]. (right) General structural modules conveying modular and functional links (bottom-most level of the hierarchy in Figure 5). Table 5: Normalized mutual information [10] (NMI) between software packages and identified network mod- ules, NMI ∈ [0, 1]. Number of modules is shown in small font. Network 16 flmng colt jung org weka javax 19 39 47 81 107 MO CP MM GP 0.580 0.519 0.614 0.503 0.558 0.704 14 10 13 11 26 59 0.609 0.473 0.650 0.537 0.410 0.761 27 20 30 30 49 155 0.521 0.533 0.661 0.378 0.430 0.392 16 19 39 39 63 89 0.610 0.530 0.680 0.536 0.314 0.747 26 26 41 33 28 192 Table 6: Classification accuracy (CA) for software package prediction, CA ∈ [0, 1]. (l∞ is the number of levels of the package hierarchy, whereas l is the average level for a software class. Value under Pi corresponds to CA for the i-th level of the hierarchy.) Network flmng colt jung org weka javax l 2.65 3.35 2.97 3.50 3.02 3.11 l∞ 4 4 4 7 6 5 P P4 P3 0.566 ← 0.572 0.654 ← 0 .756 0.617 ← 0.663 0.616 0.616 0 .714 0 .736 0.692 0.684 0.626 0.631 0 .816 P2 0 .793 0.942 0 .857 0.989 0.871 0.982 P1 1.000 1.000 1.000 1.000 1.000 1.000 Table 7: Software project quality indicators presented in the study. For each indicator, we give the range and the expected value of a well designed software system (based on Section 3). Comment Quality indicator Expected value pin k kin pout k kout D l − lER E nd/n γ ∼ k−γin (cid:29) 0 (cid:28) k−γout (cid:28) n (cid:29) 0, (cid:28) 1 ≤ 0 ≈ 0 (cid:29) 0 (cid:28) 3 Range γin > 1 γout > 1 ∞ ∞ [0, 1] ∞ [0, 1] [0, 1] > 1 High code reusability (Section 3.1). Low code complexity (Section 3.1). Characteristics of the project domain [43]. Well structured and designed project (Section 3.2). Low efficiency of information flow (Section 3.2). Low project controllability (Section 3.3). Low project vulnerability, high robustness (Section 3.1). Table 8: Software class indicators presented in the study. For each indicator, we give the range and the expected value of highly influential, most vulnerable or high complexity classes (based on Section 3). Class indicator Expected value Range Comment DC, BC CC kin kout (cid:29) 0 (cid:29) 0 [0, 1] ∞ Highly influential seed classes (Section 3.3). Highly vulnerable seed classes (Section 3.3). Highly influential hub classes (Section 3.1). High complexity hub classes (Section 3.1). ity and reusability, controllability and vulnerability, infor- mation flow, and other. Due to space limitations, compari- son with other approaches for measuring software quality is omitted (e.g., metrics of coupling and cohesion [34]). 5. CONCLUSIONS The paper conducts a comprehensive study of software networks constructed from Java source code. First, we ad- dress macroscopic network properties that are related to structural design of the corresponding software project. Next, we analyze the networks on a microscopic level of nodes, to highlight most influential and vulnerable software classes. Last, we analyze mesoscopic network structural modules and expose their applicability in project refactoring. Among other, we show that software systems are highly vulnerable to processes like bug propagation, however, they are not eas- ily controllable. On the other hand, Java language can be controlled through merely 17% of java namespace. We also identify several network-based quality indicators that can be employed to assess software project design, reusability, ro- bustness, controllability and other. The study thus exposes network analysis as a prominent set of tools for software systems engineering. 6. ACKNOWLEDGMENTS This work has been supported by the Slovene Research Agency ARRS within Research Program No. P2-0359. 7. REFERENCES [1] R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network flows: Theory, algorithms, and applications. Prentice-Hall, Upper Saddle River, NJ, 1993. [2] R. Albert, H. Jeong, and A. L. Barabasi. Error and attack tolerance of complex networks. Nature, 406(6794):378 -- 382, 2000. [3] A. L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509 -- 512, 1999. [4] G. Baxter, M. Frean, J. Noble, M. Rickerby, H. Smith, M. Visser, H. Melton, and E. Tempero. Understanding the shape of java software. In Proceedings of the ACM International Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 397 -- 412, 2006. [5] B. Beizer. Software testing techniques. Van Nostrand Reinhold Co., New York, NY, USA, 1990. [6] K. Cai and B. Yin. Software execution processes as an evolving complex network. Information Sciences, 179(12):1903 -- 1928, 2009. [7] E. M. Clarke, O. Grumberg, and D. Peled. Model checking. MIT Press, 2000. [8] A. Clauset, M. E. J. Newman, and C. Moore. Finding community structure in very large networks. Physical Review E, 70(6):066111, 2004. [9] G. Concas, M. Marchesi, S. Pinna, and N. Serra. Power-laws in a large object-oriented software system. IEEE Transactions on Software Engineering, 33(10):687 -- 708, 2007. [10] L. Danon, A. D´ıaz-Guilera, J. Duch, and A. Arenas. Comparing community structure identification. Journal of Statistical Mechanics: Theory and Experiment, P09008, 2005. [11] M. Egerstedt. Complex networks: Degrees of control. Nature, 473(7346):158 -- 159, 2011. [12] P. Erdos and A. R´enyi. On random graphs i. Publicationes Mathematicae Debrecen, 6:290 -- 297, 1959. [13] L. Freeman. A set of measures of centrality based on betweenness. Sociometry, 40(1):35 -- 41, 1977. [14] L. C. Freeman. Centrality in social networks: Conceptual clarification. Social Networks, 1(3):215 -- 239, 1979. [15] J. Gao, S. V. Buldyrev, H. E. Stanley, and S. Havlin. Networks formed from interdependent networks. Nature Physics, 8(1):40 -- 48, 2012. [16] M. Girvan and M. E. J. Newman. Community [35] S. Valverde, R. F. Cancho, and R. V. Sol´e. Scale-free structure in social and biological networks. Proceedings of the National Academy of Sciences of United States of America, 99(12):7821 -- 7826, 2002. [17] D. Hyland-Wood, D. Carrington, and S. Kaplan. Scale-free nature of java software package, class and method collaboration graphs. In Proceedings of the International Symposium on Empirical Software Engineering, pages 1 -- 10, 2006. [18] P. Jaccard. ´Etude comparative de la distribution florale dans une portion des alpes et des jura. Bulletin del la Soci´et´e Vaudoise des Sciences Naturelles, 37:547 -- 579, 1901. [19] G. A. Kohring. Complex dependencies in large software systems. Advances in Complex Systems, 12(6):565 -- 581, 2009. [20] A. Kuhn, S. Ducasse, and T. Gırba. Semantic clustering: Identifying topics in source code. Information and Software Technology, 49(3):230 -- 243, 2007. [21] N. LaBelle and E. Wallingford. Inter-package dependency networks in open-source software. e-print arXiv:cs/0411096v1, 2004. [22] V. Latora and M. Marchiori. Efficient behavior of small-world networks. Physical Review Letters, 87(19):198701, 2001. [23] Y. Liu, J. Slotine, and A. Barabasi. Controllability of complex networks. Nature, 473(7346):167 -- 173, 2011. [24] A. Lombardi and M. Hornquist. Controllability analysis of networks. Physical Review E, 75(5):056110, 2007. [25] S. Milgram. The small world problem. Psychology Today, 1(1):60 -- 67, 1967. [26] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter, and J. Onnela. Community structure in time-dependent, multiscale, and multiplex networks. Science, 328(5980):876 -- 878, 2010. networks from optimal design. Europhysics Letters, 60(4):512, 2002. [36] S. Valverde and R. V. Sol´e. Logarithmic growth dynamics in software networks. Europhysics Letters, 72(5):858 -- 864, 2005. [37] S. Valverde and R. V. Sol´e. Network motifs in computational graphs: A case study in software architecture. Physical Review E, 72(2):026107, 2005. [38] S. Valverde and R. V. Sol´e. Hierarchical small worlds in software architecture. Dynamics of Continuous, Discrete and Impulsive Systems - Series B, 14:1 -- 11, 2007. [39] L. Subelj and M. Bajec. Community structure of complex software systems: Analysis and applications. Physica A: Statistical Mechanics and its Applications, 390(16):2968 -- 2975, 2011. [40] L. Subelj and M. Bajec. Generalized network community detection. In Proceedings of the ECML PKDD Workshop on Finding Patterns of Human Behaviors in Network and Mobility Data, pages 66 -- 84, Athens, Greece, 2011. [41] L. Subelj and M. Bajec. Robust network community detection using balanced propagation. European Physical Journal B, 81(3):353 -- 362, 2011. [42] L. Subelj and M. Bajec. Unfolding communities in large complex networks: Combining defensive and offensive label propagation for core extraction. Physical Review E, 83(3):036103, 2011. [43] L. Subelj and M. Bajec. Clustering assortativity, communities and functional modules in real-world networks. e-print arXiv:12023188v1, 2012. [44] L. Subelj and M. Bajec. Ubiquitousness of link-density and link-pattern communities in real-world networks. European Physical Journal B, 85(1):32, 2012. [45] J. Wang and Y. Liu. Modeling software faults propagation. Europhysics Letters, 92(6):60009, 2010. [27] C. R. Myers. Software systems as complex networks: [46] D. J. Watts and S. H. Strogatz. Collective dynamics of Structure, function, and evolvability of software collaboration graphs. Physical Review E, 68(2), 2003. 'small-world' networks. Nature, 393(6684):440 -- 442, 1998. [28] G. M. Narayan, K. Gopinath, and V. Sridhar. [47] L. Wen, D. Kirk, and R. G. Dromey. Software systems Structure and interpretation of computer programs. In Proceedings of the IEEE International Symposium on Theoretical Aspects of Software Engineering, 2008. as complex networks. In Proceedings of the IEEE International Conference on Cognitive Informatics, pages 106 -- 115, 2007. [29] M. E. J. Newman and E. A. Leicht. Mixture models and exploratory analysis in networks. Proceedings of the National Academy of Sciences of United States of America, 104(23):9564, 2007. [30] R. Pastor-Satorras and A. Vespignani. Epidemic spreading in scale-free networks. Physical Review Letters, 86(14):3200 -- 3203, 2001. [31] A. Potanin, J. Noble, M. Frean, and R. Biddle. Scale-free geometry in OO programs. Communications of the ACM, 48(5):99 -- 103, 2005. [32] S. Sinha. Few and far between. Physics, 4:81, 2011. [33] S. N. Soffer and A. V´azquez. Network clustering coefficient without degree-correlation biases. Physical Review E, 71(5):057101, 2005. [34] W. P. Stevens, G. J. Myers, and L. L. Constantive. Structured design. IBM Systems Journal, 38(2):231 -- 256, 1999.
1504.01637
1
1504
2015-04-07T15:17:52
Local Variation of Collective Attention in Hashtag Spike Trains
[ "cs.SI", "cs.CY" ]
In this paper, we propose a methodology quantifying temporal patterns of nonlinear hashtag time series. Our approach is based on an analogy between neuron spikes and hashtag diffusion. We adopt the local variation, originally developed to analyze local time delays in neuron spike trains. We show that the local variation successfully characterizes nonlinear features of hashtag spike trains such as burstiness and regularity. We apply this understanding in an extreme social event and are able to observe temporal evaluation of online collective attention of Twitter users to that event.
cs.SI
cs
Local Variation of Collective Attention in Hashtag Spike Trains Ceyda Sanli and Renaud Lambiotte CompleXity and Networks, naXys, Department of Mathematics University of Namur, 5000 Namur, Belgium 5 1 0 2 r p A 7 ] I S . s c [ 1 v 7 3 6 1 0 . 4 0 5 1 : v i X r a Abstract In this paper, we propose a methodology quantifying temporal patterns of nonlinear hashtag time series. Our approach is based on an analogy between neuron spikes and hashtag diffusion. We adopt the local variation, originally developed to analyze local time delays in neuron spike trains. We show that the local variation successfully characterizes nonlinear features of hashtag spike trains such as burstiness and regularity. We apply this understanding in an extreme social event and are able to observe temporal evaluation of online collective attention of Twitter users to that event. Introduction Hashtag diffusion in Twitter social network is nonlinear in time. Pairwise or higher order temporal correlations, bursts, and regular patterns are observed in data analysis. The dis- tribution of time delays between two successive hashtag ac- tivities gives a power-law scaling with fat tails (Domenico et al. 2013), on the contrary to an exponential distribution suggested for an independent Poisson process. A potential reason addressed is that earlier hashtags influence coming hashtags such that past hashtags can both cooperate and compete with present hashtags (Myers and Leskovec 2012; Coscia 2013). Heterogeneity of individual online user be- havior in micro scale and self-organized cascades (Cheng et al. 2014) due to unequal selection (Ratkiewicz et al. 2010; Weng et al. 2012; Gleeson et al. 2014; Coscia 2013; Cetin and Bingol 2014; Gleeson et al. 2015) in the hashtag pool in macro scale, and the underlying cyclic rhythm of twit- ting habit (Myers and Leskovec 2014; Franca et al. 2014; Mollgaard and Mathiesen 2015; Sanli and Lambiotte 2015) are further factors driving time-dependent hashtag propaga- tion. Although preserving highly nonlinear nature, building tools to characterize hashtag time-series, except obtaining the distribution functions, has not been considered in detail, yet. protests Extreme (Borge-Holthoefer elections and 2011; Gonzalez-Bailon et al. 2011), announcement of scien- tific innovations (Domenico et al. 2013), and panic events Copyright c(cid:13) 2015, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. et al. social events such as Figure 1: Hashtag spike trains of #ledebat in different days covering extreme social events such as the debate of the French presidential election-2012 held on May 2 and the election held on May 6, and a regular day between them, e.g May 4. The upper row represents the dynamics in the debate day. Collective attention during the debate gives tremendous amount of activity on the hashtag and so we observe a con- tinuous series on the contrary to the distinguished spikes be- fore 4 pm. The middle row is for a regular day after the de- bate, followed by the spike train in the election day in the below row. A decay in the activity on the hashtag #ledebat is visible from the top to the bottom and the process suggests highly nonlinear characteristics in each day. such as crisis (Kenett et al. 2014) and earthquakes (Sasahara et al. 2013) artificially deform Twitter network and en- courage massive amount of hashtag activity in a short time window, as shown in Figure 1. The resultant emergent on- line behavior is both empirically (Yang and Leskovec 2011; Mollgaard and Mathiesen 2015) and theoretically (Moll- gaard and Mathiesen 2015) studied and distinct temporal properties of collective attention are quantified. These 8 am12 pm 4 pm 8 pm 0 am4 am0 amhourdebate dayregular dayelection dayhashtag spike trains: #ledebat properties are significantly important to be able to predict these extreme, but rare social events (Kenett et al. 2014; Miotto and Altmann 2014). Our main motivation is to establish a systematic method- ology to distinguish real noisy hashtag signals to indepen- dent random signals and to extract temporal patterns from the real signals. We apply an approach called the local varia- tion LV , originally introduced to analyze noisy neuron spike trains and to detrend for salient dynamics of neurons (Shi- nomoto, Shima, and Tanji 2003; Miura, Okada, and ichi Amari 2006; Omi and Shinomoto 2011). After convincing the usage of LV in semantic analysis, which has been per- formed extensively in our recent work (Sanli and Lambiotte 2015), we present a promising study on evaluation of col- lective attention by performing LV on a political election. Remarkable difference in LV in rush period suggests that local nonlinear features could predict extreme social events. Data Set Data Collection The data is collected via publicly open Twitter API. A fine time window, between April 30, 2012 and May 10, 2012, is determined on purpose to be able to cover two social events such as the political debate on the French presiden- tial election-2012 held on May 2 and the election day held on May 6. Having 10 days data helps us to visualize activity in regular days, both between and after these extreme events, and compare the difference in hashtag dynamics. During this period, all twitting activity, but only the users addressed in France is considered not to deal with time differences be- tween countries and regions and other potential social events held on in the same period. The time resolution is 1 second and no language selection is applied. We examine 295,697 unique hashtags out of 2,942,239 tweets include at least one hashtag, which is 30% of all tweets. 228,525 online users, almost half of the to- tal online users, are associated with hashtag diffusion. The network in the period contains hashtags directly re- lated to the debate, election, and two candidates Fran- cois Hollande and Nicolas Sarkozy for the presidency of France. Ranking them by the number of appearance (fre- quency) or equivalently popularity p, from the most pop- ular to the least, we have #ledebat (180946), #hollande (143636), #sarkozy (116906), #votehollande (99908), #avecsarkozy (67549), #ledebat [in French], #france2012 (20635), #presidentielle (13799), and many others with lesser p. The numbers inside the parenthesis present the corresponding p. These popular hashtags are at the top of the others in the pool, e.g. 0.0001% of all hash- tags. (66668) Real Hashtag Spike Trains Single hashtag diffusion in time can be represented as a spike train, as shown in Figure 1. Each spike represents that the corresponding hashtag used at that time without spec- ifying ways and users. Having the resolution 1 second, the spike time of multiple events occurring in a second cannot be N−1(cid:88) (cid:18) ∆τi+1 − ∆τi (cid:19)2 3 distinguished and therefore in this situation only one appear- ance is counted. We construct spike trains for all hashtags observed in the data ordering from the earliest appearance time to the latest time, e.g. . . . , τi−1, τi, τi+1, . . . . Each hashtag has a unique number of (exact) appearance, popu- larity p. Randomized Hashtag Spike Trains To be able to compare real dynamics with an artificial and in- dependent one, the randomized version of real hashtag spike trains is established serving as a null model. First, all spikes coming from any hashtags are combined, giving a single merged hashtag spike train. Uniforming spike appearance, one spike at a spike time, is still valid. Children randomized hashtag spike trains are obtained by uniformly permuting the matrix T of the spike times of the merged train by p times, the number of spikes of the desired real train we compare. We apply randperm(T , p) in Matlab and have p times uni- formly distributed unique independent random spike times, e.g. . . . , τ r i−1, τ r i , τ r i+1, . . . . Local Variation The local variation LV , specifically defined to quantify non- linear neural time-series and to uncover temporal patterns in neuron spike trains, is defined at spike time τi (Omi and Shinomoto 2011) , i=2 LV = N − 2 ∆τi+1 + ∆τi (1) ∆τi+1 = τi+1 − τi and ∆τi = τi − τi−1. ∆τi+1 quantifies forward delay and ∆τi represents backward waiting time. Importantly, the denominator normalizes the quantity such as to account for local variations of the rate at which events take place. By definition, LV takes values in the interval [0:3]. Fur- thermore, it is derived that LV is on average equal to 1, (cid:104)LV (cid:105) = 1, if the underlying process described by an independent Poisson distribution, which the distribution of the inter-spike intervals gives an exponential function (Shinomoto, Shima, and Tanji 2003). Here, the brackets describe the average taken over the given distribution. All other situations can be generalized by Gamma processes (Shinomoto, Shima, and Tanji 2003; Miura, Okada, and ichi Amari 2006) and (cid:104)LV (cid:105) should be significantly different than 1. For instance, (cid:104)LV (cid:105) ≈ 3 if the hashtag spike trains are extremely bursty (irregular), on the other hand (cid:104)LV (cid:105) ≈ 0 while the trains present regular (homogeneous) temporal patterns (Sanli and Lambiotte 2015). Figure 2 shows the results of our LV analysis, for both real and randomized hashtag spike trains. The probability distribution of P (LV ) of the calculated values of LV on the two data sets, with classifying hashtag groups in popular- ity p, presents distinct behavior. Whereas (cid:104)LV (cid:105) = 1 for any groups of p for the randomized trains, suggesting Poisson processes, (cid:104)LV (cid:105) never indicates 1 for the real trains. The randomization dampens nonlinearity of the real trains, tem- poral correlations, burstiness, and regularity in series and construct statistically stationary and independent processes, time-series. Empirical Application: Collective Attention We now utilize LV for more practical purposes and ask: Can LV predict extreme social events? Our investigation will be presented below is far from a complete understanding. How- ever, we will be able to capture temporal evaluation of on- line emergent behavior as a result of collective attention of twitting on the French presidential election-2012, in the first week of May 2012. We specifically compare hashtag diffusion in extreme days, the debate day (May 2) and the election day (May 6) with the dynamics in a regular day between these events, e.g. May 4. Instead of considering all hashtags in the pool, as done in the previous Section, we concentrate on topic related hashtags such as #ledebat (180946), #hollande (143636), #sarkozy (116906), #votehollande (99908), #avecsarkozy (67549), and #ledebat (66668) [in French]. The numbers in the parenthesis indicate p of the corresponding hashtag. Local variation LV is obtained for these topic-oriented hashtag spike trains. The trains are constructed separately for the three days. LV for each train and for each day is cal- culated considering time window with duration 1 hour. Fig- ure 3 presents the results in the debate (left), regular (mid- dle), and election (right) days. The top row [Figure 3(a)] shows LV (t) in the days in hour resolution. The below row [Figure 3(b)] summarizes the twitting activity as the tweets including listed hashtags in the legend versus time, again in hour resolution. Rush hours in online communications during the debate and the announcement of the election result are highlighted in the shaded yellow rectangle and with the yellow vertical line, respectively. Significant decays in LV (t) for both the debate and election days, synchronizing perfectly with the peak of the counts, indicate regular activation of the online users on the discussion of the election and so describe no burstiness, LV (t) ≈ 0. This trend is not observed at all for the regular day and mainly the cyclic rhythm of Twitter net- work (Sanli and Lambiotte 2015) characterize the values of LV (t). While large amount of fluctuations present in inac- tive hours [0 am:6 am], the rest of the day (cid:104)LV (t)(cid:105) ≈ 1 suggesting time-dependent Poisson processes. These results are preliminary, but promising since the stages of collective attention are clearly visible on LV (t). Discussion and Future Work The main purpose of this paper is to establish a tool for noisy social time-series and uncover nonstationary features and temporal patterns, specifically in an online emergent limit. Our comparative test on the real and randomized data sets shows that the local variation LV , a metric introduced to quantify the fluctuations of neuron spike trains as compared to a local characteristic time, works successfully in hashtag spike trains, as well. This encourages us to develop further tools, for instance to predict extreme online events by eval- uating the early noisy signal prior to an extreme event. As an example, we consider the week of the French presidential election-2012. This fine time window is well suitable for our Figure 2: Probability density function of local variation LV , P (LV ), of hashtag spike trains (Sanli and Lambiotte 2015). (a) Real hashtag spike trains. We observe a clear shift, to the higher values of LV , in the peak positions while decreas- ing hashtag popularity p, which indicates that the process becomes bursty (irregular). In any p, the mean values never gives 1, none of the real signal is Poisson process. (b) Ran- domized hashtag spike trains. Independent of p, all curves suggest fluctuations around 1, as expected for temporarily independent signals. To satisfy a better visualization, the re- sults are grouped based on ranking p from the most popular to the least popular ones: High p, red and orange symbols, moderate p, yellow and green symbols, and low p, blue and purple symbols. yet time-dependent events. Therefore, we characterize time- dependent Poissons in Figure 2(b), P (LV ) fluctuates around 1. However, all nonlinearities are present in the real data, and so in P (LV ). Describing regular patterns for popular hashtags (high p), red and orange symbols, the trains be- come bursty (irregular) due to local temporal correlations for moderate, yellow and green symbols, and for low popu- larity, blue and purple symbols. The trend is captured in the shift of the peak positions of P (LV ) from small LV to large LV decreasing p in Figure 2(a). Consequently, we find that not only for neurons but also for hashtags LV is a success- ful tool to characterize salient dynamics in nonlinear social 051015202530012345051015202530<p >=91127<p> =18553<p> = 1678<p> = 318<p> = 174<p> = 117<p> = 86<p> = 68<p> = 56<p> = 47<p> = 41<p> = 35<p >=91127<p> =18553<p> = 1678<p> = 318<p> = 174<p> = 117<p> = 86<p> = 68<p> = 56<p> = 47<p> = 41<p> = 35LVP( )LVP( )LVReal activity(a)Random activity(b) Figure 3: Characterizing temporal evaluation of collective attention. From left to right, the debate (May 2, 2012), a regular day (May 4, 2012), and the election day (May 6, 2012) are shown. (a) The local variation of LV (t) on the topic-related hashtags about the debate and the election. The shaded yellow rectangle covers the debate hours and the yellow line indicates the announcement of the election. Significant decays in LV (t), in left and right windows, match well with the schedule of the events. However, no remarkable trend is observed in the regular day (middle panel). (b) Counting tweets, including at least one of the hashtags addressed in the legends, per hour. The activity increase in time coincides successfully with the decays in LV (t), indicating that the collective attention homogenizes the hashtag propagation and so the hashtag spike trains in this limit present temporal regularity. aim and we find that LV is sensitive enough to distinguish collective attention period, users are active homogeneously in time, from the preceding period where temporal hetero- geneity is present and therefore a prediction would be satis- fied by performing better statistics in the decay of LV (t). We obtain LV (t) is almost 0 in rush periods. Such artifi- cial regularity originates from our assumption due to lack of time resolution below 1 second. Although we observe heterogeneity in hashtag spike trains in rush hours in the empirical data, uniforming spike appearance setting to 1 in any spike time creates unnatural homogeneity in emergent limit. To resolve this, the trains should be constructed pre- serving the heterogeneity in the data and so LV must be re-introduced for nonuniform number of spikes at different spike times in a train. Acknowledgments C. Sanli acknowledges supports from the EU 7th Framework OptimizR Project and FNRS. This paper presents research results of the Belgian Network DYSCO, funded by the In- teruniversity Attraction Poles Programme, initiated by the Belgian State, Science Policy Office. References Borge-Holthoefer, J.; Rivero, A.; Garcia, I.; Cauhe, E.; Fer- rer, A.; Ferrer, D.; Francos, D.; Iniguez, D.; Perez, M. P.; Ruiz, G.; Sanz, F.; Serrano, F.; Vinas, C.; Tarancon, A.; and Moreno, Y. 2011. Structural and dynamical patterns on on- line social networks: The spanish may 15th movement as a case study. PLoS ONE 6(8):e23883–1–8. Cetin, U., and Bingol, H. O. 2014. Attention competition with advertisement. Phys. Rev. E 90:032801–1–7. Cheng, J.; Adamic, L.; Dow, P. A.; Kleinberg, J. M.; and Leskovec, J. 2014. Can cascades be predicted? In Proceed- ings of the 23rd International Conference on World Wide Web, WWW '14, 925–936. New York, NY, USA: ACM. Coscia, M. 2013. Competition and success in the meme In International pool: A case study on quickmeme.com. AAAI Conference on Weblogs and Social Media (ICWSM). Domenico, M. D.; Lima, A.; Mougel, P.; and Musolesi, M. 2013. The anatomy of a scientific rumor. Sci. Rep. 3:2980– 1–9. Franca, U.; Sayama, H.; McSwiggen, C.; Daneshvar, R.; and Bar-Yam, Y. 2014. Visualizing the "Heartbeat" of a City with Tweets. ArXiv e-prints. 00.511.522.53 #ledebat#hollande#sarkozy#votehollande#avecsarkozy#ledebat(a)debate day0 am3 am6 am9 am12 pm3 pm6 pm9 pm 0 am05001000150020002500300035004000(b) 0 am3 am6 am9 am12 pm3 pm6 pm9 pm 0 am #hollande#sarkozy0 am3 am6 am9 am12 pm3 pm6 pm9 pm 0 amregular dayelection day#ledebat#hollande#sarkozy#votehollande#avecsarkozy#ledebathour hour hour L (t)Vtweet count/hourannouncement of the result at 7 pm debateat 7-11 pm Gleeson, J. P.; Ward, J. A.; O'Sullivan, K. P.; and Lee, W. T. 2014. Competition-induced criticality in a model of meme popularity. Phys. Rev. Lett. 112:048701–1–5. Gleeson, J. P.; O'Sullivan, K. P.; Banos, R. A.; and Moreno, Y. 2015. Determinants of Meme Popularity. ArXiv e-prints. Gonzalez-Bailon, S.; Borge-Holthoefer, J.; Rivero, A.; and Moreno, Y. 2011. The dynamics of protest recruitment through an online network. Sci. Rep. 1:197–1–7. Kenett, D. Y.; Morstatter, F.; Stanley, H. E.; and Liu, H. 2014. Discovering social events through online attention. PLoS ONE 9(7):e102001–1–7. Miotto, J. M., and Altmann, E. G. 2014. Predictability of extreme events in social media. PLoS ONE 9(11):e111506– 1–7. Miura, K.; Okada, M.; and ichi Amari, S. 2006. Estimating spiking irregularities under changing environments. Neural Comput. 18:2359–2386. Mollgaard, A., and Mathiesen, J. 2015. Emergent user be- havior on Twitter modelled by a stochastic differential equa- tion. ArXiv e-prints. Myers, S., and Leskovec, J. 2012. Clash of the contagions: Cooperation and competition in information diffusion. In Data Mining (ICDM), 2012 IEEE 12th International Con- ference on, 539–548. Myers, S. A., and Leskovec, J. 2014. The bursty dynamics In Proceedings of the of the twitter information network. 23rd International Conference on World Wide Web, WWW '14, 913–924. New York, NY, USA: ACM. Omi, T., and Shinomoto, S. 2011. Optimizing time his- tograms for non-poissonian spike trains. Neural Comput. 23:3125–3144. Ratkiewicz, J.; Fortunato, S.; Flammini, A.; Menczer, F.; and Vespignani, A. 2010. Characterizing and modeling the dy- namics of online popularity. Phys. Rev. Lett. 105:158701– 1–4. Sanli, C., and Lambiotte, R. 2015. Local variation of hashtag spike trains and popularity in Twitter. ArXiv e-prints. Sasahara, K.; Hirata, Y.; Toyoda, M.; Kitsuregawa, M.; and Aihara, K. 2013. Quantifying collective attention from tweet stream. PLoS ONE 8(4):e61823–1–10. Shinomoto, S.; Shima, K.; and Tanji, J. 2003. Differences in spiking patterns among cortical neurons. Neural Comput. 15:2823–2842. Weng, L.; Flammini, A.; Vespignani, A.; and Menczer, F. 2012. Competition among memes in a world with limited attention. Sci. Rep. 2:335–1–8. Yang, J., and Leskovec, J. 2011. ACM International Con- ference on Web Search and Data Mining (WSDM).
1505.04560
1
1505
2015-05-18T09:09:01
On the Formation of Circles in Co-authorship Networks
[ "cs.SI", "physics.soc-ph" ]
The availability of an overwhelmingly large amount of bibliographic information including citation and co-authorship data makes it imperative to have a systematic approach that will enable an author to organize her own personal academic network profitably. An effective method could be to have one's co-authorship network arranged into a set of "circles", which has been a recent practice for organizing relationships (e.g., friendship) in many online social networks. In this paper, we propose an unsupervised approach to automatically detect circles in an ego network such that each circle represents a densely knit community of researchers. Our model is an unsupervised method which combines a variety of node features and node similarity measures. The model is built from a rich co-authorship network data of more than 8 hundred thousand authors. In the first level of evaluation, our model achieves 13.33% improvement in terms of overlapping modularity compared to the best among four state-of-the-art community detection methods. Further, we conduct a task-based evaluation -- two basic frameworks for collaboration prediction are considered with the circle information (obtained from our model) included in the feature set. Experimental results show that including the circle information detected by our model improves the prediction performance by 9.87% and 15.25% on average in terms of AUC (Area under the ROC) and P rec@20 (Precision at Top 20) respectively compared to the case, where the circle information is not present.
cs.SI
cs
On the Formation of Circles in Co-authorship Networks Tanmoy Chakraborty1 ∗, Sikhar Patranabis2, Pawan Goyal3, Animesh Mukherjee4 Dept. of Computer Science & Engg., Indian Institute of Technology, Kharagpur, India -- 721302 {1its_tanmoy,2sikharpatranabis,3pawang,4animeshm}@cse.iitkgp.ernet.in 5 1 0 2 y a M 8 1 ] I S . s c [ 1 v 0 6 5 4 0 . 5 0 5 1 : v i X r a ABSTRACT The availability of an overwhelmingly large amount of bib- liographic information including citation and co-authorship data makes it imperative to have a systematic approach that will enable an author to organize her own personal academic network profitably. An effective method could be to have one's co-authorship network arranged into a set of "circles", which has been a recent practice for organizing relationships (e.g., friendship) in many online social networks. In this paper, we propose an unsupervised approach to au- tomatically detect circles in an ego network such that each circle represents a densely knit community of researchers. Our model is an unsupervised method which combines a va- riety of node features and node similarity measures. The model is built from a rich co-authorship network data of more than 8 hundred thousand authors. In the first level of evaluation, our model achieves 13.33% improvement in terms of overlapping modularity compared to the best among four state-of-the-art community detection methods. Fur- ther, we conduct a task-based evaluation -- two basic frame- works for collaboration prediction are considered with the circle information (obtained from our model) included in the feature set. Experimental results show that including the circle information detected by our model improves the prediction performance by 9.87% and 15.25% on average in terms of AU C (Area under the ROC) and P rec@20 (Pre- cision at Top 20) respectively compared to the case, where the circle information is not present. 1. INTRODUCTION Now-a-days, public repositories of bibliographic datasets such as DBLP and Google Scholar allow us access to a stream of scientific articles published by authors from differ- ent domains. An author, we wish to analyze, might be asso- ciated with overwhelming volumes of information in terms of her collaborations and publications, which in turn leads to ∗First two authors have equal contributions. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. SIGKDD'15, August 10 -- 13, 2015, Sydney, Australia. Copyright 2015 ACM 978-1-4503-2956-9/14/08 ...$15.00. http://dx.doi.org/10.1145/2623330.2623707. both information overload and high computational complex- ity. Moreover from an author's perspective, it could become painstakingly difficult to keep track of the entire set of aca- demic relationships she has with her collaborators at any point of time. Present Work: Problem definition. In this article, we study the problem of automatically discovering an au- thor's academic circles. In particular, given a single author with her co-authorship network, our goal is to identify her circles, each of which is a subset of her coauthors. Some examples of real-world circles in an author's co-authorship network are shown in Figure 1. The "owner" of such a net- work (the "ego") may wish to form circles based on common bonds and attributes among her coauthors (the "alters"). An author could have several reasons behind initiating a new collaboration. Some common tendencies exhibited by authors include collaborations with the people from her own Institute or with people sharing the same research interest with her. Therefore, the problem of deciding upon a sin- gle dimension to both characterize the circles and categorize the coauthors appropriately becomes extremely challenging. Moreover, circles are author-specific, as each author orga- nizes her personal network of coauthors independent of all other authors with whom she is not connected. This leads to a problem of designing an automatic method that organizes an author's academic network, more precisely, categorizes her surrounding neighborhoods into meaningful circles. Figure 1: (Color online) A hypothetical example showing an ego network of an author u with labeled circles. Alters might belong to multiple groups and form overlapping circles. Present Work: Motivation of the work. The problem of detecting ego-centric circles in a co-authorship network is useful in many aspects. The collaborators of a particular researcher might have interests aligned with different topics, and the set of collaborators the researcher is currently work- ing with is a reflection of her current topic of interest. Thus, by understanding circles around her co-authorship network, she might discover that she might be interested in reading papers about a certain topic that she has not been inter- ested in before. This result in turn helps in personalized paper recommendations. On the other hand, if one is inter- ested to start a new collaboration in a particular field with very famous researcher (usually having less opportunity for new collaboration), a more successful attempt could be to first establish a collaboration to one of the coauthors of the famous researcher who happens to belong to a circle that is most aligned to the field of interest. Therefore, the circle information could lead to the design of a meaningful collab- oration prediction system. Moreover, one can also discover the collaboration pattern of a researcher by observing the temporal evolution of the ego-centric circles of an author. Present Work: An unsupervised approach for cir- cle detection. In this work, we propose an unsupervised method to learn the major dimensions of author profile sim- ilarity that lead to densely linked circles. In practice, since the topological evidence in such small ego networks is less, the traditional community finding algorithms fail to discover meaningful circles from it [15, 16]. Here, we intend the fol- lowing two conditions to be satisfied during circle detection: first, we expect the circles to be formed by densely con- nected sets of alters. Different circles might overlap, i.e., alters might belong to multiple circles simultaneously. Sec- ond, we expect that the members of the same circle share common properties or traits [18]. We model the similarity between alters as a function of common profile information. We then propose an unsupervised method to learn precisely which dimensions of profile similarity lead to densely linked circles. In each iteration, our model tries to learn the con- nectivity between alters from the actual graph and updates the circle memberships accordingly. Once the optimal con- dition is encountered, the model outputs the circles. We make our experimental codes available in the spirit of repro- ducible research: http://cnerg.org/circle. Summary of the evaluation. The entire experiment is conducted on a massive dataset of computer science domain constituting more than 8 hundred thousand authors. Some interesting observations from the extensive analysis of the detected ego-centric circles are as follows: (i) the highly- cited authors tend to form more number of large and highly cohesive circles, (ii) the highly-cited authors seem to coau- thor with a group of people having a specific research inter- est in a particular time period and then leave this group to form another such group of coauthors; (iii) the highly-cited authors tend to spawn circles that have alters in very similar fields, whereas authors with medium-citations spawn more diverse circles. To evaluate the quality of the detected cir- cles, we compare our model with four state-of-the-art over- lapping community detection algorithms in terms of stan- dard overlapping modularity measure and achieve an im- provement of 13.33% over the best baseline method. Fur- ther, we conduct a task based evaluation where we show that including the circle information detected by our model in the feature set improves the performance of the existing collab- oration prediction models (liner regression and supervised random walks) by 9.87% and 15.25% respectively in terms of AU C (Area under the ROC curve) and P rec@20, com- pared to the case where the circle information is not present. With respect to the best baseline which gives the circle infor- mation, our model achieves average improvement of 3.35% and 6.26% respectively in terms of AU C and P rec@20. 2. RELATED WORK We broadly divide the related work into two subparts: re- search on the ego structure of a co-authorship network and research on discovering local circles in an ego network. Research exploring ego structure in co-authorship network. One of the most interesting yet curiously un- derstudied aspects is the analysis of the structural proper- ties of the ego-alter interactions in co-authorship networks. Eaton et al. [8] found that the productivity of an author is associated with centrality degree confirming that scien- tific publishing is related with the extent of collaboration; Borner et al. [6] presented several network measures that in- vestigated the changing impact of author-centric networks. Yan and Ding [21] analyzed the Library and Information Science co-authorship network in relation to the impact of their researchers, finding important correlations. Abbasi et al. extensively studied the relationship between scientific impact and co-authorship pattern, discovering significant correlations between network indicators (density and ego- betweenness) and performance indicators such as g-index [1] and citation counts [2]. McCarty et al. [17] attempted to predict the h-index evolution through ego networks, observ- ing that this factor increases if one can choose to coauthor articles with authors already having a high h-index. Research on discovering local circles in ego network McAuley and Leskovec [15, 16] were the first who explored social circles in ego networks. They mapped this problem as a multi-membership node clustering problem and devel- oped a model for detecting circles that combines network structure as well as user profile information from Google+, Facebook and Twitter. They remarked that these local cir- cles can not be discovered using traditional community de- tection algorithms [19] because of the dearth of information on topological structure in the ego network of each author [9, 16]. According to them, under such circumstances topic- modeling techniques [3, 5] are the best to uncover "mixed memberships" of nodes to multiple groups. This, to the best of our knowledge, is the first attempt to detect local circles (groups of coauthors with similar features) centered around each ego/author in a co-authorship network and to use this information further to enhance the performance of existing collaboration prediction models. 3. AN UNSUPERVISED MODEL FOR DIS- COVERING EGO-CENTRIC CIRCLES Our model for detecting ego-centric circles applies to any general ego network, where each node is considered as an ego and the set of her one-hop neighbor nodes constitute the set of alters. The ego is said to spawn the ego network, but is not considered as a part of the network. Our method intends to discover circles in this ego network in an unsuper- vised fashion, leveraging properties specific to nodes as well as properties of the network. Our model requires each node to have a profile, which is essentially the feature vector char- acterizing the node in a feature space. Two nodes are said to be similar if their feature vectors are similar, as evaluated by an appropriate similarity metric. Although exact profile details and the similarity metrics will vary depending on the nature of the network, some general assumptions made by our model are as follows: • Alters of the same ego, that have similar profiles should be in the same circles while those with dissimilar profiles should be in different circles. • Alters that share an edge are more likely to be part of the same circle than disconnected alters. • While it should be possible to label each circle by some common property of its member nodes, a circle may actu- ally have more than one label. In our earlier example of a co-authorship network, two or more circles may contain authors from the same field, but may be different in some other attribute such as the authors from the same Institute as shown in Figure 1. • Circles may overlap and may even contain other smaller circles. We now describe the algorithm for circle formation in more details. The input to our algorithm is an ego network G =< V, E >. Each node v ∈ V has an N -dimensional pro- file vector Fv = {f1v, f2v, f3v, ..., fNv}, where fiv denotes the value of the ith feature of the node v. The ego node u, often referred to as the center node, is responsible for spawning the ego network, but does not itself feature as a part of the network. So the ego network of u is essentially the subgraph induced by the alters of u. Let D(x, y) be the Euclidean distance between the profile vectors of nodes x and y given by Equation 1. terms of their circle membership, denoted by β(x, y). Let β1(x, y) and β2(x, y) be defined as follows. β1(x, y) = XCj :{x,y}⊆Cj β2(x, y) = XCj :{x,y}*Cj (Sim(x, y) − τj + λ)−1 (3) (Sim(x, y) − τj + λ)−1 (4) Note that {x, y} ⊆ Cj if both x and y are members of the circle Cj , while {x, y} * Cj if Cj does not contain one or both of x and y. The constant λ is kept large enough to ensure that no term in the summation is negative and may simply be taken as the maximum of all threshold val- ues, i.e., max{τ1, τ2, ..., τK}. Note that β1(x, y) is high if x and y share common circles with very high thresholds, while β2(x, y) is high if x and y do not share common circles with high thresholds. Now, we define the closeness estimator β(x, y) as follows. β(x, y) = exp{[β1(x, y)]2 − [β2(x, y)]2} (5) Note that β(x, y) is purely a circle-membership based sim- ilarity metric for the pair (x, y), and increases with increase in the number and threshold values of the common circles which x and y are part of. Thus, the closeness estimator em- phasizes not only the common circle memberships of nodes but also the thresholds of the circles they are part of. From the closeness information so estimated, the prob- ability that the pair (x, y) forms an edge in G is modeled by: p((x, y) ∈ E) = β(x, y) 1 + β(x, y) (6) D(x, y) = D(y, x) = vuut N Xi=1 (fix − fiy)2 (1) Similarly, for the node-pair (x, y) which does not belong to E, the probability is estimated as follows: The aim of the method is to identify a set of circles C= {C1, C2,.....,CK }. Given a circle Cj ∈ C and a node y ∈ V , we define the distance of y from Cj , say D′(Cj, y), as the average distance of y from all other nodes in Cj . Also, the profile similarity measure between a pair of nodes x and y, denoted by Sim(x, y) is defined to be the reciprocal of D(x, y). Analogously, the similarity between node y and circle Cj, denoted by Sim′(Cj, y) is defined to be the recip- rocal of D′(Cj, y). We shall demonstrate the merit of this profile similarity measure in Sections 4 and 6. Each circle Cj in our model has a similarity threshold parameter τj associated with it such that if node y ∈ V is in Cj then the following constraint is satisfied: p((x, y) /∈ E) = 1 − p((x, y) ∈ E) = 1 1 + β(x, y) (7) Quite evidently, p(x, y) increases with increase in β(x, y) and is normalized using add-one smoothing [12]. Thus we get a predicted probability of existence for each possible edge in the network given C and τ . The rationale underlying the prediction is that the closeness of a pair of nodes (x, y) is proportional to the similarity of their profiles as well as the number and similarity thresholds of common circles that they are a part of. Now the model must ensure that this predicted network indeed corresponds to the real network, for which we present the following analysis. Sim′(Cj, y) ≥ τj (2) Assuming independent generation of each edge in the graph, the joint probability of G and C can be written as Based on our assumption that nodes within a common circle at any point of time have a higher probability of form- ing an edge in the network, our model predicts the circles estimated at each step to be cliques, and distinct circles not to share any edge at all. Given a set of K circles C= {C1, C2,.....,CK }, along with a set of threshold parameters τ = {τ1, τ2,...,τK } in any iteration of the algorithm, we define a closeness estimator for a pair of nodes (x, y) ∈ V × V in Pτ (G; C) = Y(x,y)∈E p((x, y) ∈ E) Y(x,y) /∈E p((x, y) /∈ E) (8) We define the following notation 9 for ease of expression: φ(x, y) = log (β(x, y)) = ([β1(x, y)]2 − [β2(x, y)]2) (9) Taking logarithm of Equation 8, and using notation 9 we can express the log likelihood of G given C and τ as: lτ (G; C) = log (Pτ (G; C)) = X (x,y)∈E = X (x,y)∈E = X (x,y)∈E log (p((x, y) ∈ E)) + X (x,y) /∈E log (p((x, y) /∈ E)) log (β(x, y)) − X (x,y)∈V ×V log(1 + β(x, y)) φ(x, y) − X (x,y)∈V ×V log(1 + exp{φ(x, y)}) (10) The model thus attempts to identify a set of circles C that maximizes lτ (G; C). In Section 4 we describe how this may be achieved by optimizing τ . Also, in Section 6, we describe how this generic model can be applied to co-authorship net- works in particular. 4. UNSUPERVISED LEARNING OF MODEL PARAMETERS In this section, we describe the method used to find the set of circles C by maximizing the log likelihood in Equation 10. Algorithm 1 summarizes the steps of a single iteration of the algorithm. Initially, each node is in a different circle with a very high threshold value. At each iteration t, for each node y ∈ V we alter the circle membership of y by randomly adding it to some circles it previously did not belong to and deleting it from some circles it belonged to. This is similar to the concept of perturbing the solution in simulated annealing [14]. The circle thresholds are then updated accordingly such that the constraint in Equation 2 is not violated. The general idea is that larger the number of circles a node y is already part of after time step t, lesser is the extent to which the circle membership of y is disturbed in time step t + 1. We denote by Ct the set of circles and by τt the cor- responding set of thresholds after time step t, where Ct = {C1(t), C2(t),...,CK (t)} and τt = {τ1(t), τ2(t),...,τK (t)}. Also, let the log likelihood of G given Ct and τt be lτ (G; Ct). The following are the main steps of the algorithm to update the circle in time step t + 1: Step 1: For each node y ∈ V , we capture the circle mem- bership of y at time t by defining two sets S1y,t and S2y,t: S1y,t = {Cj(t)Cj(t) ∈ Ct ∧ y ∈ Cj (t)} S2y,t = {Cj(t)Cj(t) ∈ Ct ∧ y /∈ Cj (t)} (11) (12) Step 2: Now we intend to compute the number of circles to add y to and to remove y from, given by the two variables - AddCircle(y, t + 1) and RemoveCircle(y, t + 1): AddCircle(y, t + 1) = (cid:24) K1 + S1y,t RemoveCircle(y, t + 1) = (cid:24) K2 + S1y,t S1y,t S1y,t (cid:25) (cid:25) (13) (14) Here, K1 is a randomly chosen integer with 1 ≤ K1 < S2y,t, such that the value of AddCircle(y, t + 1) is less than or equal to S2y,t, i.e., the number of circles that y is currently not part of. Similarly, K2 is a randomly cho- sen integer with 1 ≤ K2 < S1y,t such that the value of RemoveCircle(y, t + 1) is less than or equal to S1y,t, i.e., the number of circles that y is currently part of. Note that both AddCircle(y, t + 1) and RemoveCircle(y, t + 1) are low for high values of S1y,t. This ensures that the more the number of circles y is currently part of, lesser is the dis- turbance to the circle membership of y (and vice versa). Step 3: Add y to AddCircle(y, t+1) many randomly cho- sen circles from S2y,t and remove y from RemoveCircle(y, t+ 1) many randomly chosen circles from S1y,t. The corre- sponding circles are updated accordingly. Step 4: Once Steps 1, 2 and 3 are over for each node, we have the set Ct+1 containing the augmented circles. Next, we update the corresponding thresholds by setting τj(t + 1) corresponding to the circle Cj(t + 1) to the minimum value such that for each node y ∈ Cj(t + 1) the constraint in Equation 2 is not violated. Thus the updated τj(t + 1) for Cj(t + 1) is given by: τj(t + 1) = min{Sim′(Cj(t + 1), y)y ∈ Cj (t + 1)} (15) Step 5: If the threshold τj(t + 1) for Cj(t + 1) falls below a constant lower limit τL, we discard Cj (t + 1). The value of τL is empirically determined. In our experiments, we tested over a wide range of τL and set it to 0.2 for best results (see Figure 3). Step 6: We then compute the log likelihood lτt+1 (G; Ct+1) using Equation 10. If lτt+1 (G; Ct+1) > lτt (G; Ct), then re- tain newly computed sets Ct+1 and τt+1; else set Ct+1 = Ct and τt+1 = τt. The process continues till we reach a maxima and the log likelihood does not increase any further for sufficiently many iterations. We then report the set of circles so obtained as the optimal set of circles. Note that the maximum number of circles after any iteration of the algorithm is V and the maximum number of nodes in any circle is also V . So the running time of each iteration of the algorithm is O(V + Ct) = O(V ). Also, any change to the set of circles is accepted only if the overall likelihood increases and so the method converges to a local maxima after a finite number of steps. For practical applications, the method is assumed to reach a local maxima if the likelihood function does not increase for V iterations. 5. A LARGE PUBLICATION DATASET We have crawled one of the largest publicly available data- sets from Microsoft Academic Search (MAS) which houses over 4.1 million publications and 2.7 million authors. We collected all the papers specifically published in the com- puter science domain and indexed by MAS. The crawled dataset contains more than 2 million distinct papers by more than 8 hundred thousand authors, which are further dis- tributed over 24 fields of computer science domain. The co-authorship network constructed from this dataset has au- thors as nodes and edges between authors who have written at least one paper together. Ego network: The next step is the construction of ego networks from the co-authorship network. We consider the ego networks corresponding to each node (author) present in our dataset, thus obtaining 821,633 ego networks. An illustrative example of an ego network is shown in Figure 1. However, in this experiment we consider only the induced Ct+1 ← Ct τt+1 ← τt for all y ∈ V do Algorithm 1 Iteration for Updating Circles 1: procedure CircleUpdate(t, Ct, τt, lτt (G; Ct)) 2: 3: 4: 5: 6: 7: 8: 9: S1y,t = {Cj (t)Cj(t) ∈ Ct ∧ y ∈ Cj (t)} S2y,t = {Cj (t)Cj(t) ∈ Ct ∧ y /∈ Cj (t)} K1 ← random(1, S2y,t) K2 ← random(1, S1y,t) AddCircle(y, t + 1) ← l K1+S1y,t S1y,t m RemoveCircle(y, t + 1) ← l K2+S1y,t S1y,t m Randomly choose CAC , CRC : CAC ⊆ S2y,t, CAC = AddCircle(y, t + 1) for all Cj(t) ∈ CAC do Cj (t + 1) ← Cj(t + 1) ∪ {y} CRC ⊆ S1y,t, CRC = RemoveCircle(y, t + 1) for all Cj(t) ∈ CRC do Cj (t + 1) ← Cj(t + 1) r {y} for all Cj(t + 1) ∈ Ct+1 do τj(t + 1) ← min{Sim′(Cj(t + 1), y)y ∈ Cj (t + 1)} if τj (t + 1) < τL then . Ct+1 ← Ct+1 r {Cj (t + 1)} τt+1 ← τt+1 r {τj (t + 1)} Compute lτt+1 (G; Ct+1) [Eq. 10] if lτt+1 (G; Ct+1) > lτt (G; Ct) then Return { Ct+1, τt+1} else Return { Ct, τt} 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: subgraph of the alters for an ego and exclude the ego and its attached edges from the ego network, as mentioned earlier. 6. FEATURE EXTRACTION Profile information of each author node in the ego net- work is represented as a feature vector consisting of a set of features. These features can be divided into two broad categories -- general and ego-centric features. Having these two separate categories, the feature set emphasizes the fact that members of common circles should not only have high feature similarity with each other but also share similar re- lationships with the ego. Given an author x with all her publications, and the set of fields of research F = {r1, r2, ....., r24}1, we define the ver- satility vector V (x) of an author x as {ri,x; ri ∈ F } such that ri,x is the fraction of publications of x in field ri. Also, given a set of decades DEC = {1960-1970, 1971-1980, 1981- 1990, 1991-2000, 2001-2009}, we define the persistence vec- tor D(x) for x as {dj,x; 1 ≤ j ≤ 5}, where dj,x denotes the number of papers published by x in decade DEC(j). We also define the major field of work R(x) for x, where she has maximum number of publications. The general features capture independent characteristics of each author in the ego network and are listed below: • The normalized number of citations the author has re- ceived (size 1) • The normalized number of citations per paper that the author has received (size 1) • The normalized h-index of the author (size 1) • The normalized number of coauthors of the author (size 1) • The versatility vector of the author (size 24) • The normalized number of papers written by the author (size 1) 1Note that there are 24 research fields present in our dataset. • The persistence vector of the author (size 5) • The major field of the author (size 1) On the other hand, the ego-centric features capture the relationship of an alter with its ego. Such features include: • The fraction of papers coauthored by the alter with the ego in each of the five decades (size 5) • The fraction of papers coauthored by the alter with the ego in each of the 24 fields (size 24) • The normalized number of common coauthors that the al- ter has with the ego (size 1) • The fraction of papers authored by the alter in the major field of the ego (size 1) • The fraction of papers authored by the ego in the major field of the alter (size 1) Thus the dimension of the feature vector containing all the above listed features is 67. Using the profile informa- tion for each node, our model computes the probability of edge existence between each pair of nodes (x, y), given by p(x, y) as described in Equation 6. We calculate this prob- ability from the extent of similarity of node-pair (x, y), i.e., Sim(x, y). In order to verify that the node similarity indeed helps identify edges between similar authors with high prob- ability of collaboration, we perform two small experiments. We first check the conditional probability that given a node- pair (x, y) with similarity Sim(x, y) = Wxy in G(V, E), the node-pair indeed materializes as an edge in the real network. ) y x W E ∈ ) y , x ( ( P (a) 1 0.8 0.6 0.4 0.2 0 0 0.2 0.4 0.6 x 104 (b) 6 4 2 y x f o s e g d e g n i t s i x e # W t h g i e w 1 0.8 Pair−wise vertex similarity, W 0.2 0 0 xy 0.4 0.6 0.8 1 Figure 2: (a) Conditional probability of edge exis- tence between authors with a given similarity Wxy between their profiles; (b) actual number of edges with a given edge weight in the network. Plot shown in Figure 2(a) confirms that our similarity measure is indeed proportional to the conditional probability of edge existence. We also observe the number of edges in a network having a particular edge weight Wxy in Figure 2(b). Most of the edges are in the range 0.55 − 0.75, indicating that this is the most common profile similarity range among pair-wise authors. Very few edges exist in the range 0 − 0.3, which indicates that collaboration between authors with very dissimilar profiles is quite rare. This value also seems quite low for the range 0.9 − 1.0, which might be due to the fact that it is extremely rare to have authors with nearly similar profiles. 7. EVALUATION OF DETECTED CIRCLES In this section, we intend to evaluate the quality of the circles detected by our proposed methodology. Evaluation is especially important to judge the quality of the detected circles. We compare the circles detected by our model with that obtained from four other recent overlapping community detection algorithms, namely BIGCLAM [22], SLPA [20], c i r t n e c − o g e f o r e b m u N r o h t u a r e p s e l c r i c 15 10 5 0 0 (a) 100 200 300 c i r t n e c − o g e f o e z i s . g v A s e l c r i c 25 20 15 10 5 0 0 100 (b) s e l c r i c c i r t n e c − o g e f o r e b m u N f o t r a p a s i r o h t u a n a (d) (c) 80 60 40 20 − o g e f o s s e n h s i u q i l c . g v A s e l c r i c c i r t n e c 0.2 0.1 300 100 200 No of citations per author 0 0 200 300 0 0 100 200 300 Figure 4: (Color online) Author-specific characterization of detected ego-centric circles. The following are plotted against the number of citations per author : (a) the number of circles centered around an author, (b) the average size of the circles centered around an author, (c) the number of ego-centric circles an author is a part of and (d) the average cliquishness of the circles centered around an author. Figure 3: (Left) Change in overlapping modularity Qov with the increase in τL; (Right) comparison of the baseline algorithms with our method. OSLOM [13] and COPRA [10]. We also detect the circles using the coordinate ascent method (CA) [15, 16]. Since we intend to show that research field of the authors is not the proper information for creating the circles, we also compare our output with the circles obtained simply from research fields. For comparison, we use overlapping modularity Qov [11] which is probably the most widely used measure for evaluating the goodness of a community structure without a ground-truth. First, to show the change in Qov with respect to the threshold τL as described in Section 4, we plot this qual- ity function in Figure 3 by varying τL from 0.05-0.5. We observe that Qov reaches maximum at τL = 0.2. Then for each competing algorithm, we measure the value of Qov for each ego and take an average over all the egos present in our dataset. The table adjacent to Figure 3 shows that our method outperforms the traditional topology based commu- nity finding algorithms in detecting meaningful circles. Our method achieves Qov of 0.68 which is 6.25% higher than coordinate ascent method, 13.33% higher than BIGCLAM, 15.25% higher than OSLOM, 17.24% higher than COPRA, and 21.42% higher than SLPA. We notice that research field based circles are the worst among the detected circles (see Section 9 for more discussion). 8. ANALYSIS OF EGO-CENTRIC CIRCLES In this section, we intend to characterize the ego-centric circles obtained from our unsupervised model. In particular, we study the properties of the ego-centric circles at two lev- els of granularity: author-specific analysis and circle-specific analysis. 8.1 Author-specific Analysis Here we study how the circles in the ego networks of the highly-cited authors differ from those of the low-cited au- thors. Figure 4(a) shows the number of ego-centric circles appearing in the ego network of each author. Note that in all of the experiments, we categorize authors into three groups: authors receiving more than 100 citations as highly- cited authors (proportion: 5.21%), authors receiving cita- tions between 30-100 as medium-cited authors (proportion: 28.75%), and authors receiving less than 30 citations as low- cited authors (proportion: 66.04%). We notice a rise in the number of circles with the increase of citations. The pos- sible reason could be that since the authors accumulating high citations tend to have high number of collaborators, the number of alters in their ego networks is also high, and thus more number of ego-centric circles are detected for the highly-cited authors. In Figure 4(b), we plot the average size (measured in terms of the number of nodes) of the ego-centric circles for the authors in different citation range. Once again, the average size of the circles increases with the increase of citations per author. It essentially indicates that for the highly-cited egos, the alters are not only high in number but also form large cohesive groups. Since each author is also an alter in her neighbors' ego networks, she might be a part of multiple such ego-centric circles. Figure 4(c) shows the number of such ego-centric circles to which an author belongs to. This plot highly cor- relates with Figure 4(a), and shows that since highly-cited authors have more number of alters in their ego networks, each of them also belongs to multiple local circles of her neighbors' ego networks. Further, we measure the degree of cliquishness (the ratio of the number of existing edges in the circle and the maximum number of possible edges in the circle) of each ego-centric cir- cle. For each ego, we measure the average cliquishness of her surrounding circles in the ego network. Figure 4(d) shows that the average value of cliquishness initially decreases with the increase of the number of citations per author, then it starts increasing. The reason could be that since both the number and the size of the ego-centric circles for low-cited authors are less, the maximum number of possible edges within a circle is also less, which in turn acts as the reason of high cliquishness for low-cited authors. In the middle cita- tion zone, both the number and the average size of the circles are moderate. However, the number of edges that material- ize within these circles is less as compared to the maximum number of possible edges, thus accounting for the sparseness of these circles. Therefore, the value of cliquishness of cir- cles spawned by authors in the middle range of citations is comparatively low. However, the value of cliquishness starts increasing for the authors having citations more than 100. c S e z i s f o s e l c r i c f o % 6 4 2 0 0 (a) 50 100 Size of a circle, S c c C s s e n h s i h q i l c f o s e l c r i c f o % 8 6 4 2 (b) s e l c r i c f o 1 0.8 0.6 0.4 0.2 0 (c) c s e l c r i c N g n i v a h s o g e f o % 50 100 Size of a circle, S c (d) 12 10 8 6 4 2 0 0 60 No of ego−centric circles, N c 20 40 c S e z i s f o s s e n h s i u q i l c g v A 0 0 1 Cliquishness of a circle, C c 0.5 Figure 5: (Color online) Circle-specific characteristics of detected ego-centric circles: (a) distribution of the size of the ego-centric circles, (b) distribution of the cliquishness of the ego-centric circles, (c) average cliquishness of the circles having a particular size, and (d) percentage of egos surrounded by a particular number of ego-centric circles. This signifies that for the highly-cited authors, despite the apparently large size of circles, the probability that an edge actually materializes in the real network tends to increase. This explains the formation of dense ego-centric cliques sur- rounding the ego in the high-citation range. 8.2 Circle-specific Analysis Now we look into some of the characteristic features spe- cific to an ego-centric circle. In Figure 5(a), we plot the per- centage of ego-centric circles having a particular size Sc. It follows a Gaussian distribution at the beginning along with a heavy tail at the end. We observe that around 65.26% circles have sizes ranging between 4-30. However, the flat tail at the end shows that more than 15% circles have size greater than 50. Figure 5(b) shows the distribution of the cliquishness (Cc) of the ego-centric circles. Surprisingly, it again follows a Gaussian distribution with mean ∼ 0.44 and variance ∼ 0.02. We notice that around 59.28% circles have cliquishness values ranging between [0.4, 0.6] which is quite high. Further inspection reveals that low-degree egos are surrounded by small-size circles and therefore their cliquish- ness value is quite high. To get a clear idea of the relation be- tween the size and the cliquishness of the ego-centric circles, we plot in Figure 5(c) the average cliquishness of the circles having a specific size. The value of cliquishness Cc gradually decreases with the increase of the size Sc till Sc=40, which is followed by a sharp increase. As mentioned earlier, the increase of cliquishness at the end once again emphasizes that the large-size circles centered around the highly-cited authors are relatively dense. Finally, we plot the percentage of egos surrounded by a specific number of circles in Figure 5(d). As expected, we observe that the plot has a declining trend from the very beginning, which once again highlights our previous observation that most of the low-cited authors have a low degree in the co-authorship network, and spawn only a few ego-centric circles. Since the co-authorship net- work is mostly dominated by low-degree authors, most of the egos are fringed by a small number of local circles. 9. INTERPRETATION OF EGO-CENTRIC CIRCLES In co-authorship network, most intuitive ground-truth com- munities are often assumed to be different areas of research [7] in a particular domain. Therefore, one can interpret each ego-centric circle as a group of coauthors working in a spe- cific research area. Since we know the major research area of each author in the dataset, for each ego we further group its coauthors based on only their major research area such that each circle corresponds to an area and constitutes coau- (a) Circles detected by the model Field−based circles s s e n h s i u q i l c . g v A 0.3 0.25 0.2 0.15 0.1 0.05 0 0 4000 2000 10000 Authors (arranged in decreasing order of the cliquishness of circles detected by our model) 6000 8000 y t i e n e g o m o h . g v A ) e c n a i r a v h t i w ( 1 0.8 0.6 0.4 0.2 0 (b) Range 1 Range 2 Range 4 Different citation ranges of authors Range 3 Figure 6: (Color online) (a) Comparison of cliquish- ness of area-based circles and the circles detected by our model, (b) average homogeneity of the ego- centric circles detected by our model for the authors categorized into four zones as per number of cita- tions: Range 1 (>200), Range 2 (>100 & <=200), Range 3 (>30 & <=100) and Range 4 (<=30). thors working on this area. Then we measure the average cliquishness of the research field based circles for each au- thor vis-a-vis that of the ego-centric circles detected by our model. Essentially, we intend to cross-validate our hypothe- sis that considering a single dimensional feature vector of an author such as the field information is not an appropriate way of encircling alters; rather each circle might represent individual dimension of cohesiveness among its constituent nodes as shown in Figure 1. In Figure 6(a), we plot the av- erage cliquishness of field-based circles vis-a-vis that of the circles detected by the model surrounding each author. As expected, the cliquishness of the detected circles is signifi- cantly higher than that of the field-based circles. Therefore, we conclude that the field-based circles might not appropri- ately group highly cohesive nodes, rather the circles detected by our model seem to be more representative and meaning- ful. We further mark each of the detected circles by that field which is also the major research area for most of its con- stituent coauthors. Then for each ego, we measure the frac- tion of circles belonging to each of the 24 fields. There- fore, each ego/author can now be represented by a vector of size 24 whose ith entry represents the fraction of ego- centric circles marked by field i. Figure 7 shows three heat maps corresponding to highly-cited, medium-cited and low- cited authors. For the sake of brevity, we only plot val- ues for 1000 authors from each citation range although the results are similar for other authors. We observe that for highly-cited authors, ego-centric circles are mostly marked by few fields, which indicates that the highly-cited authors tend to collaborate with people from similar research area. If this is true, then the immediate question would be why D I r o h t u A (a) 200 400 600 800 1000 Highly−cited 1 0.8 0.6 0.4 0.2 0 5 10 15 20 (b) 200 400 600 800 Medium−cited 0.08 0.06 0.04 0.02 5 1000 24 fields in computer science 10 15 20 0 (c) 200 400 600 800 1000 Low−cited 0.1 0.05 0 5 10 15 20 Figure 7: (Color online) Heat maps representing the fraction of ego-centric circles marked by each of the 24 fields for highly-cited, medium-cited and low-cited authors. For each author, the elements in the horizontal axis are sorted in descending order. the coauthors having same research interest are encircled into different groups by our model. Further inspection re- veals that along with the field, each group also represents the time of collaboration. For instance, the ego network of Author 12 (one of the highly-cited authors) is shown in Fig- ure 8(a). One group of her ego network encircles authors in Data Mining who have coauthored with her during 1997 -- 2000. Another such group constitutes authors from Machine Learning, who have collaborated with her during 2000 -- 2003. Therefore, the field of research and the time of collaboration act as two major dimensions in this case. Next for the medium-cited authors, the heat map in Fig- ure 7(b) shows that the distribution of circles into different fields seems to be much more uniform as compared to Figure 7(a). The example shown in Figure 8(b) also corroborates with the hypothesis that with the decrease of citations, the ego-centric circles tend to become even more complicated to be interpreted distinctly. From Figure 8(b), we notice that the time duration of collaboration corresponding to the circles are overlapping and, therefore, it is very hard to distinguish these circles. The result is even more clut- tered for low-cited authors as shown in Figures 7(c) and 8(c). These results thus lead to a general conclusion that the highly-cited authors seem to coauthor with a group of people having a specific research interest in a particular time period and then move to another such group of coauthors; whereas this tendency is not so prominent for medium- and low-cited authors. However, we posit that there might be other dimensions (such as the name of the Institute where the author belongs to) that might help us interpret these circles more clearly. Homogeneity of ego-centric circles. We define a field- based homogeneity for ego-centric circles to verify if, in most cases, authors from the same field tend to form communi- ties and whether the circles spawned by our unsupervised approach are able to capture this tendency. Given a circle C, we define FC,i to be the fraction of authors in C with major field fi. One can easily infer that a uniform distribu- tion FC,i implies that the circle is homogeneous with respect to the field of work while a skewed distribution (with ma- jority of authors in one or two fields) characterizes a more field-specific circle. In particular, we define the homogene- ity coefficient H(C) for circle C in terms of the entropy of the circle with respect to the distribution across different 2The names of the authors are anonymized in order to main- tain privacy. fields as in Equation 16. Greater the entropy, lesser is the homogeneity and vice versa. H(C) = 1 1 − P24 i=1 FC,i log(FC,i) (16) Figure 6(b) captures the average homogeneity of circles in the ego-network of authors in four different citation ranges. We note that the homogeneity is highest for the authors with very high citation ranges (> 200) and has low variance, indicating that highly-cited authors tend to spawn circles that have alters in very similar fields, whereas authors with medium citations (30−100) spawn more diverse circles. The authors with low citations (≤ 30) exhibit higher degree of homogeneity than those in the medium range, but this may be attributed to the fact that they spawn very small-sized circles. 10. TASK BASED EVALUATION We further evaluate the quality of the circles through a task based evaluation framework -- the task of collaboration prediction. We choose two supervised learning models: lin- ear regression (LR) [4] and supervised random walks (SRW) [4]. Then we demonstrate that inclusion of the ego-centric circles detected by our model as a feature in the feature set would eventually enhance the performance of this model with respect to the one in which the circle information is missing. 10.1 Problem Definition For our problem, we assume a temporal graph GT = (VT , ET ) where VT represents a set of nodes such that each node ut ∈ VT is associated with a time stamp t indicating its first appearance in GT , and each edge eti,tj = (uti , vtj ) connects two nodes uti and vtj (such that uti ,vtj ∈ VT and ti <= tj ). Each node ut is also associated with a feature vector fut at time stamp t, whose entires might change over time. Now, given a longitudinal snapshot of the graph GT from the beginning till time T , say GT ′ = (VT ′ , ET ′ ), the collaboration prediction problem aims at predicting the col- laborations which are going to appear among the vertices in VT ′ within ∆t time period after T This task is very challenging due to extreme sparsity of real networks where each node is connected to only a very small fraction of all other nodes in the network (the presence of high proportion of negative evidences in the dataset). 10.2 Feature Set . ′ ′ We use a set of node- and edge-level features for the learn- ing models. The following set of node-level features (denoted by N ) are used. Each feature is normalized by the maximum value of the corresponding feature so that the values range between 0 to 1. • Normalized number of citations received by an author • Normalized h-index of an author • Normalized number of coauthors of an author • Fraction of papers by an author in each of the 24 fields • Normalized number of papers written by an author • Fraction of papers published by an author in each of the five decades (between 1960-2009) Further, given an edge e = (x, y) in the co-authorship net- work, we additionally use the following edge-level features (denoted by E). Each feature is appropriately normalized Figure 8: (Color online) Examples of ego-networks from three citation zones. Individual nodes have different colors corresponding to different areas of research. If the color of all the nodes in a circle is same as the color of the circle, the value of homogeneity is 1. Time period (ti − tj) associated with each circle indicates that the ego has written a paper first (last) time with anyone of its constituent coauthors at year ti (tj ). to a value between 0 and 1. • Fraction of papers coauthored by x and y in each of the five decades • Normalized number of common coauthors of x and y • Fraction of papers authored by x in the major field of y • Fraction of papers authored by y in the major field of x We refer to the combined set of both node- and edge- level features by N E. We provide this set N E of node and edge attributes as an input to the learning model which then takes care of determining how to combine them with the network structure to make predictions [4]. Note that if we take the dataset till t for training the model, all the features mentioned above will be calculated based on the statistics of each vertex till t in order to avoid information leakage. 10.3 Evaluation Methodology In order to demonstrate that predictions are robust ir- respective of the time stamp considered for dividing the dataset into training and test sets, we run the competing models in three different time periods: (i) the dataset till 1995 is considered for training and the accuracies of the models are measured by comparing the new edges formed between 1996-1999, (ii) similarly, the dataset till 2000 for training and 2001-2004 for checking the accuracy, and (iii) the dataset till 2005 for training and 2006-2009 for checking the accuracy. In each time stamp, we evaluate the methods on the test set, considering two performance metrics: the Area under the ROC curve (AU C) and the Precision at Top 20 (P rec@20), i.e., for each node s, what fraction of top 20 nodes sug- gested by each model actually receive links from s later. This measure is particularly appropriate in the context of link-recommendation where we present a user with a set of suggested coauthors and aim that most of them are correct. 10.4 Performance Evaluation We compare the predictive performance of two learning models including the circle information in three different time periods as mentioned in Section 10.3. We iterate each of these collaboration prediction models using different sets of features: (i) only node-level features (Model: N), (ii) only edge-level features (Model: E), (iii) both node and edge level features (Model: NE), (iv) besides node and edge level fea- tures, including a binary feature B that checks whether a pair of nodes (x, y) belong to at least one common ego- centric circle or not (Model: NEB), and (v) besides node- level and edge-level features and the binary circle informa- tion, including a numeric feature C indicating the number of common circles a pair of nodes (x, y) is a part of (Model: NEBC). The circles are detected by our model, the coordi- nate ascent method (CA) [15, 16] and BIGCLAM separately. Table 1 shows the performance of these two prediction models with different feature sets. We notice that edge fea- tures are more effective than node features, and the per- formance improves incrementally after combining different features together. A general observation is that inclusion of circle information in the feature set improves the perfor- mance of both the prediction models irrespective of the time periods. For instance, it improves the performance by 9.87% and 15.25% on average in terms of AU C and P rec@20 re- spectively compared to the case, where the circle information is not present (N E). We further observe that the inclusion of circle information detected by our model significantly outperforms the case where the circles are obtained by BIGCLAM and CA in each time stamp. Including the binary circle information (N EB) from our model achieves an average AUC improvement of 2.16% and 3.51% respectively for LR and SRW models (sim- ilarly, in terms of P rec@20, the improvement is 3.75% and 2.94% respectively for LR and SRW models) compared to BIGCLAM (CA). Further, including the count of common circles for a node pair (N EBC) in the feature set leads both LR and SRW to achieve even better performance. We observe an aver- age AUC improvement of 3.41% (1.11%) and 3.31% (0.57%) respectively for LR and SRW models using our circle infor- mation as compared to that obtained from BIGCLAM (CA) (similarly, in terms of P rec@20, the improvement is 6.35% (5.14%) and 6.16% (3.22%) respectively for LR and SRW models). 11. CONCLUSIONS AND FUTURE WORK Circles allow us to organize the overwhelming volumes of data generated by an author's personal academic network. In this work, we proposed a simple yet effective method of detecting ego-centric circles in co-authorship networks. However, the proposed method is applicable to any general ego network given a suitable set of features. Our model is un- supervised and combines node attributes and node similari- ties to identify circles that resemble communities in real net- works. Experiments with four state-of-the-art overlapping community detection algorithms showed that our method outperformed these baseline algorithms. Further, a task based evaluation achieved a superior performance after in- clusion of the circle information detected by our model. In future, we would like to develop a semi-supervised ver- sion of our algorithm that makes use of manually labeled Table 1: Comparison of BIGCLAM (BIG), coordinate ascent method (CA) [15, 16] and our model (CIRC) after including their detected circle information into the feature set of Linear Regression (LR) and Supervised Random Walks (SRW) frameworks across three time periods and different feature sets (N: node-level, E: edge-level, NE: node- and edge-level, NEB: adding the binary circle information to NE, NEBC: adding the numerical circle information to NEB). Time period N E NE 1996-1999 2001-2004 2006-2009 Average 0.5872 0.5890 0.5916 0.5893 0.5914 0.5907 0.5891 0.5904 0.6451 0.6528 0.6436 0.6472 Linear Regression (LR) BIG 0.6569 0.6529 0.6439 0.6512 NEB CA 0.6689 0.6437 0.6510 0.6545 CIRC 0.6791 0.6659 0.6509 0.6653 BIG 0.6989 0.6845 0.6905 0.6913 Supervised Random Walks (SRW) NEBC CA 0.7195 0.7011 0.7001 0.7069 CIRC 0.7235 0.7012 0.7198 0.7148 N E NE 0.6332 0.6419 0.6360 0.6370 0.6478 0.6514 0.6608 0.6533 0.7659 0.7591 0.7609 0.7620 BIG 0.7908 0.8067 0.8001 0.7992 NEB CA 0.7895 0.8035 0.8101 0.8101 CIRC 0.8275 0.8249 0.8295 0.8273 BIG 0.7971 0.8098 0.8111 0.8060 NEBC CA 0.8296 0.8149 0.8279 0.8279 CIRC 0.8303 0.8356 0.8321 0.8327 Area Under the ROC Curve (AUC) Time period N E NE 1996-1999 2001-2004 2006-2009 Average 0.137 0.141 0.147 0.142 0.124 0.143 0.142 0.136 0.152 0.156 0.161 0.156 Linear Regression (LR) BIG 0.155 0.162 0.162 0.160 NEB CA 0.161 0.159 0.165 0.162 CIRC BIG 0.164 0.158 0.175 0.169 0.179 0.171 0.166 0.173 NEBC CA 0.173 0.175 0.178 0.175 CIRC 0.177 0.185 0.189 0.184 Supervised Random Walks (SRW) N E NE 0.165 0.158 0.161 0.161 0.172 0.163 0.169 0.168 0.201 0.198 0.199 0.199 BIG 0.205 0.200 0.208 0.204 NEB CA 0.209 0.210 0.209 0.209 CIRC BIG 0.207 0.210 0.215 0.209 0.211 0.212 0.210 0.211 NEBC CA 0.215 0.220 0.217 0.217 CIRC 0.223 0.225 0.224 0.224 P rec@20 data. Although most authors may not want to label the circles manually, it would be highly desirable to make use of the information from those few who do. Additionally, we would also like to apply the proposed method on the other datasets. 12. ACKNOWLEDGMENTS The first author is financially supported by Google India PhD fellowship. 13. REFERENCES [1] A. Abbasi, K. S. K. Chung, and L. Hossain. Egocentric analysis of coauthorship network structure, position and performance. Inf. Process. Manage., 48(4):671 -- 679, July 2012. [2] A. Abbasi, R. T. Wigand, and L. Hossain. Measuring social capital through network analysis and its influence on individual performance. Libr Inform Sci Res, 36(1):66 -- 73, 2014. [3] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P. Xing. Mixed membership stochastic blockmodels. J. Mach. Learn. Res., 9:1981 -- 2014, June 2008. [4] L. Backstrom and J. Leskovec. Supervised random walks: predicting and recommending links in social networks. In WSDM, pages 635 -- 644, 2011. [5] R. Balasubramanyan and W. W. Cohen. Block-lda: Jointly modeling entity-annotated text and entity-entity links. In SDM, pages 450 -- 461, 2011. [6] K. Borner, L. Dall'Asta, W. Ke, and A. Vespignani. Studying the emerging global brain: Analyzing and visualizing the impact of co-authorship teams: Research articles. Complex., 10(4):57 -- 67, Mar. 2005. [7] T. Chakraborty, S. Sikdar, N. Ganguly, and A. Mukherjee. Citation interactions among computer science fields: a quantitative route to the rise and fall of scientific research. SNAM, 4(1), 2014. [8] J. P. Eaton, J. C. Ward, A. Kumar, and P. H. Reingen. Social-structural foundations of publication productivity in the Journal of Consumer Research. J Consum Res, 11(10):199 -- 210, 2002. [9] S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75 -- 174, 2010. [10] S. Gregory. Finding overlapping communities in networks by label propagation. New Journal of Physics, 12(10):103018, 2010. [11] K. C. H. Shen, X. Cheng and M. B. Hu. Detect overlapping and hierarchical community structure in networks. Physica A, 388(8):1706 -- 1712, 2009. [12] D. Jurafsky and J. H. Martin. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition. Prentice Hall PTR, USA, 2000. [13] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and S. Fortunato. Finding statistically significant communities in networks. PLoS ONE, 6(4):e18961, 2011. [14] J. Liu and T. Liu. Detecting community structure in complex networks using simulated annealing with -means algorithms. Physica A, 389(11):2300 -- 2309, 2010. [15] J. J. McAuley and J. Leskovec. Learning to discover social circles in ego networks. In NIPS, pages 548 -- 556, 2012. [16] J. J. McAuley and J. Leskovec. Discovering social circles in ego networks. TKDD, 8(1):4, 2014. [17] C. McCarty, J. Jawitz, A. Hopkins, and A. Goldman. Predicting author h-index using characteristics of the co-author network. Scientometrics, 96(2):467 -- 483, 2013. [18] A. Mislove, B. Viswanath, P. K. Gummadi, and P. Druschel. You are who you know: inferring user profiles in online social networks. In WSDM, pages 251 -- 260, 2010. [19] M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Phys. Rev. E, 69(026113), 2004. [20] J. Xie and B. K. Szymanski. Towards linear time overlapping community detection in social networks. In PAKDD, pages 25 -- 36, 2012. [21] E. Yan and Y. Ding. Applying centrality measures to impact analysis: A coauthorship network analysis. JASIST, 60(10):2107 -- 2118, Oct. 2009. [22] J. Yang and J. Leskovec. Overlapping community detection at scale: A nonnegative matrix factorization approach. In WSDM, pages 587 -- 596, New York, USA, 2013. ACM. (b) 1 0.8 0.6 0.4 0.2 (c) 1 0.8 0.6 0.4 0.2 1 0 0 0.5 False positive rate 1 0 0 0.5 Algorithms BIGCLAM SLPA OSLOM COPRA Field based Our method 0.2 0.3 τ L 0.4 0.5
1611.02305
1
1611
2016-11-07T21:28:40
Learning Influence Functions from Incomplete Observations
[ "cs.SI", "cs.LG", "stat.ML" ]
We study the problem of learning influence functions under incomplete observations of node activations. Incomplete observations are a major concern as most (online and real-world) social networks are not fully observable. We establish both proper and improper PAC learnability of influence functions under randomly missing observations. Proper PAC learnability under the Discrete-Time Linear Threshold (DLT) and Discrete-Time Independent Cascade (DIC) models is established by reducing incomplete observations to complete observations in a modified graph. Our improper PAC learnability result applies for the DLT and DIC models as well as the Continuous-Time Independent Cascade (CIC) model. It is based on a parametrization in terms of reachability features, and also gives rise to an efficient and practical heuristic. Experiments on synthetic and real-world datasets demonstrate the ability of our method to compensate even for a fairly large fraction of missing observations.
cs.SI
cs
Learning Influence Functions from Incomplete Observations Xinran He Ke Xu University of Southern California, Los Angeles, CA 90089 David Kempe Yan Liu 6 1 0 2 v o N 7 ] I S . s c [ 1 v 5 0 3 2 0 . 1 1 6 1 : v i X r a {xinranhe, xuk, dkempe, yanliu.cs}@usc.edu November 9, 2016 Abstract We study the problem of learning influence functions under incomplete observations of node activations. Incomplete observations are a major concern as most (online and real-world) social networks are not fully observable. We establish both proper and improper PAC learnability of influence functions under randomly missing observations. Proper PAC learnability under the Discrete-Time Linear Threshold (DLT) and Discrete-Time Independent Cascade (DIC) models is established by reducing incomplete observations to complete observations in a modified graph. Our improper PAC learnability result applies for the DLT and DIC models as well as the Continuous-Time Independent Cascade (CIC) model. It is based on a parametrization in terms of reachability features, and also gives rise to an efficient and practical heuristic. Experiments on synthetic and real-world datasets demonstrate the ability of our method to compensate even for a fairly large fraction of missing observations. 1 Introduction Many social phenomena, such as the spread of diseases, behaviors, technologies, or products, can naturally be modeled as the diffusion of a contagion across a network. Owing to the potentially high social or economic value of accelerating or inhibiting such diffusions, the goal of understanding the flow of information and predicting information cascades has been an active area of research [10, 7, 9, 14, 1, 20]. In this context, a key task is learning influence functions: the functions mapping sets of initial adopters to the individuals who will be influenced (also called active) by the end of the diffusion process [10]. Many methods have been developed to solve the influence function learning problem [9, 7, 5, 8, 3, 16, 18, 24, 25]. Most approaches are based on fitting the parameters of a diffusion model based on observations, e.g., [8, 7, 18, 9, 16]. Recently, Du et al. [3] proposed a model-free approach to learn influence functions as coverage functions; Narasimhan et al. [16] establish proper PAC learnability of influence functions under several widely-used diffusion models. All existing approaches rely on the assumption that the observations in the training dataset are complete, complete, in the sense that all active nodes are observed as being active. However, this assumption fails to hold in virtually all practical applications [15, 6, 2, 21]. For example, social media data are usually collected through crawlers or acquired with public APIs provided by social media platforms, such as Twitter or Facebook. Due to non-technical reasons and established restrictions on the APIs, it is often impossible to obtain a complete set of observations even for a short period 1 of time. In turn, the existence of unobserved nodes, links, or activations may lead to a significant misestimation of the diffusion model's parameters [19, 15]. In this paper, we take a step towards addressing the problem of learning influence functions from incomplete observations (Here specifically we mean missing activation in the observed cascades). Missing data are a complicated phenomenon, but to address it meaningfully and rigorously, one must make at least some assumptions about the process resulting in the loss of data. As a first step, we focus on random loss of observations: for each activated node independently, the node's activation is observed only with probability r, the retention rate, and fails to be observed with probability 1 − r. Random observation loss naturally occurs when crawling data from social media, where rate restrictions are likely to affect all observations equally. We establish both proper and improper PAC learnability of influence functions under incomplete observations for two popular diffusion models: the Discrete-Time Independent Cascade (DIC) and Discrete-Time Linear Threshold (DLT) models. The result is proved by interpreting the incomplete observations as complete observations in a transformed graph, In fact, randomly missing observations do not significantly increase the required sample complexity. The PAC learnability result implies good sample complexity bounds for the DIC and DLT models. However, even without missing observations, proper PAC learnability of the CIC and other models appears to be more challenging. Furthermore, the PAC learnability result does not lead to an efficient algorithm, as it involves marginalizing a large number of hidden variables (one for each node not observed to be active). Towards designing more practical algorithms and obtaining learnability under a broader class of diffusion models, we pursue improper learning approaches. Concretely, we use the parameterization of Du et al. [3] in terms of reachability basis functions, and optimize a modified loss function suggested by Natarajan et al. [17] to address incomplete observations. We prove that the algorithm ensures improper PAC learning for the DIC, DLT and Continuous-Time Independent Cascade (CIC) models. Experimental results on synthetic cascades generated from these diffusion models and real-world cascades in the MemeTracker dataset demonstrate the effectiveness of our approach. Our algorithm achieves nearly a 20% reduction in estimation error compared to the best baseline methods on the MemeTracker dataset, by compensating for incomplete observations. Several recent works also aim to address the issue of missing observations in social network analysis, but with different emphases. For example, Chierichetti et al. [2] and Sadikov et al. [21] mainly focus on recovering the size of a diffusion process, while our task is to learn the influence functions from several incomplete cascades. Myers et al. [15] mainly aim to model unobserved external influence in diffusion. Duong et al. [6] examine learning diffusion models with missing links from complete observations, while we learn influence functions from incomplete cascades with missing activations. Most related to our work are papers by Wu et al. [23] and simultaneous work by Lokhov [13]. Both study the problem of network inference under incomplete observations. Lokhov proposes a dynamic message passing approach to marginalize all the missing activations, in order to infer diffusion model parameters using maximum likelihood estimation, while Wu et al. develop an EM algorithm. Notice that the goal of learning the model parameters differs from our goal of learning the influence functions directly. Both [13] and [23] provide empirical evaluation, but do not provide theoretical guarantees. 2 2 Preliminaries 2.1 Models of Diffusion and Incomplete Observations Diffusion Model. We model propagation of opinions, products, or behaviors as a diffusion process over a social network. The social network is represented as a directed graph G = (V, E), where n = V is the number of nodes, and m = E is the number of edges. Each edge e = (u, v) is associated with a parameter wuv representing the strength of influence user u has on v. We assume that the graph structure (the edge set E) is known, while the parameters wuv are to be learned. Depending on the diffusion model, there are different ways to represent the strength of influence between individuals. Nodes can be in one of two states, inactive or active. We say that a node gets activated if it adopts the opinion/product/behavior under the diffusion process. In this work, we focus on progressive diffusion models, where a node remains active once it gets activated. The diffusion process begins with a set of seed nodes (initial adopters) S, who start active. The process then proceeds in discrete or continuous time: according to a probabilistic process, additional nodes may become active based on the influence from their neighbors. Let N (v) be the in-neighbors of node v and At the set of nodes activated by time t. We consider the following three widely used diffusion models: • Discrete-time Linear Threshold (DLT) model [10]: Each node v has a threshold θv drawn independently and uniformly from the interval [0, 1]. The diffusion under the DLT model unfolds in discrete time steps: a node v becomes active at step t if the total incoming weight from its neighbors exceeds its threshold: (cid:80) • Discrete-time Independent Cascade (DIC) model [10]: The DIC model is also a discrete-time model. Under the DIC model, the weight wuv ∈ [0, 1] captures an activation probability. When a node u becomes active in step t, it attempts to activate all currently inactive neighbors in step t + 1. For each neighbor v, it succeeds with probability wuv. If it succeeds, v becomes active; otherwise, v remains inactive. Once u has made all these attempts, it does not get to make further activation attempts at later times. u∈N (v)∩At−1 wuv ≥ θv. • Continuous-time Independent Cascade (CIC) model [8]: The CIC model unfolds in continuous time. Each edge e = (u, v) is associated with a delay distribution with wuv as its parameter. When a node u becomes newly active at time t, for every neighbor v that is still inactive, a delay time duv is drawn from the delay distribution. duv is the duration it takes u to activate v, which could be infinite (if u does not succeed in activating v). Nodes are considered activated by the process if they are activated within a specified observation window [0, τ ]. Fix one of the diffusion models defined above and its parameters. For each seed set S, let ∆S be the distribution of final active sets when the seed set is S. (In the case of the DIC and DLT model, this is the set of active nodes when no new activations occur; for the CIC model, it is the set of nodes active at time τ.) For any node v, let Fv(S) = ProbA∼∆S [v ∈ A] be the (marginal) probability that v is activated according to the dynamics of the diffusion model with initial seeds S. Then, define the influence function F : 2V → [0, 1]n mapping seed sets to the vector of marginal activation probabilities: F (S) = [F1(S), . . . , Fn(S)]. Notice that the marginal probabilities do not capture the full information about the diffusion process contained in ∆S (since they do not observe co-activation patterns), but they are sufficient for many applications, such as influence maximization [10] and influence estimation [4]. 3 Cascades and Incomplete Observations. We focus on the problem of learning influence func- tions from cascades. A cascade C = (S, A) is a realization of the random diffusion process; S is the set of seeds and A ∼ ∆S, A ⊇ S is the set of activated nodes at the end of the random process. Similar to Narasimhan et al. [16], we focus on activation-only observations, namely, we only observe which nodes were activated, but not when these activations occurred.1 To capture the fact that some of the node activations may have been unobserved, we use the following model of independently randomly missing data: for each (activated) node v ∈ A \ S, the activation of v is actually observed independently with probability r. With probability 1 − r, the node's activation is unobservable. For seed nodes v ∈ S, the activation is never lost. Formally, define A as follows: each v ∈ S is deterministically in A, and each v ∈ A \ S is in A independently with probability r. Then, the incomplete cascade is denoted by C = (S, A). n · x − y2 2.2 Objective Functions and Learning Goals To measure estimation error, we primarily use a quadratic loss function, as in [16, 3]. For two n-dimensional vectors x, y, the quadratic loss is defined as (cid:96)sq(x, y) = 1 2. We also use this notation when one or both arguments are sets: when an argument is a set S, we formally mean to use the indicator function χS as a vector, where χS(v) = 1 if v ∈ S, and χS(v) = 0 otherwise. In particular, for an activated set A, we write (cid:96)sq(A, F (S)) = 1 We now formally define the problem of learning influence functions from incomplete observations. Let P be a distribution over seed sets (i.e., a distribution over 2V ), and fix a diffusion model M and parameters, together giving rise to a distribution ∆S for each seed set. The algorithm is given a set of M incomplete cascades C = {(S1, A1), . . . , (SM , AM )}, where each Si is drawn independently from P, and Ai is obtained by the incomplete observation process described above from the (random) activated set Ai ∼ ∆Si. The goal is to learn an influence function F that accurately captures the diffusion process. Accuracy of the learned influence function is measured in terms of the squared error with respect to the true model: errsq[F ] = ES∼P,A∼∆S [(cid:96)sq(A, F (S))]. That is, the expectation is over the seed set and the randomness in the diffusion process, but not the data loss process. nχA − F (S)2 2. PAC Learnability of Influence Functions. We characterize the learnability of influence func- tions under incomplete observations using the Probably Approximately Correct (PAC) learning framework [22]. Let FM be the class of influence functions under the diffusion model M, and FL the class of influence functions the learning algorithm is allowed to choose from. We say that FM is PAC learnable if there exists an algorithm A with the following property: for all ε, δ ∈ (0, 1), all parametrizations of the diffusion model, and all distributions P over seed sets S: when given activation-only and incomplete training cascades C = {(S1, A1), . . . , (SM , AM )} with M ≥ poly(n, m, 1/ε, 1/δ), A outputs an influence function F ∈ FL satisfying: Prob C[errsq[F ] − errsq[F ∗] ≥ ε] ≤ δ. Here, F ∗ ∈ FM is the ground truth influence function. The probability is over the training cascades, including the seed set generation, the stochastic diffusion process, and the missing data process. We say that an influence function learning algorithm A is proper if FL ⊆ FM; that is, the learned influence function is guaranteed to be an instance of the true diffusion model. Otherwise, we say that A is an improper learning algorithm. 1Narasimhan et al. [16] refer to this model as partial observations; we change the terminology to avoid confusion with "incomplete observations." 4 Figure 1: Illustration of the graph transformation. The light green node is the seed, the dark green nodes are the activated and observed nodes while the yellow node is activated but lost due to incomplete observations. 3 Proper PAC Learning under Incomplete Observations In this section, we establish proper PAC learnability of influence functions under the DIC and DLT models. For both diffusion models, FM can be parameterized by an edge parameter vector w, whose entries we are the activation probabilities (DIC model) or edge weights (DLT model). Our goal is to find an influence function F w ∈ FM that outputs accurate marginal activation probabilities. While our goal is proper learning - meaning that the function must be from FM - we do not require that the inferred parameters match the true edge parameters w. Our main theoretical results are summarized in Theorem 1 and Theorem 2. Theorem 1. Let λ ∈ (0, 0.5). The class of influence functions under the DIC model in which all edge activation probabilities satisfy we ∈ [λ, 1 − λ] is PAC learnable under incomplete observations with retention rate r. The sample complexity is O( n3m Theorem 2. Let λ ∈ (0, 0.5), and consider the class of influence functions under the DLT model such u∈N (v) wuv ∈ [λ, 1 − λ]. This class is PAC learnable under incomplete observations with retention rate r. The sample complexity is O( n3m that the edge weight for every edge satisfies we ∈ [λ, 1 − λ], and for every node v, 1 −(cid:80) ε2r4 ). ε2r4 ). proof are provided in Appendix A. In this section, we present the intuition and a proof sketch for the two theorems. Details of the The key idea of the proof of both theorems is that a set of incomplete cascades C on G under the two models can be considered as essentially complete cascades on a transformed graph G = ( V , E). The influence functions of nodes in G can be learned using a modification of the result of Narasimhan et al. [16]. Subsequently, the influence functions for G are directly obtained from the influence functions for G, by exploiting that influence functions only focus on the marginal activation probabilities. The transformed graph G is built by adding a layer of n nodes to the original graph G. For each node v ∈ V of the original graph, we add a new node v(cid:48) ∈ V (cid:48) and a directed edge (v, v(cid:48)) with known and fixed edge parameter wvv(cid:48) = r. (Conveniently, the same parameter value serves as activation probability under the DIC model and as edge weight under the DLT model.) The new nodes V (cid:48) have no other incident edges, and we retain all edges e = (u, v) ∈ E. Inferring their parameters is the learning task. An example of the transformation on a simple graph consisting of four nodes is shown in Figure 1. 5 𝐺𝑢𝑣𝑤𝑥𝑢𝑣𝑤𝑥𝑢'𝑣′𝑤′𝑥′𝐺' For each observed (incomplete) cascade (Si, Ai) on G (with Si ⊆ Ai), we produce an observed i deterministically; (2) for each i with probability r. This defines the training cascades i as follows: (1) for each v ∈ Ai \ Si, we let v(cid:48) ∈ A(cid:48) activation set A(cid:48) v ∈ Si independently, we include v(cid:48) ∈ A(cid:48) C = {(Si, A(cid:48) i)}. Now consider any edge parameters w, applied to both G and the first layer of G. Let F (S) denote the influence function on G, and F (S) = [ F1(cid:48)(S), . . . , Fn(cid:48)(S)] the influence function of the nodes in the added layer V (cid:48) of G. Then, by the transformation, we get that (1) for all nodes v ∈ V . And by the definition of the observation loss process, we also have that for all non-seed nodes v /∈ Si, Fv(cid:48)(S) = r · Fv(S) Prob[v ∈ Ai] = r · Fv(S) = Fv(cid:48)(S). While the cascades C are not complete on all of G, in a precise sense, they provide complete information on the activation of nodes in V (cid:48). In Appendix A, we show that Theorem 2 of Narasimhan et al. [16] can be extended to provide identical guarantees for learning F (S) from the modified observed cascades C. For the DIC model, this is a straightforward modification of the proof from [16]. For the DLT model, [16] had not established PAC learnability2, so we provide a separate proof. Because the results of [16] and our generalizations ensure proper learning, they provide edge weights w between the nodes of V . We use these exact same edge weights to define the learned influence functions in G. Equation (1) then implies that the learned influence functions on V satisfy r · Fv(cid:48)(S). The detailed analysis in Appendix A shows that the learning error only scales Fv(S) = 1 by a multiplicative factor 1 r2 . The PAC learnability result shows that there is no information-theoretical obstacle to influence function learning under incomplete observations. However, it does not imply an efficient algorithm. The reason is that a hidden variable would be associated with each node not observed to be active, and computing the objective function for empirical risk minimization would require marginalizing over all of the hidden variables. The proper PAC learnability result also does not readily generalize to the CIC model and other diffusion models, even under complete observations. This is due to the lack of a succinct characterization of influence functions as under the DIC and DLT models. Therefore, in the next section, we explore improper learning approaches with the goal of designing practical algorithms and establishing learnability under a broader class of diffusion models. 4 Efficient Improper Learning Algorithm In this section, we develop improper learning algorithms for efficient influence function learning. Instead of parameterizing the influence functions using the edge parameters, we adopt the model-free influence function learning framework, InfluLearner, proposed by Du et al. [3] to represent the influence function as a sum of weighted basis functions. From now on, we focus on the influence function Fv(S) of a single fixed node v. 2[16] shows that the DLT model with fixed thresholds is PAC learnable under complete cascades. We study the DLT model when the thresholds are uniformly distributed random variables. 6 v (S) =(cid:80) H:at least one node in S has a path to v in H γH. Influence Function Parameterization. For all three diffusion models (CIC, DIC and DLT), the diffusion process can be characterized equivalently using live-edge graphs. Concretely, the results of [10, 4] state that for each instance of the CIC, DIC, and DLT models, there exists a distribution Γ over live-edge graphs H assigning probability γH to each live-edge graph H such that F ∗ To reduce the representation complexity, notice that from the perspective of activating v, two different live-edge graphs H, H(cid:48) are "equivalent" if v is reachable from exactly the same nodes in H and H(cid:48). Therefore, for any node set T , let β∗ H:exactly the nodes in T have paths to v in H γH. We then use characteristic vectors as feature vectors rT = χT , where we will interpret the entry for node u as u having a path to v in a live-edge graph. More precisely, let φ(x) = min{x, 1}, and χS S · rT ) = 1 if and only if v is reachable from S, the characteristic vector of the seed set S. Then, φ(χ(cid:62) and we can write T :=(cid:80) (cid:88) F ∗ v (S) = T · φ(χ(cid:62) β∗ S · rT ). T This representation still has exponentially many features (one for each T ). In order to make the learning problem tractable, we sample a smaller set T of K features from a suitably chosen distribution, implicitly setting the weights βT of all other features to 0. Thus, we will parametrize the learned influence function as (cid:88) T∈T F β v (S) = βT · φ(χ(cid:62) S · rT ). The goal is then to learn weights βT for the sampled features. (They will form a distribution, i.e., β1 = 1 and β ≥ 0.) The crux of the analysis is to show that a sufficiently small number K of features (i.e., sampled sets) suffices for a good approximation, and that the weights can be learned efficiently from a limited number of observed incomplete cascades. Specifically, we consider the log likelihood function (cid:96)(t, y) = y log t + (1 − y) log(1 − t), and learn the parameter vector β via the following maximum likelihood estimation problem: Maximize (cid:80)M subject to i=1 (cid:96)(F β β1 = 1, β ≥ 0. v (Si), χAi(v)) Handling Incomplete Observations. The maximum likelihood estimation cannot be directly applied to incomplete cascades, as we do not have access to Ai (only the incomplete version Ai). To address this issue, notice that the MLE problem is actually a binary classification problem with log loss and yi = χAi(v) as the label. From this perspective, incompleteness is simply class-conditional noise on the labels. Let yi = χ Ai (v) be our observation of whether v was activated or not under the incomplete cascade i. Then, Prob[yi = 1yi = 1] = r and Prob[yi = 1yi = 0] = 0. In words, the incomplete observation yi suffers from one-sided error compared to the complete observation yi. Known techniques can be used to address this issue. By results of Natarajan et al. [17], we can construct an unbiased estimator of (cid:96)(t, y) using only the incomplete observations y, as in the following lemma. 7 Lemma 3 (Corollary of Lemma 1 [17]). Let y be the true activation of node v and y the incomplete observation. Then, defining for any t, we have Ey = (cid:96)(t, y). (cid:96)(t, y) := (cid:104)(cid:96)(t, y) (cid:105) 1 r y log t + 2r − 1 r (1 − y) log(1 − t), Based on this lemma, we solve the maximum likelihood estimation problem with the adjusted (2) likelihood function (cid:96)(t, y): Maximize (cid:80)M subject to i=1 (cid:96)(F β v (Si), χ Ai β1 = 1, β ≥ 0. (v)) We analyze conditions under which the solution to (2) provides improper PAC learnability under incomplete observations; these conditions will apply for all three diffusion models. These conditions are similar to those of Lemma 1 in the work of Du et al. [3], and concern the approximability of the reachability distribution β∗ T . Specifically, let q be a distribution over node sets T such that q(T ) ≤ Cβ∗ T for all node sets T . Here, C is a (possibly very large) number that we will want to bound below. Let T1, . . . , TK be K i.i.d. samples drawn from the distribution q. The (S) with parameter3 features are then rk = χTk. We use the truncated version of the function F β,λ λ as in [3]: v (S) = (1 − 2λ)F β F β,λ v v (S) + λ. Let Mλ be the class of all such truncated influence functions, and F ∈ Mλ the influence functions obtained from the optimization problem (2). The following theorem (proved in Appendix B) establishes the accuracy of the learned functions. β,λ v Theorem 4. Assume that the learning algorithm uses K = Ω( C2 it constructs, and observes4 M = Ω( log C probability at least 1 − δ, the learned influence functions F P satisfy ε2 ) features in the influence function ε4r2 ) incomplete cascades with retention rate r. Then, with for each node v and seed distribution (cid:104) ES∼P β,λ (F v (S) − F ∗ β,λ v v (S))2(cid:105) ≤ ε. The theorem implies that with enough incomplete cascades, an algorithm can approximate the ground truth influence function to arbitrary accuracy. Therefore, all three diffusion models are improperly PAC learnable under incomplete observations. The final sample complexity does not contain the graph size, but is implicitly captured by C, which will depend on the graph and how well the distribution β∗ T can be approximated. Notice that with r = 1, our bound on M has logarithmic dependency on C instead of polynomial, as in [3]. The reason for this improvement is discussed further in Appendix B. 3The proof of Theorem 4 in Appendix B will show how to choose λ. 4The Ω notation suppresses all logarithmic terms except log C, as C could be exponential or worse in the number of nodes. 8 Efficient Implementation. As mentioned above, the features T cannot be sampled from the exact reachability distribution β∗ T , because it is inaccessible (and complex). In order to obtain useful guarantees from Theorem 4, we follow the approach of Du et al. [3], and approximate the distribution β∗ T with the product of the marginal distributions, estimated from observed cascades. The optimization problem (2) is convex and can therefore be solved in time polynomial in the number of features K. However, the guarantees in Theorem 4 require a possibly large number of features. In order to obtain an efficient algorithm for practical use and our experiments, we sacrifice the guarantee and use a fixed number of features. Notice that the optimization problem (2) can be solved independently for each node v; the learned functions Fi(S) can then be combined into F (S) = [F1(S), . . . , Fn(S)]. As the optimization problem factorizes over nodes, the method is obviously parallelizable, thus scaling to large networks. in our theoretical analysis, we assumed that the retention rate r is known to the learning algorithm. In practice, it can be estimated via cross- validation. As we show in the next section, the algorithm is not very sensitive to the misspecification of the retention rate. A further point regarding the implementation: 5 Experiments In this section, we experimentally evaluate the algorithm from Section 4. Since no other methods explicitly account for incomplete observations, we compare it to several state-of-the-art methods for influence function learning with full information. Hence, the main goal of the comparison is to examine to what extent the impact of missing data can be mitigated by being aware of it. We compare our algorithm to the following approaches: (1) CIC is an approach fitting the parameters of a CIC model, using the NetRate algorithm [7] with exponential delay distribution. (2) DIC fits the activation probabilities of a DIC model using the method in [18]. (3) InfluLearner is the model-free approach proposed by Du et al. in [3] and discussed in Section 4. (4) Logistic uses S · cu + b) for each u independently, logistic regression to learn the influence functions Fu(S) = f (χ(cid:62) 1+e−x is the logistic function. (5)Linear uses where cu is a learnable weight vector and f (x) = 1 linear regression to learn the total influence σ(S) = c(cid:62) · χS + b of the set S. Notice that the CIC and DIC methods have access to the activation time of each node in addition to the final activation status, giving them an inherent advantage. 5.1 Synthetic cascades Data generation. We generate synthetic networks with core-peripheral structure following the Kronecker graph model [12] with parameter matrix [0.9, 0.5; 0.5, 0.3].5 Each generated network has 512 nodes and 1024 edges. We then generate synthetic cascades following the CIC, DIC and DLT models. For the CIC model, we use an exponential delay distribution on each edge whose parameters are drawn independently and uniformly from [0, 1]. The observation window length is τ = 1.0. For the DIC model, the activation probability for each edge is chosen independently and uniformly from [0, 0.4]. For the DLT model, we follow [10] and set the edge weight wuv as 1/dv where dv is the in-degree of node v. For each model, we generate 8192 cascades as training data. The seed sets are sampled uniformly at 5We also experimented on Kronecker graphs with hierarchical community structure ([0.9, 0.1; 0.1, 0.9]) and random structure ([0.5, 0.5; 0.5, 0.5]). The results are similar and omitted due to space constraints. 9 (a) CIC (b) DIC (c) DLT Figure 2: MAE of estimated influence as a function of the retention rate on synthetic datasets for (a) CIC model, (b) DIC model, (c) DLT model. The error bars shows one standard deviation. random with sizes drawn from a power law distribution with parameter 2.5. The generated cascades have average sizes of 10.8, 12.8 and 13.0 in the CIC, DIC and DLT models, respectively. We then create incomplete cascades by varying the retention rate between 0.1 and 0.9. The test set contains 200 independently sampled seed sets generated in the same way as the training data. To sidestep the computational cost of running Monte Carlo simulations, we estimate the ground truth influence of the test seed sets using the method proposed in [3], with the true model parameters. Algorithm settings. We apply all algorithms to cascades generated from all three models; that is, we also consider the results under model misspecification. Whenever applicable, we set the hyperparameters of the five comparison algorithms to the ground truth values. When applying the NetRate algorithm to discrete-time cascades, we set the observation window to 10.0. When applying the method in [18] to continuous-time cascades, we round activation times up to the nearest multiple of 0.1, resulting in 10 discrete time steps. For the model-free approaches (InfluLearner and our algorithm), we use K = 200 features. Results. Figure 2 shows the Mean Absolute Error (MAE) between the estimated total influence σ(S) and the true influence value, averaged over all testing seed sets. For each setting (diffusion model and retention rate), the reported MAE is averaged over five independent runs. The main insight is that accounting for missing observations indeed strongly mitigates their effect: notice that for retention rates as small as 0.5, our algorithm can almost completely compensate for the data loss, whereas both the model-free and parameter fitting approaches deteriorate significantly even for retention rates close to 1. For the parameter fitting approaches, even such large retention rates can lead to missing and spurious edges in the inferred networks, and thus significant estimation errors. Additional observations include that fitting influence using (linear or logistic) regression does not perform well at all, and that the CIC inference approach appears more robust to model misspecification than the DIC approach. Sensitivity of retention rate. We presented the algorithms as knowing r. Since r itself is inferred from noisy data, it may be somewhat misestimated. Figure 4 shows the impact of misestimating r. 10 1.00.90.80.70.60.50.40.30.20.1Retention Rate234567891011MAECICDICInfluLearnerLinearLogisticOur Method1.00.90.80.70.60.50.40.30.20.1Retention Rate234567891011MAECICDICInfluLearnerLinearLogisticOur Method1.00.90.80.70.60.50.40.30.20.1Retention Rate234567891011MAECICDICInfluLearnerLinearLogisticOur Method Figure 3: Relative error in MAE when the true retention rates are drawn from the truncated Gaussian distribution. The x-axis shows standard deviation σ of the retention rates from the mean, and the y-axis is the relative difference of the MAE compared to the case where all retention rates are the same and known. We generate synthetic cascades from all three diffusion models with a true retention rate of 0.8, and then apply our algorithm with (incorrect) retention rate r ∈ {0.6, 0.65, . . . , 0.95, 1}. The results are averaged over five independent runs. While the performance decreases as the misestimation gets worse (after all, with r = 1, the algorithm is basically the same as InfluLearner), the degradation is graceful. Non-uniform retention rate In practice, different nodes may have different retention rates, while we may be able only to estimate the mean retention rate r. For our experiments, we draw each node v's retention rate rv independently from a distribution with mean r. Specifically, in our experiments, we use uniform and Gaussian distributions; for the uniform distribution, we draw rv ∼ Unif[r − σ, r + σ]; for the Gaussian distribution, we draw rv ∼ N (r, σ2), truncating draws at 0 and 1.6 In both cases, σ measures the level of noise in the estimated retention rate. We set the mean retention rate r to 0.8 and vary σ in {0, 0.02, 0.05, 0.1, 0.2}. Figure 3 shows the results for the Gaussian distribution; the results of uniform distribution are similar and omitted. The results show that our model is very robust to random and independent perturbations of individual retention rates for each node. Influence Estimation on real cascades 5.2 We further evaluate the performance of our method on the real-world MemeTracker7 dataset [11]. The dataset consists of the propagation of short textual phrases, referred to as Memes, via the publication of blog posts and main-stream media news articles between March 2011 and February 2012. Specifically, the dataset contains seven groups of cascades corresponding to the propagation of Memes with certain keywords, namely "apple and jobs", "tsunami earthquake", "william kate marriage"', "occupy wall-street", "airstrikes", "egypt" and "elections." Each cascade group consists of 6The truncation could lead to a bias on the mean of r. However, empirical simulations show that the bias is negligible (only 0.01 when σ = 0.2). 7We use the preprocessed version of the dataset released by Du et al. [3] and available at http://www.cc.gatech. edu/~ndu8/InfluLearner.html. Notice that the dataset is semi-real, as multi-node seed cascades are artificially created by merging single-node seed cascades. 11 96%98%100%102%104%106%0.020.050.10.2CICDICDLT Figure 4: Relative error in MAE under reten- tion rate misspecification. x-axis: retention rate r used by the algorithm. y-axis: relative difference of MAE compared to using the true retention rate 0.8. Figure 5: MAE of influence estimation on seven sets of real-world cascades with 20% of activa- tions missing. 1000 nodes, with a number of cascades varying from 1000 to 44000. We follow exactly the same evaluation method as Du et al. [3] with a training/test set split of 60%/40%. To test the performance of influence function learning under incomplete observations, we randomly delete 20% of the occurrences, setting r = 0.8. The results for other retention rates are similar and omitted. Figure 5 shows the MAE of our methods and the five baselines, averaged over 100 random draws of test seed sets, for all groups of memes. While some baselines perform very poorly, even compared to the best baseline (InfluLearner), our algorithm provides an 18% reduction in MAE (averaged over the seven groups), showing the potential of data loss awareness to mitigate its effects. 6 Model Extensions So far, we have assumed that the retention rate is the same for all the nodes; however, our approach can be easily generalized to the case in which each individual node has a different (but known) retention rate. The following theorem generalizes Theorems 1 and 2. (The proofs of all theorems from this section are given in Appendix C.) Theorem 5. Let λ ∈ (0, 0.5) and for each node v, let rv be v's retention rate. Write ¯r = 1 . • The class of influence functions under the DIC model in which all edge activation probabilities (cid:80)n 1 r2 v i=1 n satisfy we ∈ [λ, 1 − λ] is PAC learnable with sample complexity O( ¯r2n3m satisfies we ∈ [λ, 1 − λ], and for every node v, 1 −(cid:80) • The class of influence functions under the DLT model such that the edge weight for every edge u∈N (v) wuv ∈ [λ, 1 − λ], is PAC learnable ). ε2 with sample complexity O( ¯r2n3m ε2 ). The empirical evaluation in the previous section also shows that the performance does not change significantly if the true retention rate of each node is independently perturbed around the estimated mean loss rate. A second limitation of our approach is that we assume the retention rate r to be known to the algorithm. Estimating r in a real-world setting presents a "chicken and egg" problem; however, we 12 --‐10--‐5051015202530354010.950.90.850.80.750.70.650.6CICDICDLT051015202530351234567MAEGroups of memesLinearLogisticDICCICInfluLearnerOur Method believe that a somewhat accurate estimate of r (perhaps based on past data for which ground truth can be obtained at much higher cost) will still be a significant improvement over the status quo, namely, pretending that no data are missing. Moreover, even approximate information about r leads to positive results on proper PAC learnability. We show that the PAC learnability result can be extended to the case where we only know that the true retention rate lies in a given interval. Instead of knowing the exact value r, we only know that r lies in an interval measured by the relative error η, namely r ∈ I = [¯r · (1− η), ¯r · (1 + η)]. Within that interval, the retention rate is adversarially chosen. We can then generalize Theorems 1 and 2 as follows. Theorem 6. Let λ ∈ (0, 0.5), and assume that the ground truth retention rate r is adversarially chosen in I = [¯r · (1 − η), ¯r · (1 + η)]. For all ε, δ ∈ (0, 1), all parametrizations of the diffusion model, and all distributions P over seed sets S: when given activation-only and incomplete training cascades C, there exists a proper learning algorithm A which outputs an influence function F ∈ FM satisfying: Prob C[errsq[F ] − errsq[F ∗] ≥ ε + 4η2 (1 − η)2 ] ≤ δ. • For the DIC model, when all edge activation probabilities satisfy we ∈ [λ, 1 − λ], the required number of observations is M = O( n3m ε4r4(1−η)4 ). 1 −(cid:80) • For the DLT model, when all edges weights satisfy we ∈ [λ, 1 − λ], and for every node v, u∈N (v) wuv ∈ [λ, 1 − λ], the required number of observations is M = O( n3m ε4r4(1−η)4 ). Notice that the result of Theorem 6 is not technically a PAC learnability result, due to the additive error that depends on the interval size. However, the theorem provides useful approximation guarantees when the interval size is small. A dependence of the guarantee on the interval size is inevitable. For when nothing is known about the retention rate (for η large enough), all information about the marginal activation probabilities is lost in the incomplete data: for instance, if no nodes are ever obesrved active, we cannot distinguish the case r = 0 from the case in which no nodes become activated. The experiments from the previous section confirm that for moderate uncertainty about the retention rate, the performance of our approach is not very sensitive to the misestimation of r. 7 Conclusion and Future Work We studied the problem of learning influence functions under incomplete observations, which are common in real-world applications. We established proper PAC learnability of influence functions under two popular diffusion models, the DIC and DLT model. The incompleteness only has moderate impact on the sample complexity bound, but computational efficiency would require an oracle for efficient empirical risk minimization. We next designed an efficient improper learning algorithm with learning guarantees for the DIC, DLT, and CIC models. Our framework can be easily generalized to handle non-uniform (but independent) loss of node activations. We also have partial results theoretically establishing robustness to misestimations of r (which we observed experimentally in Section 5). A much more significant departure for future work would be non-random loss of activations, e.g., losing all activations of some randomly chosen 13 nodes. As another direction, it would be worthwhile to generalize the PAC learnability results to other diffusion models, and to design an efficient algorithm with PAC learning guarantees. Acknowledgments We would like to thank anonymous reviewers for useful feedback. The research was sponsored in part by NSF research grant IIS-1254206 and by the U.S. Defense Advanced Research Projects Agency (DARPA) under the Social Media in Strategic Communication (SMISC) program, Agreement Number W911NF-12-1-0034. The views and conclusions are those of the authors and should not be interpreted as representing the official policies of the funding agency, or the U.S. Government. 14 References [1] K. Amin, H. Heidari, and M. Kearns. Learning from contagion (without timestamps). In Proc. 31st Intl. Conf. on Machine Learning, pages 1845–1853, 2014. [2] F. Chierichetti, D. Liben-Nowell, and J. M. Kleinberg. Reconstructing Patterns of Informa- tion Diffusion from Incomplete Observations. In Proc. 23rd Advances in Neural Information Processing Systems, pages 792–800, 2011. [3] N. Du, Y. Liang, M.-F. Balcan, and L. Song. Influence Function Learning in Information Diffusion Networks. In Proc. 31st Intl. Conf. on Machine Learning, 2014. [4] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable Influence Estimation in Continuous- Time Diffusion Networks. In Proc. 25th Advances in Neural Information Processing Systems, pages 3147–3155, 2013. [5] N. Du, L. Song, S. Yuan, and A. J. Smola. Learning Networks of Heterogeneous Influence. In Proc. 24th Advances in Neural Information Processing Systems, pages 2780–2788. 2012. [6] Q. Duong, M. P. Wellman, and S. P. Singh. Modeling information diffusion in networks with unobserved links. In SocialCom/PASSAT, pages 362–369, 2011. [7] M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. In Proc. 28th Intl. Conf. on Machine Learning, pages 561–568, 2011. [8] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. ACM Transactions on Knowledge Discovery from Data, 5(4), 2012. [9] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. Learning influence probabilities in social networks. In Proc. 3rd ACM Intl. Conf. on Web Search and Data Mining, pages 241–250, 2010. [10] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the Spread of Influence in a Social Network. In Proc. 9th Intl. Conf. on Knowledge Discovery and Data Mining, pages 137–146, 2003. [11] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the dynamics of the news cycle. In Proc. 15th Intl. Conf. on Knowledge Discovery and Data Mining, pages 497–506, 2009. [12] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker graphs: An approach to modeling networks. The Journal of Machine Learning Research, 11:985–1042, 2010. [13] A. Y. Lokhov. Reconstructing spreading couplings from partial observations of several cascades. In Proc. 28th Advances in Neural Information Processing Systems, 2016. [14] S. A. Myers and J. Leskovec. On the convexity of latent social network inference. In Proc. 22nd Advances in Neural Information Processing Systems, pages 1741–1749, 2010. [15] S. A. Myers, C. Zhu, and J. Leskovec. Information Diffusion and External Influence in Networks. In Proc. 18th Intl. Conf. on Knowledge Discovery and Data Mining, pages 33–41. [16] H. Narasimhan, D. C. Parkes, and Y. Singer. Learnability of Influence in Networks. In Proc. 27th Advances in Neural Information Processing Systems, pages 3168–3176, 2015. 15 [17] N. Natarajan, I. S. Dhillon, P. K. Ravikumar, and A. Tewari. Learning with noisy labels. In Proc. 25th Advances in Neural Information Processing Systems, pages 1196–1204, 2013. [18] N. Praneeth and S. Sujay. Learning the Graph of Epidemic Cascades. In Proc. 12th ACM Sigmetrics Conf. on Measurement and Modeling of Computer Systems, pages 211–222, 2012. [19] D. Quang, W. M. P, and S. S. P. Modeling Information Diffusion in Networks with Unobserved Links. In SocialCom, pages 362–369, 2011. [20] N. Rosenfeld, M. Nitzan, and A. Globerson. Discriminative learning of infection models. In Proc. 9th ACM Intl. Conf. on Web Search and Data Mining, pages 563–572, 2016. [21] E. Sadikov, M. Medina, J. Leskovec, and H. Garcia-Molina. Correcting for missing data in information cascades. In Proc. 4th ACM Intl. Conf. on Web Search and Data Mining, pages 55–64, 2011. [22] L. G. Valiant. A theory of the learnable. Communications of the ACM, 27(11):1134–1142, 1984. [23] X. Wu, A. Kumar, D. Sheldon, and S. Zilberstein. Parameter learning for latent network diffusion. In Proc. 29th Intl. Joint Conf. on Artificial Intelligence, pages 2923–2930, 2013. [24] S.-H. Yang and H. Zha. Mixture of Mutually Exciting Processes for Viral Diffusion. In Proc. 30th Intl. Conf. on Machine Learning, 2013. [25] K. Zhou, H. Zha, and L. Song. Learning Social Infectivity in Sparse Low-rank Network Using Multi-dimensional Hawkes Processes. In Proc. 30th Intl. Conf. on Machine Learning, 2013. 16 A Proofs for Section 3 A.1 Proof of Theorem 1 Here, we flesh out the proof sketch from Section 3 for the DIC model. For the transformed graph G, we consider only the influence functions of the n nodes in the added layer V (cid:48). Recall that we write F (S) = [ F1(cid:48)(S), . . . , Fn(cid:48)(S)] for the influence function of those nodes. Let F ∗ be the ground truth influence function for the same nodes, and F ∗ the ground truth influence function for G. Let M(G) and M( G) be the class of influence functions of G and G. For functions F , we write . Notice that the ground truth functions minimize the (cid:99)errsq[ F ] = ES,A expected squared error, i.e., F ∗ ∈ argmin F∈M( G)(cid:99)errsq[ F ] and F ∗ ∈ argminF∈M(G)errsq[F ]. We will v(cid:48)∈V (cid:48)(χA(v(cid:48)) − Fv(cid:48)(S))2(cid:105) (cid:80) (cid:104) 1 show that errsq[F ] − errsq[F ∗] can be made arbitrary small. n We first prove a variation of Theorem 2 from [16] for learning F , by verifying that all the supporting lemmas still apply. The modified Theorem 2 from [16] is the following: Theorem 7. Assume that the learning algorithm observes M = Ω(−2n3m) training cascades C = {(Si, A(cid:48) i)} under the DIC model. Then, with probability at least 1 − δ, we have (3) Proof. While the cascades in C are incomplete on V , they are complete on V (cid:48). We use this completeness of the cascades as follows. Consider the restricted class of the DIC model on the transformed graph G in which only the m activation probabilities w between nodes in V are learnable, while the edges (v, v(cid:48)) have a fixed weight of r. Define the log-likelihood for a cascade (S, A(cid:48)) as (cid:99)errsq[ F ] −(cid:99)errsq[ F ∗] ≤ . L(S, A(cid:48)w) = (v(cid:48)) log( F w v(cid:48) (S)) + (1 − χA(cid:48) i χA(cid:48) i (v(cid:48))) log(1 − F w v(cid:48) (S)). (cid:88) v(cid:48)∈V (cid:48) The algorithm outputs an influence function F based on the solution of the following optimization problem: w∗ ∈ argmaxw∈[λ,1−λ]m L(Si, A(cid:48) iw). M(cid:88) i=1 As the function F is learned from the DIC model, Lemma 3 in [16] carries thorough to establish the Lipschitz continuity of DIC influence functions. Lemma 8 (Lipschitz continuity of DIC influence). Fix S ⊆ V and v(cid:48) ∈ V (cid:48). For any w, w(cid:48) ∈ Rm with w − w(cid:48)1 ≤ , we have F w v(cid:48) (S) − F w(cid:48) v(cid:48) (S) ≤ . Moreover, such instances (on 2n nodes) still only have m parameters, and the L∞ covering number bound in Lemma 8 from [16] applies without any changes. Lemma 9 (Covering number of DIC influence functions). The L∞ covering number of the restricted class of the DIC influence functions on the transformed graph for radius  is O((m/)m). Establishing the sample complexity bound on the log-likelihood objective (Lemma 4 in [16]) requires that all function values be bounded away from 0 and 1 (Lemma 9 in [16]). We assume that r < 1, as Lemma 4 in [16] directly holds when there are no missing data at all. Let λ > 0 be the bound on the edge activation probabilities in G from our Theorem 1; that is, λ ≤ wuv ≤ 1 − λ for all 17 u, v ∈ V . Due to the layered structure of G, we have that r · λn ≤ Fv(cid:48)(S) ≤ r · (1 − λn).8 Therefore, Lemma 4 in [16] carries thorough with the same sample complexity of O(−2n3m): Lemma 10 (Sample complexity guarantee on the log-likelihood objective). Fix , δ ∈ (0, 1) and M = Ω(−2n3m). With probability at least 1 − δ (over the draws of the training cascades), (cid:21) (cid:20) 1 n (cid:21) (cid:20) 1 n max w∈[λ,1−λ]m ES,A(cid:48) L(S, A(cid:48)w) − ES,A(cid:48) L(S, A(cid:48)w∗) ≤ . As all the lemmas used in the proof of Theorem 2 from [16] remain true, we have proved our Theorem 7, with the guarantee that errsq[ F ] − errsq[ F ∗] ≤ . Finally, we recall that according to Equation (1), Fv(S) = 1 r · Fv(cid:48)(S) and F ∗ v (S) = 1 r · F ∗ v(cid:48)(S), giving us that errsq[F ] − errsq[F ∗] (∗) = Equation (1) = (∗) = v (S))2(cid:3) v∈V ES (cid:2)(Fv(S) − F ∗ (cid:20) (cid:88) (cid:88) (cid:99)errsq[ F ] −(cid:99)errsq[ F ∗] Fv(cid:48)(S) − 1 r v(cid:48)∈ V 1 n 1 n ( 1 r ES r2 (cid:21) F ∗ v(cid:48)(S))2 Equation (3)≤  r2 (The steps labeled (*) are applications of Equation (4) from [16].) Now, by taking  = ε · r2, with O( n3m ε2r4 ) incomplete cascades, we obtain that errsq[F ] − errsq[F ∗] ≤ ε. A.2 Proof of Theorem 2 We will show that the analogue of Theorem 7 for the DLT model also holds. We do so by following the same sequence of steps as in Appendix A.1 and verifying that all the steps in the proof of Theorem 2 in [16] still hold. The main difference is that a new proof is needed for establishing Lipschitz continuity of the DLT influence function with respect to the L1 norm (the analogue of Lemma 3 in [16]). We begin by establishing this lemma. Lemma 11 (Lipschitz continuity). Fix S ⊆ V and u ∈ V . For any w, w(cid:48) ∈ Rm with w− w(cid:48)1 ≤ ε, we have that F w Proof. As shown in [10], the influence functions under the DLT model can be also characterized via the reachability under a distribution over live-edge graphs. Specifically, the distribution is as follows [10, Theorem 2.5]: for each node v, pick at most one of its incoming edges at random, selecting the edge from z ∈ N (v) with probability wzv and selecting no incoming edge with probability z∈N (v) wzv. For each node v, let the random variable Xv be the incoming neighbor chosen for v, z∈N (v) wzv. 1−(cid:80) with Xv =⊥ if v has no incoming edge. For simplicity of notation, we define w⊥v = 1−(cid:80) u (S) − F w(cid:48) u (S) ≤ ε. 8As in the proof of Lemma 4 in [16], we assume that there exists a path in the graph G from a node in S to node v(cid:48); the cases where this assumption fails can be handled easily. 18 Define X = (Xv)v∈V , and write X for the set of all such vectors X. For any node v, we write X−v for the set of all vectors with edges (or ⊥) for all nodes except v. And for a vector X ∈ X−v, we write X[v (cid:55)→ z] for the vector in which all entries agree with those in X, except for the entry for v which is now z. Let RX (v, S) be the indicator function of whether node v is reachable from the seed set S in the graph (V, X), where we interpret X as the set of all edges (Xv, v) with Xv (cid:54)=⊥. Claim 2.6 of [10] implies that We fix an edge (y, y(cid:48)) and take the partial derivative of F w u (S) with respect to wyy(cid:48): (cid:12)(cid:12)(cid:12)(cid:12) ∂F w u (S) ∂wyy(cid:48) (cid:12)(cid:12)(cid:12)(cid:12) = (cid:88) (cid:89) v∈V X (cid:88) (cid:89) F w u (S) = wXvvRX (u, S).  (cid:88) (cid:89) (cid:89) v∈V \{y} ∂wyy(cid:48) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∂ (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) (cid:88) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) (cid:88) X∈X−y X∈X−y v∈V \{y} = ≤ wzy z∈N (y)∪{⊥} X∈X−y v∈V \{y} wXvv · RX[y(cid:55)→y(cid:48)](u, S) − (cid:88) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) wXvv (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) wXvv · RX[y(cid:55)→z](u, S) (cid:89) wXvv · RX[y(cid:55)→⊥](u, S) X∈X−y v∈V \{y} (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Therefore, ∇wF w = 1. u (S)∞ ≤ 1, implying Lipschitz continuity. wzv ∈ [λ, 1 − λ] by assumption, and we further assumed that w⊥v = 1 −(cid:80) Next, we bound the values of the influence functions away from 0 and 1. Because each edge weight z∈N (v) wzv ∈ [λ, 1 − λ], it follows directly (as in the proof for the DIC model) that r · λn ≤ Fv(cid:48)(S) ≤ r · (1 − λn). This establishes the analogue of Lemma 9 in [16], and we can therefore apply Lemma 4 in [16], obtaining a sample complexity of O(−2n3m) under the DLT model. As all the used lemmas remain true, the results of Theorem 7 also hold for the DLT model. Finally, exploiting the same relation between F (S) and F (S) as in the proof of Theorem 1 leads to the conclusion of Theorem 2. B Proof of Theorem 4 Let M = Ω( log C that for any single node v, with probability at least 1 − δ/n, 4r2 ), and let F β,λ v (S) be the influence functions obtained in Theorem 4. We will show The theorem then follows by taking a union bound over all n nodes. Recall that Mλ is function class of all truncated influence functions. We write RM (Mλ) := E Si∼P,(i)i∼Uniform({−1,1}M ) sup F∈Mλ 1 M i · Fv(Si) (cid:35) M(cid:88) i=1 (cid:104) ES (F β,λ v (S) − F ∗ v (S))2(cid:105) ≤ ε. (cid:34) 19 εδ ) features such that ES∼P for its Rademacher complexity, where the i's are i.i.d. Rademacher (symmetric Bernoulli) random ∈ Mλ with β,λ variables. By Lemma 12 in [3], there exists a truncated influence function F v K = O( C2 ε2 log Cn least 1 − δ 2n. Using the log likelihood function (cid:96)(t, y) = y log t + (1 − y) log(1 − t) as defined in Section 4, we write the log loss of influence function Fv as errlog[Fv] = ES,A [−(cid:96)(Fv(S), A)]. By Lemma 2 in [17], with probability at least 1 − δ 2n, v (S))2(cid:105) ≤ 2ε2 + 2λ2 with probability at (S) − F ∗ β,λ (F v (cid:104) (cid:114) (cid:114) β,λ errlog[F v ] ≤ min f∈Mλ errlog[f ] + RM (Mλ) + 4 λ · r log(2n/δ) 2M . Because F β,λ v ∈ Mλ, we can bound that minf∈Mλ errlog[f ] ≤ errlog[F β,λ v side. Subtracting errlog [F ∗ v ] from both sides, we obtain (S)] on the right-hand follows: β,λ errlog[F v ] − errlog[F ∗ v ] ≤ errlog[F β,λ v ] − errlog[F ∗ v ] + RM (Mλ) + 4 λ · r log(2n/δ) 2M . (4) The square and log errors can be related to each other as in the proof of Theorem 2 in [16], as (cid:104) ES β,λ (F v (S) − F ∗ v (S))2(cid:105) ≤ 1 (cid:104) ] − errlog[F ∗ v ]). β,λ (errlog[F v 2 (S) − F ∗ v (S))2(cid:105) Hence, in order to obtain a bound on ES β,λ right-hand side of (4). The term errlog[F v β,λ in [3], using Lemma 11 and Lemma 16 from [3]: Assume that F v Then, with probability at least 1 − δ, we have β,λ (F v ]− errlog[F ∗ , it suffices to upper-bound the v ] can be bounded as in the proof of Lemma 2 ) features. uses K = Ω( C2 2 log Cn δ ). Next, we bound the Rademacher complexity of the function class Mλ: (1 + log λ β,λ v ] − errlog[F ∗ v ] ≤ 2 + λ2 errlog[F 1 λ (cid:113) 2 log(1+K) Lemma 12. The Rademacher complexity RM (Mλ) for the function class Mλ with at most K features is at most Proof. Recall that we use basis functions φi(S) := min{1, χ(cid:62) S rTi}. Let W = {φii = 1, . . . , K}∪{1}, where 1 is the constant function with value 1. By definition, we have Mλ ⊆ conv(W), where conv(W) denotes the convex hull. Therefore, RM (Mλ) ≤ RM (conv(W)) = RM (W). Since φi(S) ≤ 1, by Massart's finite lemma9, we have RM (W) ≤(cid:113) 2 log(1+K) , completing the proof. M . M (5) To finish the proof of Theorem 4, let  be the desired accuracy. Define δ = δ , c(cid:48) log 1 where c(cid:48) is a sufficiently large constant. Then, the right-hand side of (5) is upper-bounded by  · (1 + log 1 9Massart's finite lemma states the following: Let F be a finite set of functions, such that supf∈F 1 for any variables values X1, . . . , Xn. Then, the Rademacher complexity of F is upper bounded by Rn(F) ≤(cid:113) 2C2 log F (cid:80)n i=1 f (Xi)2 ≤ C 2 . 2n and  = λ =   ) ≤  2. n  n 20 4r2 ), we have 4 (cid:113) log(n/δ) log n 2 ), we also get that With M = Ω( log K δ 2M ≤  4. Taking M as the maximum of the above three, which is satisfied when M = (cid:104) 4r2 ), we can substitute all of the bounds into the right-hand side of (4) and obtain that β,λ n. Now, taking a union bound over all (F v v (S))2(cid:105) ≤  with probability at least 1 − δ 4. Whenever M = Ω( λ·rRM (Mλ) ≤  Ω( log C ES nodes v concludes the proof. (S) − F ∗ Discussion. Notice that when the retention rate is 1, our Theorem 4 significantly improves the sample complexity bound compared to Du et al. [3]. The sample complexity in [3] is O( C2 3 ), while our theorem implies a sample complexity of O( log C 4 ) under complete observations. The improvement is derived from bounding the Rademacher complexity of the function class Mλ instead of the L2,∞ dimension. The Rademacher bound leads to a logarithmic dependence of the sample complexity on the number of features K, whereas the L2,∞ bound results in a polynomial dependence. C Proofs for Section 6 C.1 Proof of Theorem 5 Let ri be the retention rate of node i and εi the desired error guarantee for learning the influence )} function Fvi. incomplete cascades are sufficient to guarantee that with probability at least 1 − δ, for each i, we obtain It is immediate from the proofs of Theorems 1 and 2 that M = maxi{ O( n3m ε2 i r4 i (cid:2)(Fvi(S) − F ∗ vi(S))2(cid:3) ≤ εi. ES The estimation error for the overall influence is the average ε = 1 n i εi. Given non-uniform retention rates ri, we can choose non-uniform εi yielding the desired ε, so as to minimize the sample complexity. The corresponding optimization problem is the following: (cid:80) Minimize subject to max 1 ε2 i r4 i i (cid:88) εi = ε, 1 n εi > 0 for all i. i (cid:80) The minimum is achieved when all The constant C can be obtained from the constraint 1 n ¯r = 1 n . This completes the proof of the theorem. (cid:80) 1 ε2 i r4 i i 1 r2 i are equal to some constant C, meaning that εi = 1√ i εi = ε, yielding that C = ¯r2 . C·r2 ε2 , where i C.2 Proof of Theorem 6 The proof of Theorem 6 is similar to that of Theorems 1 and 2. We again treat the incomplete cascades as complete cascades in a transformed graph G. Because we no longer know the true retention rate r, we cannot set the probability on the egde (v, v(cid:48)) to wvv(cid:48) = r. Instead, we treat the wvv(cid:48) as parameters to infer, under the constraint that wvv(cid:48) ∈ I = [¯r · (1 − η), ¯r · (1 + η)]. We spell out the details of the proof for the DIC model; the proof for the DLT model is practically identical. 21 As in Theorem 1, we consider only the influence functions of the n nodes in the added layer V (cid:48). ε2 ) cascades, for Following the proof of Theorem 1, with probability as least 1 − δ, using M = O( n3m all v(cid:48) ∈ V (cid:48), (cid:104) v(cid:48)(S))2(cid:105) ≤ ε. ES ( Fv(cid:48)(S) − F ∗ (6) In the proof of Theorem 1, the fact that wvv(cid:48) = r allowed us to obtain the influence function at v r · Fv(cid:48)(S). Since the edge probabilities wvv(cid:48) are now inferred, we instead use the inferred via Fv(S) = 1 probabilities for obtaining the activation functions for nodes v. On the other hand, the ground truth influence functions for v and v(cid:48) are still related via the correct value r. Writing rv = wvv(cid:48), this gives us the following: Consider ES can now be written as follows: Fv(cid:48)(S) F ∗ v (S) = rv Fv(S) = (cid:2)(Fv(S) − F ∗ (cid:2)(Fv(S) − F ∗ v (S))2(cid:3) for any node v. The expected squared estimation error for node v v (S))2(cid:3) Equation (7) ES (7) = . F ∗ v(cid:48)(S) r ES = ≤ ES rv v(cid:48)(S) v(cid:48)(S) r − F ∗ (cid:32) Fv(cid:48)(S) (cid:33)2 (cid:32) Fv(cid:48)(S) − F ∗ (cid:104) vi(S))2(cid:105) (cid:34) Fv(cid:48)(S) ( Fvi(S) − F ∗ r2 · ES · r − rv · ES (cid:34) F 2 (cid:35) · (r − rv)2 2 r rv 1 r r . r2 v(cid:48)(S) r2 v + +ES (cid:33)2 + Fv(cid:48)(S) r − rv r · rv · Fv(cid:48)(S) − F ∗ v(cid:48)(S) (cid:35) (8) (9) (10) We will bound the term (8) using Inequality (6). In order to bound the terms (9) and (10), observe the following: • For all seed sets S and nodes v(cid:48) ∈ V (cid:48), we have Fv(cid:48)(S) ≤ rv by the structure of the transformed graph. • r−rv r ≤ 2η • By Jensen's inequality and Inequality (6), ES 1−η follows from the assumption that rv, r ∈ [¯r · (1 − η), ¯r · (1 + η)]. (cid:104) Fv(cid:48)(S) − F ∗ v(cid:48)(S)(cid:105) ≤ √ ε. √ Using the preceding three inequalities, we can bound the term (9) by 4η 4η2 (1−η)2 . When ε ≤ εr2 2 , using the inequality (6), the term (8) is upper-bounded by 1 r2 ES ε 2. Similarly, when ε ≤ ε2r2(1−η)2 64η2 , the additive term (9) is upper-bounded by 2η ε r(1−η) and the term (10) by (cid:2)(Fvi(S) − F ∗ vi(S))2(cid:3) ≤ √ r(1−η) ≤ ε ε 2. Thus, 22 taking ε = min{ εr2 M = O( 2 , ε2r2(1−η)2 64η2 ε4r4(1−η)4 ) cascades, with probability at least 1 − δ, for each node v, n3m }, the first two terms combined are bounded by ε. Thus, using (cid:2)(Fv(S) − F ∗ v (S))2(cid:3) ≤ ε + ES 4η2 (1 − η)2 . Now, taking an average on both sides of the above equation over all the nodes v ∈ V concludes the proof of Theorem 6. 23
1703.04901
1
1703
2017-03-15T02:59:10
On the Analysis of the DeGroot-Friedkin Model with Dynamic Relative Interaction Matrices
[ "cs.SI", "cs.MA", "eess.SY", "physics.soc-ph" ]
This paper analyses the DeGroot-Friedkin model for evolution of the individuals' social powers in a social network when the network topology varies dynamically (described by dynamic relative interaction matrices). The DeGroot-Friedkin model describes how individual social power (self-appraisal, self-weight) evolves as a network of individuals discuss a sequence of issues. We seek to study dynamically changing relative interactions because interactions may change depending on the issue being discussed. In order to explore the problem in detail, two different cases of issue-dependent network topologies are studied. First, if the topology varies between issues in a periodic manner, it is shown that the individuals' self-appraisals admit a periodic solution. Second, if the topology changes arbitrarily, under the assumption that each relative interaction matrix is doubly stochastic and irreducible, the individuals' self-appraisals asymptotically converge to a unique non-trivial equilibrium.
cs.SI
cs
On the Analysis of the DeGroot-Friedkin Model with Dynamic Relative Interaction Matrices (cid:63) Mengbin Ye ∗, Ji Liu ∗∗, Brian D.O. Anderson ∗,∗∗∗,∗∗∗∗, Changbin Yu ∗,∗∗∗, and Tamer Ba¸sar ∗∗ ∗ Research School of Engineering, Australian National University, Canberra, A.C.T. 2601, Australia ∗∗ University of Illinois at Urbana-Champaign, USA ∗∗∗ Hangzhou Dianzi University, Hangzhou, Zhejiang, China E-mail: {mengbin.ye, brian.anderson, brad.yu}@anu.edu.au, ∗∗∗∗ Data61-CSIRO (formerly NICTA Ltd.) {jiliu, basar1}@illinois.edu Abstract: This paper analyses the DeGroot-Friedkin model for evolution of the individuals' social powers in a social network when the network topology varies dynamically (described by dynamic relative interaction matrices). The DeGroot-Friedkin model describes how individual social power (self-appraisal, self-weight) evolves as a network of individuals discuss a sequence of issues. We seek to study dynamically changing relative interactions because interactions may change depending on the issue being discussed. In order to explore the problem in detail, two different cases of issue-dependent network topologies are studied. First, if the topology varies between issues in a periodic manner, it is shown that the individuals' self-appraisals admit a periodic solution. Second, if the topology changes arbitrarily, under the assumption that each relative interaction matrix is doubly stochastic and irreducible, the individuals' self-appraisals asymptotically converge to a unique non-trivial equilibrium. Keywords: social and behavioural sciences, multi-agent systems, social networks, networked systems, opinion dynamics 1. INTRODUCTION In the past decade and a half, the systems and control community has conducted extensive research into multi- agent systems. A multi-agent system comprises of multiple interacting agents. Problems such as formation control, distributed optimisation, consensus based coordination and robotics have been heavily studied, see (Cao et al., 2013; Knorn et al., 2015) for two overviews. On the other hand, the control community has recently turned to study multi-agent systems in social sciences. Specifically, a social network consisting of groups of people interacting with their acquaintances can be considered from one point of view as a multi-agent system. The emergence of social media platforms such as Facebook, Instagram and Twitter has only increased the relevance of research into social networks. A problem of particular interest is "opinion dynamics", which studies how opinions within a social network may evolve as individuals discuss an issue, e.g. religion or (cid:63) This work was supported by the Australian Research Council (ARC) under the ARC grants DP-130103610 and DP-160104500, by the National Natural Science Foundation of China (grant 61375072), and by Data61-CSIRO (formerly NICTA). The work of Liu and Ba¸sar was supported in part by AFOSR MURI Grant FA 9550-10- 1-0573, and in part by NSF under grant CCF 11-11342. politics. The classical DeGroot model (DeGroot, 1974) is closely related to the consensus process (Jadbabaie et al., 2003; Shi and Johansson, 2013). Other models include the Friedkin-Johnsen model (Friedkin and Johnsen, 1990), the Altafini model (Altafini, 2013; Altafini and Lini, 2015), and Hegselmann-Krause model (Hegselmann and Krause, 2002; Etesami and Ba¸sar, 2015). The DeGroot-Friedkin model proposed and analysed in (Jia et al., 2015) is a two- stage model for multi-issue discussions, where issues are discussed sequentially. For each issue, the DeGroot model is used to study the opinion dynamics; each individual updates its own opinion based on a convex combination of its opinion and those of its neighbours. The coefficients of the convex combination are determined by 1) the indi- vidual's self-weight (which represents self-appraisal, self- confidence) and 2) the weights assigned by the individual to its neighbours (which might be a measure of trust or friendship). At the beginning of each new issue, a reflected appraisal mechanism is used by each individual to update its own self-weight. This mechanism takes into account the individual's influence and impact on the discussion of opinions on the prior issue. From one perspective, an indi- vidual's self-weight is a representation of that individual's social power in the social network. The key contribution of this paper is the study of the DeGroot-Friedkin model with time-varying interac- tions among the individuals. Because interactions in the DeGroot-Friedkin model are modelled by a matrix termed the "relative interaction matrix ", we will be investigating relative interaction matrices which dynamically change between issues but remain constant during each issue. In particular, we will investigate two types of time-varying in- teractions as to be explained shortly. As an extension of the DeGroot-Friedkin model, a modified version was proposed and analysed in (Xu et al., 2015; Chen et al., 2015). Time- varying interactions on this modified DeGroot-Friedkin model was studied in (Xia et al., 2016). On the other hand, there have been no results studying time-varying interac- tions for the original DeGroot-Friedkin model proposed in (Jia et al., 2015) (which assumed a constant relative interaction matrix during each discussion and between all issues). The first type of time-varying interaction to consider is issue-dependent interactions that change periodically. For example, consider a government cabinet that meets regularly to discuss several different issues, e.g. defence, finance, and social security. Because different ministers will have different portfolios and specialisations, it is likely that the weights assigned by an individual to its neigh- bours (used in the opinion dynamics component of the DeGroot-Friedkin model) will change depending on the issue. Periodically changing interactions may occur if a group meets regularly to discuss the same set of issues, e.g. the above example of the government cabinet. Initially, we consider the situation where the social network switches periodically between two different interaction topologies. We show that the self-weight of each individual in the so- cial network has a periodic solution where each individual always has strictly positive self-weight that is less than one. This result is then generalised to multiple periodically switching interaction topologies. As a second type of time variation, we consider the case where the issues vary arbitrarily as opposed to periodically. Accordingly, the relative interaction matrices also vary arbitrarily. Furthermore, in order to simplify the analysis, we assume that the arbitrarily varying relative interaction matrices are doubly stochastic and irreducible for each issue. Such arbitrarily changing interactions may occur in current day online social networks. We show that, given the assumption of doubly stochastic and irreducible rela- tive interaction matrices, the self-weight of each individual converges asymptotically to 1/n where n is the number of individuals in the network. In other words, a democratic sharing of social power is achieved. This result is consistent with (Jia et al., 2015) which studied a single, constant relative interaction matrix for the network over all issues. The remainder of the paper is organised as follows. Sec- tion 2 provides mathematical notation and introduces the DeGroot-Friedkin model. Section 3 considers interactions which change periodically with issues. Interactions which vary randomly between issues is studied in Section 4. Simulations are presented in Section 5 and we conclude the paper with the concluding remarks of Section 6. 2. BACKGROUND AND PROBLEM STATEMENT We begin by introducing some mathematical notations used in the paper. Let 1n and 0n denote, respectively, the n × 1 column vectors of all ones and all zeros. For a vector x ∈ Rn, 0 (cid:22) x and 0 ≺ x indicate component- wise inequalities, i.e., for all i ∈ {1, 2, . . . , n}, 0 ≤ xi and 0 < xi, respectively. Let ∆n denote the n-simplex, the set which satisfies {x ∈ Rn : 0 (cid:22) x, 1(cid:62) n x = 1}. (cid:101)∆n = ∆n\{e1, . . . , en} and int(∆n) = {x ∈ Rn : 0 ≺ The canonical basis of Rn is given by e1, . . . , en. Define n x = 1}. For the rest of the paper, we shall use the x, 1(cid:62) terms "node", "agent", and "individual" interchangeably. We shall also interchangeably use the words "self-weight" and "individual social power". An n × n matrix is called a row-stochastic matrix if its entries are all nonnegative and its row sums all equal 1. An n × n matrix is called a doubly stochastic matrix if its entries are all nonnegative and its row and column sums all equal 1. 2.1 Graph Theory The interaction between agents in a social network is modelled using a weighted directed graph, denoted as G = (V,E). Each individual agent is a node in the finite, nonempty set of nodes V = {v1, . . . , vn}. The set of ordered edges is E ⊆ V × V. We denote an ordered edge as eij = (vi, vj) ∈ E, and because the graph is directed, in general the assumption eij = eji does not hold. An edge eij is outgoing with respect to vi and incoming with respect to vj. The presence of an edge eij connotes that individual j's opinion is influenced by the opinion of individual i (the precise nature of the influence will be made clear in the sequel). The incoming and outgoing neighbour set of vi are respectively defined as N + i = {vj ∈ V : eji ∈ E} and N − i = {vj ∈ V : eij ∈ E}. The relative interaction matrix C ∈ Rn×n associated with G has nonnegative entries cij, termed "relative interpersonal weights" in Jia et al. (2015). The entries of C have properties such that 0 < cij ≤ 1 ⇔ eji ∈ E and cij = 0 otherwise. It is assumed that cii = 0 (i.e. with no self-loops), and we cij = 1 (i.e. that C impose the restriction that (cid:80) is a row-stochastic matrix). j∈N + i A directed path is a sequence of edges of the form (vp1, vp2), (vp2, vp3 ), . . . where vpi ∈ V, eij ∈ E. Node i is reachable from node j if there exists a directed path from vj to vi. A graph is said to be strongly connected if every node is reachable from every other node. The relative interaction matrix C is irreducible if and only if the as- sociated graph G is strongly connected. If C is irreducible then it has a unique left eigenvector c(cid:62) associated with the eigenvalue 1, with the property c(cid:62)1n = 1 (Perron- Frobenius Theorem, see (Godsil et al., 2001)). Hence forth, we shall call this left eigenvector c(cid:62) the dominant left eigenvector of C. 2.2 Modelling the Dynamics of the Social Network The discrete-time DeGroot-Friedkin model is comprised of a consensus model and a mechanism for updating self- appraisal (the precise meaning of self-appraisal will be made clear in the sequel). We define S = {1, 2, 3, . . .} to be the set of indices of sequential issues which are being discussed by the social network. For a given issue s, the social network discusses the issue using the discrete-time n(cid:88) DeGroot consensus model. At the end of the discussion (i.e. when the DeGroot model has effectively reached steady state), each individual judges its impact on the discussion (self-appraisal). The individual then updates its own self-weight and discussion begins on the next issue s + 1. For each issue s ∈ S, DeGroot Consensus of Opinions each agent updates its opinion yi(s,·) ∈ R at the t + 1th time instant as yi(s, t + 1) = wii(s)yi(s, t) + wij(s)yj(s, t) (1) j∈N + i ,j(cid:54)=i where wii(s) is the self-weight individual i places on its own opinion and wij are the weights given by agent i to the opinions of its neighbour individual j. The opinion dynamics for the entire social network may be expressed as y(s, t + 1) = W (s)y(s, t) (2) where y(s, t) = [y1(s, t) ··· yn(s, t)](cid:62) is the vector of opinions of the n + 1 agents in the network at time instant t. This model was first proposed in (DeGroot, 1974) with S = 1 (i.e. only one issue was discussed). Below, we provide the model for the updating of W (s) (and specifically wii(s) via a reflected self-appraisal mechanism). for Determining Self- Friedkin's Self-Appraisal Model Weight The Friedkin component of the model proposes a method for updating the self-weight (self-appraisal, self- confidence or self-esteem) of agent i, which is denoted by xi(s) = wii(s) ∈ [0, 1] (the ith diagonal term of W (s)) (Jia et al., 2015). Define the vector x(s) = [x1(s) ··· xn(s)](cid:62) as the vector of self-weights for the social network, with starting self-weight x(1) ∈ ∆n. The influence matrix W (s) can be expressed as W (s) = X(s) + (I n − X(s))C (3) where C is the relative interaction matrix associated with the graph G and X(s) . = diag[x(s)]. From the fact that C is row-stochastic with zero diagonal entries, (3) implies that W (s) is a row-stochastic matrix. The self-weight vector x(s) is updated at the end of issue s as x(s + 1) = w(s) (4) where w(s) is the dominant left eigenvector of W (s) with n w(s) = 1 and w(s) (cid:23) 0 (Jia the properties such that 1(cid:62) et al., 2015). This implies that x(s) ∈ ∆n for all s. In (Jia et al., 2015), the DeGroot-Friedkin model was studied under the assumption that C was constant for all t and all s. In this paper, we investigate the model when C(s) varies between issues. We assume that each agent's opinion, yi(s, t), is a scalar for simplicity. The results can readily be applied to the scenario where each agent's opinion state is a vector yi ∈ Rp, p ≥ 2, by using Kronecker products. It is shown in [Lemma 2.2, (Jia et al., 2015)] that the system (4), with C independent of s, is equivalent to x(s + 1) = F (x(s)) (5) where the nonlinear vector-valued function F (x(s)) is defined as  ei F (x(s)) =  with α(x(s)) = 1/(cid:80)n α(x(s)) if xi(s) = ei, for any i  otherwise 1 − x1(s) c1 ... cn 1 − xn(s) ci i=1 (6) 1−xi(s) and where ci is the ith entry of the dominant left eigenvector c(cid:62) of the relative interaction matrix C. Theorem 1. (Theorem 4.1, (Jia et al., 2015)). For n ≥ 3, consider the DeGroot-Friedkin dynamical system (5) with a relative interaction matrix C that is row-stochastic, irreducible, and has zero diagonal entries. Assume that the digraph G associated with C does not have star topology 1 and define c(cid:62) as the dominant left eigenvector of C. Then, (i) For all initial conditions x(1) ∈ (cid:101)∆n, the self-weights x(s) converge to x∗ as s → ∞. Here, x∗ ∈ (cid:101)∆n is the unique fixed point satisfying x∗ = F (x∗). (ii) There holds x∗ i < x∗ j if and only if ci < cj, for any i, j, where ci is the ith entry of the dominant left eigenvector c. There holds x∗ j if and only if ci = cj. (iii) The unique fixed point x∗ is determined only by c(cid:62), i = x∗ and is independent of the initial conditions. 2.3 Problem Formulation This paper studies the DeGroot-Friedkin model under the assumption that C varies between issues. For a given s, however, C is assumed to remain constant for all t. Thus, the relative interactions among the individuals, i.e. C(s), may change between issues, but remains constant for all t for a given issue. We will consider alternative situations corresponding to alternative assumptions. We leave the details of these assumptions to their corresponding future sections. To facilitate our analysis, we make the following two assumptions which will hold in all problems considered in this paper. Assumption 1. The graph G does not have star topology, the relative interaction matrix C(s) is irreducible and n ≥ 3. Assumption 2. The initial conditions of the DeGroot- Friedkin model dynamics (5) satisfy x(1) ∈ (cid:101)∆n. Note that Assumption 1 requires n ≥ 3, because for n = 2, any irreducible C(s) is doubly stochastic and corresponds to a star topology. Assumption 2 ensures that no individual begins with self-weight equal to 1 (autocratic configuration). 3. PERIODIC SWITCHING In this section, we investigate the situation where C(s) changes periodically. In order to simplify the problem, we make the following assumption. 1 A graph G is said to have star topology if there exists a node i such that every edge of G is either to or from node i. Assumption 3. The social network switches between two relative interaction matrices, C1 and C2, where both ma- trices are irreducible, row-stochastic, but not necessarily doubly stochastic. More specifically, the social network switches between C1 and C2 periodically, with period T = 2, as given by C(s) = if s is odd if s is even (7) (cid:26)C1 C2 Note that for a constant C, simulations show that conver- gence of x(s) to x∗ typically occurs after only a few issues (Jia et al., 2015). We are therefore interested in periodic switching with a short period, because a long period will allow x(s) to reach x∗ (hence the above assumption). 3.1 Transformation into a Time-Invariant System Under Assumption 3, the update of the self-weights occurs as x(s + 1) = F (x(s), s), where we now acknowledge the fact that F (x(s), s) is an explicit function of time. More specifically, and in accordance with (6), we have for the time-invariant nonlinear composition functions F 3 = F 2 ◦ F 1 and F 4 = F 1 ◦ F 2. We can thus express the periodic system (8) as the nonlinear time-invariant system (cid:62) y∗ 3 , F (cid:62) y(2s + 2) = ¯F (y(2s)) (16) where ¯F = [F (cid:62) 4 ](cid:62), and seek to study the equilibrium of this system. More specifically, suppose that y∗ = (cid:62)](cid:62) is an equilibrium of the system (16). In [y∗ Appendix A, we show F 3 and F 4 are continuous. It is then straightforward to see that if limk→∞ y(k) → y∗, then x(s) is an asymptotic periodic sequence with periodic sequence 2 1 (cid:26)F 3(y∗ 1) F 4(y∗ 2) x(s) = if s is odd if s is even (17) Define yi (respectively ¯Fi) as the ith element of the vector y (respectively ¯F ). From the above, manipulation allows us to obtain, for i = 1, . . . , n, ¯Fi(y1(2s)) = α2(F 1(y1(2s))) where α1(y1(2s)) = 1/(cid:80)n (cid:80)n α2(F 1(y1(2s))) = j=1 p=1 ci,2 1 − α1(y1(2s)) ci,1 1−yi(2s) cj,1 1−yj (2s) and 1 cp,2 1−α1(y1(2s)) cp,1 1−yp (2s) (18) (19) 3.2 Existence of a Periodic Sequence In this subsection, we establish properties of the function ¯F . More specifically, we detail properties of F 3(y1(2s)). Because F 3(y1(2s)) is similar in form to F 4(y2(2s)), we omit the proof verifying that the same properties hold for F 4(y2(2s)). Lemma 2. The following properties of F 3(y1(2s)) hold. P1 The quantity α2(F 1(y1(2s))) > 0 if y1(2s) ∈ (cid:101)∆n, for any s. P2 If y1(2s) = ei for any i, then F 3(y1(2s)) = ei. In other words, the n vertices of ∆n are fixed points of F 3. P3 The function F 3(y1(2s)) : ∆n → ∆n is continuous. P4 There exists at least one fixed point in int(∆n). (11) Proof. See Appendix A. 1 and y∗ Lemma 2 states that F 3 and F 4 each have at least one fixed point, which we denote by y∗ 2 respectively. We will leave the study of whether the fixed points are unique, and analysis of convergence to the fixed points to the journal version of this paper. We now state the following theorem which establishes the periodic behaviour of the system (8). Theorem 3. Suppose that Assumption 3 holds. T1 Suppose further that for some s1 ∈ S, there holds 1 ∈ int(∆n) is any fixed x(2s1 − 1) = y∗ point of F 3. Then, for all s ≥ s1, there holds 1, where y∗ x(s) = if s is odd if s is even (20) where y∗ 2 ∈ int(∆n) is a fixed point of F 4. (cid:26)y∗ 1 y∗ 2 (14) (15) if s is odd if s is even (8) if xi(s) = ei, for any i  otherwise 1 − x1(s) ei c1,p αp(x(s)) F 2(x(s)) x(s + 1) = F p(x(s)) =  The function F p, for p = 1, 2, is (cid:26)F 1(x(s))  with αp(x(s)) = 1/(cid:80)n (cid:20)y1(2s) (cid:21) (cid:20)y1(2s + 2) ... cn,p i=1 = y(2s + 2) = y2(2s + 2) 1 − xn(s) ci,p (9) 1−xi(s) . Here ci,p is the ith (cid:62) associated element of the dominant left eigenvector cp with the relative interaction matrix Cp. We now define a new state y ∈ R2n as y(2s) = (10) and study the evolution of y(2s) for every s ∈ S. Observe that y2(2s) (cid:21) = x(2s) x(2s + 2) (cid:21) (cid:20)x(2s − 1) (cid:20)x(2s + 1) (cid:21) (cid:21) (cid:17) (cid:17)  (cid:17) (cid:17) (cid:20) F 2(x(2s)) (cid:16) F 2 (cid:16) F 2 (cid:16) (cid:20)F 3(y1(2s)) F 2(y2(2s)) F 1(y1(2s)) (cid:21) F 1 F 4(y2(2s)) = = By observing that x(2s + 1) = F 2(x(2s)) and x(2s + 2) = F 1(x(2s + 1)) for any s, we obtain y(2s + 2) = F 1(x(2s + 1)) (12) Similarly, by noticing that x(2s) = F 1(x(2s − 1)) and x(2s + 1) = F 2(x(2s)) for any s, we obtain F 1(x(2s − 1)) F 2(x(2s)) y(2s + 2) = (cid:16) (13) F 1 T2 Suppose now that, instead of T1, there holds for some s1 ∈ S, x(2s1) = y∗ 2 ∈ int(∆n) is any fixed point of F 3. Then, (20) holds for all s1 ≥ s, with 1 ∈ int(∆n) being a fixed point of F 3. y∗ 2, where y∗ Proof. See Appendix B and that any y1(0) ∈ (cid:101)∆n will converge to the unique y∗ Note that the above result establishes that a periodic sequence exists, but convergence to this sequence is not established. We conjecture that F 3 does in fact have a unique fixed point (i.e. a unique periodic sequence for x(s)) 1. We conjecture a similar result for F 4. In Section 5, we provide simulations in support of these conjectures. Remark 4. Theorem 3 leads to an interesting conclusion. Consider that case where, at some point in the evolution of the system trajectory, we have x(s) = y∗ 1 or y∗ 2 (e.g. the self-weights are initialised as x(1) = y∗ 1). Then, the self-weights will exhibit a periodic sequence. Furthermore, for each individual in the network, that individual's self- weight/social power is never zero. Remark 5. Notice that in the Theorem 3, we did not require the fixed points of F 3 and F 4 to be unique. Suppose that there are two distinct fixed points of F 3, which we label y∗ 1,b. The theorem then concludes that if x(2s) = y∗ 1,a for some s, then the system (8) will exhibit a periodic sequence. If on the other hand x(2s) = y∗ 1,b for some s, the system (8) will also exhibit a periodic sequence, but different from the sequence involving y∗ 1,a. 1,a and y∗ 3.3 Generalisation to M Topologies We now generalise to the case where the social network switches between M different topologies. The following assumption is now placed on the social network instead of Assumption 3. Assumption 4. For q ∈ Z≥0, the social network switches between the M ≥ 3 relative interaction matrices in the following manner C(M (s − 1) + p) = Cp (21) for all s ∈ S and any p ∈ {1, 2, . . . , M}. The matrices Cp are all irreducible, row-stochastic and in general Ci (cid:54)= Cj,∀ i, j ∈ {1, 2, . . . , M}. With the above Assumption 4, the update of the self- weights is given by x(M (s − 1) + p + 1) = F p(x(M (s − 1) + p)) (22) for all s ∈ S and any p ∈ {1, 2, . . . , M}. The function F p is given in (9), but now for p = 1, 2, . . . , M . Following the steps in subsection 3.1, we now show the generalised transformation of the time-varying system with M differ- ent topologies to a time-invariant nonlinear system. A new state variable y ∈ RM n is defined as  y1(M s) y2(M s) ...  = yM (M s)  x(M (s − 1) + 1) x(M (s − 1) + 2) x(M (s − 1) + M ) ...  y(M s) = (23) and we study the evolution of y(M s) for every strictly positive integer s. It follows that y(M (s + 1)) = y(M (s + 1)) = (24) Following the logic in subsection 3.1, but with the precise steps omitted due to space limitations, we obtain that ... ... x(M s + M )   x(M s + 2) y2(M (s + 1)) yM (M (s + 1))  =  x(M s + 1)  y1(M (s + 1))  F M (F M−1(. . . (F 1(y1(M s)))))  G1(y1(M s)) F 1(F M (. . . (F 2(y2(M s))))) G2(y2(M s))  F M−1(F M−2(. . . (F M (yM (M s))))) ... = ... (25) GM (yM (M s)) One can observe that each GM is a time-invariant non- linear function. Due to the complexity of each Gi, we do not reproduce their expressions here, but their forms are similar to the expressions in (18) - (19). The transformed nonlinear system is expressed as y(M (s + 1)) = ¯G(y(M s)) (26) The generalisations of Lemma 2 and Theorem 3 are now given below. Lemma 6. The following properties of ¯G(y(M s)) hold, for any p ∈ {1, 2, . . . , M}. (cid:101)∆n, for any s. P1 The quantity αj > 0,∀ j ∈ {1, 2, . . . , M} if yp(M s) ∈ P2 If yp(M s) = ei for any i, then Gp(yp(M s)) = ei. In other words, the n vertices of ∆n are fixed points of Gp. P3 The function Gp(yp(M s)) : ∆n → ∆n is continuous. P4 There exists at least one fixed point for Gp in int(∆n). Theorem 7. Suppose that Assumption 4 holds. Suppose further that for some s1, there holds x(M (s1−1)+p) = y∗ p, p ∈ int(∆n) is a fixed point of Gp. Then, for all where y∗ s ≥ s1 there holds j , for any j ∈ {1, 2, . . . , M} (27) xj(M (s − 1) + j) = y∗ where y∗ j = y∗ for j = p. j ∈ int(∆n) is a fixed point of Gj, and y∗ p The proofs for the above two results are omitted due to the similarity of the proof methods between Lemma 2 (respectively, Theorem 3) and Lemma 6 (respectively, Theorem 7). 4. ARBITRARY SWITCHING This section considers the scenario where the social net- work topology changes arbitrarily. In other words, the function F (x(s), s) in (6) may depend explicitly on the issue s. Specifically, it is the quantities ci(s) that may vary depending on the issue discussed. In order to facilitate the analysis, the following assumption is invoked. Assumption 5. For all s ∈ {1, 2, . . .}, C(s) is doubly stochastic and irreducible. Theorem 8. Suppose that Assumption 5 holds. Then, the vector of self-weights x(s) asymptotically converges to the unique equilibrium x∗ in (cid:101)∆n as s → ∞, where x∗ for each i ∈ {1, 2, . . . , n}. i = 1/n Proof. Because C(s) is irreducible, the dominant nor- malised left eigenvector c(s)(cid:62) is unique. Moreover, because C(s) is doubly stochastic, we obtain that ci(s) = 1/n for all i ∈ {1, 2, . . . , n}, which implies that ci(s) does not depend on s, and neither does the function F (x(s), s) in (6). Thus, the convergence analysis in (Jia et al., 2015), on the system x(s + 1) = F (x(s)) can be directly applied here, leading to the conclusion that lims→∞ x(s) = 1n/n. 5. SIMULATIONS In this section, simulations are provided which verify the claims of Lemma 2, Lemma 6, Theorem 3 and Theorem 7. The simulated social network has 8 individuals, with three possible sets of interactions described by three different irreducible relative interaction matrices, which we denote as C1, C2 and C3. These are omitted due to space limitations. Figure 1 shows the evolution of the individual social power (self-weight xi(s)) over a sequence of issues for the periodically switching relative interaction matrices C1 and C2. The initial condition x(s = 1) was generated randomly. For the same two relative interaction matrices, Fig. 2 shows the evolution for a second randomly generated initial condition x(s = 1) different from the first figure. Figure 3 shows the evolution of x(s) for a social network that periodically switches between C1, C2 and C3. Figures 1 and 2 illustrate that Theorem 3 holds. In other words, x(s) has a periodic solution. Notice from Figures 1 and 2 that even for different initial conditions, x(s) asymptotically reaches the same periodic solution. This supports our conjecture that ¯F has a unique fixed point and that the fixed point is attractive for all x(s) ∈ int(∆n). Our goal is to verify this in the extended version of this paper. Figure 3 illustrates the results developed in subsection 3.3 on generalising to multiple periodically switching relative interaction matrices. Lastly, Figure 4 simulates the DeGroot-Friedkin model for 8 individuals, with C(s) arbitrarily changing between is- sues. Assumption 5 holds for C(s) ∈ {C4, C5}. Theorem 8 is illustrated since lims→∞ x(s) → 1n/n. 6. CONCLUSION In this paper, the DeGroot-Friedkin model was used to analyse a social network under a number of assumptions on the dynamically changing network topology, with the network topology being described by relative interaction matrices which vary between issues being discussed by the social network. In particular, results were developed on the evolution of an individual's social power (or self-weight). If the relative interaction matrices changed periodically, then an individual's self-weight admitted at least one peri- odic solution where the individual's self-weight was always strictly positive, and less than 1. For arbitrarily varying relative interaction matrices which were irreducible and doubly stochastic, individual social power converged to a democratic configuration. In the periodic case, future work will focus on studying the uniqueness of the periodic solu- tion and obtaining a convergence property. For arbitrarily varying topologies, future work will focus on relaxing the assumptions on the relative interaction matrices. REFERENCES Altafini, C. (2013). Consensus problems on networks with antagonistic interactions. IEEE Transactions on Automatic Control, 58(4), 935–946. Altafini, C. and Lini, G. (2015). Predictable dynamics of opinion forming for networks with antagonistic interac- tions. IEEE Transactions on Automatic Control, 60(2), 342–357. Cao, Y., Yu, W., Ren, W., and Chen, G. (2013). An Overview of Recent Progress in the Study of Dis- IEEE Transac- tributed Multi-Agent Coordination. tions on Industrial Informatics, 9(1), 427–438. doi: 10.1109/TII.2012.2219061. Chen, X., Liu, J., Xu, Z., and Ba¸sar, T. (2015). Distributed Evaluation and Convergence of Self-Appraisals in Social Networks. In 54th IEEE Conference on Decision and Control (CDC), Osaka, Japan, 2895–2900. DeGroot, M.H. (1974). Reaching a consensus. Journal of the American Statistical Association, 69(345), 118–121. Etesami, S.R. and Ba¸sar, T. (2015). Game-theoretic analysis of the Hegselmann-Krause model for opinion dynamics in finite dimensions. IEEE Trans. Autom. Control, 60(7), 1886–1897. Friedkin, N.E. and Johnsen, E.C. (1990). Social influence and opinions. The Journal of Mathematical Sociology, 15(3-4), 193–205. Godsil, C.D., Royle, G., and Godsil, C. (2001). Algebraic graph theory, volume 207. Springer New York. Hegselmann, R. and Krause, U. (2002). Opinion dy- namics and bounded confidence models, analysis, and simulation. Journal of Artificial Societies and Social Simulation, 5(3). Jadbabaie, A., Lin, J., and Morse, A.S. (2003). Co- ordination of Groups of Mobile Autonomous Agents IEEE Transac- Using Nearest Neighbor Rules. tions on Automatic Control, 48(6), 988–1001. doi: 10.1109/TAC.2003.812781. Jia, P., MirTabatabaei, A., Friedkin, N.E., and Bullo, F. (2015). Opinion Dynamics and the Evolution of Social Power in Influence Networks. SIAM Review, 57(3), 367– 397. Knorn, S., Chen, Z., and Middleton, R. (2015). Overview: Collective control of multi-agent systems. IEEE Trans- actions on Control of Network Systems, PP(99), 1–1. doi:10.1109/TCNS.2015.2468991. Shi, G. and Johansson, K.H. (2013). The Role of Persistent Graphs in the Agreement Seeking of Social Networks. IEEE Journal on Selected Areas in Communications, 31(9), 595–606. doi:10.1109/JSAC.2013.SUP.0513052. Xia, W., Liu, J., Johansson, K.H., and Ba¸sar, T. (2016). Convergence Rate of the Modified DeGroot-Friedkin Model with Doubly Stochastic Relative Interaction Ma- trices. In American Control Conference (ACC), Boston, USA, 1054–1059. doi:10.1109/ACC.2016.7525054. Xu, Z., Liu, J., and Ba¸sar, T. (2015). On a Modified DeGroot-Friedkin Model of Opinion Dynamics. In American Control Conference (ACC), Chicago, USA, 1047–1052. doi:10.1109/ACC.2015.7170871. Fig. 1. Evolution of an individual's self-weight for C1 and C2. Fig. 2. Evolution of an individual's self-weight for C1 and C2, different initial conditions. Fig. 3. Evolution of an individual's self-weight for C1, C2 and C3. Fig. 4. Evolution of an individual's self-weight when C(s) varies arbitrarily between C4 and C5. Appendix A. PROOF OF LEMMA 2 Property P1: Firstly, observe that α2(F 1(y1(2s))) = (cid:80)n p=1 1 cp,2 1− ¯Fi(y1(2s)) and, for i = 1, . . . , n, we have ¯Fi(y1(2s)) = α1(y1(2s)) ci,1 1 − yi(2s) (A.1) (A.2) i=1 From the fact that cp,1 > 0 and yp(2s) < 1 for any p = 1, . . . , n, we obtain α1(y1(2s)) > 0 (see the definition of α1 below (9)). It follows that ¯Fi(y1(2s)) > 0 for any ¯Fi = 1 i = 1, . . . , n. Furthermore, observe that (cid:80)n implying that F 1(y1(2s)) ∈ (cid:101)∆n. It is then trivial to obtain from (A.1) that α2(F 1(y1(2s))) > 0, for any s. Property P2: From (9), it follows that F 3(y1(2s)) = F 2(F 1(ei)) = F 2(ei) = ei. Property P3: Let p = 1, 2. The fact that F p : ∆n → ∆n is continuous on (cid:101)∆n is straightforward; [Lemma 2.2, (Jia et al., 2015)] shows that F p is Lipschitz continuous about ei with Lipschitz constant 2 2/ci,p. It is then straightforward to verify that the composition F 3 = F 2 ◦ F 1 : ∆n → ∆n is continuous. Property P4: Define the set A = {y1 ∈ ∆n : 1 − r ≥ yi ≥ 0,∀ i ∈ {1, . . . , n}} (A.3) where r is strictly positive. In [Theorem 4.1, (Jia et al., 2015)], it is shown that for a sufficiently small r, there holds F p(A) ⊂ A, for p = 1, 2. In fact, Fi(y1) < 1−r,∀ i ∈ √ {1, . . . , n}). It follows that F 1(A) ⊂ A ⇒ F 2(F 1(A)) ⊂ A, which implies that F 3(A) ⊂ A. Brouwer's fixed-point theorem then implies that there ex- ists at least one fixed point y∗ 1 = F 3(y∗ 1) because F 3 is a continuous function on the compact, con- vex set A. In the above proof for Property P1, we showed that if y1(2s) ∈ (cid:101)∆n, then α1(y1(2s)) and α2(F 1(y1(2s))) 1 ∈ A such that y∗ are both strictly positive. For any i = 1, . . . , n, consider now y∗ i = ¯Fi(y∗ ¯Fi(y∗ 1). We have 1) = α2(F 1(y∗ 1)) (A.4) ci,2 1 − α1(y∗ 1) ci,1 1−y∗ i < 1 from the fact that y1 ∈ (cid:101)∆n. In other words, y∗ which implies that ¯Fi(y∗ and y∗ i is strictly positive for all i = 1, . . . , n. We thus conclude 1 ∈ int(∆n) ⊂ A, i.e. no point on the boundary of that y∗ (cid:3) ∆n is a fixed point apart from ei. 1) > 0 because ci,p > 0 for p = 1, 2 i Appendix B. PROOF OF THEOREM 3 2 is a fixed point of F 4. 1)). Next, define z∗ 2)) which implies that z∗ 1 = F 2(F 1(y∗ 1 = F 2(z∗ 2). In other words, z∗ 2 = F 2(y∗ Observe that y∗ 1). 2). Next, observe that F 1(y∗ We thus have y∗ 1) = 2 = F 1(F 2(z∗ F 1(F 2(z∗ 2)) = F 4(z∗ For any s, suppose that y1(2s) = x(2s − 1) = y∗ 1. From the fact that x(2s) = F 1(x(2s − 1)), it follows that y2(2s) = x(2s) = z∗ 2. One can then obtain x(2s + 1) = y1(2s + 2) = F 3(y1(2s)) = y∗ 1. Likewise, we conclude that x(2s + 1) = y2(2s + 2) = F 4(y2(2s)) = z∗ 2. Because the above arguments hold for any s, statement T1 in the theorem readily follows. Statement T2 follows likewise. (cid:3) 246820121416182000.10.20.30.4Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 8246810121416182000.10.20.30.4Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 8246810121416182000.10.20.30.4Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 81234567891000.10.20.3Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 8
1910.08010
1
1910
2019-10-17T16:30:08
Uncritical polarized groups: The impact of spreading fake news as fact in social networks
[ "cs.SI", "physics.soc-ph" ]
The spread of ideas in online social networks is a crucial phenomenon to understand nowadays the proliferation of fake news and their impact in democracies. This makes necessary to use models that mimic the circulation of rumors. The law of large numbers as well as the probability distribution of contact groups allow us to construct a model with a minimum number of hypotheses. Moreover, we can analyze with this model the presence of very polarized groups of individuals (humans or bots) who spread a rumor as soon as they know about it. Given only the initial number of individuals who know any news, in a population connected by an instant messaging application, we first deduce from our model a simple function of time to study the rumor propagation. We then prove that the polarized groups can be detected and quantified from empirical data. Finally, we also predict the time required by any rumor to reach a fixed percentage of the population.
cs.SI
cs
Uncritical polarized groups: The impact of spreading fake news as fact in social networks Jes´us San Mart´ına, F´atima Drubib, Daniel Rodr´ıguez P´erezc aDept. Matem´aticas del ´Area Industrial, ETSIDI, Universidad Polit´ecnica de Madrid, bDept. Matem´aticas, Facultad de Ciencias, Universidad de Oviedo, Oviedo, Spain cDept. F´ısica Matem´atica y de Fluidos, Facultad de Ciencias, Universidad Nacional de Educaci´on a Distancia, Madrid, Spain Madrid, Spain Abstract The spread of ideas in online social networks is a crucial phenomenon to un- derstand nowadays the proliferation of fake news and their impact in democ- racies. This makes necessary to use models that mimic the circulation of rumors. The law of large numbers as well as the probability distribution of contact groups allow us to construct a model with a minimum number of hypotheses. Moreover, we can analyze with this model the presence of very polarized groups of individuals (humans or bots) who spread a rumor as soon as they know about it. Given only the initial number of individuals who know any news, in a population connected by an instant messaging application, we first deduce from our model a simple function of time to study the rumor propagation. We then prove that the polarized groups can be detected and quantified from empirical data. Finally, we also predict the time required by any rumor to reach a fixed percentage of the population. Keywords: online social network, fake news, rumor propagation, uncritical Email address: [email protected] (Jes´us San Mart´ın) Preprint submitted to Elsevier October 18, 2019 senders group 1. Introduction The extraordinary global increase in online social network usage, and the ease of sending messages ubiquitously and almost instantaneously, have pro- vided a fertile ground for the dissemination of fake news [1, 2]. In addition, the use of these platforms can inevitably have deep social and political con- sequences. For instance, a disinformation campaign became a topic of wide public concern during the Brexit referendum in the UK, as well as during the US presidential election, both in 2016 [3, 1, 4]. The seriousness of the situation due to the current and growing phe- nomenon of fake news lies not only in the speed and ease of reaching broad and very different strata of society but also in the negligible cost of this new form of worldwide interactive communication. This is a novel and simulta- neously complicated situation that makes it necessary to study rumor propa- gation models in order to design appropriate countermeasures and avoid, for example, their potential impact on destabilization of liberal democracies [2]. Nevertheless, online social networks cannot be considered solely as mere media responsible for the propagation of fake news, since first they work in an inverse manner spreading real news. For this reason, understanding how ideas spread in social networks, as an element of both economic and political marketing, becomes a fundamental task. Companies, as well as political parties, that are interested in promoting their products or disseminating their ideas to the population, can benefit from the use of new and cheaper communication channels based on mobile applications such as WhatsApp 2 (with millions of users worldwide), which are much more profitable than traditional marketing strategies, publicity campaigns, etc. In order to avoid the destabilizing effects due to the spread of fake news, it is necessary to provide a suitable propagation model of rumors. In this sense, it is essential to first identify the fundamental variables that characterize this phenomenon. Given that there are great similarities between the spread of news and rumors and the spread of infectious diseases, a classic approach to study how information is disseminated is to define epidemiological models of populations [5, 6]. Additionally, other studies focused on identifying the most efficient spreaders in a network [7]. In [8], two models were presented with the assumption that either spreaders are not always active or an ignorant is not interested in spreading the rumor. The effect of homogeneity and polarization, i.e. echo chambers, in the spreading of misinformation online was studied in [9]. Finally, why rumors spread so quickly in social networks was analyzed in [10]. It should be noted that an element common to all these different approaches is that it is necessary to assume certain more or less believable hypotheses. In this study, we present a news dissemination model base on a proba- bilistic approach that allow us to use the law of large numbers to determine the probability function of sending messages. To the best of our knowledge, there is no similar result for rumor spread models and we can only refer to the discussion in [11]. One of our main contributions is that additional un- realistic hypotheses are not necessary. Therefore, we provide a more general rumor propagation model, which is also robust, without any limitation due to simplifications in the hypotheses. 3 In addition to reducing the number of necessary hypotheses, another ma- jor issue when modelling is to obtain a faithful description of the reality that, in the particular case of social networks, is manifested by its heterogeneity. In our model, this heterogeneity is reflected in the fact that people are related through groups, with different sizes and not with the same sensitivity to the propagation of a message. In particular, the strongly polarized like-minded population groups are one of the key elements to amplify the spread of ru- mors. People belonging to this type of group will forwa all kind of news (false or not) with the sole criterion that they are related to their own ideological line. It is interesting to note that news dissemination models hardly take into account the different reactions that people show when faced with true and false news. In this sense, there are two underlying problems for any model: the first refers to the different reaction of people to the veracity/falsity of the news and the second is related to how the certainty of the news is validated. In order to give an answer to these problems with our model, we simply focus on the propagation of the message. Thus, the authenticity or falsity of the message will be determined solely by the probability of propagation. Note that, except in very specific cases such us "the president has been killed", the information is judged according to the sender and is considered true based only on the idiosyncrasy of the person who receives it (similarly to those people who belong to the same ideological line will do it). On the contrary, that information will be considered false by those who have a different ideology, opposed to the sender's. The continuous variations of the ideological spectrum in the population imply the need to constantly evaluate 4 the truth/falsity of a message. This phenomenon can be perfectly described by means of the different probabilities of propagation of the message: the more inclined the population is towards the conservatives, the greater the probability of spreading news that damages the image of the liberals and vice versa. In fact, the probability of news propagation is a fundamental parameter when modeling the dissemination of ideas, since, if most of the individuals in a network propagate a message with low probability but a group, which we call the group of uncritical senders (USG), does so uncritically with probability 100%, the USG will be identified as a very polarized group. The USG label is surely well defined in the sense that humans, not robots, accelerate the spread of false news more than the truth [12]. The fact that people react differently when they receive the news, mainly depending on whether or not they have an ideological affinity, makes the probability of news propagation a key parameter to present and analyze our results. We must be aware that social networks are dynamic, that is, they are con- stantly changing. Because of this, the proposed models can only be useful if they can show how the spread of news changes when the relevant parameters of those models vary continuously. That information must be provided, as we will, with an analytic formulation. Therefore, we present a predictable model that can be used to eliminate or mitigate the dangerous consequences of spreading fake news as, for instance, biasing the vote in government elec- tions, misallocating resources after natural disasters or terrorist actions, mis- guiding in the investment measures after the stock market crash, etc. All this with a great political, social and economic impact, due to the fact that 5 the number of people who are currently only informed of the news through their social networks is increasing. Finally, given that it is a well-known fact that news does not necessarily have to be disseminated from a single source, but that there may be dif- ferent sources from which the same news spreads in cascade to the entire social network, we work with our propagation model of rumors but using different initial conditions, that is, different seeds are considered in the pop- ulation. These seeds represent different groups of individuals that initiate the propagation of the same rumor in the network. Our results show how the distributions of the propagation probability of news in social networks change over time as a function of polarized groups of uncritical senders. Particularly, we found that the probability of spreading rumors varies from an exponential evolution to a logistic one. As a result, simply observing how fake news is spread in a social network, we can detect with our model the presence of a polarized group of uncritical individuals, which becomes a very useful tool to design countermeasures to deactivate such groups, if necessary. The rest of this paper is structured as follows. In section 2, we present a model of rumor propagation in a social network based on WhatsApp. This is a numerical model defined from empirical data. In particular, the standard distributions of the number of person-to-person contacts and of group sizes were estimated experimentally. In addition, the key parameters that allows us to analyze the phenomena of spreading rumors are identified and their values are also estimated. In section 3, analytic expressions that fit the numerical simulations are deduced. Based on these expressions, a theoretical 6 model is proposed that captures the observed behavior and sets the basis to interpret the dynamics that led to those results. In section 4, we discuss the potential applications of our model and its predictive capabilities. We conclude the paper in section 5. 2. Methodology Taking into account that WhatsApp is one of the most popular messaging application all over the world (e.g. it reaches a 70% of the total population in Spain 1), we simulate our rumor propagation model in a social network based on this application. In order to properly simulate message spreading over this network, we must distinguish two types of contacts, person-to- person and groups. We also need to know the standard distributions of the number of person-to-person contacts and of group sizes. Both were estimated experimentally as described below. 2.1. Statistical characterization of a WhatsApp network A sample of 150 college students (age range 18-20 years) was used to ob- tain the statistical distribution of person-to-person and groups in the What- sApp network. Individuals were asked about the number of contacts in their cell phone contact lists, the number of WhatsApp groups with three or more members and the sizes of those groups (number of members including them- selves). Moreover, they were asked about the number of frequent individual WhatsApp contacts, defined as those to whom they would text with a con- troversial message they learned from any source. 1https://www.messengerpeople.com/global-messenger-usage-statistics/#Spain 7 In any contact list, there are many contacts that do not belong to any group (meaning by group a set of persons linked by a common interest). Hence, we posed the following question: in case they learned about a partic- ularly "hot news", to whom of their contacts would they expressly text for commenting on it? Obviously, that "hot news" would not be sent to their attorney or plumber and, depending on the topic, neither to a relative. Thus, we define the groups of size two as those contacts in the contact list that, although they may be members of any WhatsApp group, would receive a message directly from the user about a news considered especially relevant. Only these size-two groups constitute the set of person-to-person links of each WhatsApp user. From our sample data, we find out that the number m of person-to-person contacts an individual has follows approximately a normal distribution N (m, µ, σ) = − (m−µ)2 2σ2 e 1 2πσ (1) where µ = 7.35 and σ = 4.38. The group size distribution, for sizes of 3 ≤ N ≤ 30 members (that included the majority of our samples), fits an exponential distribution E(N ) = 1 − exp(−λ(N − a)) (2) where coefficients are adjusted from the data as λ = 0.1113 ± 0.0019 and a = 1.41 ± 0.12 (r2 = 0.9959). See Figure 1. In summary, the groups between 3 and 30 individuals in size are charac- terized by an exponential distribution function, while the groups of size 2, i.e. person-to-person links, are characterized by a normal distribution function. 8 Figure 1: WhatsApp empirical group size distribution (left) and the goodness of fit of the cumulative distribution function (right) to an exponential (r2 = 0.9959). N represents the number of individuals in a group (3 ≤ N ≤ 30), E(N ) represents the empirical distribution function, i.e. the fraction of groups of size ≤ N , and Eest(N ) is the estimation of E(N ). 2.2. The model In this paper, we introduce a novel model where individuals are linked either by person-to-person relations or by belonging to the same WhatsApp group. These links fit the distributions obtained in section 2.1. It is worth noticing that, initially, a given fraction of population, named the seed, knows a rumor. This rumor may spread to other linked individuals at each itera- tion during the numerical simulations. The rumor propagation proceeds iteratively taking into account two main rules. First, the individual propaga- tion probability at each iteration is given by a uniform distribution. Second, there may also be a group of individuals, the so-called uncritical senders group, which always propagates the rumor at each iteration, i.e. with an individual propagation probability of 100%. As the numerical simulations were repeated independently a large number of times and then we averaged the result, the law of large numbers guaran- tees that the final law of distribution followed by the rumor propagation is 9 0 0.2 0.4 0.6 0.8 1 5 10 15 20 25 30 35 40E(N)N 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1Eest(N)E(N) determined as well as the time required for a rumor to reach a given fraction of the population. An important feature of the model is that it shows when a population is polarized regarding a given rumor. For the sake of enabling a better understanding of the model that is developed in detail below, we provide here some useful definitions: Burned: A person who knows the rumor is said to be a burned individual. Observe that if an individual is burned, he remains in that state until the end of the rumor propagation process. Sender: A person who knows the message (a burned individual) and texts it to any of his contacts is called a sender. Receiver: Any individual (burned or not) in the population that is reached by the message is said to be a receiver. Seed: All those individuals who know the rumor at the beginning of its propagation constitute the seed, i.e. the set of burned individuals at the initial time t = 0. Person-to-person relation: A direct link between two individuals of the pop- ulation is called a person-to-person relation. This relationship is singled out from the group relationship because it represents a one-way link. If an individual i is connected with another individual j, then j may receive text messages sent by i, but this does not imply that individual j could also send messages to i. Group: The set of three or more individuals in the population that are interconnected, meaning that what one of the individuals sends to the 10 group is received by all others in the group simultaneously. Individual propagation probability (PIP ): The probability of the rumor being sent by a burned individual, who knows the rumor, to one of its contacts (person-to-person probability) or groups in the WhatsApp network. Individual initial probability (PII): The probability that individuals are part of the seed. That is, the probability that an individual knows the message at the beginning of the process of spreading the rumor. Uncritical senders group (USG): The set of individuals who automatically send the message to all of their contacts when they receive it is named the uncritical senders group. Hence, PIP is always equal to 100% for individuals in the USG. USG membership probability (PU SG): The probability that individuals belong to the USG. It represents the fraction of the population that forms the USG. The size of the USG is fixed as an initial condition and once fixed, and randomly chosen the individuals that are a part of it, it does not change. 2.3. Model algorithms The model consists of two main steps. First, an algorithm that generates populations of connected individuals as described in section 2.1. Second, another algorithm simulating the spreading rumors among these populations. 11 2.3.1. Populations In order to simulate a network with the statistical properties described in section 2.1, we proceeded to implement an algorithm that reproduces that structure. That is, given a population of N p individuals, we establish connections between pairs of individuals following the normal distribution (1) and also generate groups of 3 to 30 interconnected individuals with group sizes given by (2). When come to consider group construction, we will separate groups formed by just 2 individuals from groups formed by 3 or more individuals; the rea- son is that in two-person groups, connections are not bidirectional (as we explained above), whereas for groups with 3 or more individuals it is. We will assume a normal distribution (1) for the number of 2-groups an individual belongs to, having the mean and standard deviation fitted from our sample. From that distribution, the number of individuals nm that are expected to have a number m of person-to-person connections was computed, for m = 0, 1, . . . , 30. That is, first the number of individuals in the population having zero person-to-person contacts, n0 = N (0, µ, σ) was computed and then, recursively, the number of individuals having m person- to-person contacts nm = N (m, µ, σ) − N (m − 1, µ, σ) for m = 1, . . . , 30. Then the nm individuals having m contacts were chosen randomly from the population, linking them to other individuals also randomly chosen. Notice that these relationships, by their very nature, are not bidirectional given that they are not proper WhatsApp groups, but the initial individual will send messages to the destination individual, but that does not have to work in the reciprocal. 12 To compute the number of groups of size 3 or more an individual belongs to, we will use the exponential distribution in (2) with the parameters fitted from our sample. Specifically, the number of groups of size i is calculated as E(i)− E(i− 1) for i = 3, 4, . . . , N . Once known the number of groups of each size (from 3 to 30 individuals), the individuals of the population belonging to each group are randomly chosen. Thirty populations with 10000 individuals each were simulated following the previous procedure, taking into account that only 70% of the individuals (the penetration of WhatsApp in Spanish population) should be connected either person-to-person or to groups of sizes 3 to 30. Each of these simulations provided a network of connections between individuals of the population. 2.3.2. Message spreading Once the population has been simulated (see above) the rumor spreads among its individuals according to the following rules: 1. The fraction of the population that knows the rumor, that is the initial seed, is chosen initially from the connected population given by PIP . 2. One individual belonging to the see is randomly chosen 3. The groups to which that individual belongs are identified 4. That individual will pass the rumor to each of these groups with a probability PIP ; for this, a uniformly distributed random value in [0, 1) is generated for each group, and the rumor is spread to the group if that value is less than PIP Steps 2 and 3 are repeated until all seed individuals are exhausted. 13 5. All the individuals that know the rumor become part of the seed, and the propagation process is repeated 100 times; this number of iterations is chosen because in most simulations the rumor reaches the entire population before that time. Once the initial seed and the USG have been chosen, according to the individual initial probability (PII), the uncritical senders group membership probability (PU SG), and the individual propagation probability (PIP ) that characterize the initiation and propagation of the messages on the social network, the algorithm proceeds according to the following rules: i) The rumor is propagated among the individuals in the population for 100 iterations (the simulation unit of time). ii) At each iteration, every burned individual in the population, that is, every individual who knows the rumor, will communicate it to each of its contacts with probability PIP . iii) If an individual belongs to the USG and is burned, it will propagate the message to all of its contacts (that is, PIP equals 1 for individuals in the U SG). iv) After every iteration, burned individuals (and WhatsApp groups) are recorded and counted. Given that message transmission is a random process, message spreading algorithm is run 50 times on each population using, for that population al- ways the same initial seed. The result after finishing each run is the series of numbers of burned individuals at each iteration. The final result is summa- rized as the average number of these 50 series. Along the same lines, given 14 that each population is computed as a random sample from a probability distribution, in section 3 we will work with the results obtained by averaging over the 30 populations, in order to characterize the temporal evolution of the average number of burned individuals for each set of parameters PIP , PII and PU SG. 3. Numerical results To proceed with the simulations, the parameter space PII × PIP × PU SG is sampled at 500 points given by the following tuples (u, v, w) where u, v ∈ {k · 10−2 : k = 1, 2, . . . , 10} and w ∈ {k · 10−2 : k = 0, 3, 5, 7, 10}. Each of these 500 points characterizes individuals and groups in a simulated popula- tion. For each of the 500 points, 30 such populations with 10000 individuals each were randomly generated following the algorithm described in 2.3. No- tice that although these populations are different, they are statistically the same because they were generated using the same parameters at the same point of the parameter space. For each of these 30 populations, a news was spread over the network during 100 iterations, and this random process was repeatedly simulated 50 times, choosing a different initial condition for each of the 30 populations (the seed individuals who know the information at the beginning of the propagation). The propagation time series was computed as the average of the 50 simulations for a given population, resulting in 30 averaged spreading evolutions corresponding to the 30 statistically identical populations. Finally, the average over the 30 populations was computed as the propagation time series corresponding to one of the 500 points in the parameter space. 15 The goal of this numeric modeling is to fit an analytic expression that summarizes the spreading of the news corresponding to the model described above. 3.1. Case PU SG = 0 To see the effect polarized groups have on news spreading, it was first needed to know how news spread without those groups (PU SG = 0). In this section these results are shown and an analytic expression fitted to them. The analysis is based on data from simulations obtained as the aver- age number of burned individuals at the n-th iteration taking into account all populations (30) and all 50 simulations performed on each population. That is, the behavior of the function corresponding to the average number of burned individuals at each iteration is studied: f (n) = Total of burned individuals at n-th iteration no. of populations × no. of simulations × Np where Np is the number of individuals of the population connected by What- sApp, and n = 1, . . . , 100. The space of parameters is sliced in sections, that is, we study how rumor spread in populations for different values of PII ∈ [0, 0.1] and, for each of these values, the behavior for different values of PIP ∈ [0, 0.1] is also studied. The simulation results f (n) (see Figure 2) picture the average evolution of the fraction of burned individuals after successive iterations (indexed by n) that approach a continuous function F (t) dependent of time t. For values of PII around 10%, function F (t) is well approximated by an exponential of the form Fexp(t) = 1 − A exp(−t/a) 16 PII = 3% PIP = 2% Figure 2: Average number of burned individuals f (n) at each iteration n for different values of PIP (left, PII = 3%) and PII (right, PIP = 2%). Fixed parameter: PU SG = 0. The blue lines correspond to the fitting expression (3) in each case. whereas for smaller values of PII a better fit is obtained using a logistic function Flog(t) = 1 1 + B exp(−2t/a) Therefore, we construct a function that fits the data in the entire range by changing from one form to the other through a parameter : F (t) = C exp[(1 + )(t − b)/a] − 1 1− + C exp[(1 + )(t − b)/a] 2 (3) where a, b,  and C are the fitted coefficients whose values depend on simula- tion parameters PII and PIP (how, will be shown in what follows). Coefficient a represents a characteristic time scale. Coefficient b has the meaning of a time origin, thus can be taken as zero. To fulfill the initial condition F (t = 0) = PII (the initial fraction is just the seed), C had to be taken as a function of a, b,  and PII given by: C(a, b, ) = 1 + 2 1− PII (1 − PII) exp[(1 + )b/a] (4) 17 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100PIP = 1, 3, 5, 7, 9%f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100PII = 1, 3, 5, 7, 9%f(n)n From the fitting of the simulation data for different PII and PIP , an expression is given for  in the form:  = 1 + aaPII 1 + exp(bb/a) (5) where aa is less than zero, in order to produce an  between 0 and 1. Likewise, a is fitted to: 1/a = cc P ee IP (6) which leads to a characteristic time a tending to infinity, when the probability PIP tends to zero (that is, if the propagation probability is very small, the time a rumour will take to spread over the entire network will become very large). The values of aa, bb, cc and ee can be found in table 1 (for PU SG = 0). The power law (6) did not provide a good collapse of all the points towards the fitting curve (see Fig. 5a). Thus, in order to achieve that collapse (see Fig. 5b), a factor (1+ggPII) is considered to correct for the small dependency that a showed on PII, resulting in an expression of the form 1/a = cc P ee IP (1 + gg PII) (7) Inserting into (3) the expressions for C,  and a given by (4), (5) and (7) an expression for F (t) is obtained. It is remarkable that all the resulting expressions depend exclusively of PIP , PII and PU SG so that the number of burned individuals at a given iteration n, are given by (9) in terms of just these parameters. Hence, the number of burned individuals can be computed at any time, given a point (PU SG, PIP , PII) in the parameter space, or vice versa, that point in the parameter space can be computed once the time required to burn a given fraction of the connected population has been fixed. 18 Figure 3: Average number of burned individuals f (n) at each iteration n for different values of PU SG. Fixed parameters: PII = 2% and PIP = 1%. The results of fitting the simulation data to the analytic expression (3) are also shown (blue lines). 3.2. Case PU SG (cid:54)= 0: Effect of the uncritical senders group Assuming the presence of very polarized groups among the population, what we call the uncritical senders group, it is necessary to see how their existence modifies the spread of news just described. The introduction of the USG affects the evolution of the fraction of the population a rumor reaches at a given time, as the simulations show. Some results of these numerical simulations are shown in Figure 3, together with their respective fitting to expressions formally identical to (3), which shows its validity also for PU SG (cid:54)= 0. The relationship (5) between  and 1/a obtained above for PU SG = 0 is still valid for PU SG (cid:54)= 0, according to the numerical results (see Figure 4 and table 1). Also expression (7) for 1/a in terms of PIP and PII remains valid 19 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100PUSG = 1, 3, 5, 7, 10%f(n)n Figure 4: Fitted values of the coefficient ε with respect to 1/a for different values of parameter PII . Fixed parameter: PU SG = 3%. The graph of the fitted expression relating both coefficients with PIP is also shown (blue lines). (see Figure 5 and table 1). Nevertheless, the effect of considering a USG in the network makes that the coefficients aa, bb, cc, ee and gg in equations (5) and (7) become functions of PU SG. The functional expressions of aa, bb, cc, ee and gg were derived from the numerical results (for PU SG ∈ [0, 0.1]) as follows: aa = aa1 + aa2PU SG + aa3PU SG 2 bb = bb1 + bb2PU SG 4/(1 + bb3PU SG 3) cc = cc1 + cc2PU SG + cc3PU SG 2 ee = ee1 + ee2PU SG + ee3PU SG 2 (8) where the values of the new coefficients are given in Table 2. Substituting expressions (8) in equations (5) and (7), and these in equations (4) and (3), 20 0.7 0.75 0.8 0.85 0.9 0.95 1 0 0.05 0.1 0.15 0.2 0.25 0.3PII=1, 3, 5, 7, 9%ε1/a Figure 5: Left: Fitted values of the coefficient 1/a for different values of PIP and PU SG (and of PII ). The graph of the power law expression (6) is also shown (blue lines). Right: Values of h(PII ) = 1/a for different values of PIP and PU SG. Taking into account the 1+ggPII effect of PII on 1/a, the correction given by (7) is shown (green lines). Notice how the data now collapse to the modified power law. the general equation for the evolution of F (t) is obtained, exclusively in terms of the parameters PIP , PII and PU SG, as was our goal. 3.3. Dynamical spreading model In this section we present a theoretical model that captures the behav- iors described above. For that, we will interpret our discrete time model in terms of a continuous time model that may be derived from a differential equation. For that, it is enough to see that PIP is a probability per unit time of a message being propagated by one individual to another or to its group, being that unit time the time separating one iteration from the next one. Expression (3), describing the fraction of burned individuals as a function of (cid:20)1 −  (cid:21) 2 21 time turns out to be a solution of the following differential equation: dF/dt = 2 a + F (1 − F ) (9) 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10PUSG=0, 3, 5, 7, 10%1/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10PUSG=0, 3, 5, 7, 10%h(PIP)PPI If this equation is interpreted as a law of mass action, the coefficient A = 2 a would stand for the spreading velocity towards the unburned population (1 − F ) of news originating in the burned population F plus an "invisible" population given by the additional term G = 1− 2 . In order to find out the meaning of this "invisible" population (which is constant along the spreading process), let us consider the case of PII → 0, for which  → 1. Then, employing (5), equation (9) tends to dF/dt = 1/a aaPII 1 + exp(bb/a) + F (1 − F ) (cid:20) (cid:21) that is, the "invisible" population is proportional to the seed population that knows the rumor at t = 0. 4. Discussion For further clarification, we first summarize the procedure developed above to obtain the function F (t), which depends only on parameters PIP , PII and PU SG. Next, we discuss our model and its capability to make pre- dictions about the phenomenon of spreading rumors. We outline below the steps necessary to adjust the experimental data and find the function F (t). First step: A partition of the parameter space is defined. For each of the 500 points in the partition, numerical simulations are performed and the results obtained are analyzed as indicated below. Second step: Coefficients a and  are computed using (3). C is estimated using (4), so that the initial conditions are fulfilled. 22 Third step: We study the dependence of these coefficients on the parame- ters PIP and PII (for PU SG fixed), using (5) and (7). Fourth step: Using the data set that was fitted in the first steps, we deduce a general expression of the function F (t) and also analyze its depen- dence on PU SG (see (8)). In section 3.2, the distribution of burned individuals, F (t), was deduced as a function dependent only on the parameters inherent to the network, PIP , PII and PU SG. This function becomes a fundamental tool for predicting how long fake news will take to spread and cause problems or for estimating the time necessary for messages, as for instances a marketing campaign or specific information, to be disseminated among the target audience. 4.1. Time necessary for a rumor to reach a fraction of the population One of the main results of this study is that the function F (t) can be used to estimate the number of burned individuals at any time. An immediate consequence, no less important, is that the time necessary for a rumor to reach a given fraction of the population can also be calculated from this function. In summary, and more formally, the number of iterations tX (or nX, for discrete time in our model) that are necessary for a rumor to reach a fraction of the population X, assuming that the message begins to spread (cid:33) (cid:32) 1 + 2 1− X (1 − X)C at time t = 0, can be calculated using (3). tX = F −1(X) = b + a 1 +  log (10) Therefore, the equation X = F (tX) provides an implicit relation between the parameters inherent in the network, PII, PIP and PU SG, and the variables 23 that define the necessary time tX and the fraction of the population X. As a result, we can estimate the size of the seed (that is, the value of PII) such that a given fraction X of the population is reached at time tX fixed, in a network characterized by PIP and PU SG. In particular, the effect of the seed (PII) and the size of the uncritical senders group (PU SG) can be studied to obtain the result sought in a given population. 4.2. Time evolution from observed data The function that models the propagation of a rumor in a network de- pends, obviously, on the parameters associated with that particular rumor. Our model can be used to estimate these parameters from empirical obser- vations on how the rumor is spread. In fact, only four observations of the number of individuals burned at four different times, since the beginning of the propagation of a rumor, are sufficient to determine the coefficients that fit the function F (t). Then, we can use this adjusted expression to calculate the number of individuals burned at any time in the future. As it is shown in figure 6, the fitted function (blue line) accurately follows that obtained by numerically fitting the data (green dots). These approxima- tions work for different values of PII. It should be noted that the adjustment of the coefficients is done for a burned fraction of the population of less than 20%, so the function thus fitted can be used to predict when a catastrophe will occur (i.e., a large-scale spreading of an idea). Last but not least, the adjusted coefficients are obtained not only from small values of individuals burned in the population but, and this is the most important, from values that remain almost unchanged over time, see figure 6. 24 PU SG = 0% PU SG = 3% PU SG = 7% Figure 6: Approximations of (t, F (t)) based on the evolution of the early times. From left to right, the values of PU SG are 0%, 3% and 7%. Fixed parameter: PII = 5% and PIP = 1%. The dotted line (green) corresponds to numerical simulation data (n, f (n)). The four points used to approximate the coefficients of F (t) are highlighted in red. 4.3. Network structure inference Knowing the number of burned individuals as a function of spreading time allows us to infer the very structure of the network in which the news is being disseminated. Once the propagation of a rumor for a given topic is known, its current evolution f (n) is used to estimate the coefficients a,  and C in (3), and from them the parameters of the network, PII, PIP y PU SG, can be calculated. From equations (5) and (8), the value of the parameter PU SG is calculated. Next, when entering in the function F (t) the initial value of PII, the estimated value PU SG and the number of individuals burned X at time tX, we obtain the value of parameter PIP . Note that the calculation of PII and PU SG has to be performed for each type of news, because each topic will have its own values for the parameters PII and PU SG. Once these parameters are determined, the function F (t) can be used to predict the propagation of similar topic news, and use that pre- diction to design countermeasures, either to avoid further propagation, e.g., 25 0 0.2 0.4 0.6 0.8 1 0 20 40 60 80 100F(n)n 0 0.2 0.4 0.6 0.8 1 0 20 40 60 80 100F(n)n 0 0.2 0.4 0.6 0.8 1 0 20 40 60 80 100F(n)n from a political point of view, or to improve the dissemination of news, e.g., with commercial or public information, such as the annual flu vaccination campaign. 5. Conclusions As far as we know, we present here a new approach to study the crucial phenomena of rumor propagation through WhatsApp. It is noteworthy that the results obtained in this paper, as well as our algorithms and main tech- niques used, can be naturally extended to any other type of similar instant messaging application. One of our main contributions is to provide a manageable function of time that describes the time evolution of rumor spreading taking into account only person-to-person relationships and contact groups. To be more precise, fixed the initial and propagation probabilities for each individual (PII and PIP ), the function in (3) defines the fraction of the population who knows the rumor at different times in terms of the parameters that characterize the structure of the network and the dynamics of propagation. In fact, the values of these parameters were estimated from the data obtained by numerical simulations for different scenarios depending on the size of the uncritical senders group (PU SG). Conversely, we show that, given the temporal evolution of a rumor by a function as in (3), it can be predicted how the message propagates throughout the network and how much time it takes to burn a fraction of the population. As a set of few parameters (PII, PIP and PU SG) typifies the structure of the network, how a rumor spreads in any social network can be simulated simply 26 by replacing different values of these parameters in the analytical expressions we provide in this paper. Therefore, this information can be used to assess how long it will take a rumor to become dangerous and, consequently, to make decisions accordingly during that time in order to avoid the damages caused by the disinformation. Moreover, the number of individuals that should be burnt to ensure that the rumor reaches a fixed fraction of the population in a given time can be calculated. Finally, we also study the impact of the so-called uncritical senders group, i.e. a group of individuals who automatically forward a message as soon as they receive it. For all we know, this is a novel idea that allows us to simulate the behavior of groups of highly polarized humans that disseminate fake news with the vile purpose of influencing and causing major changes in society. From our model, we can detect and estimate the size of a group of uncritical senders in a social network by analyzing in particular how the presence of this group changes the temporal evolution in the propagation of a rumor. In summary, we present a model that shows how some few but key pa- rameters influence the spread of a rumor and determine the speed with which a rumor may reach a large part of the population. Furthermore, we study how this rumor propagation may be manipulated both through information (or disinformation campaigns) and a group of uncritical senders that actively disseminate some types of news to the entire population. References [1] Figueira A., Oliveira L. The current state of fake news: challenges and opportunities. Procedia Computer Science 121 (2017) 817-825. 27 doi:10.1016/j.procs.2017.11.106 [2] Metaxas P. & Mustafaraj E. (2010) From Obscurity to Prominence in Minutes: Political Speech and Real-Time Search. WebSci10: Extending the Frontiers of Society On-Line. [3] Allcott H., Gentzkow M. Social media and fake news in the 2016 Elec- tion. Journal of Economic Perspectives 31(2) (2017) 211-236. doi:10.1257/jep.31.2.211 [4] Silverman C., Singer-Vine J. Most Americans who see fake news believe it, new survey says. BuzzFeed News (2016). https://www.buzzfeednews.com/article/craigsilverman/fake-news- survey [5] Tambuscio M., Ruffo G., Flammini A., Menczer F. (2015). Fact-checking effect on viral hoaxes: A model of misinformation spread in social net- works. In Proceedings of the 24th International Conference on World Wide Web (ACM, 2015), pp. 977982. doi:10.1145/2740908.2742572 [6] Jin, Fang and Dougherty, Edward and Saraf, Parang and Cao, Yang and Ramakrishnan, Naren. Epidemiological Modeling of News and Rumors on Twitter. Proceedings of the 7th Workshop on Social Network Mining and Analysis. SNAKDD '13. pp. 8:1 -- 8:9. ACM, New York, 2013. doi:10.1145/2501025.2501027 [7] Kitsak M, Gallos L.K., Havlin S., Liljeros F., Muchnik L., Stanley H.E. and Makse H.A. (2010). Identification of influential spreaders in complex 28 networks. Nature Physics volume 6, pages 888-893 https://www.nature.com/articles/nphys1746 [8] Borge-Holthoefer, Meloni S., Gonalves B., Moreno Y (2012). Emergence of Influential Spreaders in Modified Rumor Models. Journal of Statistical Physics, 151, pages 383-393 https://link.springer.com/article/10.1007%2Fs10955-012-0595-6 [9] Del Vicario M., Bessi A., Zollo F., Petroni F., Scala A., Caldarelli G., Stanley H.E., and Quattrociocchi W. (2016). The spreading of misinfor- mation online. PNAS, 113, pages 554-559 https://www.pnas.org/content/pnas/113/3/554.full.pdf [10] Doerr B., Fouz M., Friedrich T. (2012). Why rumors spread so quickly in social networks. Communications of the ACM, 55, pages 70-75 https://dl.acm.org/citation.cfm?id=2184338 [11] Daley D.J., Kendall D.G. (1965). Stochastic Rumours. IMA Journal of Applied Mathematics, 1, pages 4255 https://doi.org/10.1093/imamat/1.1.42 [12] Vosoughi S., Roy D., Aral S. The spread of true and false news online. Science 359 (2018) 1146-1151. doi:10.1126/science.aap9559 29 aa Values PU SG 0% −0.0208 ± 0.0003 3% −0.0663 ± 0.0006 5% −0.1148 ± 0.0010 −0.180 ± 0.002 7% −0.328 ± 0.006 10% cc Values PU SG 0% 0.03204 ± 0.00011 3% 0.03579 ± 0.00015 0.0391 ± 0.0002 5% 0.0431 ± 0.0002 0.0521 ± 0.0004 10% 7% gg Values PU SG 0% 0.00354 ± 0.00019 0.0036 ± 0.0002 3% 0.0039 ± 0.0003 0.0045 ± 0.0003 0.0054 ± 0.0005 10% 5% 7% Error 1.49% 0.91% 0.90% 1.12% 1.93% bb Values 7.32 ± 0.16 7.69 ± 0.09 8.28 ± 0.09 8.77 ± 0.11 9.47 ± 0.19 ee Values Error 0.33% 0.9381 ± 0.0015 0.41% 0.9228 ± 0.0019 0.51% 0.907 ± 0.002 0.56% 0.888 ± 0.003 0.77% 0.843 ± 0.004 Error 2.18% 1.23% 1.12% 1.31% 2.02% Error 0.16% 0.21% 0.26% 0.30% 0.43% Error 5.42% 6.70% 7.65% 7.54% 8.61% Table 1: Coefficients and exponents obtained from fitting expressions (5) and (7) to data from simulations with different values of PU SG. 30 Parameter aa1 aa2 aa3 bb1 bb2 bb3 cc1 cc2 cc3 ee1 ee2 ee3 gg1 gg2 gg3 Value Error -2.2 ±0.4 -63 ±18 -2410 ±170 7.319 ±0.010 1.09×106 ±0.09×106 49000 ±4000 2.405 ±0.010 4.7 ±0.5 -35 ±4 0.9375 ±0.0017 -0.25 ±0.08 -7.0 ±0.7 0.3541 ±0.0010 10800 ±600 4700 ±300 Table 2: Coefficients of equations (8). 31
1109.2417
1
1109
2011-09-12T09:48:41
Internet and political communication - Macedonian case
[ "cs.SI" ]
Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their partys voters (people) and other interest groups and whether social networks can affect the political and economic changes in the state, and the political power of one party.
cs.SI
cs
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org Internet and political communication – Macedonian case 154 MSc. Sali Emruli1, Prof. dr. sc. Miroslav Bača 2 Faculty of Organization and Informatics, University of Zagreb, Varaždin, 42000, Croatia Faculty of Organization and Informatics, Department for biometrics, University of Zagreb, Varaždin, 42000, Croatia Abstract Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their party's voters (people) and other interest groups and whether social networks can affect the political and economic changes in the state, and the political power of one party. Keywords: Network Analysis, Political parties, Complexity, Scale Free Network, Social Network Analysis, Non-Profit Organization, Capacity, Public relations, marketing, Interne, Facebook, YouTube, Twitter, Blogs, MySpace, and Forum. 2. Introduction The analysis will be done in a way that will create a list of largest political parties in the Republic of Macedonia, their communications infrastructure through ICT (website), content and the manner in which they placed their information and receive feedback from voters. Internet, social networking, Web 2.0, Facebook, YouTube, blog ... All these are relatively new word in the political vocabulary, new concepts, new media and new opportunities for the transmission of ideas and messages are not enough channels used to communicate with the public. Although the practice of using the Internet in local political advertising goes back to the nineties, only in recent years the advent of new tools and social networks demonstrates true strength of this medium. Besides direct access to the public, political ideas, it provides full force confrontation, but also provides a relatively convenient ground for review of public attitudes, research and development of certain ideas. Using such a change in social communication, transmission of political messages through the transition from traditional forms of communication and finding new paths to the recipients. Professional and political public for years following the development of the Internet as a medium, but he showed the greatest strength in the last U.S. presidential election. Political power depends on the satisfaction of the people towards a particular party and party connections with other parties or organizations. Well-developed social network provides further prestige and power of the party and its direct channel of communication with voters and other influential interests groups. 3. Political Communication through Internet Internet and politics in the modern world have become inseparable and thus gradually eliminating barriers to free flow of information between the political decision-makers and those in whose name the benefits they bring (the public). Countries the follow transition must in contemporary trends of fitting of the Internet in the area of political communication, which simultaneously causes the change to the model that is still the dominant, of political communication based on secrecy and lack of transparency. In Macedonia, the network and politics are still not together, except in the case of international organizations. into political incorporated Internet fully is not communication (or, more precisely, it is not done properly). A key condition (requirement) for this is application of technology and simultaneous transformation of consciousness. This change requires the rejection of the principle of confidentiality as a condition of political activity of government and party, because it is absolutely contrary to the nature of the Internet. It is necessary also to strengthen the awareness of the importance of on-line crystallization of public opinion, and more intensive and better connection of on-line and off-line political stage. 155 IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 4. Impact of Social network analysis in politics Political communication is a new and exciting area of research and teaching that is located at the crossroads of the study of communication, political parties and electoral behavior. As well as profiling the changing nature of the media system such an approach invariably leads us onto what we term the ‘new political communication’ - that based around the new Information and Communication Technologies (ICTs). We examine the work that has been done on the uses of the new media by parties and politicians across a range of democratic contexts and offer some insights into the strong challenges they introduce for the established manufacturers of political communication. One of the key uses of the Internet is to build databases of voter data and access that through different applications for different purposes. Because data entry can be easily done automatically by scanners or by hand more campaigns and political operatives are recognizing the importance of capturing, storing, analyzing and using voter information. What used to take days of analyzing can now take minutes by using computers to analyze important information. That data can also be used offline or online for a number of different ways and the usage of these systems have become key components of the political system. Throughout history political campaigns have evolved around the advancing technologies that are available to candidates. As technology develops, candidates are able to permeate the lives of citizens on a daily basis. Television, radio, newspapers, magazines, billboards, yard signs, bumper stickers, and Internet websites all create a means of spreading political platforms. While the traditional forms of media are still an integral portion of campaign strategy, the availability of the Internet opens the door of campaign tools waiting for candidate’s attention. The Internet provides numerous opportunities for politicians to reach the polity. Among those is a new phenomenon called social networking websites. Social networking sites have gained popularity in the last few years. These sites are growing popular particularly on college campuses nationwide. Specifically social networking websites such as MySpace and Facebook have provided users with a new form of communication. When new forms of communication are made available, political candidates begin to use the new technology to their advantage. What social networking websites allow politicians to do is to create a sense of personalized communication with their constituents. This personalization of politics enables voters and politicians alike to feel as though a connection is made. The Internet can make direct communication possible among government officials, candidates, parties, and citizens. As history shows us, when new technologies are made available, they begin to reshape the personalization factor between the candidate and the voter. This increase in interpersonal interactivity has shown to offer opportunities and increase success for political campaigns. 5. Political Parties in Republic of Macedonia 5.1. Overview of the political system Macedonia is a Republic having multi-party parliamentary democracy and a political system with strict division into legislative, executive and judicial branches. From 1945 Macedonia had been a sovereign Republic within Federal Yugoslavia and on September 8, 1991, following the referendum of its citizens, Macedonia was proclaimed a sovereign and independent state. The Constitution of the Republic of Macedonia was adopted on November 17, 1991, by the first multiparty parliament. The basic intention was to constitute Macedonia as a sovereign and independent, civil and democratic state and also to create an institutional framework for the development of parliamentary democracy, guaranteeing human rights, civil liberties and national equality. The Assembly is the central and most important institution of state authority. According to the Constitution it is a representative body of the citizens and the legislative power of the Republic is vested in it. The Assembly is composed of 120 seats. The President of the Republic of Macedonia represents the Republic, and is Commander-in-Chief of the Armed Forces of Macedonia. He is elected in general and direct elections, for a term of five years, and two terms at most. Executive power of the Republic of Macedonia is bicephalous and is divided between the Government and the President of the Republic. The Government is elected by the Assembly of the Republic of Macedonia by a majority vote of the total number of Representatives, and is accountable for its work to the Assembly. The organization and work of the Government is defined by a law on the Government. In accordance with its constitutional competencies, executive power is vested in the Government of the Republic of Macedonia. It is the highest institution of the state administration and has, among others, the following responsibilities: it proposes laws, the budget of the Republic and other regulations passed by the Assembly, it determines the policies of execution of laws and other regulations of the Assembly and is responsible for their execution, decides on the recognition of states and governments, establishes diplomatic and consular relations IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 156 with other states, proposes the Public Prosecutor, proposes the appointment of ambassadors and representatives of the Republic of Macedonia abroad and appoints chiefs of consular offices, and also performs other duties stipulated by the Constitution and law. In Macedonia there are more political parties participating in the electoral process at national and local level. 5.2. Current Structure Parties of traditional left and right: Coalition VMRO – DPMNE (63 mandates, right oriented Macedonian party) Democratic Party of the Albanians (12 mandates, right oriented Albanian party) Coalition “SONCE” – SDSM (27 mandates left oriented Macedonian party) Democratic Union for Integration (18 mandates left oriented Albanian party) Fig. 1 Current political structure in Republic of Macedonia and Political Parties mandate percentage win in latest parliamentary elections. 6. Political party web sites and use of social media Party websites represent an application of a technology which has led those dealing in votes to invest considerable amounts of time and money. This part presents a survey of the websites of Macedonian political parties. It examines the individual parties on the web and the party system on the web as virtual counterparts of the ordinary parties and party system. Because of the importance of applying information and communication technologies (ICT) in the work of central and local government and in terms of facilitating the life and work of citizens, as well as the major role in the development of information society in EU integration process, an analysis has been conducted on websites and social media usage by political parties in Macedonia. The research includes analysis of websites, analysis of the use of social media and online activities compared in terms of seats obtained by political parties. In account were taken only websites of the major political parties that can certainly be determined to be guided by their info centers. In order to level the differences between the parties and a common base for comparison, two indexes were created: Internal platform which are the party's official website and External platforms which are websites that defined as social media platforms. While reviewing the websites I have searched for features that can be considered as social media features and that were incorporated in parties' websites. Contrary to traditional content analysis where texts are the subject of a thorough analysis, here a content analysis was made, but on a more general level of website sections and less on their content. Platforms that are not owned by the parties and considered as social media platforms. On these platforms the party has an official profile/user that is uploading the content and has the permissions to monitor moderate the other users' activity. The results had showed that the relatively popular parties, The VMRO-DMPNE, Social Democrats, DPA, DUI and ND had been using more social media features and platforms than the other parliament parties. Despite these findings there are no clear signs of an established use of social media as a political communication strategy. There is not enough correlation between number of parliament members and website’s users. Some of major parties are the worst in translating voters into website’s users. Fig. 2 Represents Traffic rate and mandates by relatively popular parties IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 6.1. Purpose of research Due to the increased use of Internet in Macedonia and the increased influence of the same as medium, research has been conducted to determine how political parties use the influence of Internet. The study aims to evaluate several levels of Internet usage and social networks in everyday political events:  To determine the level of quality and implementation of the standards of the political parties websites  To determine the level of use of social media for their promotion  To determine the level of online communication of political parties with public  To compare the number of online supporters with conquered mandate of the last elections. 157 6.1.3. Methodology To implement this part of the research content analysis methodology was used. Drawing up the list of web sites that will be use, their analysis is processed by strictly defined form, with concrete questions and directions. The form consists of three main issues, which contain additional questions about obtaining the necessary information and conclusions. The main issues are:  In which language versions websites are accessible  What type of content is offered by websites  What kind of social media are used by political party  One area of running a political campaign is Internet, and also the use of social media. The analysis will include internal platform which are the party's official website their social content and does this web pages have links to the external platforms which are websites that defined as social media platforms. Also, the technical characteristics of the sites. 6.1.1. Research questions and hypotheses The analysis of political parties’ websites is based on clearly defined issues that are divided into several categories, in order to evaluate every aspect of the content and making the website of the political party. Questionnaire for this section is designed to address the following main questions:  In what languages website is available  What type of content is offered on website (text, multimedia, transparency ...)  Applying the standard for usability of website  Usage of Social Media  6.1.2. Limits In conducting the research and when creating the list of political parties whose Web sites will be analyzed, there were taken in consideration only those whose identity could be confirmed. It means that it is evident that website is managed by the political party. 6.2. Language version The websites analysis will include Web sites of relatively popular political parties in Macedonia. From 19 political parties, only 13 (70%) have their own web sites for promotion and marketing of their political activity. From analyzed Web sites , only 4 offer bilingual accessibility (30%), and others offer information only in the language of own ethnicity (unilingual content). Table 1: Language Versions Fig. 3 Language versions As I mentioned above from analyzed websites, only 4 offer bilingual accessibility (30%), and nine other political parties (70%) offer only unilingual content. Table 2: Multilanguage Usage IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 158 future activities and events. Most political parties use their websites to archive articles from the media, rather than used to inform their supporters. Fig. 4 Multilanguage Usage 6.3. Offered content The second area for which websites analysis was performed is content offered by political party websites to their readers. The type of content is divided into text and multimedia. Table 3-1: Content offered by political parties websites Fig.5 Textual content of all political party web sites Fig. 6 Multimedia content of all political party web sites to external Frequently political parties put banners WebPages, and not applying the concept of linking in the text. Although most of the texts offered by political parties at their web sites are excerpts from articles in the media, although they cite the source from where the content is downloaded, they not publish the link to the original article, not even the online edition of the medium. Besides textual content almost all political parties are offering and multimedia content. Most of political parties have placed videos of nearly any report or television interview. Besides the video clips, several political parties offer galleries of their activities. Only audio clips are missing from multimedia content on political party websites. Only three political parties have offered this type of content, and they have offered several songs (hymns of the party) for download, but they were not taken into account. Fig.7 Textual content of each political party websites Table 3-2: Content offered by political parties’ websites The results of this part of the research shows that most of the websites of political parties are filled with textual content, but that the textual content is not linked to the outside source (Out Links) 31% of websites, while regarding the multimedia content nearly 46% of the websites of political parties have no photo gallery, 77% of websites of political parties have no audio clips and 38% of websites have no video clips. Also a lack in all the websites of political parties is informing the guests for IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 159 parties do not take care of attendance (visitors) of their websites. Fig.8 Multimedia content of each political party website. Besides the types of content (text and multimedia) in this part of the analysis were explored also the ways of communication which are offered by political parties through their websites. Surprising fact that political parties do not use their sites for the opportunity to communicate and besides the possibility of sending e-mails almost there is no other possible way to contact them, except a very small number of political parties which offers email and other contact information as phone number, address and the like. Very few political parties have set forum on their website, also very small number of political parties offers an opportunity for asking questions and publishing answers online. Fig.9 Opportunities for contact / interaction / transparency offered by each political party in Macedonia Fig.10 Opportunities for contact / interaction / transparency offered by all political party in Macedonia by category Table 4: Ways of communication offered by political parties Table shows that in terms of interaction, political parties are not handled and did not use the opportunities of new media field. Besides basic information such as postal address, phone and email address, no other method is used. Sites of some political parties have disabled the opportunity to contact them via e-mail or form, but they offer only traditional ways of communication the (telephone and letter). For transparency of the website is necessary to enable seeing the number of visitors on the site, which was also left out of more websites of the political parties. A very small part of the political parties had included counters on their websites, whether public or just used by the administrators of the website. This means that political Table 5: Visitors Counter on political web pages From the table we can conclude that almost 92% of political parties have no counters on their websites, as a consequence of lack of counters we cannot say with certainty about the attendance (visitors) of website of certain political parties. Almost all political parties have used CMS (Content Management System) for making their websites, so they meet the basic rules for usability of the website. However astonishing fact that despite meeting the technical specifications for usability, they have errors that are not inherent for the platforms that are used, for example the search box which does not work properly and the like. In terms of recommendations for visibility of search engines, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 160 many political parties does not satisfy the conditions, which means that their site search will not be among the first results and will not be easily accessible to readers. 6.4. Technical Specifications of political parties’ websites This part of research covers the technical characteristics of the websites of political parties, respectively hosting and platform on which websites are set up and registration of the domain are shown in the table below. Table 6: Technical Specifications of political parties web sites If we do comparison of software solutions which is more used we can conclude that 69% of political parties websites use the PHP programming language, 23% use ASP programming language and only 8% use ASPX programming language. Platforms that are used by political parties websites are 23% Windows Server 2003, 23% of them use Windows 2000 platform and 54% were Unknown platforms. Table 7: Software solutions and platforms used by political parties websites Fig.11 Software solution used by political parties’ websites in Macedonia Fig.12 Platforms used by political parties’ websites in Macedonia Table 8: Servers used by political parties’ websites in Macedonia Fig.13 Servers used by political parties’ websites in Macedonia Most of political parties websites are hosted in Macedonia 46% of the total number of political Web sites, 38% of them are hosted in the US, 8% are hosted in France and 8% are hosted in the Netherland. Fig.14 Hosted in Countries Most of the websites of political parties are registered in the Republic of Macedonia 63%, while 31% are registered in the United States and 7% are registered in France. Table 9: Registered in countries IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 161 Fig.15 Registered in countries According the table in which the technical characteristics of the websites of political parties are presented, we can see that political parties have used free solutions. While the information for domains show that websites of political parties often are registered and hosted in Macedonia, but there are a few exceptions, some political parties have their sites hosted in the U.S., but again Macedonia is dominant in terms of domain registration. Here it is important to mention that those domains that are not registered in Macedonia have no extension. mk. 6.5. Profiles on social media websites Recently, many popular are accounts of political parties and politicians on social media, so precisely because they were included in this study. According to this fact i have collected information which politicians (party presidents) have their official account on social media (social networking sites) and the political parties use these social media to communicate with electors. Fig.16 Usage of social media by each political party Fig.17 Usage of social media by each president of political parties Fig.18 Usage of social media by all political parties Table 10: Usage of social media by each political party and its leader Fig.19 Usage of social media by all presidents of political parties IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 162 Fig.20 Usage of social media by all political parties VS all party presidents According to the results, they show that despite the popularity of social media (SNS), political parties and politicians (presidents of the parties) have not used fully the advantages and opportunities of these tools to connect with their supporters. Most popular services are Facebook and YouTube, while platforms for sharing images were used rarely. Some political parties had implemented photo galleries on their sites. 7. Conclusion The Internet first became a significant political tool in offering one-way communication for political parties with the development of political parties’ websites. However, politics online is no longer as valued for its one-way communication but is now praised, and used for the opportunities it provides to conduct two way communications their parties, political between campaigns, and potential voters. In today’s political arena, websites and Internet resources, such as weblogs, social networks, podcasts and compatible video formats are being shared as a means of consuming and disseminating information via the web. As a result, websites are becoming a major if not the number one resource for political campaigns to contact supporters, volunteers, and donations. At the same time, for the consumer, or, in this case, the voter, the Internet has become a primary resource for campaign media explored via web blogging, campaign websites, news sites, social networks, video sharing and podcasts. While traditional websites are still offering significant value to the political world, technology is pushing the envelope steps further with the use of web blogging, the development of social networks, the availability of podcasts (news and opinion related), and video sharing through sites such as YouTube, which provide the general public with video clips (of up to 5+ minutes in length). Thus the issue is no longer whether politics is online but, instead, in what form and with what consequences. Politics on the Internet has expanded beyond static two- dimensional web pages that used to serve as online billboards, flyers for a candidates position, and the traditional barriers of physical organizing. This has ushered in a new era of online consumer media and networking content that is saturated by political and campaign content. Furthermore, the phenomena of campaigns and the Internet is becoming less about what is featured on the campaign website, and instead consists more of user generated and user spread content that circulates virally on the Internet, connecting supporters from across the globe. So far, Web 2.0 has had a weak e-ruptive effect on Macedonian party politics. On the horizontal dimension, the parties’ share of activities on Web 2.0 has mainly followed what could be expected from their share of votes in 2008 parliamentary election. But deviations from the pattern indicate there are variable priorities, meaning that given a minimum of resource, parties and activists can decide to be “big in Web 2.0 politics” or decide not to. Regarding the vertical dimension of e-ruption, it appears that the national party organizations has gained more control and initiative in 2009 presidential an municipality election, the more anarchical situation of 2008 being temporary, due to sudden introduction of new technologies. Furthermore, while the number of users, viewers, members, followers and bloggers may have doubled since 2008, the party political Web 2.0 segment is still very small. This is both as a segment on Web 2.0 and as segment of voters in general. Therefore the Web 1.5 hypothesis appears to give the best description. Furthermore, a likely next step is an even more integrated and proactive strategy, as indicated by providing guidance and cues on the party web sites, as well as setting up party specific networks or “zones” on places like Facebook. Success stories of internet politics, and especially Obama, have had a significant impact on Macedonian media. Comments like the one quoted below is quite common: “Macedonian politicians have a lot to learn from Obama and his staff when it comes to running electoral campaigns. In particular, they should notice his priority of digital media, a part of the campaign which can be run without especially high costs.” Party strategists have also been inspired by the American experience. However, to get Macedonian voters drawn into Web politics in sufficient numbers in the first place, a more systemic approach is called for. During the American presidential campaign common “entrances” or “portals” to party politics on the main Web 2.0 sites were set up on established sites as on Facebook, YouTube and Twitter. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 163 Some differences between the American and Macedonian party systems should also be noted. A national party in the USA and Macedonia is quite simply different entities. Population- and territorial size, as well as diversity, place different demands on local networking and autonomy, as well as effective coordination and communication between the localities. American parties also have a much looser structure, with relatively few members and dormant local branches. Macedonian parties on the other hand are still are relatively strong organizations and less reliant on ad hoc networking. Thirdly, American elections are candidate-centered, in contrast to the party centered approach found in Macedonia. These differences may be reduced over time, as Macedonia – along with other European countries – is approaching a model with decoupled local branches, fewer members and more focus on individual leaders. But they are still significant enough to warrant the question whether Web 2.0 is more functional for American parties and therefore more “rational” to use for winning elections, exactly because these parties are more like network parties in the first place. As such, it may therefore seem like a paradox that it is the SDSM and VMRO-DPMNE which have most fully embraced Web 2.0. They are one of the oldest parties and probably still have the most effective and vital party organization. However, this also means that the party has the resources and structure to effectively implement their Web 2.0 presence, provided the party leadership thinks it necessary. It is another useful media channel for communicating with members and voters. The Internet is a unique forum for politics as it provides back and forth communication and allows for an exchange of information between users and sources. The Internet also offers its users greater access to information and the ability to express themselves in various online political arenas. In addition, individuals use the Internet as a tool to find and join groups that share their similar ideological, cultural, political and lifestyle preferences. 8. Reference [1] Marin, Alexandra, and Barry Wellman. "Social Network Analysis: An Introduction." Computing in the Humanities and Social Sciences. Web. 04 Apr. 2010. <http://www.chass.utoronto.ca/~wellman/publications/new bies/newbies.pdf>. [2] Oblak, Tanja. "Internet Kao Medij i Normalizacija Kibernetskog Prostora." Hrčak Portal Znanstvenih časopisa Republike Hrvatske. Web. 06 Apr. 2010. <hrcak.srce.hr/file/36810>. [3] "Mixing Friends with Politics: A Functional Analysis of ’08 Presidential Candidates Social Networking Profiles Authored by Compton, Jordan." All Academic Inc. (Abstract Management, Conference Management and Research Search Engine). Web. 13 June 2010. <http://www.allacademic.com//meta/p_mla_apa_research_ citation/2/5/9/3/4/pages259348/p259348-1.php>. [4] All Academic Inc. (Abstract Management, Conference Management and Research Search Engine). Web. 13 June 2010. <http://www.allacademic.com//meta/p_mla_apa_research_ citation/2/5/9/3/4/pages259348/p259348-1.php>. [5] "Alexa Internet - Website Information." Alexa the Web Information Company. Web. 20 June 2010. <http://www.alexa.com/siteinfo>. [6] "What Is Web 2.0 - O'Reilly Media." O'Reilly Media - Technology Books, Tech Conferences, IT Courses, News. Web. 27 May 2010. <http://oreilly.com/web2/archive/what-is-web-20.html>. [7] Web 2.0 Sites. Web. 28 May 2010. <http://web2.ajaxprojects.com/>. [8] "Key Differences between Web1.0 and Web2.0." CiteSeerX. Web. 25 May 2010. <http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1 .145.3391>. [9] "Political Participation and Web 2.0." Political Theory. Web. 24 May 2010. <http://arts.monash.edu.au/psi/news- and-events/apsa/refereed-papers/political- theory/allisonpoliticalparticipationandweb.pdf>. [10] "Alexa - Top Sites in Macedonia." Alexa the Web Information Company. Web. 01 June 2010. <http://www.alexa.com/topsites/countries/MK>. [11] "What Is Social Networking? - Should You Join." What Is Social Networking? - What Is Social Networking? Web. 30 May 2010. <http://www.whatissocialnetworking.com/Should_You_Jo in.html>. [12] Boyd, Danah M., and Nicole B. Ellison. "Social Network Sites: Definition, History”. Web. 30 May 2010. <http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html>. S. Emruli, received his bachelor degree from Faculty of Communication Sciences and Technologies in Tetovo SEE University (2006), MSc degree from Faculty of Organization and Informatics, Varaždin (2010). Currently works as professional IPA Advisor at Ministry of Local Self Government in Macedonia. M. Bača, is currently an Associated professor, University of Zagreb, Faculty of Organization and Informatics. He is a member of various professional societies and program committee members, and he is reviewer of several international journals and conferences. He is also the head of the Biometrics centre in Varaždin, Croatia. He is author or co-author more than 70 scientific and professional papers and two books.
1606.05179
1
1606
2016-06-16T13:24:52
Incentivized Campaigning in Social Networks
[ "cs.SI" ]
Campaigners, advertisers and activists are increasingly turning to social recommendation mechanisms, provided by social media, for promoting their products, services, brands and even ideas. However, many times, such social network based campaigns perform poorly in practice because the intensity of the recommendations drastically reduces beyond a few hops from the source. A natural strategy for maintaining the intensity is to provide incentives. In this paper, we address the problem of minimizing the cost incurred by the campaigner for incentivizing a fraction of individuals in the social network, while ensuring that the campaign message reaches a given expected fraction of individuals. We also address the dual problem of maximizing the campaign penetration for a resource constrained campaigner. To help us understand and solve the above mentioned problems, we use percolation theory to formally state them as optimization problems. These problems are not amenable to traditional approaches because of a fixed point equation that needs to be solved numerically. However, we use results from reliability theory to establish some key properties of the fixed point, which in turn enables us to solve these problems using algorithms that are linearithmic in maximum node degree. Furthermore, we evaluate the efficacy of the analytical solution by performing simulations on real world networks.
cs.SI
cs
Incentivized Campaigning in Social Networks Bhushan Kotnis, Albert Sunny, Joy Kuri 1 6 1 0 2 n u J 6 1 ] I S . s c [ 1 v 9 7 1 5 0 . 6 0 6 1 : v i X r a Abstract -- Campaigners, advertisers and activists are increas- ingly turning to social recommendation mechanisms, provided by social media, for promoting their products, services, brands and even ideas. However, many times, such social network based campaigns perform poorly in practice because the intensity of the recommendations drastically reduces beyond a few hops from the source. A natural strategy for maintaining the intensity is to provide incentives. In this paper, we address the problem of minimizing the cost incurred by the campaigner for incentivizing a fraction of individuals in the social network, while ensuring that the campaign message reaches a given expected fraction of individuals. We also address the dual problem of maximizing the campaign penetration for a resource constrained campaigner. To help us understand and solve the above mentioned problems, we use percolation theory to formally state them as optimization problems. These problems are not amenable to traditional ap- proaches because of a fixed point equation that needs to be solved numerically. However, we use results from reliability theory to establish some key properties of the fixed point, which in turn enables us to solve these problems using algorithms that are linearithmic in maximum node degree. Furthermore, we evaluate the efficacy of the analytical solution by performing simulations on real world networks. Index Terms -- Social Networks, Incentivized Campaigns, In- formation Control, Bootstrapped Percolation, Reliability Theory I. INTRODUCTION On-line social networking services have enabled advertisers, campaigners and activists to reach millions of individuals. In particular, the ability to recommend or share web articles [1], videos [2], and other media can be harnessed by campaigners for disseminating information to a worldwide audience. While such social network based campaigns sound promising, due to the fact that ideas propagate only a few hops from their origins [3], often, they are found to perform poorly in practice. Providing incentives for recommendations is a natural solution for increasing the hop count. For example, Dropbox, which offers cloud storage services, increased its customer base rapidly by offering incentives for social recommendations [4]. Although such referrals may increase the short term costs to the company by generating a large number of registrations for the free service, in the long term, the free registrations pay off, since a significant portion of free users eventually migrate to the premium service. Also, to keep the cost down, they capped the referral payouts -- additional 500 MB only for the first 28 referrals, i.e. the referral payout is capped at 14 GB. An alternative mechanism to limiting the cost is to cap the number of incentivized individuals, i.e., instead of capping in- Department of Electronic Systems Engineering, Indian Institute of Science, Bangalore, India. Email: {bkotnis,salbert,kuri}@dese.iisc.ernet.in centive payments, offer large referral rewards1 to a preselected set of individuals2. This approach allows the campaigner to target individuals who are best suited to use and recommend the service to their co-workers or friends. A. Related Work through direct In [5 -- 7], the authors consider nodes to be either active or inactive. Making an inactive node active -- not through network effects, but intervention for kick- starting the campaign -- is termed as "seeding." Assuming full knowledge of the network structure, i.e., the adjacency matrix, the question asked in [5 -- 7] is; Given a constraint on the number of seeds, what is the optimal set of seed nodes that would maximize the reach of the campaign? However, in several real-world settings, we may just have access to the statistical properties of the network. Also, the authors in [5 -- 7] do not consider the cost incurred due to incentivization. Incentivization is the process of providing incentives to nodes who are already active, to persuade their friends to sign up. Incentivization happens throughout the campaign, whereas seeding, as discussed in [5], happens only at the beginning. A related problem involving the calculation of an optimal pricing strategy for products sold to individuals in a social network was explored in [8, 9]. The authors in [8, 9] consider the problem of pricing a product and calculating the amount of cash-back (discount) that is provided to individuals as an incentive to evangelize the product. In this paper, we do not focus on optimal pricing, but rather focus on the size and cost of the campaign where individuals do not incur a cost to register for the service. The problems studied in this paper are more appropriate in settings where the service is free, or is based on a freemium model. Furthermore, we only assume partial knowledge of the network and also incorporate constraints that ensure a given campaign penetration, whereas the algorithms proposed in [8, 9] assume full knowledge of the network structure and do not consider any constraint on the campaign size. The problem of computing the optimal referral payment mechanisms that maximize profit was studied in [10], by modelling the referral process as a network game. The authors in [10] conclude that a combination of linear payment mecha- nism (linear in the number of referrals) and threshold payment mechanism (payment only when number of referral exceeds a threshold) approximates the optimal pricing scheme. In this 1For example the living social website gives 100% cash-back on a purchased product if the customer persuades three others to buy the (same) product. Another famous example of uncapped referrals is Uber, and also the taxi service Lyft. 2Instead of advertising the referral scheme, a randomized scheme can be advertised. For example, the advertisement could be "those who register for the service will get a chance to win discounts for referring their friends." paper, we focus on the set of nodes to be incentivized while assuming that a pricing scheme, which can be computed based on the results in [10], is provided by the campaigner. Similar problems involving the computation of referral rewards in real time, for maximizing the campaign spread, were studied using the theory of optimal control in [11 -- 15]. B. Our Contributions We consider a scheme where preselected incentivized in- dividuals are presented with a reward when they register for the service, encouraging them to spread the news about the service to their friends. The decision of whether to offer an incentive to an individual is precomputed based on the solution of an optimization problem. We use a variant of the linear threshold model [5] for modelling the campaign spreading process. For a given fraction of such incentivized individuals, we first compute the campaign size (expected fraction of registered individuals) using bootstrap percolation. We then use this quantity to formulate the following optimiza- tion problems: 1). minimize the cost for achieving a given expected fraction of registered individuals, and 2). maximize the expected fraction of registered individuals for a given cost budget. These optimization problems are not amenable to traditional approaches because of a fixed point equation that needs to be solved numerically. However, we use results from reliability theory to establish some key properties of the fixed point, which in turn enables us to solve these problems using algorithms that are linearithmic in the maximum node degree. Through extensive simulations, we also study the efficacy our incentivization scheme in real world networks. TABLE I A SUMMARY OF KEY NOTATION Description fraction of degree k nodes maximum node degree of graph G probability of a degree k node having threshold m activation probability of a type 1 node activation probability of a type 2 node Notation p(k) kmax pth(mk) α1 α2 d mean node degree of graph G q Xk2 Yk−k2 u uq s(q) sk(q) probability of encountering a type 2 node by traversing a randomly chosen link random variables that denote the number of type 2 active neighbours of a degree k node, given that there are k2 type 2 neighbours random variables that denote the number of type 1 active neighbours of a degree k node, given that there are k − k2 type 1 neighbours probability of reaching a registered node by following an arbitrary edge of the graph fixed point of Equation (3) expected fraction of registered nodes at the end of the campaign expected fraction of degree k registered nodes at the end of the campaign cost of incentivizing a degree k node probability of incentivizing a degree k node minimum expected fraction of registered nodes ck φ(k) γ c maximum expected incentivization cost 2 Fig. 1. Flow chart denoting the various stages of a node; m denotes the threshold of node i, α1 and α2 are the activation probabilities of incentivized and non-incentivized nodes, respectively. results from percolation theory, we compute the campaign size (expected proportion of registered individuals). Using this quantity, we formulate and solve two relevant optimization problems in Sections IV and V. In Section VI, we compare the analytical results with simulation performed on real-world networks. Finally, in Section VII, we conclude the paper. II. MODEL Consider a set of N = {1, 2,··· , n} individuals who are connected to one another through a social network. For analytical tractability, as in [16, 17], we consider this network to be arbitrary, connected3, locally tree-like and uncorrelated4. We represent this network as an undirected graph G(N ,L), where N and L represent the set of nodes and links of graph G, respectively. An undirected edge (a, b) ∈ L if individuals a and b are neighbours in the underlying social network. In most scenarios, full knowledge of the network structure may not be available to the campaigner. In such cases, the campaigner can obtain statistical properties of the network through data mining. One such property is the degree distribution. Let {p(k), k ≥ 1} be the degree distribution of graph G. We consider a campaign on the network represented by graph G (see Fig. 1 for the flow chart). The nodes in graph G can be either in "active", "registered" or "unregistered" state. Once active, a node remains active. Active nodes are very spirited and express their strong support for the campaign The key notation used in this paper is summarized in Table I. The remainder of this paper is organized as follows. In Sec- tion II, we present the campaign model. In Section III, using 3The configuration model random graph is connected with high probability if and only if the minimum degree is greater than or equal to 3. 4Uncorrelated networks are networks where the degree of a node is statistically independent of the degree of any other node in the network [18]. Nodei:unregisteredIsnodezealous?WaittoberecommendedbyactiveneighboursHasatleastmactiveneighbours?Nodei:registeredIsnodeincentivized?Choosetobecomeactive(withprobabilityα2)?Nodei:activeChoosetobecomeactive(withprobabilityα1)?Nodei:registeredYesNoYesNoYesNoYesYesNoNo by encouraging their neighbours to register, whereas nodes in the registered and unregistered states refrain from recommen- dations. For a node to become active, it must first show support for the campaign by registering itself. However, all registered nodes need not be active. The campaign starts with a set of zealous individuals -- those who intrinsically desire the service. These nodes do not need any recommendation to register, and are registered for the campaign from the very start. If a zealous node becomes active, it will recommend the service to its neighbours. On the other hand, nodes that are not zealous, register only if the number of active neighbours exceeds a predefined threshold value (see Fig. 1). Let pth(mk) denote the probability of a degree k node having threshold m. This is a generalization of the celebrated linear threshold model [5] -- a model of choice for studying the dissemination and adoption of new products, technologies and ideas [19 -- 22]. We note that, by definition, k≥1 p(k)· pth(0k) denotes the fraction of zealous nodes in the network5 -- fraction of nodes that register without any recommendations. (cid:80) A node that receives a reward when it registers for the service is more likely to tell its neighbours about the reward and encourage them to register. Therefore, we divide the nodes into two categories: the 'non-incentivized' (type 1) and the 'incentivized' (type 2). The campaigner decides the fraction of incentivized nodes before the start of the campaign6. However, these nodes become aware of the fact that they are incentivized only if they register for the service7. Since incentivized nodes are provided with incentives upon registration, they are more likely to be enthused, and will play an active part in the campaign than non-incentivized nodes. Let α1 ∈ (0, 1] and α2 ∈ (0, 1] be the probabilities of a non-incentivized (type 1) and incentivized (type 2) node becoming active, respectively. Due to the presence of incentives, we assume that α2 > α1. III. COMPUTING THE CASCADE SIZE Before presenting the problems, we need to first compute cascade size, i.e., the expected fraction of nodes that have registered at the end of the campaign. Let p(k(cid:48)k) be the probability of encountering a degree k(cid:48) node by traversing a link from a degree k node. From [16], we know that this conditional distribution, for an uncorrelated network, has the following form p(k(cid:48)k) = k(cid:48)·p(k(cid:48) , where d denotes the mean degree of the graph G. Let q(k) be the probability of encountering a type 2 node by traversing a randomly chosen link from a degree k node. Then, we have ] · p(k 1 d Pr[type 2 neigh.k (cid:48)k) = (cid:88) (cid:88) (cid:88) ) · p(k q(k) = (cid:48)k) )p(k (cid:48)≥1 (cid:48)≥1 (cid:48)≥1 φ(k φ(k = k ) k k k d ) (cid:48) (cid:48) (cid:48) (cid:48) (cid:48) 5Campaigner can estimate the fraction of zealous nodes by conducting surveys on a reasonable sized demographic. 6Alternatively, whenever an individual registers, the campaigner can dynam- ically decide whether to incentivize this individual. This problem is similar to stochastic control problems, and is beyond the scope of this paper. 7Incentives are assigned assuming knowledge of the exact degree of the registered node, because the exact node degree can be obtained after registering. For example, one can ask individuals to register through an on- line social network, and compute the exact degree from their contact list. 3 (cid:48) k2 Since q(k) is independent of k, let q(k) = q ∀ k ∈ {1, 2,··· , kmax}. Here, kmax is the maximum node degree. Since the network is locally tree-like, with some effort, it can be shown that the number of type 2 neighbours of a degree k node is a binomial random variable with the probability distribution function p(k2k) = (cid:0) k (cid:1) · qk2 · (1 − q)k−k2. Let (cid:48) (cid:48) (cid:48) +1) i.e., ) = (k +1)·p(k ) be the excess degree distribution, the degree pex(k distribution of a node encountered by following a randomly chosen link without counting that link. For an uncorrelated . network, from [17], we know that pex(k Now, let u denote the probability of reaching a registered node by following an arbitrary edge of the graph. First, let us consider an arbitrary node j of degree k and threshold m. Next, we compute the probability that node j registers due to recommendations from its active neighbours, given that we have arrived at node j by following an arbitrary link in the graph. For ease of presentation, we do not explicitly write the condition "following an arbitrary link." P [j registers j is of degree k, j has threshold m] d (cid:80)k l=mP [j has l active neighboursj is of degree k] k2=0P [k2 type 2 neighboursj is of degree k] (cid:16)(cid:80)k · P [l active neigh.j is of degree k and k2 type 2 neigh.] k2=0 p(k2k) · P [Xk2 + Yk−k2 = l] (cid:17) l=m l=m k2=0 p(k2k) · P [Xk2 + Yk−k2 ≥ m] (1) where Equality (a) follows because the events {j registers} and {j has m or more active neighbours given that j has threshold m} are equivalent, and the events {j has l active neighbours} and {j has threshold m} are independent of each other. (a) = (cid:80)k =(cid:80)k =(cid:80)k =(cid:80)k (cid:17) In Equality (1), Xk2 and Yk−k2 are random variables that denote the number of type 2 and type 1 active neighbours of a degree k node, given that there are k2 type 2 and k − k2 type 1 neighbours. With some effort, it can be shown that random variables Xk2 and Yk−k2 are independent and have a binomial distribution with parameters (k2, α2u) and (k − k2, α1u), respectively. Here, α1 and α2 are the probability of a type 1 and type 2 node becoming active, respectively. The independence occurs because the probability of incentivizing a node is independent of the degree of its neighbouring nodes. The binomial distribution arises here because the network is locally tree-like. From Equation (1), it is evident that the probability of a node registering is independent of its type8. Therefore, the probability that by following an arbitrary link we can reach a node that registers due to recommendations is given by (cid:88) P [node registers due to recommendation] = pex(k)· P [node reg. due to recommendationsexcess degree k] k≥1 8A node registers either if it is zealous (this event is independent of its type), or through recommendations which depend on its neighbours and type of neighbours but not on its type. (cid:88) (cid:88) k≥0 k≥0 f (q, u) = = pex(k) · pth(0k + 1) + pex(k) · pth(0k + 1) + (cid:88) (cid:88) (cid:18)(cid:88) (cid:88)k l+l (cid:88) (cid:88) (cid:88)k (cid:88)k (cid:18)k − k2 k≥1 k≥1 pex(k) m≥1 pth(mk + 1) pth(mk + 1) m≥1 pex(k) (cid:18)k2 (cid:19) l l p(k2k) · P [Xk2 + Yk−k2 ≥ m] (α2u)l(1 − α2u)k2−l (cid:48) (cid:48)≥m 4 (cid:19) p(k2k) · P [Xk2 + Yk−k2 ≥ m] (cid:18) k · qk2 · (1 − q)k−k2· (1 − α1u)k−k2−l (cid:48)(cid:19) k2=0 (cid:19) k2=0 k2 (cid:48) (α1u)l (cid:88) k2=0 k≥1 m≥1 m≥1 pex(k) pth(mk) P [node registers, node has threshold m gk(q, u) = pth(0k) + where Xk2 ∼ Bin(k2, α2u) and Yk−k2 ∼ Bin(k − k2, α1u) (cid:88) (cid:88) (cid:88) k(cid:88) m≥1 · qk2 · (1 − q)k−k2 · P [Xk2 + Yk−k2 ≥ m] (2) node has excess degree k, node has threshold m] pth(mk + 1) · P [node registers (cid:88) (cid:88) (cid:88) node has excess degree k] pth(mk + 1)· (cid:18) k pex(k) pex(k) (cid:19) m≥1 k≥1 k≥1 = (a) = = k2 k2=0 On the RHS of Equation (2), we use the excess degree distribution because we discount the link that we followed to arrive at the node. In Equality (a), we use pth(mk + 1) because if we include the link on which we arrived, a node of excess degree k will have k + 1 links. Arguing along the lines of [17], we can conclude that u has to satisfy the following self consistency equation (ii) If every node in the network is zealous, then u = 1 is the only solution of Equation (3). (iii) If the fraction of zealous nodes lies in the interval (0, 1), then Equation (3) has a unique fixed point in (0, 1). Proof: In Appendix B-B. For ease of presentation, in the remainder of the paper, we assume that the fraction of zealous nodes lies in the open interval (0, 1). For any q ∈ [0, 1], let uq denote the fixed point of Equation (3). Since the fixed point is unique, we can obtain uq by iteratively solving Equation (3). Our next proposition qualitatively describes the variation of the fixed point uq as function of q. Proposition 3.3: If α2 > α1, then uq is a strictly increasing continuous function of q, i.e., ∂uq ∂q > 0. Proof: In Appendix C. Now, given a q ∈ [0, 1], let sk(q) be the expected fraction of degree k nodes that have registered at the end of the campaign. The expression for sk(q) can be obtained as follows sk(q) = P [node registersdegree k] = P [node is zealousdegree k] + P [node reg. due to recommendationsdegree k] m≥1 P [node reg, node has threshold m node has degree k] + pth(0k) (cid:88) = pth(0k) + pth(mk)· m≥1 P [node regnode has degree k, node has threshold m] = gk(q, u)u=uq (4) where gk(q, u) is as given at the top of this page and uq is the fixed point of Equation(3). Given a q ∈ [0, 1], let s(q) be the expected fraction of nodes that have registered at the end of the campaign. s(q) is also termed as the size of the epidemic. Then, using arguments similar to the ones used to derive Equation (5), it can be shown that k≥1 s(q) = p(k) · gk(q, u) p(k) · sk(q) (5) Once again using results from reliability theory, in Proposi- tion 3.4, we establish the increasing and non-decreasing nature of functions g(q, u) and gk(q, u) (with respect to u and q). k≥1 = (cid:12)(cid:12)(cid:12)u=uq (cid:88) (cid:88) Proposition 3.4: If α2 > α1, then 1) ∂g(q,u) ∂u > 0 ∂u ≥ 0. 2) ∂gk(q,u) ∂q > 0 and ∂g(q,u) ∂q ≥ 0 and ∂gk(q,u) u = P [node is zealous] (cid:88) = k≥0 + P [node reg. due to recommendations] pex(k)pth(0k + 1) = (cid:88) + P [node reg. due to recommendations] = f (q, u) (3) where f (q, u) is as given at the top of this page. For any q, Equation (3) is a fixed point equation in u. However, due to the complex nature of the function f (q, u), the existence of a u that satisfies Equation (3) is not obvious. Using results from reliability theory, in Proposition 3.2, we prove the existence and uniqueness of the fixed point of Equation (3). Before that, the following proposition establishes the nature of function f (q, u) (w.r.t u). Proposition 3.1: If the fraction of zealous nodes lies in the open interval (0, 1), then ∀ q ∈ [0, 1], f (q, u) is a continuously differentiable, convex, monotonically increasing function of u. Proof: In Appendix B-A. Proposition 3.1 gives us some intuition about the existence and uniqueness of the fixed point. However, we establish the same rigorously in the following proposition. Proposition 3.2: For every q ∈ [0, 1], (i) If no node in the network is zealous, then u = 0 is the only solution of Equation (3). Proof: Similar to that of Propositions 3.1 and C.1. IV. COST MINIMIZATION UNDER CASCADE SIZE CONSTRAINT Providing incentives is a costly affair. The campaigner may either be interested in minimizing the cost while guaranteeing that a given proportion of population registers, or in maximiz- ing the registrations for a given cost budget. In this section, we look at the former problem. A. Cost of incentivization Incentives provided by the campaigner is usually a function of its degree because the number of potential recommendations depend on the degree. Let ck be the cost of incentivizing a degree k node. Incentivized nodes obtain incentives only if they registers. Therefore, the expected cost per incentivized degree k node is given by ck · sk(q), where sk(q) (see Equation 4) is the probability that an incentivized degree k node registers. Let φ(k) denote the probability of incentivizing a degree k node. Then, the average cost per node for incentive- k≥1 p(k)φ(k) × k≥1 p(k)·ck·φ(k)·sk(q), where policy (φ = {φ(k), k ≥ 1}) is given by (cid:80) (cost of node of deg. k) =(cid:80) (cid:80) k≥1 k · p(k) · φ(k). q = 1 d B. Problem formulation Minimizing the cost while providing guarantees on the number of expected registrations is appropriate for campaigns where the campaigners are mandated to achieve a given target. This problem can be mathematically formulated as follows min 0≤φ≤1 k≥1 ck · p(k) · φ(k) · sk(q) (6) (cid:88) Subject to: s(q) ≥ γ and q = k · p(k) · φ(k) k≥1 where γ ∈ [0, γmax] is the minimum expected fraction of registered individuals that must be achieved and d is the mean degree of the network. Here, γmax is the expected fraction of registered individuals obtained by incentivizing everyone. The expression for sk(q) (Equation (4)) and s(q) (Equation (5)) involve uq, which is the solution to the fixed point Equa- tion (3). Thus, it is not possible to apply traditional analytical techniques such as the Karush-Kuhn-Tucker (KKT) conditions to solve the above problem. Furthermore, the problem may be non convex, and applying numerical techniques such as genetic algorithms, or Markov Chain Monte Carlo methods may not yield a globally optimal solution. (cid:88) 1 d C. Solution approach In this section, we present transformations that allow us to efficiently compute the global optima of the cost minimization problem presented in the previous section. To help us with this, we state and prove the following proposition. The intuition behind this proposition is that, as α2 > α1, increasing q increases the proportion of type 2 nodes, which results in a higher s(q). Proposition 4.1: If α2 > α1, then function s : [0, 1] → [γmin, γmax] is a monotonically increasing bijection, where Proof: We have (cid:1) ∂(cid:0)g(q, u)u=uq (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)u=uq ∂g(q, u) ∂q ∂q ∂s(q) ∂q = (a) = (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)u=uq · ∂uq ∂q + ∂g(q, u) ∂u · γmax = s(0) and γmax = s(1) are the expected fraction of registered individuals obtained by incentivizing nobody and everybody, respectively. 5 = (> 0) Proposition 3.4 + (> 0) Proposition 3.4 ⇒ ∂s(q) ∂q > 0 (> 0) Proposition 3.3 (7) where Equality (a) follows from an application of the chain rule. From Inequality (7), we can see that s(q) is a monoton- ically increasing function defined on the closed interval [0, 1]. Hence, s : [0, 1] → [γmin, γmax] is a bijection. Proposition 4.1 establishes that s(q) is a monotonically increasing function of q and is a bijection. Therefore, we can replace the constraint s(q) ≥ γ with the constraint q ≥ qγ, where qγ is such that s(qγ) = γ. Since s(q) is a monotonically increasing function of q, we can compute qγ by performing a line search over the closed interval [0, 1]. The following algorithm does this. qmp := (q1 + q2)/2 Solve equation u = f (qmp, u) to obtain uqmp. if s(qmp) < γ then Algorithm 1 Algorithm to compute qγ 1: Set q1 := 0 and q2 := 1 2: while s(q1) − s(q2) >  do 3: 4: 5: 6: 7: 8: 9: 10: end while 11: return qγ := (q1 + q2)/2 q1 := qmp q2 := qmp end if else Proposition 4.2: If α2 > α1, then for all k ≥ 1, ∂sk(q) Proposition 4.1 does not tell us how the expected fraction of registered degree k nodes (sk(q)) responds to changes in q. While, the function sk(q) may not be a bijection for all values of k, we show that it is a non-decreasing function of q, for all values of k. ∂q ≥ 0 Proof: By first writing the total derivative in terms of the partial derivatives (see Proposition 4.1), and then by using the non-negativity of these partial derivatives (from Propositions 3.3 and 3.4). Now, if γ ≤ γmin = s(0), then the cascade constraint is met without incentivizing anyone. In such cases, the op- timum incentive policy and the optimum cost is given by {φ(k) = 0,∀k ≥ 1} and 0, respectively. On the other hand, if γ = γmax = s(1), then the cascade constraint is met only if everyone is incentivized, i.e., {φ(k) = 1,∀k ≥ 1}, and k≥1 ck · p(k) · sk(1). For the cases when γ ∈ (γmin, γmax), due to Propositions 4.1, the the optimum cost is given by(cid:80) (cid:88) cost minimization problem can be re-written as follows P1 : min 0≤φ≤1 Subject to: ck · p(k) · φ(k) · sk(q) k≥1 (8) q ≥ qγ and q = k · p(k) · φ(k) k≥1 ·(cid:88) 1 d where qγ is chosen such that s(qγ) = γ. Since γ ∈ (γmin, γmax), we have qγ ∈ (0, 1) (see Proposition 4.1). The next proposition establishes the existence of an optimal policy, of problem P1, that satisfies all its the constraints, with equality. optimal solution φopt = {φopt p(k) · φopt(k) = d · qγ k , k ≥ 1} such that (cid:80) then problem P1 has an k≥1 k · Proposition 4.3: If α2 > α1, Proof: In Appendix D-A. From Proposition 4.3, we can see that problem P1 has an optimal solution that satisfies all its constraints with equality. Therefore, to obtain a solution of problem P1, we restrict our search to the set of policies that satisfy the constraints of problem P1 with equality. Subsequently, a change of variable gives us the following linear program d · qγ ·(cid:88) νk · µk(qγ) νk = 1 and 0 ≤ νk ≤ k · p(k) d · qγ k≥1 (9) ∀k ≥ 1 P2 : min Subject to: (cid:88) {νk,k≥1} k≥1 k where µk(qγ) = sk(qγ )·ck . The following proposition es- tablishes a crucial relation between the optimal solutions of problems P1 and P2. k , k ≥ 1} be an optimal solution of problem P2. If α2 > α1, then we can obtain an optimal solution of problem P1 as follows Proposition 4.4: Let {νopt (cid:40) φopt(k) = 0 k ·d·qγ νopt k·p(k) if p(k) = 0 otherwise Proof: In Appendix D-B. Therefore, to obtain an optimal solution of problem P1, we just need to solve P2 and apply Proposition 4.4. Problem P2 is a linear program and can be solved by any well-known LP- solver in polynomial time (O((kmax)3.5) time, where kmax is the maximum node degree in the network)[23]. However, we exploit the rich structure of this problem and solve it in linearithmic time O(kmax · log(kmax)) Let S = {1, 2,··· , kmax}. Here, kmax is the maximum degree of the network. Consider a permutation σ : S → S such that if k1 < k2, then µσ(k1)(qγ) ≤ µσ(k2)(qγ), i.e., µσ(1)(qγ) ≤ µσ(2)(qγ) ≤ ··· ≤ µσ(kmax)(qγ). The permu- tation σ can be obtained in O(kmax · log(kmax)) time by sorting the set {µk(qγ), k ≥ 1} in ascending order. Using this order, we can obtain an optimal solution νa of problem P2 in Θ(kmax) time by following the steps in Algorithm 2. k denotes the kth component of vector νa. We illustrate the principle behind Algorithm 2 using a σ(j) can be interpreted as a jar filling analogy. Variable νa jar with capacity σ(j)·p(σ(j)) . The for loop in the algorithm is equivalent to filling these jars with water from another jar of unit capacity, in an ascending order, as given by the In Algorithm 2, νa d·qγ 6 (cid:110) Algorithm 2 Algorithm to compute optimal solution of P2 1: res := 1 and νa := [0, 0,··· , 0] -- a 1 × kmax vector 2: for j ∈ [1, 2,··· , kmax] do 3: 4: 5: end if 6: 7: end for 8: return νa if res > 0 then νa σ(j) = min res := res − νa res, σ(j)·p(σ(j)) (cid:111) d·qγ σ(j) permutation σ. From steps 1, and 4 − 5 of Algorithm 2, it is easy to see that νa is a feasible solution of problem P2. The optimality of νa with respect to problem P2 is established by the following proposition. Proposition 4.5: The vector νa returned by Algorithm 2 is an optimal solution of problem P2. Proof: In Appendix E. V. CASCADE SIZE MAXIMIZATION UNDER BUDGET CONSTRAINT In this section, we consider the challenge faced by a resource-constrained campaigner. The campaigner desires to maximize the campaign size, but is constrained by limited resources. Let c denote the limit on the expected incentiviza- tion cost. Then, we can formulate the cost-constrained cascade maximization problem as follows P3 : max 0≤φ≤1 Subject to: (cid:88) (cid:88) k≥1 and q = 1 d s(q) ck · p(k)φ(k)sk(q) ≤ c k · p(k) · φ(k) k≥1 A. Solution approach Let sopt be the optimum value of problem P3. From Propo- sition 4.1, we know that there exists a unique qopt ∈ (0, 1) such that s(qopt) = sopt. From Proposition 4.1, we know that ∂s(q) ∂q > 0, i.e., s(q) is a monotonically increasing bijection. Therefore, it can be argued that qopt can be obtained by solving the following optimization problem Subject to:(cid:88) P4 : max 0≤φ≤1 q ck · p(k)φ(k)sk(q) ≤ c k≥1 (cid:88) 1 d and q = k≥1 Let us define µk(q) = sk(q)·ck k k · p(k) · φ(k) and νk(q) = k·p(k)·φ(k) . d·q Then, problem P4 can be re-written as follows ν,q∈(0,1) P5 : max Subject to: d · q ·(cid:88) νk(q) = 1 and 0 ≤ νk(q) ≤ k · p(k) d · q q νk(q) · µk(q) ≤ c k≥1 ∀ k ≥ 1 (cid:88) k≥1 Now, given a q ∈ (0, 1), consider the following criteria (1) d · q ·(cid:80) (2) (cid:80) k≥1 νk(q) · µk(q) ≤ c ∀k ≥ 1 k≥1 νk(q) = 1 (3) 0 ≤ νk(q) ≤ k·p(k) d·q If we can find a vector ν that satisfies the above criteria, then the 2-tuple (ν, q) is a feasible solution of problem P5. Let νa(q) be the vector output by Algorithm 2 when qγ is set to q. From Proposition 4.5, we know that this vector minimizes the LHS of criterion (1) subject to criteria (2) and (3). Therefore, if k (q)·µk(q) > c, then for the given value of q, no vector ν can satisfy criterion (1). Now, let νa(q +∆q) be the vector output by Algorithm 2 when qγ is set to q + ∆q. k (q) · µk(q) > c, then we have d·q·(cid:80) Then, for any ∆q > 0, if d · q ·(cid:80) k≥1 νa k≥1 νa (cid:88) we have c < d · q k (q) · µk(q) νa k≥1 (b)≤ d · (q + ∆q) ·(cid:88) k≥1 (a)≤ d · q ·(cid:88) k≥1 k (q + ∆q) · µk(q) νa k (q + ∆q) · µk(q + ∆q) νa (10) where Inequality (a) follows because the vector νa(q) is an optimal solution and νa(q + ∆q) is just a feasible point at q, ∂q ≥ 0 and Inequality (b) follows because ∂µk(q) (see Proposition 4.2). From Inequality 10 we can conclude that if there does not exist a vector ν that satisfies criteria (1)-(3) for some q ∈ (0, 1), then no vector satisfies these criteria for (cid:48) ∈ (q, 1). Therefore, the optimal value qopt is given by any q the largest value of q in [0, 1] such that vector νa(q) satisfies criteria (1), and can be computed using the following algorithm k · ∂sk(q) ∂q = ck qmp := (q1 + q2)/2 Set qγ = qmp in Algorithm 2 and obtain νa(qmp) if d · qmp ·(cid:80) Algorithm 3 Algorithm to compute optimum of P3 1: Set q1 := 0 and q2 := 1 2: while s(q1) − s(q2) >  do 3: 4: 5: 6: 7: 8: 9: 10: end while 11: Return qopt := (q1 + q2)/2 k (qmp) · µk(qmp) > c then q2 := qmp q1 := qmp k≥1 νa end if else Algorithm 3 does a line search to find the largest values of q ∈ [0, 1] such that the tuple (νa(q), q) meets criteria (1)-(3). VI. SIMULATION AND NUMERICAL EVALUATIONS We formulated and solved the optimization problems assum- ing an uncorrelated, locally tree-like and connected network. However, real world social networks may contain triads, loops, multiple connected components, and need not be uncorrelated. Despite such differences, we show that, in most cases, our analytical results closely match the simulations on real world social networks. We evaluate our analytical results on two very different networks: Gnutella [24] -- a p2p file sharing network, and Hamsterster [25] -- a social network for people with pet hamsters. Table II presents a few statistical measures of these networks. The degree distributions of these networks 7 Fig. 2. Degree distribution of network A (Gnutella network); the thick black line denotes the best fit of the power law to the degree distribution. Fig. 3. Degree distribution of network B (Hamsterster network); the thick black line denotes the best fit of the power law to the degree distribution. 3. All simulations are are displayed in Figures averaged over 10000 runs. To enhance legibility, error bars are suppressed in all the plots. 2 and SIMPLE PARAMETERS OF THE TWO REAL-WORLD NETWORKS USED FOR TABLE II SIMULATIONS. Network A Network B p2p-Gnutella08 [24] Hamsterster [25] Network category Peer-to-peer Source Nodes Edges Maximum degree Average degree Number of triangles Clustering coefficient Connected components 6301 20777 273 6.59 2383 0.01 2 Social 2426 16631 97 13.71 53265 0.51 148 We first evaluate the correctness of the analytical calculation of the campaign size, i.e., s(q). The simulation plots were generated by considering a linear threshold model where nodes register if at least 50% of their neighbours are active. We assume that 30% of the nodes in the network were zealous. For a different values of q, we studied three schemes: φall -- incentivizing all nodes equally with probability q, φhigh -- incentivizing nodes starting from the highest degree till degree k(cid:48) such that q = 1 k≥k(cid:48) p(k)φhigh(k), and φlow -- incentivizing nodes starting from the lowest degree till degree k(cid:48) such that q = 1 1≤k≤k(cid:48) p(k)φhigh(k). The analytical results were obtained by extracting the degree distribution from the networks. (cid:80) (cid:80) The number of triangles in the p2p Gnutella network is very small, which is also reflected in the clustering coefficient. Therefore, the Gnutella network is very similar to a locally d d 1 10 100 1000 1 10 100Number of NodesDegree 1 10 100 1 10 100Number of NodesDegree 8 Fig. 4. Analytical and simulated values of s(q) on network A (Gnutella network). Fig. 7. Analytical and simulated values of average cost vs. γ for network B (Hamsterster network). Fig. 5. Analytical and simulated values of s(q) on network B (Hamsterster network). Fig. 8. Analytical and simulated values of cascade size vs. c for network A (Gnutella network). compute the solution φ and the average cost. We then simulate the linear threshold process (nodes register if at least 50% of their neighbours are active) on the respective real world networks using the analytical solution φ, and compare the average cost obtained from analysis and simulations (see Fig. 6 and Fig. 7). Similarly, for the campaign size maximization problem we analytically compute φ and size s for a given cost budget c. The analytical solution is then used in the simulation of cascade maximization problem (see Fig. 8 and Fig. 9). As observed in Fig. 6 and 7, the analytical average cost is in excellent agreement with the simulated one for different values of α1, α2 and γ, on both the networks. Similarly Fig. 8 and 9 show an excellent match between simulation and analytical computation of campaign size in almost all the plots. For large values of α1 and α2, the simulated campaign size in the Hamsterster network is larger than the analytically computed campaign size. This may in part be due to the large number of triangles in the network. This suggests that in social networks containing large number of triangles and loops, the analytically computed size represents a lower bound. Fig. 6. Analytical and simulated values of average cost vs. γ for network A (Gnutella network). tree-like network. As consequence of this, for the Gnutella network, the simulation and analytical results are in excellent agreement with each other (see Fig. 4). On the other hand, one can observe a deviation of the simulation results from the analytical on Hamsterster for large values of q (see Fig. 5). This behaviour may in part be due to the presence of significant number of triangles and loops in the network. Next, we consider a linear incentive structure, where an incentivized node obtains a unit reward per neighbour, i.e., ck = k, ∀ k ≥ 1. For the cost minimization problem, for a given γ, using the degree distributions, we analytically 0.32 0.34 0.36 0.38 0.4 0.42 0.44 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1s(q)qAnalyticalSimulation (all nodes incentivized)Simulation (low degree nodes incentivized)Simulation (high degree nodes incentivized) 0.31 0.32 0.33 0.34 0.35 0.36 0.37 0.38 0.39 0.4 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1s(q)qAnalyticalSimulation (all nodes incentivized)Simulation (low degree nodes incentivized)Simulation (high degree nodes incentivized) 0 0.75 1.5 2.25 0.324 0.326 0.328 0.33 0.332 0.334 0.336 0.338 0.34α1=0.2, α2=0.3AnalyticalSimulation 0 0.75 1.5 2.25 3 0.32 0.34 0.36 0.38 0.4 0.42 0.44 0.46Average costα1=0.2, α2=0.8 0 0.75 1.5 2.25 3 0.41 0.415 0.42 0.425 0.43 0.435 0.44 0.445γα1=0.7, α2=0.8 0 1.5 3 4.5 0.314 0.315 0.316 0.317 0.318 0.319 0.32 0.321 0.322 0.323 0.324α1=0.2, α2=0.3AnalyticalSimulation 0 1.5 3 4.5 6 0.31 0.32 0.33 0.34 0.35 0.36 0.37 0.38 0.39 0.4Average costα1=0.2, α2=0.8 0 1.5 3 4.5 6 0.375 0.38 0.385 0.39 0.395 0.4γα1=0.7, α2=0.8 0.32 0.325 0.33 0.335 0.34 0 0.5 1 1.5 2 2.5α1=0.2, α2=0.3AnalyticalSimulation 0.3 0.35 0.4 0.45 0 0.5 1 1.5 2 2.5Cascade sizec-α1=0.2, α2=0.8 0.4 0.41 0.42 0.43 0.44 0.45 0 0.5 1 1.5 2 2.5α1=0.7, α2=0.8 9 (ii) Let Z(n, p1) and Z(n, p2) be two binomial random variable with parameters (n, p1) and (n, p2), then for any n ∈ N, Z(n, p1) ≤st Z(n, p2) if p1 ≤ p2. Proof: Part (i): By comparing the complementary cumu- lative distribution function of the two random variable, and by applying the definition of usual stochastic order. Part (ii): A binomial random variable with parameter (n, p) is the sum of n i.i.d. Bernoulli random variable with parameter p. Now, the result follows from an application of Part (i), and due to the fact that stochastic order is closed under convolution (Theorem A.2). We also use some results from the theory of stochastic convexity in our proofs. For the sake of completeness, we reproduce some definitions and theorems from [26]. Let {X(θ), θ ∈ Θ} be a parametrized collection of random variables. We say (a) {X(θ), θ ∈ Θ} is stochastically increasing (SI) if E[ψ(X(θ))] is non-decreasing in θ for all non-decreasing functions ψ. (b) {X(θ), θ ∈ Θ} is stochastically increasing and convex (SICX) if {X(θ), θ ∈ Θ} ∈ SI and E[ψ(X(θ))] is non- decreasing and convex in θ for all non-decreasing convex functions ψ. (c) {X(θ), θ ∈ Θ} is stochastically increasing and linear (SIL) if {X(θ), θ ∈ Θ} ∈ SICX and E[ψ(X(θ))] is non-decreasing and concave in θ for all non-decreasing concave functions ψ. Note that, by definition, we have {X(θ), θ ∈ Θ} ∈ SIL ⇒ {X(θ), θ ∈ Θ} ∈ SICX. Lemma A.2: Let X(n, p) be a binomial random variable with parameters (n, p). Then, {X(n, p), p ∈ (0, 1)} ∈ SICX. Proof: By combining example Example 8.B.3 and Theo- rem 8.B.9 of [26], it can shown that {X(n, p), p ∈ (0, 1)} ∈ SIL. Then, due to the fact that SIL ⇒ SICX, the lemma follows. Theorem A.3: Suppose {X(θ), θ ∈ Θ} and {Y (θ), θ ∈ Θ} are two collection of random variables such that X(θ) and Y (θ) are independent for each θ. If {X(θ), θ ∈ Θ} ∈ SICX and {Y (θ), θ ∈ Θ} ∈ SICX, then {X(θ) + Y (θ), θ ∈ Θ} ∈ SICX. Proof: Refer the proof of Theorem 8.A.15 in [26]. Theorem A.4: Suppose that for each θ ∈ Θ, the support of X(θ) is in N. Then, {X(θ), θ ∈ Θ} ∈ SICX if and only if {X(θ), θ ∈ Θ} ∈ SI and P [X(θ) > m] is non-decreasing and convex in θ for all m ∈ N. Proof: Refer the proof of Theorem 8.A.10 in [26]. APPENDIX B EXISTENCE AND UNIQUENESS OF THE FIXED POINT In this section, we show that for any q ∈ [0, 1], the fixed point Equation 3 has a unique solution. The proof in this section is split into two parts. In the first part, we show that function f (q, u) is monotonically increasing and convex in u. In the section part, we use the result of the first part to establish the existence and uniqueness of the fixed point. Fig. 9. Analytical and simulated values of cascade size vs. c for network B (Hamsterster network). VII. CONCLUSION In this paper, we have studied the problem of campaigning in social networks by offering incentives for referrals. We used ideas from percolation theory to compute the campaign size, which was then used to formulate two optimization problems. These problems were not amenable to traditional solutions since they involved a fixed point equation whose solution was analytically intractable. We used results from reliability theory to establish some key properties of the fixed point that enabled us to solve these problems with simple algorithms having linearithmic time complexity. Although we assumed an uncorrelated and locally tree-like network in the analysis, through extensive simulations on real world social networks, we showed that our analytical results are applicable in real world networks. APPENDIX A SOME RESULTS FROM RELIABILITY THEORY In this paper, we prove several propositions using the theory of stochastic order.. Let X and Y be two random variables. Then, X is said to be smaller than Y in the usual stochastic order (denoted by X ≤st Y ) [26] if and only if P [X > x] ≤ P [Y > x] ∀x ∈ (−∞,∞) Next, we present two theorem from [26] without proof, and a lemma. We will use these theorems and lemma in several of our proofs. Theorem A.1: X ≤st Y if and only if E[ψ(X)] ≤ E[ψ(Y )] holds for all non-decreasing functions ψ for which the expec- tation exists. Proof: Refer Chapter 1 of [26]. Theorem A.2: The usual stochastic order is closed under + convolutions, i.e., If X ≤st Y and X X ≤st Y (cid:48) ≤st Y , then X (cid:48) (cid:48) + Y . (cid:48) Proof: Refer Chapter 1 of [26]. Lemma A.1: (i) Let I(p1) and I(p2) be two Bernoulli then random variable with parameters p1 and p2, I(p1) ≤st I(p2) if and only if p1 ≤ p2. 0.31 0.315 0.32 0.325 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5α1=0.2, α2=0.3AnalyticalSimulation 0.3 0.35 0.4 0.45 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5Cascade sizec-α1=0.2, α2=0.8 0.36 0.38 0.4 0.42 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5α1=0.7, α2=0.8 10 f (q, u) − u. It is easy to see that u0 is a fixed point of Equation 3 if and only if f 0(u0) = 0. By differentiating f 0(u) ∂u2 ≥ 0, i.e., with respect to u twice, we get ∂2f 0(u) f 0 is a convex function of u. We also have ∂u2 = ∂2f (q,u) f 0(0) = f (q, 0) = f 0(1) = f (q, 1) − 1 (b) < 0 pex(k) · pth(0k + 1) (a) > 0 k≥0 (cid:88) where Inequality (a) follows because the network is connected and the fraction of zealous nodes lies in the open interval (0, 1), and Inequality (b) follows because the f (q, 1) is a convex combination of non-negative terms less or equal to 1 (some terms are strictly less that 1). Since f 0(0) > 0 and f 0(1) < 0, due to the continuity of function f 0, there exist a point u0 ∈ (0, 1) such that f 0(u0) = 0 i.e., f (q, u0) = u0. We prove the uniqueness of the fixed point by contradiction. Now, if u0, u1 ∈ (0, 1) are two fixed points of Equation (3), then we should have f 0(u0) = f 0(u1) = 0. Without loss of generality, let us assume that 0 < u0 < u1 < 1. Now, choose positive real numbers u2 ∈ (u1, 1) and λ ∈ (0, 1) such that f 0(u2) < 0 and u1 = λu0 + (1 − λ)u2. Then, we have f 0(λu0 + (1 − λ)u2) = f 0(u1) = 0 and λf 0(u0) + (1 − λ)f 0(u2) = (1 − λ)f 0(u2) < 0 =⇒ f 0(λu0 + (1 − λ)u2) Inequality (c) contradicts the convex nature of function f 0. > λf 0(u0) + (1 − λ)f 0(u2) (c) Thus, in turn, establishes the uniqueness of the fixed point. APPENDIX C INCREASING NATURE OF THE FIXED POINT A. Proof of Proposition 3.1 Then, The differentiability of f (q, u) follows from its definition. In this section, we show that f (q, u) is monotonically increasing and convex in u ∈ (0, 1). To show this, we use the theory of stochastic convexity. Let {X(k2, α2u), u ∈ (0, 1)} and {Y (k − k2, α1u), u ∈ (0, 1)} be two collection of independent binomial random variables with parameters (k2, α2u) and (k − k2, α1u), re- spectively. from Lemma A.2, we have {X(k2, α2u), u ∈ (0, 1)} ∈ SICX and {Y (k − k2, α1u), u ∈ (0, 1)} ∈ SICX. Since the random variables are independent, an application of Theorem A.3 gives us {X(k2, α2u) + Y (k − k2, α1u), u ∈ (0, 1)} ∈ SICX. Now, by applying Theorem A.4 we can conclude that (1) {X(k2, α2u) + Y (k − k2, α1u), u ∈ (0, 1)} ∈ SI. (2) P [X(k2, α2u)+Y (k−k2, α1u) > m] is a non-decreasing convex function of u ∈ (0, 1) for all m ∈ N. Let h(u, k, k2, m) = P [X(k2, α2u)+Y (k−k2, α1u) > m]. We note that function h(u, k, k2, m) is non-decreasing and convex in u. Since the network is connected and the frac- tion of zealous nodes lies in the open interval (0, 1), there exists positive integers k0, m0 such that m0 ∈ (0, k0] and pex(k0)pth(m0k0 + 1) > 0. Therefore, we have ∂f (q, u) (cid:88) k(cid:88) (cid:88) pth(mk + 1) · p(k2k)· = pex(k) ∂u ∂h(u, k, k2, m) k≥1 ∂u + pex(k0)pth(m0k0 + 1) m≥1 · (1 − I{k=k0,m=m0,k2=k}) k2=0 ∂P [X(k0, uα2) ≥ m0] (a) > 0 ∂u where Inequality (a) follows because h(u, k, k2, m) and P [X(k0, uα2) ≥ m0], m0 ∈ (0, k0] are non-decreasing and monotonically increasing functions of u, respectively. Simi- larly, we have (cid:88) k≥1 (cid:88) m≥0 ∂2f (q, u) ∂u2 = pex(k) pth(mk + 1) ∂2h(u, k, k2, m) ∂u2 k2=0 (b)≥ 0 where Inequality (a) follows because h(u, k, k2, m) is convex in u. B. Proof of Proposition 3.2 We recollect that u denotes the probability of finding a registered node by following an arbitrary link of the network. Nodes with zero threshold do not need any recommendations, and are registered from the start of the campaign. Thus, if every node has threshold value zero, then the entire network is registered and we have u = 1. On the other hand, nodes with non-zero threshold have to be recommended by active nodes to register. Therefore, if all nodes in the network have non-zero threshold, then there are no node from which the campaign can start. Hence, in such scenarios, we have u = 0. Now, let us consider the case when the fraction of zealous nodes lies in the interval (0, 1). Let us define f 0(u) = k(cid:88) First we introduce some notation and present some prelimi- nary observations. We will use these observations in the proof of Proposition 3.3. Let (cid:19) qk2 (1 − q)k−k2P [Xk2 + Yk−k2 ≥ m] (cid:18) k k(cid:88) p(k2k)· hm,k(q) = k2 k2=0 where random variables Xk2 and Yk−k2 are independent and have a binomial distribution with parameters (k2, α2u) and (k − k2, α1u), respectively. The first step in the proof of Proposition 3.3 is to show that for any m ∈ Z+, P [Xk2 + Yk−k2 ≥ m] is a non-decreasing function of k2 ∈ [0, k]. Let ϕm,k(k2) = P [Xk2 + Yk−k2 ≥ m] ∀k2 ∈ [0, k] We note that if u ∈ (0, 1] then ϕm,k(k2) = 0 only if m > k, i.e., if the number of active neighbours is greater than the node degree. Lemma C.1: For any m, k ∈ Z+, ϕm,k(k2) is non- decreasing function of k2 ∈ [0, k]. 2 ∈ [0, k]. Without loss (cid:48) 2 > k2 and define the following random Proof: Consider two integers k2, k (cid:48) of generality, let k variables Wk2 = Xk2 + Yk−k2 and Wk (cid:48) 2 = Xk (cid:48) 2 + Yk−k (cid:48) 2 Then, we have Wk2 =st Xk2 + Yk−k2 (cid:88)k2 =st Ii(α2u) + i=1 (cid:88)k−k2 i=1 Ii(α1u) where Ii(p) are independent Bernoulli random variable with parameter p and =st implies equality in distribution [26]. Therefore, for any k 2 ∈ [0, k], we have (cid:48) (cid:48) 2 > k2 and k2, k (cid:48) 2)+(k (cid:48) 2−k2) Wk2 =st Ii(α2u) + i=1 (cid:88)k2 (cid:88)k2 (cid:88)k2 (cid:88)k i=1 (cid:48) 2 i=1 =st (a)≤ st i=1 (cid:88)(k−k (cid:88)k−k (cid:88)k−k (cid:88)k−k i=1 (cid:48) 2 i=1 (cid:48) 2 (cid:48) 2 Ii(α2u) + Ii(α1u) + Ii(α1u) Ii(α2u) + Ii(α1u) + Ii(α2u) (cid:88)k (cid:88)k Ii(α1u) (cid:48) 2−k2 i=1 (cid:48) 2−k2 i=1 (cid:48) 2 i=1 i=1 Ii(α2u) + Ii(α1u) =st Wk =st where Inequality (a) follows because α1 < α2 ⇒ α1u ≤ α2u, and due to Lemma A.1. Hence, we have established that for . Thus, k2, k ∀m ∈ Z+ and k ϕm,k(k2) = P [Xk2 + Yk−k2 ≥ m] = P [Wk2 ≥ m] 2 > k2, we have Wk2 ≤st Wk 2 ∈ [0, k] and k (cid:48) 2 > k2, we have (cid:48) 2 (cid:48) (cid:48) (b)≤ P [Wk (cid:48) 2 ≥ m] = P [Xk (cid:48) 2 + Yk−k (cid:48) 2 ≥ m] = ϕm,k(k (cid:48) 2) where Inequality (b) follows because Wk2 ≤st Wk . Thus, we have shown that ϕm,k(k2) is a non-decreasing function of k2 ∈ [0, k]. Now, let us define (cid:48) 2 ψm,k(k2) = k · ϕm,k(k2) (k − k2) ∀k2 ∈ [0, k − 1] Due to Lemma C.1, we can conclude that for any m, k ∈ Z+, ψm,k(k2) is also a non-decreasing function of k2 ∈ [0, k− 1]. Next, establish that the function f (q, u) is monotonically increasing in q. Proposition C.1: If α2 > α1, then ∂f (q,u) ∂q > 0. Proof: hm,k(q) = (cid:88)k−1 = k2=0 = (1 − q) (cid:19) k2=0 (cid:18) k k(cid:88) (cid:19) (cid:18) k (cid:88)k−1 k2 (cid:18)k − 1 (cid:19) k2=0 k2 qk2(1 − q)k−k2 P [Xk2 + Yk−k2 ≥ m] k2 qk2 (1 − q)k−k2P [Xk2 + Yk−k2 ≥ m] + qm · P [Xk ≥ m] qk2 (1 − q)k−k2 · ψm,k(k2) + qm · P [Xk ≥ m] = (1 − q) · E[ψm,k(Z(k − 1, q))] + qm · P [Xk ≥ m] where Z(k − 1, q) is a binomial random variable with param- eters (k − 1, q). Now, consider two real numbers q1, q2 ∈ [0, 1] such that q1 < q2. Then, we have 11 hm,k(q1) = (1 − q1)E[ψm,k(Z(k − 1, q1))] + (q1)mP [Xk ≥ m] (a)≤ (1 − q1)E[ψm,k(Z(k − 1, q1))] + (q2)mP [Xk ≥ m] (b)≤ (1 − q1)E[ψm,k(Z(k − 1, q2))] + (q2)mP [Xk ≥ m] = (1 − q2)E[ψm,k(Z(k − 1, q2))] + (q2)mP [Xk ≥ m] + (q2 − q1)E[ψm,k(Z(k − 1, q2))] = hm,k(q2) + (q2 − q1)E[ψm,k(Z(k − 1, q2))] (11) where (a) follows because q1 < q2. (b) since q1 < q2, we have Z(k − 1, q1) ≤st Z(k − 1, q2) (Lemma A.1). Therefore, due to the non-decreasing nature of function ψm,k, we have E[ψm,k(Z(k − 1, q1))] ≤ E[ψm,k(Z(k − 1, q2))] (Theorem A.1). Also, from the definition, we also have hm,k(q1) = E[ϕm,k(Z(k, q1))] (c)≤ E[ϕm,k(Z(k, q2))] = hm,k(q2) (12) follows because of Lemma A.1, where Inequality (c) Lemma C.1 and Theorem A.1. From Equations (11) and (12), we can see that for any q1, q2 ∈ [0, 1] such that q1 < q2, we have hm,k(q1) = hm,k(q2) if and only if E[ψm,k(Z(k − 1, q2))] = 0. From the definition of function ψm,k, we can see that E[ψm,k(Z(k − 1, q2))] = 0 if and only if m > k. Thus, if m ∈ [0, k], then we can conclude that hm,k(q1) < hm,k(q2). k≥1 m≥1 (cid:88) (cid:88) f (q1, u) = z0 + Thus, we have pex(k)pth(mk + 1)hm,k(q1) Since the network is connected and the fraction of there ex- zealous nodes lies in the open interval (0, 1), ists positive integers k0, m0 such that m0 ∈ (0, k0] and pex(k0)pth(m0k0 + 1) > 0. Therefore, for q1, q2 ∈ [0, 1] z0 =(cid:80) such that q1 < q2, we have hm0,k0 (q1) < hm0,k0(q2). Let k≥1 pex(k)pth(0k + 1) -- fraction of zealous nodes. (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) ≤(cid:88) (cid:41)) pex(k)pth(mk + 1)hm,k(q1)(1 − I(cid:40) + pex(k0)pth(m0k0 + 1) · hm0,k0(q1) + z0 pex(k)pth(mk + 1)hm,k(q1)(1 − I(cid:40) (cid:41)) + pex(k0)pth(m0k0 + 1) · hm0,k0(q2) + z0 (cid:41)) pex(k)pth(mk + 1)hm,k(q2)(1 − I(cid:40) + pex(k0)pth(m0k0 + 1) · hm0,k0(q2) + z0 m=m0 k=k0 m=m0 k=k0 m=m0 k=k0 m≥1 m≥1 m≥1 k≥1 k≥1 k≥1 = < = f (q2, u) i.e., for q1, q2 ∈ [0, 1] such that q1 < q2, we have f (q1, u) < f (q2, u). A. Proof of Proposition 3.3 The continuity of the fixed point follows from the fact that function f (·, u) is a continuous map for all u ∈ [0, 1]. To prove the increasing nature of the fixed point, we use the implicit function theorem. Let f 0(q, u) = f (q, u) − u. According to the implicit function theorem, when f 0(q, u) = 0, we have = − du dq ∂f 0(q,u) ∂q ∂f 0(q,u) ∂u = ∂f (q,u) ∂q 1 − ∂f (q,u) ∂u (cid:16) (cid:17) From Proposition 3.2, we know that for every q ∈ [0, 1], there is a unique fixed point uq ∈ (0, 1) that satisfies f (q, uq) = uq i.e., f 0(q, uq) = 0. Therefore, we have duq dq = (cid:18) ∂f (q,uq) ∂q 1 − ∂f (q,u) ∂u (cid:19) (cid:12)(cid:12)(cid:12)u=uq From Proposition C.1, we know that ∂f (q,u) (0, 1). Since uq ∈ (0, 1), we have ∂f (q,uq) Proposition 3.3, we just need to show that ∂f (q,u) > 0,∀u ∈ ∂q > 0. Now, to prove < 1. (cid:12)(cid:12)(cid:12)u=uq ∂u ∂q (a) We show this by contradiction. We note that f (q, 1) < 1, where Inequality (a) follows because the f (q, 1) is a convex combination of non-negative terms less than or equal to 1 (some terms are strictly less that 1). Since the function f (q, u) is continuous and non-decreasing in u (see Proposition 3.1), (cid:48) (cid:48) (cid:48) q. there exists a point u q) < u We note that the function f (q, u) is convex in u ∈ (0, 1) (see ≥ 1. Proposition 3.1). Now, let us assume that ∂f (q,u) Then, from the definition of convex functions, we have q ∈ (uq, 1) such that f (q, u ∂u (cid:12)(cid:12)(cid:12)u=uq (cid:12)(cid:12)(cid:12)u=uq (cid:48) f (q, u q) ≥ f (q, uq) + (u ≥ f (q, uq) + (u (cid:48) (cid:48) q − uq) · ∂f (q, u) q − uq) q − uq) = u ∂u (cid:48) q (cid:48) (b) = uq + (u (cid:48) q (c)≥ u ⇒ f (q, u (cid:48) q) where Inequality (b) follows because we have f (q, uq) = uq. (cid:48) q. Since this contradiction was due to the assumption that ∂f (q,u) < 1. This, ≥ 1, we should have ∂f (q,u) Inequality (c) contradicts the fact (cid:48) that f (q, u q) < u (cid:12)(cid:12)(cid:12)u=uq (cid:12)(cid:12)(cid:12)u=uq ∂u ∂u in turn, establishes that duq dq > 0. APPENDIX D EQUIVALENCE TO THE LINEAR PROGRAM In this section, we prove the equivalence between problems P1 and P2 presented in Section IV A. Proof of Proposition 4.3 optimal solution of problem P1. If we have (cid:80) Let the value of the objective of problem P1 for incentive- k, k ≥ 1} be an k≥1 k · p(k) · policy φ be denoted as c(φ). Let φo = {φo φo(k) = d · qγ, then we can choose φopt = φo. 12 So, let us assume that 1 d (cid:80) k≥1 k · p(k) · φo(k) = qo > qγ. Our goal to obtain a policy φopt from φo without increasing (cid:88) the cost. Let φopt = qγ qo φo. Then, we have (cid:88) k · p(k) · φo(k) = qγ (13) kp(k) · φopt(k) = qγ qod k≥1 1 d k≥1 and 0 ≤ φopt ≤ φo ≤ 1 (14) From Equality (13) and Inequality (14) we can see that φopt is a feasible solution of problem P1. Further, we also have c(φo) = (cid:88) (a)≥ (cid:88) (b)≥ (cid:88) = c(φopt) k≥1 k≥1 k≥1 ck · p(k) · φo(k) · sk(qo) ck · p(k) · φopt(k) · sk(qo) ck · p(k) · φopt(k) · sk(qγ) (c)≥ c(φo) ⇒ c(φo) = c(φopt) where Inequality (a) follows because φopt ≤ φo, Inequality (b) follows because q0 > qγ and sk(q) is non-decreasing in q (Proposition 4.2), and Inequality (c) follows because φo is an optimal solution of problem P1. Since the cost for policies φo and φopt are equal, and φo is an optimal policy, we can conclude that policy φopt is also an optimal solution of problem P1. B. Proof of Proposition 4.4 k , k ≥ 1} be an optimal solution of problem Let νopt = {νopt P2. Let us define φf (k) = 0 k ·d·qγ νopt k·p(k) Then, we have (cid:88) 1 d k≥1 k · p(k) · φf (k) = qγ 0 < 1 k ·d·qγ νopt k·p(k) φf (k) = if p(k) = 0 otherwise (cid:88) νopt k (a) = qγ k≥1 if p(k) = 0 (b)≤ 1 otherwise (15) (16) (cid:40) where Equality (a) and Inequality (b) follows because {νopt k , k ≥ 1} is a feasible solution of problem P2. From Equality (15) and Inequality (16), we can conclude that φf is a feasible solution of problem P1. k , k ≥ 1} be an optimal solution k≥1 k · p(k) · φopt(k) = d · qγ. The existence of such an optimal policy is guaranteed by Proposition 4.3. Let us define of problem P1 such that (cid:80) Now, let φopt = {φopt k · p(k) · φopt k d · qγ Then, we have(cid:80) νf (k) = k≥1 νf (k) =(cid:80) νk = k·p(k)·φopt k d·qγ ≤ k·p(k) d·qγ k·p(k)·φopt = 1 and 0 ≤ . Hence, νf is a feasible solution of k≥1 d·qγ k problem P2. Further, we also have ckp(k)φopt(k)sk(qγ) ≤(cid:88) (cid:88) k≥1 · µk(qγ) ≤ d · qγ νopt k (cid:88) k≥1 ckp(k)φopt(k)sk(qγ) k≥1 = d · qγ (cid:88) (cid:88) ⇒(cid:88) k≥1 = k≥1 (cid:88) k≥1 ⇒ φf is an optimal solution of problem P1. ckp(k)φopt(k)sk(qγ) = ckp(k)φf (k)sk(qγ) ckp(k)φf (k)sk(qγ) k · µk(qγ) νf k≥1 APPENDIX E OPTIMALITY OF ALGORITHM 2 In this section, we prove that the vector νa returned by Algorithm 2 is an optimal point of problem P2. However, as a first step, we prove the following lemma. Let S = {1, 2,··· , kmax} and kmax is the maximum degree in the network. Lemma E.1: Let ν, a 1×kmax vector, be a feasible solution of problem P2. Then, we have (cid:88)j0 νa j=1 σ(j) ≥(cid:88)j0 (cid:26) j=1 νa σ(1) = min Proof: We prove this lemma by induction. For j0 = 1, we have σ(1) · p(σ(1)) (cid:27) (a)≥ νσ(1) let us assume that (cid:80)j1 d · qγ 1, (17) (cid:80)j1 (cid:80)j1+1 σ(j) ≥(cid:80)j1+1 where Inequality (a) follows because ν is a feasible solution σ(j) ≥ of problem P2. Now, for some j1 ∈ S. We need to show that j=1 νσ(j). σ(j1+1) ≥ νσ(j1+1), then the result is trivial. σ(j1+1) < νσ(j1+1). j=1 νσ(j) j=1 νa If we have νa Let us therefore consider the case where νa This implies that j=1 νa σ(j1+1) < νσ(j1+1) ≤ σ(j1 + 1) · p(σ(j1 + 1)) νa ⇒ νa d · qγ (b) νa σ(j) σ(j1+1) j=1 where Equality (b) follows because of steps 4 and 5 of Algorithm 2. Therefore, if νa σ(j1+1) < νσ(j1+1), then we have j∈S νσ(j) ≥(cid:88)j1+1 j=1 νσ(j) (cid:88)j1+1 j=1 νa σ(j) = 1 = = 1 −(cid:88)j1 (cid:88) A. Proof of Proposition 4.5 (cid:80) Let ν be a feasible solution of problem P2. Since νa and ν are feasible solutions of problem P2, we have j≥1 ν(σ(j)) = 1. Let X a and X two independent random variable taking values from the set S such that P [X a = j] = νa and P [X = j] = νσ(j). σ(j) Then, from Lemma E.1, we have j≥1 νa(σ(j)) = (cid:80) j0(cid:88) νσ(j) = P [X ≤ j0] (18) σ(j) ≥ j0(cid:88) P [X a ≤ j0] = νa j=1 j=1 νσ(j) ∀j0 ∈ S where Inequality (b) follows by setting ν to νopt in Inequal- ity (19). 13 From Equation 18 and the definition of usual stochastic k≥1 orders we can see that X a ≤st X. Therefore, we have (cid:88) (cid:88) = (cid:88) (a)≤ E[µσ(X)(qγ)] = (cid:88) k · µk(qγ) = νa j∈S P [X a = j] · µσ(j)(qγ) = E[µσ(X a)(qγ)] (cid:88) j∈S P [X = j] · µσ(j)(qγ) νk · µk(qγ) σ(j) · µσ(j)(qγ) j∈S νσ(j) · µσ(j)(qγ) = (cid:88) j∈S νa k≥1 = (19) following inequalities Let νopt be an optimal solution of P2. Then, we have the where Inequality (a) follows from an application of The- orem A.1 (X a ≤st X and µσ(j)(qγ) is a non-decreasing function of j). (cid:88) =⇒(cid:88) · µk(qγ) ≤(cid:88) k · µk(qγ) (cid:88) νa k≥1 · µk(qγ) = (b)≤ (cid:88) k · µk(qγ) νa · µk(qγ) νopt k νopt k k≥1 k≥1 νopt k k≥1 k≥1 =⇒ νa is an optimal solution of P2 REFERENCES [1] J. Leskovec, L. Backstrom, and J. Kleinberg, "Meme-tracking and the dynamics of the news cycle," in Proc. 15th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, 2009, pp. 497 -- 506. [2] J. Leskovec, A. Singh, and J. Kleinberg, "Patterns of influence in a recommendation network," in Advances in Knowledge Discovery and Data Mining. Springer, 2006, pp. 380 -- 389. [3] T. N. Dinh, D. T. Nguyen, and M. T. Thai, "Cheap, easy, and massively effective viral marketing in social networks: truth or fiction?" in Proc. 23rd ACM Conf. Hypertext and Social Media, 2012, pp. 165 -- 174. [4] D. Houston, "Dropbox - startup lessons learned," Presentation Slides http://www.slideshare.net/gueste94e4c/dropbox-startup- avaliable lessons-learned-3836587, 2010. at [5] D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread of influence through a social network," in Proc. 9th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, 2003, pp. 137 -- 146. [6] W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," in Proc. 15th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, 2009, pp. 199 -- 208. [7] W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization in social networks under the linear threshold model," in Proc. 10th IEEE Int. Conf. Data Mining (ICDM), 2010, pp. 88 -- 97. [8] J. Hartline, V. Mirrokni, and M. Sundararajan, "Optimal marketing strategies over social networks," in Proc. 17th Int. Conf. World Wide Web, 2008, pp. 189 -- 198. [9] D. Arthur, R. Motwani, A. Sharma, and Y. Xu, "Pricing strategies for viral marketing on social networks," in Internet and Network Economics. Springer, 2009, pp. 101 -- 112. [10] I. Lobel, E. D. Sadler, and L. R. Varshney, social media," Available "Customer at SSRN: referral http://ssrn.com/abstract=2520615, 2014. incentives and [11] A. Karnik and P. Dayama, "Optimal control of information epidemics," in Proc. 4th IEEE Int. Conf. Communication Systems and Networks (COMSNETS), 2012, pp. 1 -- 7. [12] P. Dayama, A. Karnik, and Y. Narahari, "Optimal incentive timing strategies for product marketing on social networks," in Proc 11th Int. Conf. Autonomous Agents and Multiagent Systems-Volume 2, 2012, pp. 703 -- 710. [13] K. Kandhway and J. Kuri, "How to run a campaign: Optimal control of sis and sir information epidemics," Applied Mathematics and Computa- tion, vol. 231, no. 0, pp. 79 -- 92, 2014. [14] -- -- , "Optimal control of information epidemics modeled as maki thompson rumors," Communications in Nonlinear Science and Numeri- cal Simulation, vol. 19, no. 12, pp. 4135 -- 4147, 2014. 14 [15] -- -- , "Campaigning in heterogeneous social networks: Optimal control of si information epidemics," IEEE/ACM Trans. Netw., vol. PP, no. 99, pp. 1 -- 1, 2014. [16] A. Barrat, M. Barthelemy, and A. Vespignani, Dynamical processes on complex networks. Cambridge University Press, 2008. [17] G. J. Baxter, S. N. Dorogovtsev, A. V. Goltsev, and J. F. Mendes, "Bootstrap percolation on complex networks," Phys. Rev. E, vol. 82, no. 1, p. 011103, 2010. [18] S. N. Dorogovtsev, Lectures on complex networks. Oxford University Press Oxford, 2010, vol. 24. [19] M. Granovetter, "Threshold models of collective behavior," American journal of sociology, pp. 1420 -- 1443, 1978. [20] M. W. Macy, "Chains of cooperation: Threshold effects in collective action," American Sociological Review, pp. 730 -- 747, 1991. [21] V. Mahajan, E. Muller, and F. M. Bass, "New product diffusion models in marketing: A review and directions for research," in Diffusion of technologies and social behavior. Springer, 1991, pp. 125 -- 177. [22] E. Berger, "Dynamic monopolies of constant size," Journal of Combi- natorial Theory, Series B, vol. 83, no. 2, pp. 191 -- 200, 2001. [23] N. Karmarkar, "A New Polynomial-time Algorithm for Linear Program- ming," in Proc. 16th Annu. ACM Symp. Theory of Computing, 1984, pp. 302 -- 311. [24] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection," http://snap.stanford.edu/data, Jun. 2014. [25] J. Kunegis, "KONECT Datasets: Koblenz network collection," http:// konect.uni-koblenz.de/, 2015. [26] M. Shaked and J. G. Shanthikumar, Stochastic Orders. Springer, 2007.
1906.07358
1
1906
2019-06-18T03:05:52
Knowledge Network System (KNS) by Evolutionary Collective Intelligence (ECI): Model, Algorithm and Applications
[ "cs.SI" ]
Aiming at overcoming some inherent drawbacks and bottlenecks encountered by the conventional Knowledge, Recommendation, Search, and Social Systems, in this article we introduce the Knowledge Network System (KNS), a novel type of knowledge graph which is constructed by a new proposed algorithm, the Evolutionary Collective Intelligence (ECI) algorithm. The ECI, an agent-machine interactive algorithm, constructs the KNS by iteratively recommending interesting/matched samples/files to the agents, and meanwhile taking advantages of the collective intelligence of the agents. The ECI based KNS, to the best of our knowledge, is the first attempt in literature that integrates the functions of knowledge network construction, high-quality recommendation, new types of search and social in a same framework. Some real and potential applications of KNS and ECI are discussed, and a real system named VISVA is provided to demonstrate their efficacy. Some open problems for future works are also summarized in the end.
cs.SI
cs
Knowledge Network System (KNS) by Evolutionary Collective Intelligence (ECI): Model, Algorithm and Applications Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu(cid:63)(cid:63) Visva, Inc. 20410 Town Center Lane, Suite 295 Cupertino, CA 95014, U.S.A. {taoxiang, zilianghuang, pengbai, congruiji, [email protected] } Abstract. Aiming at overcoming some inherent drawbacks and bot- tlenecks encountered by the conventional Knowledge, Recommendation, Search, and Social Systems, in this article we introduce the Knowl- edge Network System (KNS), a novel type of knowledge graph which is constructed by a new proposed algorithm, the Evolutionary Collec- tive Intelligence (ECI) algorithm. The ECI, an agent-machine interac- tive algorithm, constructs the KNS by iteratively recommending inter- esting/matched samples/files to the agents, and meanwhile taking ad- vantages of the collective intelligence of the agents. The ECI based KNS, to the best of our knowledge, is the first attempt in literature that in- tegrates the functions of knowledge network construction, high-quality recommendation, new types of search and social in a same framework. Some real and potential applications of KNS and ECI are discussed, and a real system named VISVA is provided to demonstrate their efficacy. Some open problems for future works are also summarized in the end. Keywords: Knowledge Network System, Evolutionary Collective Intel- ligence, Knowledge System, Recommendation System, Search Engine, Social Network System, Internet of Things, VISVA 1 Introduction Nowadays, people query/search/receive information from the Internet by using a variety of tools, Knowledge System such as Wikipedia, Search Engine such as Google, Recommend Systems such as TopBUZZ, and Social Network System (SNS) such as Twitter, to name a few. The underlying technologies behind them have proven quite effective during the last decade. Generally, the Knowledge System employs entry to facilitate the query, Search Engines make use of key words matching, Recommend System works by mining the correlations between the articles and/or users, and SNS relies on the follow relationship between users. Though these tools have achieved great success by now, all of them exhibit some inherent drawbacks. (cid:63)(cid:63) Corresponding author 9 1 0 2 n u J 8 1 ] I S . s c [ 1 v 8 5 3 7 0 . 6 0 9 1 : v i X r a 2 Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu The entry system makes query convenient to implement, but it somehow suf- fers from at least the two facts. First, the entry system is tedious to maintain, especially in nowadays many new ideas and concepts emerge almost everyday; second, it is hard to precisely locate in the entry system some multidisciplinary knowledge, let alone those concepts beyond words and unnameable. For the key words based search engines, only the articles containing the key words can be found, but cannot hit those closely related materials but without explicitly containing the key words; it is even harder, if not impossible, to recover those nonverbal medias such as image, video and audio files. Huge number of rec- ommendation algorithms have been proposed in recent years. The content or user based recommendation recommends the content based on some similarity between some related contents or users, but hard to generalize to find other po- tential interesting items; the knowledge graph based recommendation can work in a more systematic way, but how to formulate the knowledge graph (especially suitable for recommendation) remains to be a tough task. The follow relation- ship in SNS means that the follower receives all of the information posted by the one followed, however, in general not all but only a part of the posts might be interesting to the follower, consequently making the follower receive much noise. In view of the above considerations, in this paper we introduce the Knowl- edge Network System (KNS), which is gradually formulated by the Evolutionary Collective Intelligence (ECI), a novel agent(human)-machine interactive learn- ing algorithm proposed particularly for the KNS. The main contribution of this article is summarized as twofold: -- To overcome the drawbacks of the knowledge and recommendation systems etc., we propose the ECI algorithm to construct the KNS, a new type of knowledge construction, storage and distribution system. -- A real application based on the KNS and ECI is presented to illustrate their efficacy. The remainder of this article is organized as follows. The KNS and ECI algorithms are introduced in Sections 2 and 3, respectively, followed by some theoretical analysis and discussions in Section 4. After giving some real and po- tential applications in Section 5, Section 6 concludes this article by summarizing some future works. 2 Knowledge Network Systems Some notations used in the KNS and ECI algorithm are firstly given as follows. -- Knowledge file, denoted by f , is the basic input or sample of the knowledge system. Typical types of knowledge file include such as message, article, image, video, and audio file. -- Knowledge item, denoted by v, exactly a knowledge node in the KNS, rep- resents one basic knowledge point in the KNS. Each item consists of one or more knowledge files, or in other word, the knowledge item is a collection of KNS by ECI 3 these files, which share some common characteristics. Since as will see below each node in the KNS is also accompanied with some agents, sometimes we may also call each item a group in the sense of group of agents. That is, item, node, and group can be exchanged equivalently by context. -- Agent, denoted by a, might being a person or an artificial agent, is defined as an intelligent reactor that might be interested to some particular files. If an agent a is interested in a file f pushed to it, we say that f matches a, and f is a signal to a, or a noise otherwise. Thus, for each agent a, we can define a signal-noise ratio (SNR) on the pushed files as follows, #matched files snra = #unmatched files (1) The Knowledge Networks Systems (KNS), denoted by K, is defined as a dynamic directed knowledge graph K = {V, E}, where V is the set of graph nodes and E = (vx, vy) defines the directed edges from node vx to vy, as illustrated by Fig. 1. Here dynamic implies that the graph including both V and E may evolve over time. Actually, as will see below, K could be evolved initially from a null graph without containing any node. Without doubt, KNS is also possible to be a static graph with fixed nodes and structure if the evolution is finished. Fig. 1. A simple illustration of KNS Each node v in the KNS represents a knowledge item, and v has two at- tributes. The first one is the knowledge files it consists of, and the second one is the agents belonging to it. So, v can be represented as k}, av = {av v = {f v, av}, f v = {f v n} 2, ..., av 2 , ...f v (2) 1 , f v 1, av It is noted that in general it is f v instead of av that defines the knowledge item, just because each agent may cover huge number of knowledge items. It is also because as shown in the next section the collected files f v in each v are voted together by the agents, the knowledge item takes a quite different form from the traditional entry. Based on f v and given two nodes vx and vy, the weight value of the edges exy and eyx can be calculated respectively as exy = f vx ∩ f vy f vy , eyx = f vx ∩ f vy f vx . (3) ………………},{vvafvxyeyxe 4 Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu Each directed weighted edge between two nodes measures not only the simi- larity, but also a hierarchical relationship between them. For example, given two directed edges exy = 0.9 and eyx = 0.5 , the similarity between the two nodes can be directed calculated by 1 2 (exy + eyx) = 0.7, and vx positions a higher hierarchical level in K since simply exy > eyx. In addition, once the KNS is established, we may also employ some hierarchical spectral clustering tools [1,2] on the KNS to mine its hierarchical knowledge structure. In practice, we may set a threshold value Te for the weighted edges, that is, exy is set to be zero if exy < Te. Thus, the KNS is in general a sparse graph, meaning that only a very small fraction of the node pairs is activated. This sparse property is particulary important for a large K, considering both the storage and computational complexities. 3 Evolutionary Collective Intelligence In this section we introduce the Evolutionary Collective Intelligence (ECI), an agent-machine interactive algorithm proposed particularly to generate the KNS. Fig. 2. A simple illustration of the interaction between agents and KNS Generally, the ECI algorithm works by interactions between the agents and the machine: the machine recommends the files to the agents, and the agent chooses to activate or not on the recommendation. The relationship between the agents and the KNS is illustrated by Fig. 2, where the top and bottom layers are the agents and KNS, respectively. If an agent links to some nodes of the KNS, it means that the agent matches this items or belongs to this group. And the ECI algorithm is implemented by extensively using such relationships between the agents and KNS. Actually, the goal of the ECI algorithm comprises two parts: first to generate the KNS with each item consisting of multiple files sharing comment knowledge, and second to achieve a high-qualify recommendation, i.e., high snra for agents. …………KNSAgent……………………},{vvafvxyeyxe KNS by ECI 5 The basic flowchart of ECI algorithm is shown in Fig. 3, where the algorithm starts by a new generated file f , posted by the system or an agent. Then f is recommended/pushed to some initially selected agents A (initial spread in the flowchart), usually in a random or other sophisticated way. More importantly, except for the initial spread, f will also be pushed to some or all of the agents belonging to those activated items I (spread by KNS in the flowchart). Mean- while, f is checked to be qualified or not to be added into I (add into the item in the flowchart), and whether qualified or not, as the founding f ile, to generate a new item (new item in the flowchart). Fig. 3. The basic flowchart of ECI algorithm Spread by KNS is the core module of the algorithm which are crucial to achieve the two goals mentioned above, i.e., to formulate the KNS and to get a high SNR. We give some more details about the module below. In ECI algorithm, a file f is pushed to the agents by two ways: initial spread and spread by KNS. Because the initial spread is usually implemented by ran- domly selecting some initial agents for a new file, its SNR is basically around the random recommendation SNR. Therefore, the SNR is improved based mainly on the spread by KNS, for which two mechanisms are proposed to achieve a high quality recommendation: voting mechanism and multi-round spread mechanism. The voting mechanism refers to that to make a file qualified or further spread in an item, most agents in a group should match the file, or in other words, most agents vote for the file (voting ratio should be bigger than a preset threshold). The multi-round spread mechanism means that a file spreads in a group by being pushed to only some but not all agents in the group in each round, and the file will not spread further in the next round unless it successfully passes the agents voting in the current round. The former one guarantees that only those matched files to the agents could be qualified or even spread in their group, and the latter one further ensures a high SNR by a gradually progressive sampling mechanism. 6 Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu Some other modules are briefly summarized here. New item means that if the number of matched agents of a file f is bigger than a threshold, a new item v is created by taking f as the founding file of v, and also some matched agents are added into the item, i.e., va in eqn.(2). Add into the item is to add a file into an item, i.e., vf in eqn.(2). Normally, the file that passes the whole multi-round spread in an item/group and meanwhile satisfies some other measures1 will be added into the item. 4 Theoretical Analysis and Discussions An overview of the KNS and ECI was described above. Next we give some theoretical analysis and discussions on them. 4.1 on agent In the ECI algorithm, a key step is to check if an agent a matches a file f or not. In the case of the agent being a human user, when the file is pushed to a user, the match is embodied by some positive actions, such as click, comment, or save of the user on the file. But if the agent is an artificial but non-human agent, we need to introduce extra information, on both agent and file, to make the algorithm proceed. Below an extra variable knowledge unit u is introduced for the artificial agent case. Though the concept of knowledge unit is unnecessary for a human user system to implement, it, as an implicit hidden variable, still helps to theoretically analyze both KNS and ECI. A knowledge unit, denoted by u, is considered as the most basic knowledge element in the knowledge system, which cannot be further decomposed. In this sense, a knowledge file f can be taken as a collection of one or more units; meanwhile, from the viewpoint of agent, the knowledge unit can be regarded as the interest of the agent, and thus an agent a can also be taken as a collection of interests or units, That is, given a knowledge unit set U = {u1, u2, ...., um}, (4) a knowledge file f and an agent a can be respectively expressed as a m-dimensional 0 − 1 vectors f = [τ f a = [τ a 1 , τ f 1 , τ a 2 , ...., τ f m]T m]T 2 , ..., τ a (5) where τ = {0, 1}, and τi = 1 implies f or a consists of the ith knowledge or interest unit, i.e., ui. Then, based on eqn. (5), the match between a and f is directly checked by the following r(a, f ), r(a, f ) = (cid:26) 0 if f T a = 0, 1 otherwise (6) 1 For example, the degree of matching between f and the files already in an item v should be checked before f can be added into v. KNS by ECI 7 Eqn. (6) implies that if f and a share at least one unit, then a matches f . We can also assign the number of units shared to r(a, f ) to measure the degree of match. In addition, r(a, f ) can be regarded as a SNR, meaning that the file f is a signal to the agent a if r(a, f ) = 1, or noise otherwise. It is noted that such a definition is consistent with the SNR defined in eqn. (1). In practice, a or f defined in eqn. (5) are usually sparse vectors, especially when m is large. 4.2 on objective of ECI As mentioned above, the goals of ECI are twofold: the KNS and a high SNR, meaning that the KNS can be gradually evolved along with a high-qualify recom- mendation system. So the two types of systems, knowledge and recommendation systems, mutually promote each other. For the KNS, each of its node represents one knowledge item, via a collection of knowledge files. So, these files should be cohesive to make the item compact and focused. The cohesion of each item can be measured by the mean square reconstruction error (MSRE) [3] of the files: the smaller the error the more cohesive the item. Given a knowledge item v and its f v = {f v k} defined by eqn. (2), the MSRE of v is given by 2 , ...f v 1 , f v k(cid:88) i=1 (cid:80)k msre(v) = 1 k i − f v)T (f v (f v i − f v) (7) where f v = 1 is the mean of f v. Based on the MSRE of each item, and by denoting the item set V = {v1, v2, ..., vl} of the KNS K, the MSRE or the k objective function for K is formulated as follows, i=1 f v i M SRE(K) = 1 l l(cid:88) i=1 msre(vi). (8) Minimization of M SRE(K) defines a typical clustering problem, i.e., MSRE clustering which is inherently a NP-hard problem. So in this sense, the ECI provides an algorithm to approximately solve this NP-hard problem. It is noted that, in literature, K-means algorithm [4] is a commonly used technique for solving such clustering problem. However, the K-means like algo- rithm is inapplicable here, because in practice it is usually hard to explicitly get the knowledge unit set U , which is introduced here as a hidden variable for theoretical analysis. by eqn.(6). Thus, by denoting f a = {f a the SNR for a is given as For the second goal, a high SNR, the SNR of a file f to an agent a is given t } as the file list pushed to a, 2 , ..., f a 1 , f a t(cid:88) i=1 snr(a) = 1 t r(a, f a i ) (9) 8 Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu And for the agent set A = {a1, a2, ...., an}, the system SNR can be averagely gotten by n(cid:88) i=1 SN R(A) = 1 n snr(ai) (10) Generally, it is difficult to simultaneously minimize M SRE(K) and maximize SN R(A). ECI, to our best knowledge, is the first attempt in literature to target at the two goals simultaneously. 4.3 on comparison with related techniques The ECI realizes recommendation and constructs knowledge system, but in a much different way from conventional techniques. ECI based KNS can avoid some troubles faced by nowadays related systems, including not only recommen- dation and knowledge, but also search and social systems. Below we give a brief comparison between KNS and the conventional systems. it is noted that for the above four types of systems, the agents in the ECI and KNS are all human user. From the viewpoint of knowledge, by the ECI, the KNS does not need to maintain a sophisticated but tedious entry system; also it can naturally adapt to knowledge changes, including new emerged concepts; furthermore, compared to the tree structure used by encyclopedia, the KNS is much more flexible on mining the knowledge structure. From the viewpoint of recommendation, by the KNS, the system can recom- mend closely related files to users based on the knowledge structure, but not just rely on the similarity (by means of content or users) based techniques. In addi- tion, by the multi-round voting mechanism, the KNS recommendation achieves a high SNR, i.e., a high-qualify recommendation. From the viewpoint of search, the KNS system can provide not only articles, but also any other types of medias, including typically image, video and audio files. This is by now extremely difficult for conventional search engines. Also, somehow similar to recommendation, the search results can include those closely related contents without needing to explicitly contain the searching keywords. From the viewpoint of social, as illustrated by Fig. 2, in KNS the users are not connected directly, but indirectly via the knowledge or interest items. This structure truly realizes the interest social and avoids the hard connection between users, commonly used by SNS systems. In such as interest social system, one user receives only commonly interesting files posted by other users, but excludes the noises. 5 Applications In this section we describe some real and potential applications of the ECI based KNS. KNS by ECI 9 5.1 VISVA The VISVA system2 is a knowledge/interest construction, share and recommen- dation platform, where the posted files will be pushed to interested users, and users receive their interesting recommendations. With the help of the KNS and ECI, the VISVA system integrates all of the four functions: knowledge, recom- mendation, search and social, in a different way from the traditional experiences. Fig. 4 shows four typical knowledge items3, consisting of 3, 3, 12, and 3 files, respectively. We can feel that the files in each group share some common features, but from different perspectives. For instance, the first 3 files somehow share the units "blue, water, ocean", while the third 12 files share the same author, the official account of VISVA China4. Meanwhile, we can feel sometimes, such as the first and the fourth one, that the common units in an item are hard to precisely described in word, so we may regard these knowledge items as mind knowledges5, which is far beyond the conventional entry system. Fig. 4. Four typical nodes of the KNS in VISVA, comprise 3, 3, 12, and 3 files, respec- tively. As for the SNR, in practice we use SN R = #clicked files #pushed files instead of eqn. (1) to measure it, by simply assuming that once a user clicked a file, he/she is interested in it, and vice versa. By the VISVA system, the recommendation SNR is promoted from around 0.1, the random recommendation 2 http://www.visva.com and http://www.visvachina.com. 3 The results are captured from the VISVA China Ta Zai APP. 4 Without using any tag or particular channel, it is surprising to see the system can group the 12 files together without any noise. 5 Actually, the vision of VISVA is to construct a global brain [5]. 10 Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu SNR, to around 0.35, that is, VISVA significantly improves the recommendation qualify by 3.5 times6. 5.2 other potential applications The KNS and ECI can also be straightforwardly applied to some other types of recommendation system, such as the electric commercial platform to achieve more reasonable product recommendations, or it can be served as a fundamen- tal multi-platform (commercial, reading, education, restaurant etc.) information spreading system, to integrate these looking-very-different information and re- alize a cross-cutting recommendation at the operation system (OS) level. From the perspective of information flow, the KNS and ECI realize a high efficient information distribution from the sender to target receivers. So the KNS in this sense functions as a router, which is a core requirement for the internet of things (IoT). From the perspective of machine learning, the ECI realizes an automated feature extraction or data clustering (by the nodes in KNS), two important tasks in machine learning. Though there are further more challenges to be solved (see the last section for details), the KNS and ECI do provide a new perspective and tool to re-consider and re-formulate these problems. 6 Conclusions and Future Works In this article we introduced the KNS and ECI algorithm. Basically, the ECI al- gorithm collectively takes advantages of intelligence of agents in an evolutionary manner, thus named ECI. The ECI based KNS is a new knowledge generation, storage and distribution system, which avoids many drawbacks and bottlenecks encountered by nowadays knowledge, recommendation, search and social sys- tems. A real application, VISVA, was built based on the KNS and ECI, and has exhibited some promising and quite surprising results. On the other hand, this paper basically gives only some preliminary theoretical analysis about the model and algorithm, on which there are many open problems worth further exploring. First, as an original but mainly heuristical algorithm, though has achieved great progresses especially in real application, the ECI still needs further theo- retical analysis, on such as convergence, error bound, and complexity. In addition to some theoretical insights, it will also definitely help to further improve the algorithm itself. Second, it is also beneficial to make an extensive comparison, from the per- spective of model and algorithm instead of just function, with related works. (Google) knowledge graph and collaborative filtering [6] used by recommenda- tion system, the Pagerank [7] like voting techniques used by search engine, are typical examples. 6 By comparison, in an artificial test of VISVA, by setting A = 1000,U = 54, number of files F = 953, and average i ai = 1.543, where f, a is defined by eqn.(5), the system SNR was greatly improved from the random 0.0883 to 0.5492. (cid:80)1000 (cid:80)953 i=1 aT i=1 f T i fi = 3.178, 1 953 1 1000 KNS by ECI 11 Last but not least, how to design machine agent for ECI is another important further work. By machine agents, which might be preset or learned during the evolution, the information generation and distribution mechanisms of KNS and ECI may generalize them to vast applications in the fields of, such as, machine learning, evolutionary computation and IoT. References 1. Von Luxburg, U.: A tutorial on spectral clustering. Statistics and computing 17(4), 395 -- 416 (2007) 2. S´anchez-Garc´ıa, R.J., Fennelly, M., Norris, S., Wright, N., Niblo, G., Brodzki, J., Bialek, J.W.: Hierarchical spectral clustering of power grids. IEEE Transactions on Power Systems 29(5), 2229 -- 2237 (2014) 3. Xu, L.: Least mean square error reconstruction principle for self-organizing neural- nets. Neural networks 6(5), 627 -- 648 (1993) 4. Hartigan, J.A., Wong, M.A.: Algorithm as 136: A k-means clustering algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics) 28(1), 100 -- 108 (1979) 5. Bloom, H.: Global brain. NY: Wiley (2000) 6. Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1999. pp. 230 -- 237. Association for Computing Machinery, Inc (1999) 7. Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web. Tech. rep., Stanford InfoLab (1999)
1711.10002
1
1711
2017-11-27T21:10:48
TweetIT- Analyzing Topics for Twitter Users to garner Maximum Attention
[ "cs.SI" ]
Twitter, a microblogging service, is todays most popular platform for communication in the form of short text messages, called Tweets. Users use Twitter to publish their content either for expressing concerns on information news or views on daily conversations. When this expression emerges, they are experienced by the worldwide distribution network of users and not only by the interlocutor(s). Depending upon the impact of the tweet in the form of the likes, retweets and percentage of followers increases for the user considering a window of time frame, we compute attention factor for each tweet for the selected user profiles. This factor is used to select the top 1000 Tweets, from each user profile, to form a document. Topic modelling is then applied to this document to determine the intent of the user behind the Tweets. After topics are modelled, the similarity is determined between the BBC news data-set containing the modelled topic, and the user document under evaluation. Finally, we determine the top words for a user which would enable us to find the topics which garnered attention and has been posted recently. The experiment is performed using more than 1.1M Tweets from around 500 Twitter profiles spanning Politics, Entertainment, Sports etc. and hundreds of BBC news articles. The results show that our analysis is efficient enough to enable us to find the topics which would act as a suggestion for users to get higher popularity rating for the user in the future.
cs.SI
cs
TweetIT- Analyzing Topics for Twitter Users to garner Maximum Attention Dhanasekar Sundararaman SSN College of Engineering Chennai, Tamilnadu Priya Arora Texas A&M University Texas India [email protected] United States [email protected] Vishwanath Seshagiri College of Engineering, Guindy Chennai, Tamilnadu India [email protected] ABSTRACT Twitter, a microblogging service, is today's most popular platform for communication in the form of short text messages, called Tweets. Users use Twitter to publish their content either for expressing concerns on information news or views on daily conversations. When this expression emerges, they are experienced by the worldwide distribution network of users and not only by the interlocutor(s). Depending upon the impact of the tweet in the form of the likes, retweets and percentage of followers increases for the user considering a window of time frame, we compute attention factor for each tweet for the selected user profiles. This factor is used to select the top 1000 Tweets, from each user profile, to form a document. Topic modelling is then applied to this document to determine the intent of the user behind the Tweets. After topics are modeled, the similarity is determined between the BBC news data- set containing the modeled topic, and the user document under evaluation. Finally, we determine the top words for a user which would enable us to find the topics which garnered attention and has been posted recently. The experiment is performed using more than 1.1M Tweets from around 500 Twitter profiles spanning Politics, Entertainment, Sports etc. and hundreds of BBC news articles. The results show that our analysis is efficient enough to enable us to find the topics which would act as a suggestion for users to get higher popularity rating for the user in the future. systems➝Database management CCS Concepts • Information system engines • Computing methodologies➝Massively parallel and high-performance simulations. This is just an example; please use the correct category and subject descriptors for your submission. The ACM Computing Classification Scheme: Keywords Topic modelling; Twitter; Text Mining 1. INTRODUCTION Social networks like Twitter, Facebook etc. are becoming an essential part of everyday life. Being a microblogging platform, Twitter has gained so much of attention in the past few years since it allows users to post short text messages, called Tweets on their timeline. These Tweets range from news articles to gossips but within a limit of 140 characters. It enables interested parties to follow individual user's views on an event or a topic in real-time[1]. Users tend to follow people with whom they share common interests or who they want to know more about like their favourite celebrities etc. Hence, people tend to post Tweets that can bring maximum attention to their engaged followers as well as which can fetch more followers to the profile. An analysis on this is imperative as it tends to reveal the topics a particular user has posted, which fetched a lot of attention enabling them to do the same in the future. Now after developing an efficient service for determining the potential suggested topics, a user can enhance his follower list. This list is expanded gradually depending upon the topic chosen for the tweet which, in turn, leads to getting most popularity ratings. The newly added followers would have shared the same interests like the topic of the tweet, or the topic trending in the market. For example, if the user is a healthcare consultant and tweets are highly focussed on health-insurance, health-benefits, meditation and medical-equipments etc., the followers of that user would have interest in this domain. However, if the user is a popular celebrity or a politician, the topic of the tweet may span various topics ranging from entertainment to politics. Hence, with the liking in several domains, the user gets increment in his follower list within a time frame. Though this seems obvious, what if there is a way to find the topics, among several interested once, which a user can focus the most so that his follower list could be increased; and this could lead to getting most popularity ratings for that user profile based upon the tweet. To get this rating, we propose a topic- modeling based twitter service that would help in determining the top words that a user could use for enhancing the follower's list and hence popularity ratings. To summarise,  We take the last 3000 tweets from Twitter API of several users (over 500) of various domains like entertainment, politics, sports. Further, we analyse, pre-process and mine the data.   For each user, we select top 1000 tweets based on the attention factor of the tweets. This attention factor is determined by the number of likes on the tweet and retweet count, on a topic, within a time-frame window. Then we apply the topic modelling on each user document containing top 1000 tweets. BBC news data- set is then analysed to find the topic and compared with the document of each user. The similarity between the user's tweet top-document and the BBC data-set suggests us the topic that a user should tweet upon to get the maximum popularity ratings. The paper is organised as follows. Section 2 deals with the literature survey about the Twitter as a major microblogging platform in social media. It also highlights scenarios where user modelling can be done on the Twitter API. Section 3 talks about the collection of Twitter and BBC news dataset and the filters employed to extract Tweets from the user efficiently. Section 4 describes the profile modeling in which the most representative terms are found and the similarity measures employed and the accuracy with which proposed study can be used for the suggestion of the topics to the user. Section 5 explains the process behind our research work while section 6 highlights the results of the process. We conclude finally with Section 7 reflecting on the shortcomings with the future vision of this work. 2. RELATED WORKS The social microblogging services/platform such as Twitter helps in engaging people by letting them publish about their thoughts ranging from entertainment to politics. Millions of people, now a day is part of this microblogging platform. Everyone uses Twitter for conveying their views and to follow like-minded people who post such views. Due to such a large user-base, this platform has gained lots of attention from the research point of view. Hence, to study the work already done in this direction, we provide the literature survey that is most closely related to our work. The work done by [2,3] describes the notion of Twitter being a microblogging website and how it impacts the society. It also hypothesises the differences between a users' network connection structure by suggesting three types of unique user activities - information sharing, information seeking and social activity. Likewise, work done by [4,5,6] provides us with a background as to how the tweets can be handled for such a large user-base platform services. Moreover, it gives us the strategies as to how tweets can be analysed. Similarly, the work done by Liu et al. [7] gives us several tools for mining the data obtained from various data-sets. Apart from the study of Twitter, a micro-blogging service and how the tweets can be analysed, much of the work has been done in studying the pattern of tweets, like the work was done by Krishnamurthy et al. [8] perform a descriptive analysis of the Twitter network. It suggests that frequent updates might be correlated with high overlap between friends and followers. Similarly, Cha et al. [9] study the impact of mentions, retweets and on the dynamics of on topics and time. Apart from the impact of the users' tweet on the community, there has been work done as to how the expressed tweet content influence the society as studied by Cataldi et al. [10]. The same kind of work has been done by Rui et al. as described in work [11]. In another work, Guo et al. [12] the patterns of user tweets in several online communities, such as a blog system, a question-answering social network and a social bookmark-sharing network. They find that the rank order distribution of user postings follows stretched exponential distribution. There is one study which indirectly relates to our hypothesis, as mentioned above, by Huberman et al. [13] which says in crowdsourcing exhibits a strong positive dependence on attention, measured by the number of downloads. They find that the lack of interest leads to a decrease in the number of uploaded videos and a hence a drop in productivity. from YouTube exhibited that analysis of data There is one more parameter to determine the popularity of a Twitter account, and that is the follower counts. Many studies have been done as what makes a Twitter follower count and the factors that impact its increment as done by [14,15, 16, 17]. Depending upon the discussion on the topics based upon the recency and variety of topics happen on Twitter, user profiles generated from Twitter posts promise to be beneficial for other applications on the social web as well. However, automatically inferring the semantic meaning of Twitter posts is a non-trivial problem as mentioned in work [18]. 3. DATA COLLECTION AND PREPROCESSING In this section, first of all, we describe the data-set obtained from Twitter API and then the process using which tweets are collected related - sports, politics, education, to several domains entertainment, and philosophy. Then, we explain about the BBC dataset and finally about preprocessing these data. 3.1 Twitter Data Collection The process used for filtering out the data-set is as follows:- First of all, a large number of Twitter profiles are selected, each contains a large number of tweets. A popularity filter is employed to find the Twitter profiles having a minimum threshold of followers (several thousand). Second, a Language filter is applied to extract the words used for tweeting by the users. Language filter provides consistency across geographically distributed domains for the same user profile where the same user profile is perceived differently due to the usage of different language depending on the region. Further, a domain filter is applied to extract user profiles by comparing it with the words or topics extracted from the BBC news dataset. To perform this experiment, we have extracted approximately 3000 user profiles of renowned people among various domains. At an average of 120 characters per tweet, our dataset comprises 1.1M tweets with 130M characters approximately. 3.2 News Data Collection The news articles data is collected from the news provider, BBC available publicly online. It spans from various topics like politics, sports, entertainment, regional news, religion and current trends. These news articles were carefully chosen to include the interests of that of various Twitter profiles to avoid any bias. Hundreds of such news articles are preprocessed to remove any abbreviations and acronyms. The preprocessed text is then aggregated into a single text document as a collection of news articles. This forms the query document, that is the document that is queried on different Twitter profiles for similarity. 3.3 Preprocessing The first step in pre-processing is to transform the data to get an efficient format so that the top influential words of the tweets for each user profile can be extracted. Here, preprocessing essentially deals with filtering out non-required words from a user's profile. The non-required words are selected by sorting the bag of words selected for each user profile. This sorting is done by the number of likes and increment in follower count to that user profile. To filter out the acronyms in a tweet, we pre-process the data by using acronym dictionary by converting acronyms to their full forms. For example, "omg" is translated to "Oh My God". During pre- processing, words containing symbols such as '@,' #' and numerics are removed. The 1.1M such preprocessed tweets are carefully documented based on their domains. To process the data using our proposed methodology, it is required for the Tweets not be just arranged as stand-alone strings but rather as user profile text documents. Hence 1000 such selected tweets from each user profile are merged to form one single profile document, which collectively makes up an exhaustive dataset. 4. PROFILE MODELING AND SIMILARITY In this section, first, we discuss the profile modeling by determining the most representative words of that particular user profile (Section 4.1), and then we determine the similarity the user's document (Twitter profile) and the BBC data-set using suitable distance metric (Section 4.2). 4.1 User Profile Modeling User profile modelling refers to the top influential words of a user profile, by top influential we mean the most important words that gain the maximum number of likes with the increment in the number of followers to that user. As already defined, this importance is a measure by the number of likes and increment in the number of followers to the user profile based on the tweet. For determining the same, we compute TF-IDF between the documents generated using user's profile with the one obtained using BBC data-set for the same influential word. TF-IDF is the feature selection approach to determine the highly representative words of a document by ignoring the words that don't convey any meaning to the content like stop words. Table 1. TF-IDF of few sample terms in @realDonaldTrump realDonaldTrump TF-IDF taxes election washington reforms immigrant >0 >0 >0 >0 >0 Table 2. TF-IDF of few sample terms in @katyperry katyperry TF-IDF taxes election washington reforms immigrant 0 0 >0 0 0 Table 1 shows the TF-IDF of sample terms in @realDonaldTrump profile. These words were completely picked at random. The TF- IDF scores of these words are greater than 0, which implies that these words have been used a considerable number of times and are important or characteristic of that Twitter profile. We then see the TF-IDF scores of the same words in another contrasting Twitter profile. Table 2 shows that only some of the words enlisted (in fact only one out of five) have a score, the rest are zeros. This indicates that the first Twitter profile, being a one that of politician involves a lot of terms related to government and country. The second profile, on the other hand, belongs to the entertainment industry, and obviously, the words that relate to the notion of government and politics has a score of zero. When the similarity between these two profiles is analysed, they were found to be far less than that of two profiles involving political domain. 4.2 Profile Similarity Now that the top influential words in a user profile are identified using TF-IDF scores, the similarity between the user profile (Twitter profile) document with the BBC data-set document can be compared. Various distance metrics exist to compute this similarity such as Cosine, Euclidean, and Manhattan, etc. However, Cosine distance is the appropriate choice [19] for this work since it takes care of the bias caused due to the difference in the document lengths. This similarity is computed using TF-IDF which computes inner product of two vectors generated for the two documents (sum of the pairwise multiplied elements) which are further divided by the product of their vector lengths. The resultant score lies in the range of 0 and 1. Hence, the similarity score is obtained by subtracting this value from 1. Cosine distance = (d1d2)/d1d2 Where d1 and d2 are the vectors of the same length. Cosine similarity = 1 − (d1d2)/d1d2 While calculating the similarity between the user profile document and BBC dataset generated querydocument, the top terms contained in the query document alone are taken. The TF-IDF scores corresponding to the top words present in the user tweet is used for cosine distance computation. That is, the influential words present in the user profile are searched in the document generated using BBC dataset for the same word. Next, the TF-IDF scores of these two documents are compared for finding the similarity. 5. TweetIT – The Process The process behind TweetIT can be broken down into three steps. 5.1 Gathering Popular Tweets For modelling a person's popularity, one has to consider the reach which the person has amongst the Twitterati. Twitter provides us with a quantitative measure in the form of Likes and Retweets for every tweet, which can be used to gauge the person's ken about a certain topic or event. We combine these measures to calculate the attention factor, which is an average of some retweets and likes. Attention_Factor = 0.5 * No of Likes + 0.5 * No of Retweets This Attention_Factor is calculated for all the Tweets, and the top 1000 Tweets for each profile is obtained and stored in a separate document. Once these tweets are gathered, the time that has elapsed since the last posting this tweet is obtained and sorted from latest to oldest Tweet. This is done so that the tweet which is most recent and has highest attention_factor appear at the top. Using these newly acquired Tweets, Topic Modelling (Section 4.1) is performed to identify the topics on which a user is Tweeting. 5.2 Analyzing Similarity After gathering recent popular Tweets for each of the 500 Twitter profiles, we then analyse the similarity of these Tweets with the BBC news articles. A percentage score of similarity is obtained for each profile with every news articles. The similarity is achieved by the presence of words/ topics present in the Tweets that are also present in the news articles For each profile, we compare its similarity using the formulas described in section 4.2 with all the latest news articles and find the most similar user and the second most similar user and so on. 5.3 Analyzing Topics After finding similarity between the news articles and the various Twitter profiles, we then analyse the words or in more technical form topics, that caused the similarity in the first place. We use Influential Term Metric, proposed in [20] that finds the topics that have high influence individually in the Twitter profile, news data and together as a whole. The topics may be biased based on the nature of the dataset. If the news articles contained in the majority of sports, the most similar profiles could be that of a sportsperson, and the top words could be that related to sports. A glimpse of the results obtained through BBC news articles and Twitter profiles is shown in Tables 3 and 4 in the next section. 6. RESULTS Table 3. Similarity Ranking of Twitter profiles to BBC News QUERY DOCUMENT TWITTER PROFILE RANK BBC NEWS DATASET faisalislam jamesrbuk benfenton robfordmancs paullewismoney DouglasCarswell montie PatrickStrud JolyonMaugham 1 2 3 4 5 6 7 8 9 IanDunt 10 For finding the result, we combined 300 BBC news articles from various domains and used it as our query document. It was a collection of all the latest trending news from across the globe. Similarly, top 1000 Tweets of each user were sorted by the posted date, and stored in the separate document, which was used to compare against the query document. Based on similarity explain in 4.2, we have ranked the profiles Table 3 shows the top 10 profiles, whose tweets are similar to topics trending in BBC dataset. When we get all news articles from other genres, it can show how the ranking varies based on the content of news. This goes on to show that, even if personal tweets could be ranked, there needs to be a correlation with the trending topics, to propagate your opinions better. Apart from finding similarity between a news article and Twitter profiles, we go a notch higher and find the topics that are influential [20]. Five of the top such topics, between each Twitter profile, and BBC News is shown in Table 4. Top 5 such topics of @faisalislam are 'labour, government, chancellor, market, tories' which have been recently posted and garner maximum attention from the Twitteratti. Thus our system enables one to find many such topics for each Twitter profile by latest news sources, and propagate their views across depths of social media. Table 4. Top words in most similar Twitter profiles NAME TOPWORDS faisalislam jamesrbuk labour government chancellor market tories people britain premiership benfenton robfordmancs public secretary mobile election british england digital voters research growth ireland economic pensions customers paullewismoney compensation ryanair company 7. CONCLUSION Thus, we were able to determine topics of Twitter profiles that were posted recently, has attained widespread recognition and found in that of news headlines. This enables the user to retrospect on topics that garnered more attention than average, which in turn helps to grow the followers. The system can work to find such topics for any Twitter profile and a query document. The query document can be a news article, advertisement or any text for which related Twitter profiles is to be found. There are certain drawbacks in this process such as the failure to detect semantic words – words with the same meaning but in different forms. In the future, we would use dictionary such as Wordnet to eliminate redundancies caused by such misinterpretations. 8. REFERENCES [1] Schonfeld, E.: Mining the thought stream. TechCrunch Weblog Article (2009), http://techcrunch.com/2009/02/15/mining-the-thought- stream/ [2] Java Akshay, Xiaodan Song, Tim Finin, Belle Tseng. Why We Twitter: Understanding Microblogging Usage and Communities. Springer, 56-65, 2007.. [3] Mor Naaman, Jeffrey Boase, Chih Hui Lai. Is it really about me?: Message content in social awareness streams. 189-192, 2010. [4] Aditi Gupta, Ponnurangam Kumaraguru. Credibility ranking of tweets during high impact events. 978-1-4503-1236-3, 2012. [5] Danah Boyd, Scott Golder, Gilad Lotan. Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter. 1530-1605, 2010 [6] Honeycutt, C., & Herring, S. Beyond microblogging: Conversation and collaboration via Twitter. In Proc. HICSS '09. IEEE Press (2009). [7] Liu, B.: Web data mining; Exploring hyperlinks, contents, and usage data. Springer, Heidelberg (2006) - how to mine data. [8] Krishnamurthy, B., Gill, P., and Arlitt, M. A few chirps about twitter. In Proc. WOSP '08. ACM Press (2008) Follow the green: growth and dynamics in twitter follower markets. In Proc IMC 2013. [15] Haewoon Kwak, Changhyun Lee, Hosung Park, Sue Moon; What is Twitter, a social network or a news media?. In Proc WWW 2010. [16] Meeyoung Cha , Hamed Haddadi , Fabrício Benevenuto , Krishna P. Gummadi; Measuring user influence in Twitter: The million follower fallacy. In Proc ICWSM 2010. [9] Meeyoung Cha, Hamed Haddadi, Fabr´ıcio Benevenuto, [17] Chunliang Lu, Wai Lam, Yingxiao Zhang; Twitter User Krishna P. Gummadi. In Proc. ICWSM (2010). [10] Mario Cataldi, Luigi Di Caro, Claudio Schifanella; Emerging topic detection on Twitter based on temporal and social terms evaluation. In Proc MDMKDD'10 2010. [11] Huaxia Rui, Andrew Whinston; Information or attention? An empirical study of user contribution on Twitter. In Proc. Information Systems and e-Business Management 2012. [12] Guo, Lei, et al. "Analyzing patterns of user content generation in online social networks." Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009. [13] Bernardo A. Huberman, Daniel M. Romero, Fang Wu; Crowdsourcing, attention and productivity. In Proc KDD, 2009. [14] Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao; Modeling and Tweets Recommendation Based on Wikipedia Concept Graph. In Proc AAAI 2009. [18] Fabian Abel, Qi Gao, Geert-Jan Houben, Ke Tao; Semantic Enrichment of Twitter Posts for User Profile Construction on the Social Web. In Proc ESWC 2011. [19] Huang, Anna. "Similarity measures for text document clustering." Proceedings of the sixth new zealand computer science research student conference (NZCSRSC2008), Christchurch, New Zealand. 2008. [20] Sundararaman, Dhanasekar, and Sudharshan Srinivasan. "Twigraph: Discovering and Visualizing Influential Words Between Twitter Profiles." International Conference on Social Informatics. Springer, Cham, 2017. Columns on Last Page Should Be Made As Close As Possible to Equal Length Authors' background Your Name Title* Research Field Personal website *This form helps us to understand your paper better, the form itself will not be published. *Title can be chosen from: master student, Phd candidate, assistant professor, lecture, senior lecture, associate professor, full professor
1504.06394
1
1504
2015-04-24T05:01:12
Social Trust Prediction via Max-norm Constrained 1-bit Matrix Completion
[ "cs.SI", "cs.LG", "stat.ML" ]
Social trust prediction addresses the significant problem of exploring interactions among users in social networks. Naturally, this problem can be formulated in the matrix completion framework, with each entry indicating the trustness or distrustness. However, there are two challenges for the social trust problem: 1) the observed data are with sign (1-bit) measurements; 2) they are typically sampled non-uniformly. Most of the previous matrix completion methods do not well handle the two issues. Motivated by the recent progress of max-norm, we propose to solve the problem with a 1-bit max-norm constrained formulation. Since max-norm is not easy to optimize, we utilize a reformulation of max-norm which facilitates an efficient projected gradient decent algorithm. We demonstrate the superiority of our formulation on two benchmark datasets.
cs.SI
cs
Social Trust Prediction via Max-norm Constrained 1-bit Matrix Completion Jing Wang1, Jie Shen2, Huan Xu3 1 Hefei University of Technology, China [email protected] 2 Rutgers University, USA [email protected] 3 National University of Singapore, Singapore [email protected] Abstract Social trust prediction addresses the significant problem of exploring interactions among users in social networks. Naturally, this problem can be for- mulated in the matrix completion framework, with each entry indicating the trustness or distrustness. However, there are two challenges for the social trust problem: 1) the observed data are with sign (1-bit) measurements; 2) they are typically sampled non-uniformly. Most of the previous matrix com- pletion methods do not well handle the two issues. Motivated by the recent progress of max-norm, we propose to solve the problem with a 1-bit max- norm constrained formulation. Since max-norm is not easy to optimize, we utilize a reformulation of max-norm which facilitates an efficient projected gradient decent algorithm. We demonstrate the superiority of our formulation on two benchmark datasets. 1 Introduction With the increasing popularity of social networks, there ex- ist many interesting and difficult problems, such as friends recommendation, information propagation, etc. In this paper, we study the problem of social trust prediction, which aims to estimate the positive or negative relationship among the users based on the existing trustness information associated with them. This problem plays an important role in social networks as the system can block the invitation from some- one that the user does not trust, or recommend new friends who enjoys a high reputation. the trust within the matrix social problem Naturally, formulated can completion be [Liben-Nowell and Kleinberg, 2007] framework [Billsus and Pazzani, 1998]. the (i, j)-th entry of the observed data matrix Z ∈ Rn×n is a 1-bit code implying that the i-th user trusts the j-th user if Zij = 1. Here, n denotes the number of users. However, what we observe is only a small fraction of the entries, whose values are zero. And our goal is to estimate the missing entries according to the 1-bit measurements in Z. That is, Note that the problem is ill-posed if no assumption is im- posed on the structure of the data. To solve the problem, a number of methods are proposed. Generally, existing so- cial trust prediction methods fall into three categories. The first category is based on similarity measures or the struc- tural context similarity [Newman, 2001] [Chowdhury, 2010] [Katz, 1953] [Jeh and Widom, 2002], motivated by the in- tuition that an individual tends to trust their neighbors, or the ones with similar trusted people. The second is based on low rank matrix completion [Billsus and Pazzani, 1998] [Cai et al., 2010] [Huang et al., 2013], which assumes that the underlying data matrix is low-rank or can be approximate by a low-rank matrix. The third one models the problem as a binary classification one and utilizes techniques such as lo- gistic regression [Leskovec et al., 2010]. Challenges. However, there are two issues emerging in social trust prediction which are not well characterized by the algorithms in previous works. First, the value of the observed entry is either 1 or −1, which is analogous to the binary classification problem. But in our problem, we are handling much more complex matrix data. For- tunately, [Srebro et al., 2004] presented a maximum margin matrix factorization framework that unifies the binary prob- lem for vector case and matrix case. The key idea in their work is a low-norm matrix factorization, which will also be utilized in this paper. Second, the locations of the entries are sampled non-uniformly, which gaps the theory and practice for a lot of matrix completion algorithms. To tackle this chal- lenge, we suggest using the max-norm as a convex surrogate for the rank function, which is shown to be superior to the well-known nuclear norm when addressing the non-uniform data [Salakhutdinov and Srebro, 2010]. Our contributions are two-folds: 1) To the best of our knowledge, we are the first to address the social trust predic- tion problem by utilizing a max-norm constrained formula- tion. 2) Although a max-norm constrained problem can be solved by SDP solvers and an accurate enough solution can be achieved, we here utilize a projected gradient algorithm that is scalable to large scale datasets. We empirically show the improvement of our formulation for the non-uniform 1-bit benchmarks compared to state-of-the-art solvers. 2 Related Work interaction is investigated intensively in the last Social decades. The social interaction indicates the friendship, sup- port, enemy or disapproval as shown in Figure 1. Online users user-item matrix, such as transitivity. Meanwhile, the social trust in reality is extremely sparse. For instance, Facebook has hundreds of millions of users, but most of them have less than 1,000 friends. Besides, the people with similar person- ality tend to behave similarly. To sum up, the data matrix of social trust has both sparse and low-rank structure. Thus, the social trust prediction problem is especially suitable for the matrix completion model. That is the focus of our paper. The problem of matrix completion is to recover a low-rank matrix from a subset of entries [Cand`es and Recht, 2009], which is given by: rank(X) min X s.t. PΩ(X) = PΩ(Z) (2.1) where Z ∈ Rp×n is the data matrix, X is the recovered matrix, and Ω is the index set of observed entries. Th op- timization problem (2.1) is not only NP-hard, but requires double exponential time complexity with the number of sam- ples [Recht et al., 2010]. To solve the above problem, one alternative is to use nuclear norm as a relaxation to the rank function: X∗ min X s.t. PΩ(X) = PΩ(M ) (2.2) [Keshavan et al., 2010] where X∗ denotes the sum of singular values of matrix [Cai et al., 2010] developed a first-order procedure X. to solve the convex problem (2.2), namely singular [Jain et al., 2010] minimized value thresholding (SVT). the rank minimization by the singular value projection (SVP) algorithm. solved the trimming each row and column with problem by first too few entries, then compute the truncated SVD of the trimmed matrix. it showed accurate recovery on the order of nd log n samples (n is the number of samples, d is the rank of recovered ma- trix). With the rapid development of matrix completion problem, some more efficient methods have been proposed [Cand`es and Tao, 2010][Gross, 2011][Wang and Xu, 2012][Huang et al., 2013]. Under certain conditions, However, all the methods mentioned above use the nuclear norm as the surrogate to the rank, whose ex- act recovery can be guaranteed only when the data are sampled uniformly, which is not practical in real world applications. On the other hand, recent empiri- cal on max-norm [Srebro et al., 2004] shows promising re- sults for non-uniform data if one utilize the max-norm as a surrogate [Salakhutdinov and Srebro, 2010]. Notably, for some specific problems, such as collaborative filter- ing, [Srebro and Shraibman, 2005] proved that the general- ization error bound for max-norm is better than the nuclear norm. More recently, [Shen et al., 2014] reported encourag- ing results on the subspace recovery task (which is closely relevant to matrix completion). Since the social trust data is non-uniformly sampled, we believe that a max-norm regu- larized formulation can better handle the challenge than the nuclear norm. Our formulation is also inspired by a re- cent theoretical study on matrix completion with 1-bit mea- surement [Cai and Zhou, 2013], which established a minimax Figure 1: Illustration of the data matrix of social trust. Each column of the data matrix is a rating sample. Each entry is a tag that a user assigns to another user. The symbol "+" de- notes the "trust" relationship, "-" denotes "distrust" and "?" means unknown relationship (that we aim to predict). Most of the relationships are unknown, so the data is sparse. Typi- cally, each individual has own preference and friendship net- work, making the data non-uniform. Also noted that the data matrix may not be symmetric. rely on the trustworthiness information to filter information, establish collaboration or build social bonds. Social networks rely on the trust information to make recommendation, at- tract users from other circles, or influencing public opinions. Thus, the exploration of social trust has a wide range of ap- plications, and has emerged as an important topic in social network research. A number of methods are proposed. Specifically, commonly used to measure One kind of methods are based on the similar- Jaccard's coefficient ity measurement. the probability two is items that have a relationship. Inspired by the met- ric, Jeh and Widom [Jeh and Widom, 2002] proposed a domain-independent similarity measurement, SimRank. [Newman, 2001] directly defined a score to verify the corre- lation between common neighbors. Some methods are based on relational data modeling, structural proximity measures and stochastic relational model [Getoor and Diehl, 2005] [Liben-Nowell and Kleinberg, 2007] [Yu et al., 2009]. The above mentioned methods are mainly derived from the solutions of link prediction. The link prediction is ori- ented to network-level prediction, whereas social trust prediction focuses on person-level. Another class of methods are derived from the collaborative filtering meth- ods, such as clustering techniques [Sarwar et al., 2001], [Hofmann and Puzicha, 1999], model-based and the matrix factorization models [Srebro et al., 2003] [Mnih and Salakhutdinov, 2007]. However, the data matrix of trust has some structure properties different from the methods lower bound on the general sampling model and derived the optimal convergence rate in terms of Frobenius norm loss. Furthermore, there are several practical algorithms to solve max-norm regularized or max-norm constrained problems, see [Lee et al., 2010] and [Shen et al., 2014] for example. 2.1 Overview After review of related work in Section 2, we introduce the notations and formulate the problem in Section 3. Then we give algorithm to solve the max-norm constrained 1-bit matrix completion (MMC) problem in Section 4. Mean- while, we also provide an equivalent SDP formulation for the MMC, which can be accurately solved at the expense of effi- ciency. Then we report the empirical study on two benchmark datasets in Section 5. Section 6 concludes this paper and dis- cusses possible future work. 3 Notations and Problem Setup In this section, we introduce the notations that will be used in this paper. Capital letters such as M are used for matrices and lowercase bold letters such as v denotes vectors. The i-th row and j-th column of a matrix M is denoted by m(i) and mj respectively, and the (i, j)-th entry is denoted by Mij. For a vector v, we use vi to denote its i-th element. We denote the ℓ2 norm of a vector v by kvk2. For a matrix M ∈ Rp×n, we denote the Frobenius norm by kM kF and kM k2,∞ denotes the maximum ℓ2 row norm of M , i.e., otherwise. However, it is usually intractable to optimize the above program as the rank function is non-convex and non- continuous [Recht et al., 2010]. One common approach is to use the nuclear norm as a convex surrogate to the rank func- tion. However, it is well known that the nuclear norm can- not well handle the non-uniform data. Motivated by the re- cent progress in max-norm [Salakhutdinov and Srebro, 2010; Cai and Zhou, 2013; Shen et al., 2014], we use the max- norm as an alternative convex relaxation, which gives the fol- lowing formulation: min X 1 2 kPΩ(Z − X)k2 F , s.t. kXkmax ≤ λ2, (3.2) where λ is some tunable parameter. 4 Algorithm The max-norm is convex and moreover, it can be solved by any SDP solver. Formally, we have the following lemma: Lemma 4.1 ([Srebro et al., 2004]). For any matrix X ∈ Rp×n and λ ∈ R, kXkmax ≤ λ if and only if there ex- ist A ∈ Rp×p and B ∈ Rn×n, such that (cid:2) A X definite positive and each diagonal element in A and B is upper bounded by λ. X ⊤ B(cid:3) is semi- With Lemma 4.1 on hand, one can formulate Problem 3.2 as an SDP: kM k2,∞ := p max i=1 km(i)k2 . min X,A,B 1 2 kPΩ(Z − X)k2 F , We further define the max-norm of M [Linial et al., 2007], s.t. Aii ≤ λ2, Bjj ≤ λ2, ∀ i ∈ [p], j ∈ [n], (4.1) kM kmax = min U,V,M=U V ⊤ max{kU k2 2,∞ , kV k2 2,∞}, (3.1) where we enumerate all possible factorizations to obtain the minimum. Intuition on max-norm. At a first sight, the max-norm is hard to understand. We simply explain why it is a tighter approximation to the rank function than the nuclear norm. Again, we write the nuclear norm of M as a factorization form [Recht et al., 2010]: kM k∗ := min U,V,M=U V ⊤ 1 2(cid:16)kU k2 F + kV k2 F(cid:17) . Note that the Frobenius norm is the sum of the square of the ℓ2 row norm. Thus, a nuclear norm regularizer actually con- strains the average of the ℓ2 row norm, while the max-norm constrains the maximum of the ℓ2 row norm! Given the observed data Z ∈ Rp×n, we are interested in approximating Z with a low-rank matrix X, which can be formulated by, minimize 1 2 kPΩ(Z − X)kF , s.t. rank(X) ≤ d, where Ω is an index set of observed entries and d is some expected rank. PΩ(M ) is a projection operator on a ma- trix M such that PΩ(mij ) = mij if (i, j) ∈ Ω and zero (cid:20) A X X ⊤ B(cid:21) (cid:23) 0. And this program can be solved by any SDP solver to obtain accurate enough solution. However, SDP solvers are not scalable to large matrices. Thus, in this paper, we apply a projected gradient method to solve Problem (3.2), which is due to [Lee et al., 2010]. A key technique is the reformulation of the max-norm (3.1). As- sume that the rank of the optimal solution X ∗ produced by the SDP (4.1) is at most d. Then we can safely factorize X = U V ⊤, with U ∈ Rp×d and V ∈ Rn×d. Combining the factorization and the definition, we obtain the following equivalent program : 1 min U,V 2(cid:13)(cid:13)PΩ(Z − U V ⊤)(cid:13)(cid:13) s.t. kU k2,∞ ≤ λ, kV k2,∞ ≤ λ. 2 F , (4.2) Note that the gradient of the objective function w.r.t. U and V can be easily computed. That is, Here, for simplicity we define ∇U f (Z, U, V ) = PΩ(cid:0)(U V ⊤ − Z)V(cid:1) , ∇V f (Z, U, V ) = PΩ(cid:0)(V U ⊤ − Z ⊤)U(cid:1) . 2(cid:13)(cid:13)PΩ(Z − U V ⊤)(cid:13)(cid:13) f (Z, U, V ) = 2 F . 1 (4.3) Algorithm 1 Max-norm Constrained 1-Bit Matrix Comple- tion (MMC) Input: Z ∈ Rp×n (observed samples), parameters λ, initial solution (U0, V0), maximum iteration τ. Output: Optimal solution (U ∗, V ∗). 1: for t = 1 to τ do 2: Compute the gradient by Eq. (4.3): U ′ t = ∇U f (Z, U, Vt−1) U=Ut−1 , V ′ t = ∇V f (Z, Ut−1, V ) V =Vt−1 . 3: 4: Compute the step size αt according to Armijo rule. Compute the new iterate: Ut = Π(Ut−1 − αtU ′ t), Vt = Π(Vt−1 − αtV ′ t ). 5: end for The inequality constraints can be addressed by a projection step. That is, when we have a new iterate (Ut, Vt) at the t- th iteration, we can check if they violate the constraints. If not, we can proceed to the next iteration. Otherwise, we can re- scale the rows of U and/or V by kV k2,∞ spectively. In this way, we have the projection operator: and/or λ λ kUk2,∞ Π(M ) =( λ kMk2,∞ M, M, if kM k2,∞ > λ, otherwise. (4.4) If we further pick the step size αt via the Armijo rule [Armijo and others, 1966], it can be shown that the sequence of (Ut, Vt) will converge to a stationary point [Bertsekas, 1999]. The algorithm is summarized in Al- gorithm 1. The benefits of applying the factorization on the max-norm are two-folds: 1) the memory cost can be significantly re- duced from O(pn) of SDP to O(d(p + n)). 2) it facil- itates the projected gradient algorithm, which is computa- tionally efficient when working on large matrices (see Sec- tion 5). However, note that Problem (4.2) is non-convex. For- tunately, [Burer and Monteiro, 2005] proved that as long as we pick a sufficiently large value for d, then any local mini- mum of Eq. (4.2) is a global optimum. In Section 5, we will report the influence of d on the performance. Actually, in Algorithm 1, the stopping criteria is set to be a maximum it- eration. One may also check if it reaches a local minima as the stopping criteria, as discussed in [Cai and Zhou, 2013]. 5 Experiments In this section, we empirically evaluate our method for the matrix completion performance. We will first introduce the used datasets. In the experimental settings, we present the comparative methods and evaluation metrics. Then we report encouraging results on two benchmark datasets. We also ex- amine the influence of matrix rank d. 5.1 Datasets We conduct the experiments on two benchmark datasets: Epinions and Slashdot. In these two datasets, the users are connected by explicit positive (trust) or negative (distrust) links (i.e., the 1-bit measurements in Z). The first dataset con- tains 119,217 nodes (users) and 841,000 edges (links), 85.0% of which are positive. The Slashdot dataset contains 82,144 users and 549,202 links, and 77.4% of the edges are labeled as positive. Table 1 gives a summary description about the subset used in our experiment. It is clear that the distribution of links are not uniform since each user has his/her individual preference and own friendship network. Following [Huang et al., 2013], we se- lect 2,000 users with the highest degrees from each dataset to form the observation matrix Z. Table 1: Description of 2 datasets Dataset #of Users #of Trust #of Distrust Epinions 2,000 171,731 18,916 Slashdot 2,000 68,932 20,032 5.2 Experimental Settings Baselines. We choose four state-of-the-art methods including SVP [Jain et al., 2010], SVT as baselines, [Cai et al., 2010], OPTSpace [Keshavan et al., 2010] and RRMC [Huang et al., 2013]. Since SVT and RRMC need a specified rank, we tune the rank for these methods and choose the best performance as the final result. Evaluation Metric. Let T be the index set of all observed entries. We use two evaluation metrics to measure the per- formance, mean average error (MAE) and root mean square error (RMSE), computed as follows: M AE = X(i,j)∈T \Ω RM SE =s X(i,j)∈T \Ω (Xij − Mij)/(T − Ω), (Xij − Mij)2/(T − Ω), 4.1 Heuristic on λ The λ is the only tunable parameter in our algorithm. For our problem, note that the data is of 1-bit measurements, i.e., Zij = 1 for (i, j) ∈ Ω. Also note that Zij = u(i)v(j)⊤. Thus,(cid:12)(cid:12)u(i)v(j)⊤(cid:12)(cid:12) = 1. So we have λ ≥ 1. However, if we choose a large λ, the estimation Xij may deviate away from 1. We find that λ = 1.2 lead to satisfactory improvement. where T denotes the cardinality of T . Training and Testing. We randomly split the dataset for training and testing. In particular, the number of observation measurements Ω for training ranges from 10% to 60%, with step size 10%. For each split, we run all the algorithms for 20 trials, with the training data in each trail being randomly sampled. Then, we report the mean and standard deviation of MAE and RMSE over all 20 trials. Observed entries (%) 10 20 30 40 50 60 Observed entries (%) 10 20 30 40 50 60 Table 2: MAE Results on Epinions Dataset SVT 0.359±0.004 0.394±0.022 0.360±0.057 0.410±0.099 0.471±0.129 0.476±0.146 OPTSpace 0.289±0.019 0.236±0.005 0.219±0.009 0.205±0.008 0.197±0.007 0.197±0.003 Methods SVP 0.450±0.008 0.294±0.002 0.248±0.001 0.224±0.001 0.210±0.001 0.199±0.001 RRMC 0.576±0.001 0.518±0.002 0.460±0.002 0.418±0.002 0.386±0.001 0.362±0.002 MMC 0.254±0.003 0.212±0.003 0.201±0.002 0.193±0.001 0.190±0.002 0.206±0.003 Table 3: RMSE Results on Epinions Dataset SVT 0.513±0.010 0.559±0.031 0.532±0.082 0.620±0.171 0.719±0.225 0.728±0.288 OPTSpace 0.530±0.021 0.456±0.005 0.422±0.011 0.406±0.015 0.398±0.016 0.403±0.009 Methods SVP 0.610±0.010 0.459±0.002 0.415±0.002 0.394±0.002 0.381±0.001 0.371±0.002 RRMC 0.650±0.001 0.606±0.002 0.563±0.002 0.533±0.002 0.509±0.001 0.491±0.002 MMC 0.466±0.004 0.406±0.004 0.383±0.002 0.371±0.002 0.364±0.001 0.365±0.002 5.3 Experimental Results We report detailed results from Table 2 to Table 5. From the results in Tables 2 and 3, we observe that MMC out- performs the other methods in terms of both evaluation met- rics on the Epinions dataset most of the time. In particular, when there are few observations 10 % (which indicates a hard task), MMC obtains the RMSE of 0.466, much better than OPTSpace (0.530), SVP (0.610) and RRMC (0.650). Except on the case with 60% observed entries, OPTSpace obtains the smallest MSE with 0.197, but our algorithm is comparative with 0.206. In a nut of shell, the gap between MMC and the baselines becomes larger as the fraction of observed entries decreases. Similarly, our method achieves the least MAE and RMSE on the Slashdot dataset (see Table 4 and 5). For instance with 30 % observed entries, MMC obtains the MAE with less than 0.4, much better than the comparative methods, such as SVT (0.513), OPTSpace (0.427), SVP (0.501) and RRMC (0.686). In terms of RMSE, in the case of 20% observed entries, the RMSE values of other methods are all above 0.7 while our method reaches 0.679. In sum, our method is superior than the comparative methods on two real-life datasets in terms of MSE and RMSE most of the time. Since we have studied the effectiveness of our method, here we examine the computational efficiency in Table 6, which is important for practical applications. To test the time com- plexity of the methods, we report the averaged time cost on the Epinions dataset with 10% observed entries and Slash- dot with 20% observed entries. To illustrate the trade-off be- tween accuracy and efficiency, we also report the MAE and RMSE. As we see, SVP is the most efficient method, whose running time is 0.84 seconds on Epinions while ours is 1.92 seconds. On Slashdot, it also achieves the best performance in terms of efficiency. However, our method enjoys a signifi- cant improvement of MAE and RMSE compared to all base- E A M E S M R 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0 1 0.9 0.8 0.7 0.6 0.5 0.4 0 d=1 d=5 d=50 d=100 d=300 d=500 30 90 60 Epoch 120 150 d=1 d=5 d=50 d=100 d=300 d=500 30 60 90 Epoch 120 150 Figure 2: MAE and RMSE in terms of different rank d on the Epinions dataset. Observed entries (%) 10 20 30 40 50 60 Observed entries (%) 10 20 30 40 50 60 Table 4: MAE Results on Slashdot Dataset SVT 0.679±0.008 0.562±0.004 0.513±0.030 0.506±0.041 0.495±0.060 0.520±0.065 OPTSpace 0.554±0.017 0.458±0.008 0.427±0.009 0.395±0.009 0.376±0.004 0.362±0.011 Methods SVP 0.755±0.005 0.582±0.007 0.501±0.003 0.460±0.002 0.432±0.002 0.413±0.002 RRMC 0.715±0.001 0.704±0.001 0.686±0.003 0.647±0.006 0.609±0.002 0.585±0.002 MMC 0.546±0.008 0.437±0.008 0.395±0.006 0.380±0.009 0.366±0.003 0.350±0.002 Table 5: RMSE Results on Slashdot Dataset SVT 0.788±0.008 0.718±0.020 0.680±0.043 0.670±0.056 0.642±0.055 0.699±0.084 OPTSpace 0.826±0.021 0.704±0.013 0.652±0.006 0.620±0.009 0.596±0.009 0.577±0.011 Methods SVP 0.873±0.004 0.746±0.007 0.680±0.003 0.647±0.003 0.624±0.003 0.609±0.002 RRMC 0.829±0.001 0.821±0.001 0.807±0.002 0.778±0.005 0.749±0.002 0.730±0.002 MMC 0.774±0.008 0.679±0.009 0.633±0.008 0.615±0.011 0.581±0.006 0.566±0.002 Table 6: The trade-off between accuracy and efficiency. Dataset Epinions Slashdot SVT OPTSpace SVP MAE RMSE Time MAE RMSE Time MAE RMSE Time MAE RMSE Time MAE RMSE Time 1.92 0.466 0.618 0.618 0.728 2.41 43.11 0.262 0.481 44.12 0.437 0.679 0.576 0.651 0.715 0.830 26.76 0.288 0.531 50.73 0.458 0.705 15.26 0.450 0.610 9.23 0.582 0.746 0.84 0.83 RRMC MMC consistently outperformed them, which meets with recently developed theories on max-norm. We also studied the trade- off between the accuracy and efficiency and observed that MMC achieved superior accuracy while keeping comparable computational efficiency. The max-norm has been studied for several years and in many applications, such as collaborative filtering, clustering, subspace recovery. It is empirically and theoretically shown to be superior than the popular nuclear norm. This work in- vestigates the power of max-norm for social trust problem and demonstrates encouraging results. It is interesting and promising to apply max-norm as a convex surrogate to other practical problems such as face recognition, subspace cluster- ing etc. lines. Also, our algorithm is orders of magnitude faster than other three baselines. This implies that MMC favors a good trade-off between the accuracy and efficiency. 5.4 Examine The Influence of d The non-convex reformulation (4.2) requires an explicit rank estimation d on the true matrix. In this section, we investigate the influence of d on the Epinions dataset as an example. The rank d is chosen from [1, 5, 50 ,100, 300, 500] and the results are plot in Figure 2. We observe that the rank has little in- fluence on the performance. This is possibly because that the actual data has a low-rank structure (close to rank one). And from [Burer and Monteiro, 2005], we know that if d is larger than the actual rank, any local minimum of Eq. (4.2) is also a global optima. 6 Conclusion and Future Work In this paper, we formulated the social trust prediction in the matrix completion framework. In particular, due to the spe- cial structure of the social trust problem, i.e., the measure- ments are 1-bit and the observed entries are non-uniformly sampled, we presented a max-norm constrained 1-bit matrix completion (MMC) algorithm. Since SDP solvers are not scalable to large scale matrices, we utilized a non-convex re- formulation of the max-norm, which facilitates an efficient projected gradient decent algorithm. We empirically exam- ined our algorithm on two benchmark datasets. Compared to other state-of-the-art matrix completion formulations, MMC [Leskovec et al., 2010] Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg. Predicting positive and negative links in online social networks. In WWW, pages 641 -- 650, 2010. [Liben-Nowell and Kleinberg, 2007] David Liben-Nowell and Jon Kleinberg. The link-prediction problem for social networks. Journal of the American society for information science and tech- nology, 58(7):1019 -- 1031, 2007. [Linial et al., 2007] Nati Linial, Shahar Mendelson, Gideon Schechtman, and Adi Shraibman. Complexity measures of sign matrices. Combinatorica, 27(4):439 -- 463, 2007. [Mnih and Salakhutdinov, 2007] Andriy Mnih and Ruslan In NIPS, Salakhutdinov. pages 1257 -- 1264, 2007. Probabilistic matrix factorization. [Newman, 2001] Mark EJ Newman. Clustering and preferen- Physical Review E, in growing networks. tial attachment 64(2):025102, 2001. [Recht et al., 2010] Benjamin Recht, Maryam Fazel, and Pablo A Parrilo. Guaranteed minimum-rank solutions of linear ma- trix equations via nuclear norm minimization. SIAM review, 52(3):471 -- 501, 2010. [Salakhutdinov and Srebro, 2010] Ruslan and Nathan Srebro. Collaborative filtering in a non-uniform world: Learning with the weighted trace norm. tc (X), 10:2, 2010. Salakhutdinov [Sarwar et al., 2001] Badrul Sarwar, George Karypis, Joseph Kon- stan, and John Riedl. Item-based collaborative filtering recom- mendation algorithms. In WWW, pages 285 -- 295, 2001. [Shen et al., 2014] Jie Shen, Huan Xu, and Ping Li. Online op- In NIPS, pages 1718 -- timization for max-norm regularization. 1726, 2014. [Srebro and Shraibman, 2005] Nathan Srebro and Adi Shraibman. In Learning Theory, pages Rank, trace-norm and max-norm. 545 -- 560. 2005. [Srebro et al., 2003] Nathan Srebro, Tommi et al. Weighted low-rank approximations. In ICML, volume 3, pages 720 -- 727, 2003. Jaakkola, [Srebro et al., 2004] Nathan Srebro, Jason DM Rennie, and Tommi Jaakkola. Maximum-margin matrix factorization. In NIPS, vol- ume 17, pages 1329 -- 1336, 2004. [Wang and Xu, 2012] Yu-Xiang Wang and Huan Xu. Stability of matrix factorization for collaborative filtering. ICML, 2012. [Yu et al., 2009] Kai Yu, John Lafferty, Shenghuo Zhu, and Yihong Gong. Large-scale collaborative prediction using a nonparamet- ric random effects model. In ICML, pages 1185 -- 1192, 2009. References [Armijo and others, 1966] Larry Armijo et al. Minimization of functions having lipschitz continuous first partial derivatives. Pa- cific Journal of mathematics, 16(1):1 -- 3, 1966. [Bertsekas, 1999] Dimitri P Bertsekas. Nonlinear programming. 1999. [Billsus and Pazzani, 1998] Daniel Billsus and Michael J Pazzani. Learning collaborative information filters. In ICML, volume 98, pages 46 -- 54, 1998. [Burer and Monteiro, 2005] Samuel Burer and Renato DC Mon- teiro. Local minima and convergence in low-rank semidefinite programming. Mathematical Programming, 103(3):427 -- 444, 2005. [Cai and Zhou, 2013] Tony Cai and Wen-Xin Zhou. A max-norm constrained minimization approach to 1-bit matrix completion. The Journal of Machine Learning Research, 14(1):3619 -- 3647, 2013. [Cai et al., 2010] Jian-Feng Cai, Emmanuel J Cand`es, and Zuowei Shen. A singular value thresholding algorithm for matrix com- pletion. SIAM Journal on Optimization, 20(4):1956 -- 1982, 2010. J Cand`es and Benjamin Recht. Exact matrix completion via convex optimization. Foun- dations of Computational mathematics, 9(6):717 -- 772, 2009. [Cand`es and Recht, 2009] Emmanuel [Cand`es and Tao, 2010] Emmanuel J Cand`es and Terence Tao. The power of convex relaxation: Near-optimal matrix completion. IEEE Transactions on Information Theory, 56(5):2053 -- 2080, 2010. [Chowdhury, 2010] Gobinda Chowdhury. Introduction to modern information retrieval. 2010. [Getoor and Diehl, 2005] Lise Getoor and Christopher P Diehl. Link mining: a survey. ACM SIGKDD Explorations Newsletter, 7(2):3 -- 12, 2005. [Gross, 2011] David Gross. Recovering low-rank matrices from few coefficients in any basis. IEEE Transactions on Information Theory, 57(3):1548 -- 1566, 2011. [Hofmann and Puzicha, 1999] Thomas Hofmann and Jan Puzicha. In IJCAI, vol- Latent class models for collaborative filtering. ume 99, pages 688 -- 693, 1999. [Huang et al., 2013] Jin Huang, Feiping Nie, Heng Huang, Yi- Cheng Tu, and Yu Lei. Social trust prediction using heteroge- neous networks. ACM Transactions on Knowledge Discovery from Data, 7(4):17, 2013. [Jain et al., 2010] Prateek Jain, Raghu Meka, and Inderjit S Dhillon. Guaranteed rank minimization via singular value pro- jection. In NIPS, pages 937 -- 945, 2010. [Jeh and Widom, 2002] Glen Jeh and Jennifer Widom. Simrank: a measure of structural-context similarity. In ACM KDD, pages 538 -- 543, 2002. [Katz, 1953] Leo Katz. A new status index derived from sociomet- ric analysis. Psychometrika, 18(1):39 -- 43, 1953. [Keshavan et al., 2010] Raghunandan H Keshavan, Andrea Monta- nari, and Sewoong Oh. Matrix completion from a few entries. Information Theory, IEEE Transactions on, 56(6):2980 -- 2998, 2010. [Lee et al., 2010] Jason D Lee, Ben Recht, Nathan Srebro, Joel Tropp, and Ruslan R Salakhutdinov. Practical large-scale op- timization for max-norm regularization. In NIPS, pages 1297 -- 1305, 2010.
1912.12060
1
1912
2019-12-27T11:34:41
Characterizing and Detecting Money Laundering Activities on the Bitcoin Network
[ "cs.SI", "cs.CR", "cs.LG" ]
Bitcoin is by far the most popular crypto-currency solution enabling peer-to-peer payments. Despite some studies highlighting the network does not provide full anonymity, it is still being heavily used for a wide variety of dubious financial activities such as money laundering, ponzi schemes, and ransom-ware payments. In this paper, we explore the landscape of potential money laundering activities occurring across the Bitcoin network. Using data collected over three years, we create transaction graphs and provide an in-depth analysis on various graph characteristics to differentiate money laundering transactions from regular transactions. We found that the main difference between laundering and regular transactions lies in their output values and neighbourhood information. Then, we propose and evaluate a set of classifiers based on four types of graph features: immediate neighbours, curated features, deepwalk embeddings, and node2vec embeddings to classify money laundering and regular transactions. Results show that the node2vec-based classifier outperforms other classifiers in binary classification reaching an average accuracy of 92.29% and an F1-measure of 0.93 and high robustness over a 2.5-year time span. Finally, we demonstrate how effective our classifiers are in discovering unknown laundering services. The classifier performance dropped compared to binary classification, however, the prediction can be improved with simple ensemble techniques for some services.
cs.SI
cs
Characterizing and Detecting Money Laundering Activities on the Bitcoin Network Yining Hu1,2[0000−0002−6233−743X], Suranga Seneviratne3[0000−0002−5485−5595], Fukuda4[0000−0001−8372−2807], and Aruna Seneviratne2[0000−0001−6894−7987] Kanchana Thilakarathna3[0000−0003−4332−0082], Kensuke 1 Data61-CSIRO, Sydney, Australia [email protected] 2 University of New South Wales, Sydney, Australia [email protected] 3 University of Sydney, Sydney, Australia {firstname.lastname}@sydney.edu.au 4 National Institute of Informatics, Tokyo, Japan [email protected] Abstract. Bitcoin is by far the most popular crypto-currency solution enabling peer-to-peer payments. Despite some studies highlighting the network does not provide full anonymity, it is still being heavily used for a wide variety of dubious financial activities such as money laundering, ponzi schemes, and ransom-ware payments. In this paper, we explore the landscape of potential money laundering activities occurring across the Bitcoin network. Using data collected over three years, we create transaction graphs and provide an in-depth analysis on various graph characteristics to differentiate money laundering transactions from regu- lar transactions. We found that the main difference between laundering and regular transactions lies in their output values and neighbourhood information. Then, we propose and evaluate a set of classifiers based on four types of graph features: immediate neighbours, curated features, deepwalk embeddings, and node2vec embeddings to classify money laun- dering and regular transactions. Results show that the node2vec-based classifier outperforms other classifiers in binary classification reaching an average accuracy of 92.29% and an F1-measure of 0.93 and high robust- ness over a 2.5-year time span. Finally, we demonstrate how effective our classifiers are in discovering unknown laundering services. The clas- sifier performance dropped compared to binary classification, however, the prediction can be improved with simple ensemble techniques for some services. Keywords: Bitcoin, Transaction Graph, Money Laundering 1 Introduction The first successful peer-to-peer (P2P) financial system, Bitcoin [30], has evolved over the years into a complex financial ecosystem with a large number of users, different transaction types, and various support services. As of now, Bitcoin has the highest market share of 50% among crypto-currencies [6] and performs over 300k transactions per day [7]. Driven by the pseudonymity provided by the network, many cyber-criminals and hackers have started using Bitcoin for illegal activities. For example, Silk Road [12], an online market place for illegal goods and services, accepted bit- coins as their payment method to hide the identities of the sellers and buyers. More recently, ransom-ware attacks WannaCry and Petaya [14] also accepted Bitcoin payments from victimized computer owners to unlock their machines. Other activities that involve the misuse of Bitcoin include money laundering via mixing to hide the origin of illegally obtained money [29,16], and ponzi scheme, a pyramid scheme that pays old users with investments from new users [17]. In this paper, we investigate money laundering activities, one of the main mis- uses of Bitcoin [29]. While there are public websites such as Blockchain Info [7], BitcoinWhosWho [5], WalletExplorer.com [13] that collect de-anonymized Bit- coin services and tag those involved in money laundering, new money laundering services emerge frequently due to the unregulated and P2P nature of Bitcoin. Although several efforts have been made to understand and detect laundering activities [17,16,39], existing studies have not looked at the graph properties of laundering and regular transactions in detail, they also have not fully explored the potential of automatically created node embeddings using techniques such as deepwalk [32] and node2vec [24]. In this paper, we first explore money laun- dering transactions on the Bitcoin network from a graph theoretic perspective and compare their characteristics to regular transactions. We find that although some manually extracted statistical and network features follow different distri- butions for laundering and regular transactions, they are not sufficiently effective in detecting laundering transactions. We show that random-walk based graph representation learning algorithms -- deepwalk [32] and node2vec [24] significantly outperform manually created features for this task. This paper makes the fol- lowing contributions: -- With Bitcoin data collected over three years, we characterize graph prop- erties of money laundering transactions and highlight their differences in comparison to regular transactions. -- We show that laundering transactions are distinguishable from regular trans- actions in several statistical and network features including in-degree/out- degree ratio, sum/mean/standard deviation of output values, and number of weakly connected components -- the size of the subgraph a transaction belongs to. Nonetheless, these metrics are not effective for the binary classification of money laundering and regular transactions. -- We show a node2vec-based classifier achieves the highest performance in classifying laundering and regular transactions. We also show the robustness of the classifier by applying it to randomly selected weeks across a large timescale of two and a half years and show that results remain consistent. -- Finally, we demonstrate the performance of our classifiers in detecting un- known money laundering transactions. The classifier performance decreases 2 compared to the binary classification, but can be improved with simple en- semble techniques. The remainder of the paper is organized as follows. Section 2 discusses re- lated work that motivated our research. Section 3 presents details of our data collection, ground truth labelling and how we created the Bitcoin transaction graphs. Section 4 characterizes the properties of money laundering transactions in comparison to regular transactions. Section 5 presents the classifier design and classification results, followed by Section 6 which presents the new money laundering service discovery results. Section 7 concludes the paper. 2 Related Work Bitcoin Network Characterization Ron and Shamir [37] found a significant variance in the distribution of various Bitcoin addresses, accumulated balance and number of transactions per user providing empirical evidence that a lim- ited number of Bitcoin entities control the majority of addresses, transactions and bitcoins. Lischke et al. [27] conducted a study on the Bitcoin transaction graph during its first four years. Authors observed the distribution of several graph metrics such as in-degree, out-degree and clustering coefficient of the en- tire transaction graph. They also analyzed the economic and network aspects of multiple major Bitcoin businesses and markets including SatoshiDice and Mt.Gox. Similar studies include [31,38]. In this paper, we analyse the graph characteristics of potential laundering and regular transactions separately with the objective of coming up with a transaction classifier. Address De-anonymization Multiple studies explored the possibility of de- anonymizing Bitcoin addresses [36,28,20]. Reid et al. [36] found external informa- tion, such as user registration details and voluntary disclosure of public-keys, can be used to link Bitcoin addresses to real-life users. Meiklejohn et al. [28] proposed two address clustering heuristics to aggregate Bitcoin transactions: i) addresses associated with the input UTXOs of a transaction belonging to the same user and ii) the change address that is created when the sum of input UTXOs exceeds the amount to pay also belongs to the sender. Using these heuristics, a number of services and their Bitcoin addresses have been identified in the literature [16,17] and online forums [4,13,5,7]. We establish our ground truth labelling based on these identified services and their addresses. Service Analysis and Anomaly Detection Driven by its pseudonymity, there also exists a number of dubious and potentially illegal services in the Bitcoin network. Moser et al. [29] found services such as Bitcoin Fog, that hide transaction origins by withholding multiple small inputs and bundling them into a smaller number of larger outputs. Ferrin et al. [21] later discovered a common pattern of transaction mixing which is to form a "mixing cloud" that contains multiple interconnected "joint transactions", which result from layering multiple transactions into a single larger transaction. 3 More recently, machine learning methods are being applied to detect poten- tially illegal Bitcoin activities. Early studies often relied on the metadata and the temporal features of addresses or transactions. Pham et al. [33] performed k-means clustering on both the transaction graph and user graph and applied outlier detection to find suspicious transactions and users, however they were only able to detect one out of 30 known cases of theft. Bartoletti et al. [17] applied several supervised learning techniques to detect Bitcoin addresses asso- ciated with ponzi schemes using temporal features such as total address lifetime and active days. Weber et al. [39] recently presented a study on detecting Bit- coin laundering transactions using network features and node embeddings. The authors created 49 independent graphs over a total period of 2 weeks, using the first 34 graphs for training and the rest for testing and achieved an F1-measure of over 0.7 with Graph Convolutional Networks (GCN) and EvolveGCN. They also published a dataset containing the extracted network features, an anatomized edge list and labels [8]. However, no information was provided on the ground truth labelling process as well as the exact features the authors used, making it hard to apply the solution in other datasets. While our work is complementary to this study, we analyse data in a much larger time span of over three years, evaluate quantitatively different types of metadata and graph features, and ad- dress more realistic and challenging scenarios of operating on larger graphs and discovering new money laundering instances. 3 Data We next describe how the transaction graphs are built, our data collection pro- cess, and the methodology of establishing the ground truth. 3.1 Bitcoin Transaction Graph A Bitcoin transaction, identified by a unique id, comprises a list of input and output unspent transaction outputs, or UTXOs. UTXOs are indivisible chunks of bitcoins attached to specific owners. A Bitcoin transaction consumes UTXOs by unlocking them with the sender's signature, and creates new UTXOs designated to recipients. This is how bitcoins are transferred among users, i.e., by creating chains of transactions as shown in Figure 1. Each node represents a transaction and a directed edge between two nodes exists if an output UTXO of a transaction becomes an input UTXO of a succeeding transaction. For example, an edge is created from transaction Tx3 to transaction Tx4 as UTXO8 serves as an output for Tx3 and an input for Tx4. We utilize these transaction chains to create transaction graphs. We did not explore user (address) graphs in this paper, as new addresses can be easily created and manipulated. 3.2 Data Collection and Labelling Data Collection We ran a Bitcoin Core client under the version bitcoin- 0.15.0 [3] to collect block data, and parsed the block data with a simple parser [2] 4 Fig. 1: A simple Bitcoin transaction chain. to obtain transaction information. For each transaction, we extracted its times- tamp, previous transactions (cf. Part 3.1), number and value of input and output UTXOs. Our dataset was collected between 07/2014 and 05/2017. Ground Truth Labelling We identify several laundering and regular services and their addresses. We consider all transactions associated with these addresses as our labelled ground truth. Money laundering Laundering services disguise the origin of bitcoins by mix- ing different users' transactions, and many of them are potentially malicious [29] Our selection of money laundering services is based on existing literature [29,16], news articles and address tags from trusted online resources, e.g., WalletEx- plorer.com [13], a website that tracks Bitcoin wallets and aggregates relevant addresses. In total we found 4 major laundering services with more than 22,000 transactions each. Our selection include AlphaBay [10], BTC-e [1], Bitmixer [9] and HelixMixer [16]. Figure 2 shows the accumulated number of daily trans- actions during the active periods of the four laundering services, as well as a combined sum across all these services. For example, BTC-e was active between 08/14-05/17, and generated nearly six million transactions in total. Fig. 2: Service active period and accumulated number of transactions. 5 Inputs:UTXO1Tx1Outputs:UTXO2UTXO3Inputs:UTXO4UTXO5Tx2Outputs:UTXO6Inputs:UTXO2UTXO6Tx3Outputs:UTXO7UTXO8Inputs:UTXO8Tx4Outputs:UTXO9UTXO102014-092015-012015-052015-092016-012016-052016-092017-012017-05101103105107Accumulated number of transactionsAlphaBayBitmixerBTC-eHelixMixerCombined Regular The exchange sector has the highest number of operating entities, as most new users begin trading on Bitcoin via exchanges [23]. This is followed by wallet services with 5.8 − 11.5 million active users [35]. Payment services such as CoinPayment and Bitpay are also often linked to banking institutions and existing payment networks. As the lines between different sectors have become increasingly blurred [35], when labelling regular services, we randomly selected 9 active, large-scale exchange, payment and wallet services from the top wallet list on WalletExplorer.com [13], with reference to existing studies [34]. We label all transactions related to regular services as regular and those associated with laundering services as laundering, similar to the ground truth labelling in [17]. To ensure the correctness of labelling, we have eliminated all transactions with conflicting labels [20]. Table 1 summarizes our data collection with the total number of laundering and regular transactions, active periods of laundering services, as well as the percentage of labelled laundering and regular transactions among all existing transactions. Table 1: Data collection. Service AlphaBay Bitmixer BTC-e HelixMixer Laundering Regular Number of Tx.s Active period Percentage 1,168,382 22,122 5,665,400 605,991 7,461,895 37,907,769 08/15-04/17 09/14-06/17 08/14-06/17 12/15-08/16 - - 0.97% 0.01% 2.93% 0.56% 4.29% 22.98% 4 Graph Characterization We next provide a characterization of Bitcoin transaction graphs, with a focus on the difference between laundering and regular transactions. 4.1 Graph Evolution We first show the growth of Bitcoin network using directed daily transaction graphs created between 07/2014-05/2017. We calculated the number of nodes, number of edges, and graph density for each graph. Figure 3 shows the evolu- tion of these 3 metrics over the approximate 3-year time span. Both number of nodes and number of edges continued to increase, and started to saturate in early 2017. The decrease in graph density suggests transactions have fewer inputs and outputs on average in more recent years. This could be due to the growing number of wallet or payment services that run specific algorithms to construct transactions. The periodic fluctuations can be ascribed to the diffi- culty adjustment embedded in the Bitcoin Proof-of-Work (PoW) protocol [15]. 6 As the total hashrate changes, to maintain the constant 10 minute block time, Bitcoin adjusts PoW difficulty every 2016 blocks, which approximately was 2 weeks in 2016 [11]. (a) Node (b) Edge (c) Graph density Fig. 3: Evolution of daily transaction graphs. 4.2 Feature Characterization We then look at transaction values, calculated as the sum of all output UXTOs. Figure 4 shows the daily average value of laundering and regular transactions. On average, laundering transactions carry 38.8 bitcoins per day, while regular transactions only have 29.1 bitcoins per day. Laundering transactions also carry higher values than regular ones 77.3% of the time. Fig. 4: Average daily transaction value by service type. For each directed daily transaction graph, we calculate basic features such as number of input UTXOs (or in-degree), number of output UTXOs (or out- degree), sum/mean/standard deviation (std) of outputs, and network features such as centrality measures, PageRank, and clustering co-efficient [19]. We ex- tracted a total of 14 features for each transaction. We performed a feature impor- tance analysis using an Adaptive Boost (Adaboost) [22] classifier with a Decision Tree based estimator of maximum depth 5. We selected 5 most discriminating features based on the importance score, among which the in-degree/out-degree ratio provides information on edges; the sum/mean/std of outputs relate to UTXO values; and the weakly connected components relate to a transaction's neighbourhood. 7 2015201620170.10.20.30.40.50.60.7Number of nodes (million)2015201620170.10.20.30.40.50.60.70.8Number of edges (million)2015201620170.050.100.150.200.250.30Graph density (10e-4)2014-092015-012015-052015-092016-012016-052016-092017-012017-05101101103Transaction balanceLaunderingRegular Figure 5 shows the distribution of these 5 features of laundering and regu- lar transactions separately. Compared to regular transactions, a larger portion of laundering transactions have high in-degree/out-degree ratio. The resulting distribution confirms laundering services operate by bundling small transactions from various users and forming new ones, which is also discussed in Section 2. The CDF curves for sum, mean and std of output UTXOs of laundering transactions are slightly steeper than those of regular transactions. This indicates laundering transactions create similar number and value of output UTXOs, which also con- firms the findings in [29]. Laundering transactions also have a slightly smaller number of weakly connected components than regular transactions. This is re- sulted from the scales of different services. As services tend to send and receive transactions using addresses associated to them, directly connected transactions are more likely to belong to a same service. We leverage this observation later to design the baseline classifier in Section 5. (a) In/Out Ratio (b) Sum of outputs(c) Mean of outputs (d) Std of outputs (e) Components Fig. 5: Feature distribution for money laundering and regular transactions. To further understand the service-wise differences, we provide a more detailed comparison in Figure 6. Although there are some differences among laundering transactions related to different services, these transactions are individually dis- tinguishable from regular ones in the selected features. Among the 4 laundering services studied, BTC-e shows the most similar feature distributions as regular transactions. Bitmixer, on the other hand, behaves similarly to HelixMixer. (a) Ratio (b) Sum of outputs(c) Mean of outputs (d) Std of outputs (e) Components Fig. 6: Service-wise feature distribution. 8 1031011011030.00.20.40.60.81.0CDFMoney LaunderingRegular1061031001030.00.20.40.60.81.0CDFMoney LaunderingRegular1061031001030.00.20.40.60.81.0CDFMoney LaunderingRegular101910121051020.00.20.40.60.81.0CDFMoney LaunderingRegular1011021031041051060.00.20.40.60.81.0CDFMoney LaunderingRegular1031011011030.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular1061031001030.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular1061031001030.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular101910121051020.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular1011021031041051060.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular 5 Detecting Money Laundering Activities We next build multiple classifiers to detect laundering transactions using the partially labelled dataset described in Section 3. We train our classifiers with four different features -- nodes' immediate neighbours, curated features, deepwalk embeddings and node2vec embeddings. We used accuracy -- the total percentage of regular and laundering transactions that are correctly identified, and F1- measure -- the harmonic mean of precision and recall -- as evaluation metrics. 5.1 Transaction Classifiers The design details of our four classifiers are discussed below. Immediate Neighbour-Based Classifier Since transactions from a same service tend to be more connected (cf. Section 4.2), as a first step, we classify unlabelled transactions based on their nearest neighbours. This classifier works under the following criteria: 1) a node with more immediate regular neighbours than laundering neighbours is classified regular, 2) a node with more or equal number of immediate laundering than regular neighbours is classified laundering, and 3) a node with no regular or laundering neighbours is classified regular -- this criterion is required due to the unlabelled nodes in the graph. Curated Features We trained an Adaboost classifier with a Decision Tree base-estimator using the 14 statistical and network features discussed in Sec- tion 4. Hyper-parameter tuning results when varying the maximum depth and number of estimators are presented in Appendix A. Deepwalk Graph representation learning via random walks has become a com- mon technique to analyse graph structures in recent years [26]. These algorithms can automatically create feature vectors for graph nodes in an unsupervised man- ner, and achieve better scalability and performance than manually extracted features in various scenarios. A widely used algorithm -- deepwalk [32] -- leverages random walks of specified number of walks per node and walk length to uniformly sample a node's neighbourhood. Node2vec A more recent technique, node2vec [24], uses 2 more parameters -- the return parameter p and the in-out parameter q -- to more precisely guide the walks. When p is high (> max(q, 1)), the same nodes will not be revisited in the next 2 steps [24], and when p is low (< max(q, 1)), the walks will remain close to the starting node. When q and p both equal to 1, node2vec creates random walks in a uniform manner, similar to deepwalk. Deepwalk and node2vec are strictly transductive [25], and can only predict unlabelled nodes on the same graph, hence we created transaction graphs that cover the entire duration of training and testing, and only considered nodes on the giant component [18]. We also used undirected graphs to better explore the 9 graph structure. For both binary classification and new instance prediction in Section 6, we started random-walks from all labelled nodes in the training set and all labelled and unlabelled nodes in the testing set to ensure no pre-assumed knowledge on the testing nodes. We used 100 (number of walks per node), 100 (walk length), 25 (embedding dimension) for both deepwalk and node2vec, and 2 (p), and 0.5 (q) for node2vec. We fed the embedding vectors into an Adaboost classifier with a Decision Tree base classifier (maximum depth = 5, number of estimators = 40) for binary classification. Details on the selection of random- walk parameters and walk starting nodes are provided in Appendix A. 5.2 Classifier Performance Comparison We set the experiment duration to 1 week with the first 5 days for training and last 2 days for testing. To compare the performance of the above 4 classifiers, we selected 5 consecutive weeks in late 2014, and present the results averaged over these weeks below. In addition, we also applied two simple ensemble techniques to the prediction results using curated features and node2vec embeddings. In "OR" ensemble, we label a transaction as laundering if either classifier labels it as laundering. While in "AND" ensemble, we only label a transaction as laundering if both classifiers do so. Table 2 shows the node2vec-based classifier with proper parameter settings outperforms the other three classifiers achieving an average accuracy of 92.05% and an average F1-measure of 0.94. Information from a transaction's immedi- ate neighbours is not sufficient in detecting laundering transactions. Although some differences can be observed in the feature distribution (cf. Section 4), manually extracted statistical and network features cannot effectively differ- entiate laundering and regular transactions. Calculating network features on these large transaction graphs can also be very time-consuming. Both deepwalk and node2vec performed well in binary classification, while node2vec produced slightly better results than deepwalk. "OR" ensemble improved the node2vec classifier performance as it helps to capture more laundering nodes. "AND" ensemble on the other hand drastically diminished the performance of both clas- sifiers, as more laundering transactions are wrongly detected as regular. Table 2: Classifier Performance. Classifier Neighbourhood Manually extracted features Deepwalk Node2vec "OR" ensemble "AND" ensemble Accuracy (%) F1-measure 28.46 65.34 91.72 92.05 92.74 21.47 0.09 0.45 0.94 0.94 0.95 0.02 10 5.3 Over-time Classification Results With Node2vec We then applied the node2vec-based classifier with proper parameters on one random week per month between 08/2014-01/2017. Figure 7 illustrates the clas- sifier performance over the entire experimentation period. To ensure training reliability, we have removed scenarios with less than 150 laundering samples in training. The classifier performance was robust and achieved an average accuracy of 92.29% and F1-measure of 0.93 across the selected weeks. Fig. 7: Node2vec classifier performance over time. 6 Predicting New Money Laundering Instances We next apply a curated feature-based classifier and a node2vec-based classifier with corresponding parameters to detect previously unseen laundering trans- actions. We selected AlphaBay, Bitmixer and HelixMixer for comparison. For every 2 or 3 months during a service's active period, we randomly selected one week to leave the target service out and train the model using the remaining services. Then, we evaluated the model's ability to discover the left-out service. Figure 8 compares the classifier performance and prediction ensemble for the 3 selected services, averaged over their respective experiment periods. Compared to the classification results in Section 5, the classifier perfor- mance decreases when predicting instances from new services. Nonetheless, the node2vec classifier was able to achieve 95.2% accuracy in detecting HelixMixer with a F1-measure of 0.3. As observed in Figure 6, there are differences in sev- eral features among these services. When applying node2vec, the random walks cannot effectively explore the neighbourhoods of transactions belonging to a dif- ferent service. The class imbalance also becomes more significant when splitting training and testing sets by service, resulting in more malicious nodes being clas- sified as regular. "OR" ensemble improves the F1-measure, as it tends to capture more malicious transactions. "AND" ensemble on the other hand improves the accuracy as more regular transactions are correctly identified. In the case of Bitmixer, there are on average 66 laundering transactions and 24,428 regular transactions in the test set of each week. This significant class imbalance causes an extremely low F1-measure, which is not improved even with the proposed ensemble techniques. As for AlphaBay and HelixMixer, which have 11 15-08-201426-02-201513-08-201525-03-201628-10-20160.00.20.40.60.81.0ScoresAccuracyF1-measure discriminating features compared to regular transactions, the F1-measure using the curated feature-based classifier increases as more laundering transactions can be easily distinguished from regular ones. Both services also have sufficient samples, with an average money laundering to regular ratio being 10,485/18,727 and 2,287/24,842 respectively. When applying node2vec, their transactions are more often covered by random walks and are hence more correctly identified. Since the prediction results are also affected by the number of testing samples, it can be inferred that laundering services need to grow to a certain extent for our classifiers to be effective. Services with a small number of transactions are hard to predict, and hence they can operate unnoticed and last longer than services who create a higher transaction volume. (a) Accuracy (b) F1-measure Fig. 8: Comparison of classifier performance for different services. 7 Concluding Remarks We characterized Bitcoin transaction graphs and studied patterns of money laun- dering and regular transactions on data collected over three years. Our study found that money laundering transactions tend to have a higher in-degree/out- degree ratio, more uniform sum, mean and std of outputs, and a slightly smaller number of weakly connected components compared to regular transactions. We also show that BTC-e behaves similarly to regular services, while Bitmixer and HelixMixer have the most similar behaviors among the 4 selected laundering ser- vices. The preliminary classification and prediction results using an Adaboost classifier proved we can differentiate money laundering from regular transactions, and predict new instances using node2vec embeddings. Results also showed the classifier performance can be improved with ensemble techniques. Future work will mainly focus on the two aspects below. Ground Truth Labelling We operated on a fraction (≈ 27%) of Bitcoin trans- actions belonging to a limited number of identified services. A larger fraction of transactions remain unlabelled. Finding sufficient volumes of reliably labelled 12 AlphaBayBitmixerHelixMixer020406080100AccuracyCurated FeaturesNode2vecOR EnsembleAND EnsembleAlphaBayBitmixerHelixMixer0.00.51.0F1-measureCurated FeaturesNode2vecOR EnsembleAND Ensemble data for potentially illegal activities such as money laundering is always chal- lenging. As we used data labelled by volunteers, there exist conflicting labels for certain transactions. In this paper, we limit ourselves to the most reliable tags based on information from existing literature and trusted websites. In the future, semi-supervised approaches such as label propagation [41] and label spreading [40] can be leveraged to further improve the performance. Transductive Graph Embeddings As mentioned in Section 5, node2vec is strictly transductive and can only be used to predict unknown nodes on the same graph. One requirement for analysing temporal graphs is the possibility of making predictions to previously unseen nodes. Recent developments based on graph convolutions such as GraphSage [25] which allow embeddings learned from one graph to be used in prediction on a completely different graph can be explored. Nonetheless, their success on very large and dynamic graphs remains to be seen. 13 A Parameter Tuning A.1 Curated Features We varied the maximum depth of the base estimator from 5 to 50 and number of estimators from 10 to 80 as illustrated in Figure 9. The classifier performance remains low and does not vary significantly with maximum depth and number of estimators. This confirms manually-extracted statistical and network features are not effective in distinguishing laundering and regular transactions. (a) Accuracy heatmap (b) F1-measure heatmap Fig. 9: Adaboost classifier parameter tuning. A.2 Node2vec/Deepwalk Hyper-parameter Tuning Results in Table 3 show that a higher number of walks per node and longer walk path produce better performance. Also, for node2vec it is better to set q to a relatively low value and p higher than max(q, 1) to ensure outwards exploration from transaction nodes, as it is important to understand how UTXOs are propagated via transactions for different services. Effect of Random-Walk Starting Nodes Further, to understand the effect of random-walk starting nodes, we compared the classifier performance when vary- ing the volume of labelled and unlabelled test nodes to start random-walks from and present the results in Figure 10. The random-walks are started from all labelled training nodes, x% (x ∈ {100, 80}) of all labelled testing nodes, y% (y ∈ {100, 80, 50, 20, 0}) of all unlabelled testing nodes. Results show that to achieve high classifier performance, random-walks should be started from as many labelled testing nodes as possible. The volume of unlabelled random-walk starting nodes does not significantly affect the classifier performance. 14 510152050Maximum depth10204080Number of estimators64.0463.0765.6266.1768.4069.7865.3265.3367.3268.1068.1665.0368.1669.0468.0666.9266.6868.2867.5068.47646668accuracy510152050Maximum depth10204080Number of estimators0.520.530.540.550.570.580.540.550.570.570.570.540.570.600.580.570.560.570.570.580.520.540.560.580.60f-measure Table 3: Node2vec/Deepwalk hyper-parameter tuning. # of walks per node Walk length p 1 50 2 50 4 50 0.5 50 0.5 50 1 100 2 100 100 4 * The graph has 634,739 nodes and 1,147,979 edges. 50 50 50 50 50 100 100 100 q 1 0.5 0.5 2 4 1 0.5 0.5 Accuracy (%) F1-measure 90.20 90.48 89.72 88.35 86.85 89.84 91.01 89.62 0.93 0.93 0.92 0.91 0.90 0.92 0.93 0.92 (a) Accuracy heatmap (b) F1-measure heatmap Fig. 10: Effect of random-walk starting nodes on classifier performance. References 1. Alleged btc-e operator alexander vinnik ex- https://www.coindesk.com/ seeks tradition alleged-btc-e-operator-alexander-vinnik-seeks-extradition-to-russia, accessed: 2019-10-14 russia. to 2. bitcoin-blk-file-reader. https://github.com/mrqc/bitcoin-blk-file-reader, accessed: 2019-04-26 3. Bitcoin core version 0.15.0 released. https://bitcoin.org/en/release/v0.15.0, accessed: 2019-04-26 4. Bitcoin forum. https://bitcointalk.org, accessed: 2019-05-04 5. Bitcoin who is who. https://bitcoinwhoswho.com, accessed: 2019-04-27 6. Bitcoin's crypto total of back bitcoins-share-of-total-crypto-market-slips-back-toward-50, 2019-05-04 50%. market slips https://www.coindesk.com/ accessed: share toward 7. Blockchain. https://www.blockchain.com, accessed: 2019-04-27 8. Elliptic data set. https://www.kaggle.com/ellipticco/elliptic-data-set, ac- cessed: 2019-10-06 9. European authorities swoop on bitcoin mixing service. https://bravenewcoin. com/insights/european-authorities-swoop-on-bitcoin-mixing-service, ac- cessed: 2019-10-20 15 100%80%50%20%0Unlabelled100%80%50%Labelled92.1991.4991.8490.9892.1467.4167.5467.8967.7467.4667.1368.1567.7368.1667.477075808590accuracy100%80%50%20%0Unlabelled100%80%50%Labelled0.9250.9400.9420.9360.9430.7670.7670.7680.7680.7650.7640.7710.7690.7720.7650.800.850.90f-measure 10. The golden age of dark web drug markets is over. https://www.theverge.com/ 2019/2/17/18226718/alphabay-takedown-drug-marketplace-federal-arrest, accessed: 2019-10-14 11. Proof of work. https://en.bitcoin.it/wiki/Proof_of_work, accessed: 2019-05- 10 12. Silk road (marketplace). https://en.wikipedia.org/wiki/Silk_Road_ (marketplace), accessed: 2019-04-26 13. Wallet explorer. https://www.walletexplorer.com, accessed: 2019-04-27 14. Wannacry, big how ransomware petya, notpetya: time https://www.theguardian.com/technology/2017/dec/30/ in wannacry-petya-notpetya-ransomware, accessed: 2019-05-06 2017. hit the 15. Antonopoulos, A.M.: Mastering Bitcoin: unlocking digital cryptocurrencies. " O'Reilly Media, Inc." (2014) 16. de Balthasar, T., Hernandez-Castro, J.: An analysis of bitcoin laundry services. In: Nordic Conference on Secure IT Systems. pp. 297 -- 312. Springer (2017) 17. Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin ponzi schemes. arXiv preprint arXiv:1803.00646 (2018) 18. Bollob´as, B.: The evolution of random graphsthe giant component. In: Random graphs. vol. 184, pp. 130 -- 59. Cambridge university press Cambridge (2001) 19. Bondy, J.A., Murty, U.S.R., et al.: Graph theory with applications, vol. 290. Cite- seer (1976) 20. Ermilov, D., Panov, M., Yanovich, Y.: Automatic bitcoin address clustering. In: Machine Learning and Applications (ICMLA), 2017 16th IEEE International Con- ference on. pp. 461 -- 466. IEEE (2017) 21. Ferrin, D.: A preliminary field guide for bitcoin transaction patterns. In: Texas Bitcoin Conference (2015) 22. Freund, Y., Schapire, R.E., et al.: Experiments with a new boosting algorithm. In: International Conference on Machine Learning (ICML). pp. 148 -- 156 (1996) 23. Glaser, F., Zimmermann, K., Haferkorn, M., Weber, M., Siering, M.: Bitcoin-asset or currency? revealing users' hidden intentions. ECIS (2014) 24. Grover, A., Leskovec, J.: node2vec: Scalable feature learning for networks. In: Pro- ceedings of the 22nd ACM SIGKDD international conference on Knowledge dis- covery and data mining. pp. 855 -- 864. ACM (2016) 25. Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: Advances in Neural Information Processing Systems. pp. 1024 -- 1034 (2017) 26. Hamilton, W.L., Ying, R., Leskovec, J.: Representation learning on graphs: Meth- ods and applications. arXiv preprint arXiv:1709.05584 (2017) 27. Lischke, M., Fabian, B.: Analyzing the bitcoin network: The first four years. Future Internet 8(1), 7 (2016) 28. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 conference on Internet measurement conference. pp. 127 -- 140. ACM (2013) 29. Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: eCrime Researchers Summit (eCRS), 2013. pp. 1 -- 14. IEEE (2013) 30. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008) 31. Parino, F., Beir´o, M.G., Gauvin, L.: Analysis of the bitcoin blockchain: socio- economic factors behind the adoption. EPJ Data Science 7(1), 38 (2018) 16 32. Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: Online learning of social represen- tations. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. pp. 701 -- 710. ACM (2014) 33. Pham, T., Lee, S.: Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942 (2016) 34. Ranshous, S., Joslyn, C.A., Kreyling, S., Nowak, K., Samatova, N.F., West, C.L., Winters, S.: Exchange pattern mining in the bitcoin transaction directed hyper- graph. In: International Conference on Financial Cryptography and Data Security. pp. 248 -- 263. Springer (2017) 35. Rauchs, M., Hileman, G., et al.: Global cryptocurrency benchmarking study. Tech. rep., Cambridge Centre for Alternative Finance, Cambridge Judge Business School (2017) 36. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on. pp. 1318 -- 1326. IEEE (2011) 37. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security. pp. 6 -- 24. Springer (2013) 38. Somin, S., Gordon, G., Altshuler, Y.: Social signals in the ethereum trading net- work. arXiv preprint arXiv:1805.12097 (2018) 39. Weber, M., Domeniconi, G., Chen, J., Weidele, D.K.I., Bellei, C., Robinson, T., Leiserson, C.E.: Anti-money laundering in bitcoin: Experimenting with graph con- volutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019) 40. Zhou, D., Bousquet, O., Lal, T.N., Weston, J., Scholkopf, B.: Learning with local and global consistency. In: Advances in neural information processing systems. pp. 321 -- 328 (2004) 41. Zhu, X., Ghahramani, Z.: Learning from labeled and unlabeled data with label propagation. Tech. rep., CMU-CALD-02-107, Carnegie Mellon University (2002) 17
1509.01095
1
1509
2015-09-03T14:18:16
Tag Me Maybe: Perceptions of Public Targeted Sharing on Facebook
[ "cs.SI", "cs.CY" ]
Social network sites allow users to publicly tag people in their posts. These tagged posts allow users to share to both the general public and a targeted audience, dynamically assembled via notifications that alert the people mentioned. We investigate people's perceptions of this mixed sharing mode through a qualitative study with 120 participants. We found that individuals like this sharing modality as they believe it strengthens their relationships. Individuals also report using tags to have more control of Facebook's ranking algorithm, and to expose one another to novel information and people. This work helps us understand people's complex relationships with the algorithms that mediate their interactions with each another. We conclude by discussing the design implications of these findings.
cs.SI
cs
Perceptions of Public Targeted Sharing on Facebook Tag Me Maybe: Saiph Savage Andrés Monroy-Hernández Kasturi Bhattacharjee Tobias Höllerer University of California Santa Barbara Universidad Nacional Autónoma de México Microsoft Research {saiph, kbhattacharjee, holl }@cs.ucsb.edu [email protected] [email protected] 5 1 0 2 p e S 3 ] I S . s c [ 1 v 5 9 0 1 0 . 9 0 5 1 : v i X r a ABSTRACT Social network sites allow users to publicly tag people in their posts. These tagged posts allow users to share to both the general public and a targeted audience, dynamically assembled via notifi- cations that alert the people mentioned. We investigate people’s perceptions of this mixed sharing mode through a qualitative study with 120 participants. We found that individuals like this sharing modality as they believe it strengthens their relationships. Indi- viduals also report using tags to have more control of Facebook’s ranking algorithm, and to expose one another to novel information and people. This work helps us understand people’s complex re- lationships with the algorithms that mediate their interactions with each another. We conclude by discussing the design implications of these findings. Author Keywords Social media; access controls; social net- works; narrowcast; broadcasting; algorithmic filtering ACM Classification Keywords H.5.3 Group and Organization In- terfaces 1. INTRODUCTION On social networking sites (SNS), people have contacts from dif- ferent facets of their lives, e.g., college or work. This can lead to unintentionally sharing sensitive content with subsets of friends [7]. People engage in a spectrum of sharing modes to overcome this problem, from targeted sharing, where messages are shared with specific individuals, e.g., in an email [1], to public broadcasts where people share messages that are appropriate for all [7]. There has been growing interest in understanding people’s per- ceptions of these sharing modalities. Bernstein et al. [1] studied targeted sharing in private messages and found that people saw this modality as a way to share personally relevant content. Kairam et al. [10] used Google+ to study selective sharing, i.e., the sharing of content with specific predefined groups such as “family” or “work.” Their results indicate that people use selective sharing to evange- lize, ask questions, or start conversations. Hogan [7], in studies of public broadcasting in social media, found that in this sharing . Figure 1: Example of public targeted sharing on Facebook. mode, people often speak to the “lowest common denominator” to allow everyone to understand the message. Few studies have fully addressed the public targeted sharing modal- ity of SNS. Figure 1 presents an example of a Facebook post with this sharing mode. Public targeted sharing combines elements of targeted sharing and broadcasting. When a person tags others, the tagged individuals receive a direct notice of the post. However, the post’s public nature also reaches a wider audience similar to a broadcast (e.g., the entire social graph of the content producer). This hybrid sharing mode also represents a public display of social connections, as the public posts carry the names of certain friends and links to their personal Facebook profiles [2]. Previous research has studied particular aspects of this interaction, such as the iden- tity concerns it triggers [11] or the types of conversations that such posts elicit [9, 8]. Little is known, however, regarding people’s dif- ferent views and uses of this sharing modality. The aim of this investigation is to organize and understand the variety of perceptions of this hybrid sharing mode on Facebook. Although Facebook has a particular design for public targeted shar- ing, the concepts involved are not unique. Sites such as Twitter or Soundcloud also provide hyperlinks to the profiles of the people tagged in content. Google+ links tags to people’s profiles and al- lows people to broadcast to the social circles of those tagged. Gold users of reddit receive notifications when others tag them. Our interview-based study of 120 individuals discovers that indi- viduals feel public targeted sharing strengthens friendships. They also believe it can be used to overcome the algorithmic filtering powers in play, bringing each other greater exposure to more sur- prising content and people. 2. METHODS To examine the perceptions of public targeted sharing, we em- ploy a methodology similar to that used in a study about people’s perceptions of Facebook disclosures [11]. Similar to Lampinen et al. [11], instead of pursuing a longitudinal study, our goal is to shed light on the variety of interpretations that individuals have regard- ing this sharing modality. We conducted interviews to understand the perceptions. 2.1 Data Collection We recruited participants both offline and online to avoid having only highly active Facebook users. To recruit online, we posted invitations to our study in different Facebook groups and to pages randomly selected from public listings. To recruit offline, we ap- proached people in public spaces such as bus stops and parks and invited them to take part in our study. We labeled participants re- cruited directly from Facebook as F# and those recruited from pub- lic spaces as P#. Our recruitment material avoided the term “tag- ging” to not exclude people who rarely tag. Of the 120 individuals participated in our study, 32 were re- cruited from Facebook, and 88 from public spaces. Participants used Facebook to varying degrees. The individuals recruited from Facebook were 18-52 years old; 44% were female, 56% were male. The participants from public spaces were 18-68 years old; 52% were female, and 48% were male. The interviews had a median duration of 11 minutes, with the longest lasting 40 minutes, and the shortest 8 minutes. The interviews covered participants’ interpreta- tions of this sharing modality from the perspectives of the different social roles involved, such as content producers (individuals who tag friends in content they share on Facebook), taggees (individu- als tagged in the content), and viewers (individuals who view the tagged content). We counterbalanced the order in which we asked participants about each role. Participants voiced which roles they had taken and only responded for those that they had personally assumed. All participants had been viewers at least once, 87% had been taggees at least once, and 83% had been content producers at least once. Our study began by asking each participant to write down ex- amples of public targeted sharing. On average, each participant provided two examples (for instance, two Facebook posts where friends were tagged). For each role, we used the examples to start a discussion. For instance, we asked: “What are your thoughts when someone tags you in this type of post?” We encouraged the par- ticipants to lead the discussion. Our goal was mainly to get them to elaborate and exemplify. Participants mostly reported on their perceptions of public targeted sharing in posts (Facebook status up- dates or wall posts). Some also referred to tagging in comments, photos, or videos. However, participants did not highlight any dif- ference among content types. The interviews also covered partici- pants’ background in SNS use (sites and devices used, type of con- tent they or their friends share, number of Facebook friends, etc.) We did not witness any difference in interview responses across age groups or SNS usage. 2.2 Categorization Perspectives We used qualitative coding to analyze interview responses. This allowed us to establish a categorization of perceptions of public targeted sharing. Our overarching goal was to identify patterns in these perceptions. We transcribed all audio recordings and sepa- rated each interview into sections based on the social role that the interviewee was reporting on. Two researchers then jointly read each interview transcript for each social role to identify key con- cepts and ideas. These initial concepts were then discussed with a third researcher. We decided that a category would cover a gen- eral type of perception and that, when possible, it would include perspectives specific to each social role. Concepts were then ag- gregated and similar ones renamed. We also quantified the number of participants who viewed the tagging of Facebook users in posts as a mechanism that involved two mixed audiences. We considered this would help to further contextualize our results. Two researchers, unfamiliar with the work, read each interview and classified whether the person saw tagging as involving two audiences. The researchers found that all interviewees referred to tagging as a mixed sharing mode. Addi- tionally, 71% of the interviewees specifically used the term “share” to describe tagging on Facebook. 3. RESULTS The following five main categories cover participants’ percep- tions of public targeted sharing. One person can be associated with more than one category, as a person can have more than one per- ception associated with the sharing modality. We did not identify differences between participants’ Facebook usage and their percep- tions on sharing. Stronger Relationships. A majority of our interviewees (79%) perceived public targeted sharing as a way to build stronger re- lationships. From our interviews, it appears that tagging builds stronger friendships because the targeted audience feels that some- one is making time for them: “I think the best thing about being tagged is that there is somebody who is considering and thinking about you. I always comment on the things people tag me be- cause they took the time to think about me.” 28, male F2. This result matches theory on disclosure, which states that the more an interaction makes people feel singled out, the more value they attribute to it [2]. Being publicly tagged has become a so- cial signal that helps individuals feel unique and noteworthy. Con- tent producers appear to be aware of this dynamic. Interviewees stated that, via public targeted sharing, they secured higher-quality responses from their network: “[Tagging] ensures that you are working with only loyal people that you know will help and promote your cause, not sabotage it.” 30, male, F1. Individuals appear to use targeted sharing to jump start discussions with sympathetic crowds. Interviewees also believed that, via tag- ging, Facebook’s ranking algorithm was more likely to share their content with others. Therefore some people use public targeted sharing to revive relationships: “...I basically hope that friends I haven’t seen in a while will see this [a tagged post], and they will comment, and we can reconnect [...] Basically I have had other people in mind when I have tagged – sort of thinking about the fact that they are also watch- ing.” 21, male, F55. Surprising Content. Interviewees (61%) perceived this shar- ing mode as a way to expose audiences to information outside of what they normally viewed on Facebook. Interviewees believe that friends have similar tastes. Facebook’s recommendation algorithm thus tends to show more of one type of content to the members of a particular social circle. Tagging broke this by enabling con- tent producers to reach multiple social graphs and share surprising information, outside the social graph’s norms: “I like to tag people that I know are interested in something and whose audience will also care. But my interest is in creating a crossover. So I involve au- diences that follow people in dance, but I share with them something totally different, such as poetry...” 25, female, F10. This is similar to the finding of Huang et al. [9] of how people tagged on Twitter to direct content to certain social graphs. How- ever, perhaps due to Facebook’s recommendation algorithms, we observed here an emphasis on using tagging to diversify a social graph’s information. Participants also had folk theories about how tags influenced Facebook’s ranking algorithm: “If I tag someone and then he comments, the post becomes “active” and it’ll appear at the top of the News Feed. So I’ll sometimes tag someone directly in the post, or in the comments. In either case, if it makes him comment, the post will be pushed to the top.” 25, female, F10. Participants also believed that this sharing mode facilitates the in- troduction of audiences to new and surprising people: “Being a group of friends, I want them to meet other people who they might find interesting. The whole idea of social media is that we can share. So they might see a face, but they don’t know who they are; with the tag, they can find more information about them” 26, male, P3. Public Image. Interviewees (60% ) believed that public targeted sharing can help refine one’s public image: “I tag friends to represent something I want to project. So let’s say that I want to project that I am a super hipster, well then I will tag friends in support of a cause, I will casually mention that my friends and I are out writing in our Moleskine journals...” 29, female F5. Interviewees also reported that they tagged to link their content to the reputation or image of their friends and increase the value of the content. Participants cherry-picked who they tagged. They an- alyzed how influential or relevant the image of a person whom they planned on tagging was in reference to the content they wanted to share. Similarly, participants also believed that Facebook’s ranking algorithm would give more visibility to posts linked to high-profile users. Individuals thus tagged users with influential public images in an attempt to garner more visibility for the posts they wanted to broadcast: “Facebook will always rank higher content tied to verified, well known accounts. You’re losing a lot of visibility if you don’t link your content. You have to select well who you tag.” 41, male, P83. In contrast to selective sharing [10], public targeted sharing is also a public display of social connections [2]. This might cause individ- uals to relate it to public image construction, as everyone (people and algorithms included) can view how one interacts with others. Participants saw public targeted sharing as an opportunity to tai- lor not only their own public image but also that of their friends. They tagged as a way to collectively help friends find content that favored them. Interviewees also expressed that, in general, they felt honored to be tagged and be a part of their friends’ posts. How- ever, some also voiced identity concerns because others selected the content linked to them and the content might not match what they wanted to portray: might mislead the idea of who you are. Through tags your identity can be created for you. Your identity be- comes what other people broadcast about you, their idea of you.” 26, male, O3. Content producers were aware that others are self-conscious about the type of content that is posted about them. We found that most empathized with their friends and usually alerted them offline that they were going to tag them: “A lot of people don’t want to be tagged at a party. People are self-conscious of what they want or what they don’t want about them online. [...] I always ask people if they want to be tagged. I am in the car and I say: Hey guys I am making a Facebook status and I am going to tag all you guys!” 19, male O7. This echoes the findings of Lampinen et al. [11] regarding peo- ple negotiating self-disclosures before conflicts emerge. However, we found that, despite the negotiations taking place, individuals occasionally had to untag themselves. This occurred when indi- viduals were excessively tagged in their friends’ content. Individ- uals wanted to show their involvement in their friends’ lives (as it helped strengthen friendships). Yet, showing too much of that in- volvement, e.g., being tagged in too many posts, obscured who they were: “In every wedding photo they posted, they included my name regardless of whether I was in the photo or not [...] Because I don’t have any other posts on my profile, that one wedding event began dominating my page and it began characterizing me because it was the only thing that people saw on my profile. When peo- ple went into my page, they thought I was really into weddings [...] My identity was made up by someone’s wedding. I thought about untagging myself from the photos but decided to leave them. I felt it was sad to disassociate myself from my friend’s wedding.” 29, male, O8. I felt that was too emphasized. The nature of this mixed sharing modality generates struggles, as individuals want to show support for friends, while also portraying their desired public image. Unwanted Content. Interviewees (38%) perceived this sharing modality as annoying, because it brought them undesired data. In- dividuals thought that the content should have been shared privately with the targeted audience. Some taggees also found this sharing modality annoying because they received excessive Facebook no- tifications. Some untagged themselves as a result. Taggees and viewers alike felt annoyed with tagged posts generated by compa- nies, especially if they were advertisements. Individuals appeared tolerant of targeted ads created by friends. They considered that at least their friends thought about them to tag them and that the posts were a chance to be updated about their friends’ lives: “It’s usually interesting to see what my friends are selling. One girl was tagging so we could see her ce- ramics creations [...] it’s really interesting to see what they’re up to...” 25, female, P52. Content producers are aware that this sharing modality can be an- noying. They are thus careful about how often they publicly target others and in what content they target others. Interestingly, some see this annoyance as a chance to play with friends: “[Tagging] is a very public thing. It allows any- one to broadcast something about you, something that “One friend of mine was an Obama supporter I was tagging them in some anti-Obama stuff [...] to mess with them [...] I succeeded in being annoy- ing...hehe...” 24, male, F15. Despite this, taggees and viewers felt that unwanted content could also bring them serendipitous discoveries, as it could expose them to interesting strangers: “...I have personally met several people through this “spam”, like people with whom I’ve had an inter- est to collaborate, and people with whom I’ve shared interests on this and other topics. It isn’t common that you get to meet people in spam. They are rare excep- tions. Marvelous exceptions that bring you marvelous opportunities.” 20, male, F3. Recollection. Interviewees (33%) perceived public targeted shar- ing as a type of virtual diary that helped to document who played a part in their lives. Participants reported that they enjoyed return- ing later to these posts to reminisce. Interviewees thought it helped them to reminisce not only individually but also collectively. Indi- viduals surfaced posts from the past to encourage their audiences to relive memories: “...For me, they [tagged posts] are more like a path for sharing memories. They are really about mak- ing your friends relive these experiences again...” 28, female, P60. Content producers also have the perception that by including a per- son’s name in a post, they can implicitly remind the taggees of events that they will conduct together. In this case, content produc- ers admitted to mentioning certain persons so that their posts would be favored by Facebook’s ranking algorithm and people would be reminded of their event: “...tagging helps to build the fan base of your event, and people will be constantly reminded of the event. Their friends are also more likely to see it [i.e., the content] if you tag. That’s one of the things which Facebook loves and favors: tagging!” 21, male, F202. 4. DISCUSSION We used Facebook as a medium to investigate perceptions on an increasingly popular sharing modality: public targeted sharing. In general, individuals feel that this modality helps to reinforce rela- tionships, as content producers publicly show that they are taking the time to consider a particular targeted audience. Tagged posts generated automatically by companies are likely to not be perceived as positively, because individuals do not see any real person mak- ing time for them. This is similar to what was observed in the Scratch online community, where people valued credit granted au- tomatically less than credit given by humans [12]. SNS and UI designers could contemplate how to help companies better engage with their online clients, perhaps by encouraging more humanized sharing. This result is important especially given the recent lawsuit over people’s name appearing in tagged advertising. Individuals appeared to use public targeted sharing to build col- laborative spaces, such as a space to reminisce collectively about the past, or a type of backstage to collectively help friends craft a desired public image. Individuals seem to have adopted public tar- geted sharing as a building block to create the flexible online social spaces they desire. We believe that it is important to design digital structures that allow people to collectively experiment with build- ing on the technology. It is not about just user-testing all elements of an interface but, rather, testing whether people can make use of those elements to construct jointly the dynamic spaces they want. Our study revealed that individuals view public targeted sharing as a way to expose each other to surprising content or to other peo- ple beyond those recommended by Facebook’s algorithms. Recom- mendation algorithms in general have sought to filter out opinions, people, and items that are different from us, potentially limiting the diffusion of information. Individuals appear to use this shar- ing modality as a means to free audiences from these “algorithmic biases” and distribute information that they consider fresh and in- teresting. Individuals also perceive public targeted sharing as a way to reach audiences outside their immediate social circles. Facebook does not officially present tagging as a way to reach foreign social graphs but rather as a way simply to let people know when they are involved in the posts that are shared. Our findings thus raise the question of whether social media would benefit from more official digital structures tailored for targeting and assessing novel audi- ences [13, 4, 3, 14]. Audiences could be bombarded with more un- wanted content in this setting, however, it might also enable more serendipitous discoveries. Future work could further explore this trade-off. Across categories, we uncovered how individuals feel they can use this sharing modality to try to manipulate or “game” Face- book’s ranking algorithm and obtain the viewership they want. This result is consistent with the recent work of Gillespie [5], which points out, “Teens have been known to tag their status updates with unrelated brand names, in the hopes that Facebook will privilege those updates in their friends’ feeds.” Editors were traditionally the gatekeepers of information. Today, it is filtering algorithms that determine what is relevant [15] and even how we interact with con- tent, products and prices [6]. Our results raise the question of what the role of human-centered SNS should be regarding the algorith- mic powers in play. Again, there is a trade-off: allowing manip- ulations could expose audiences to more unwanted content, yet it might also help disseminate more diverse, unpredictable, notewor- thy content. Finally, similar to [11], we call for caution in generalizing our re- sults. Although we took care to recruit a diverse set of participants, the pool of interviewees recruited outdoors belonged to particular cultural settings. We tried to counter this issue by triangulating their responses with those participants recruited online. However, future work could focus on a quantitative analysis with a more var- ied population. Acknowledgements Special thanks to all our participants, as well as Leif Singer, Angus Forbes, Airi Lampinen for the immense feedback and iterations on this work. This work was partially sup- ported by the U.S. Army Research Laboratory under Cooperative Agreement No. W911NF-09-2-0053 and by NSF grant IIS-0747520. 5. REFERENCES [1] Bernstein, M. S., Marcus, A., Karger, D. R., and Miller, R. C. Enhancing directed content sharing on the web. In Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, CHI ’10, ACM (2010), 971–980. [2] Donath, J., and Boyd, D. Public displays of connection. BT Technology Journal 22, 4 (Oct. 2004), 71–82. [3] Forbes, A. G., Hollerer, T., and Legrady, G. behaviorism: A framework for dynamic data visualization. Visualization and Computer Graphics, IEEE Transactions on 16, 6 (2010), 1164–1171. [4] Forbes, A. G., Savage, S., and Höllerer, T. Visualizing and verifying directed social queries. In IEEE Workshop on Interactive Visual Text Analytics. Seattle, WA, Citeseer (2012). [5] Gillespie, T. The relevance of algorithms. Media Technologies (2013). [6] Hannak, A., Soeller, G., Lazer, D., Mislove, A., and Wilson, C. Measuring price discrimination and steering on e-commerce web sites. In Proceedings of the 2014 Conference on Internet Measurement Conference, ACM (2014), 305–318. [7] Hogan, B. The presentation of self in the age of social media. Bulletin of Science, Technology & Society (2010). [8] Honeycutt, C., and Herring, S. C. Beyond microblogging: Conversation and collaboration via twitter. 2013 46th Hawaii International Conference on System Sciences 0 (2009), 1–10. [9] Huang, J., Thornton, K. M., and Efthimiadis, E. N. Conversational tagging in twitter. In Proceedings of the 21st ACM conference on Hypertext and hypermedia, ACM (2010), 173–178. [10] Kairam, S., Brzozowski, M., Huffaker, D., and Chi, E. Talking in circles: selective sharing in google+. In Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, CHI ’12, ACM (2012), 1065–1074. [11] Lampinen, A., Lehtinen, V., Lehmuskallio, A., and Tamminen, S. We’re in it together: interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’11 (2011). [12] Monroy-Hernández, A., Hill, B. M., Gonzalez-Rivero, J., and boyd, d. Computers can’t give credit: How automatic attribution falls short in an online remixing community. In Proc. of the SIGCHI Conf. on Human Factors in Computing SystemsI (2011). [13] Savage, S., Forbes, A., Toxtli, C., McKenzie, G., Desai, S., and Hollerer, T. Visualizing targeted audiences. In Proceedings of the International Conference on the Design of Cooperative Systems, COOP’15 (2015). [14] Singer, L., Filho, F. M. F., Cleary, B., Treude, C., Storey, M.-A. D., and Schneider, K. Mutual assessment in the social programmer ecosystem: an empirical investigation of developer profile aggregators. In Proc. of the 2013 Conf. on Computer-Supported Cooperative Work (2013), 103–116. [15] Tufekci, Z. Algorithms in our midst: Information, power and choice when software is everywhere. In Proceedings Conference on Computer Supported Cooperative Work & Social Computing, CSCW ’15 (2015).
1804.06434
1
1804
2018-04-17T18:54:56
The emergent integrated network structure of scientific research
[ "cs.SI", "stat.AP" ]
The practice of scientific research is often thought of as individuals and small teams striving for disciplinary advances. Yet as a whole, this endeavor more closely resembles a complex system of natural computation, in which information is obtained, generated, and disseminated more effectively than would be possible by individuals acting in isolation. Currently, the structure of this integrated and innovative landscape of scientific ideas is not well understood. Here we use tools from network science to map the landscape of interconnected research topics covered in the multidisciplinary journal PNAS since 2000. We construct networks in which nodes represent topics of study and edges give the degree to which topics occur in the same papers. The network displays small-world architecture, with dense connectivity within scientific clusters and sparse connectivity between clusters. Notably, clusters tend not to align with assigned article classifications, but instead contain topics from various disciplines. Using a temporal graph, we find that small-worldness has increased over time, suggesting growing efficiency and integration of ideas. Finally, we define a novel measure of interdisciplinarity, which is positively associated with PNAS's impact factor. Broadly, this work suggests that complex and dynamic patterns of knowledge emerge from scientific research, and that structures reflecting intellectual integration may be beneficial for obtaining scientific insight.
cs.SI
cs
The emergent integrated network structure of scientific research Jordan D. Dworkina, Russell T. Shinoharaa, Danielle S. Bassettb,c,d,e,∗ aDepartment of Biostatistics, Epidemiology, and Informatics, Perelman School of Medicine, University of Pennsylvania, bDepartment of Bioengineering, University of Pennsylvania, Philadelphia, PA, USA cDepartment of Physics & Astronomy, University of Pennsylvania, Philadelphia, PA, USA dDepartment of Electrical & Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA eDepartment of Neurology, University of Pennsylvania, Philadelphia, PA, USA Philadelphia, PA, USA 8 1 0 2 r p A 7 1 ] I S . s c [ 1 v 4 3 4 6 0 . 4 0 8 1 : v i X r a Abstract The practice of scientific research is often thought of as individuals and small teams striving for disciplinary advances. Yet as a whole, this endeavor more closely resembles a complex system of natural computation, in which information is obtained, generated, and disseminated more effectively than would be possible by individuals acting in isolation. Currently, the structure of this integrated and innovative landscape of scientific ideas is not well understood. Here we use tools from network science to map the landscape of interconnected research topics covered in the multidisciplinary journal PNAS since 2000. We construct networks in which nodes represent topics of study and edges give the degree to which topics occur in the same papers. The network displays small-world architecture, with dense connectivity within scientific clusters and sparse connectivity between clusters. Notably, clusters tend not to align with assigned article classifications, but instead contain topics from various disciplines. Using a temporal graph, we find that small-worldness has increased over time, suggesting growing efficiency and integration of ideas. Finally, we define a novel measure of interdisciplinarity, which is positively associated with PNAS 's impact factor. Broadly, this work suggests that complex and dynamic patterns of knowledge emerge from scientific research, and that structures reflecting intellectual integration may be beneficial for obtaining scientific insight. Keywords: scientific research, knowledge network, graph theory, human computation 1. Introduction The practice of scientific research represents the collective effort of humans to acquire information, generate insight, and disseminate knowledge. Al- though scientific inquiry has been carried out for centuries, the recent expansion of meta-data collec- tion has allowed a robust body of literature to de- velop around the scientific study of science itself. This work has led to advances in predicting the success of scientific papers and authors 1,2, found that articles often do not fit into existing disci- plinary boundaries 3,4, and provided empirical fuel for the debate over interdisciplinary research 5,6,7,8. Yet much remains unknown about the nature of the ∗Corresponding author: Email address: [email protected] (Danielle S. Bassett) large-scale scientific system that emerges from in- dividuals' intellectual and social incentives. It is especially unclear what features of this system may make it more or less effective at producing insights. In recent years, network analysis has provided a particularly useful framework for beginning to re- veal the structure and evolution of the emergent scientific landscape. The tools of this growing dis- cipline have facilitated greater understanding the roles of specific authors or papers in co-authorship and citation networks. Network measures can pre- dict authors' future collaboration patterns 9,10, and can help identify turning points in the literature 11. While the fine-scale topology of such networks dif- fers by scientific discipline 12,13, many display sim- ilar global properties. One such commonly shared property is small-world architecture 13,14, which re- flects high local clustering within specialty, po- tentially supporting development and refinement April 19, 2018 within sub-fields, combined with efficient paths that connect distant areas, providing outlets for innova- tion and information sharing. Although co-authorship and citation networks have provided much insight into the properties of the scientific community, their dependence on au- thors' social network structures makes them an indirect window into the structure of scientific knowledge. Topic networks, which reflect the re- lations between scientific ideas, offer an opportu- nity to fill this gap. Surprisingly, the few ex- isting studies of topic networks have largely for- gone explicit large-scale analyses in favor of man- ual inspection of network appearance or node-level trends 15,16,17,18,19,20. Yet, the operationalization of science as a set of interconnected ideas provides a unique opportunity to study how research topics are related within and across scientific disciplines, how these topics and their relationships grow and change over time, and how these changes may in- fluence the degree to which scientists engage with the literature. Here we address these questions in a network of topics covered in PNAS since the year 2000. Net- work nodes reflect specific words or phrases, and network edges reflect the degree of co-occurrence within article abstracts and keyword sections. Us- ing the resultant weighted, undirected network of scientific topics, we address four hypotheses. First, building on findings for co-authorship and cita- tion networks 13,14, we hypothesize that the topic network will demonstrate non-random, small-world structure. Second, based on prior studies that performed latent topic modeling 3,4, we hypothe- size that the community structure of the network will deviate significantly from disciplinary classi- fications. Third, as collaboration has crossed na- tional boundaries and broadly increased in recent years 21,22, we hypothesize that over time the net- work will show greater bridging across topic com- munities. Fourth, although the benefits of interdis- ciplinarity for individual papers are debated 5,6,7,8, we seek to investigate whether the topic network's interdisciplinarity may be associated with the over- all degree of engagement the component literature receives, as measured by PNAS 's impact factor. Materials and Methods Data collection We retrieved keywords and abstracts from 65,290 articles published in PNAS from the journal's web- 2 site using an in-house R script, and we used key- word sections to create a list of potential topics to be searched for in the abstracts. This technique was chosen over latent topic modeling, as it re- flected scientists' explicit opinions as to the words and phrases that constitute relevant scientific top- ics, and allowed for the incorporation of multi-word phrases. Network construction We calculated the prevalence of each potential topic by finding the ratio of abstracts or keyword sections containing the topic phrase to the total number of articles written in the time-span of study. Thus, prevalence varied for the full network and the year-specific networks. We used the 1000 most common topics in the given time-span as nodes to construct the network, as this value represented the approximate number at which the least prevalent words occurred often enough to produce meaning- ful signal. Edges were given by the φ coefficient for binary association 25, representing the degree to which two topics tended to be mentioned in the same abstract. We removed negative correlations, as several statistics for the analysis of signed net- works remain difficult to interpret. We created a dynamic network using a sliding window of ±6 months from a central month. Cen- tral months ranged from July, 2000 to May, 2017 such that data from January, 2000 to November, 2017 were included in the analyses. At each win- dow, the 1000 most common topics were used as nodes. We made the choice of 1000 nodes for both the static and dynamic networks because it rep- resented the highest number at which all topics selected in each window would occur more than five times. Thus, higher values would risk unin- terpretable noise among low-prevalence topics, and lower values would sacrifice valuable information. Community detection For both the static and the dynamic networks, we performed community detection using an iter- ative generalized Louvain-like locally greedy algo- rithm to maximize a common modularity quality function 26. This technique works by stochastic op- timization of the quality index value Q, in which nodes are reassigned one by one until no reassign- ment can improve Q, and then by iterating this optimization until convergence to a globally opti- mal set of community assignments to account for Figure 1: Architecture of the topic network. Nodes (N = 1000) reflect research topics and edges (E = 173, 309) reflect the degree of co-occurrence in abstracts and keyword sections. (A) The adjacency matrix sorted by topics' most commonly associated article classification. (B) Visualization of the topic network using a distributed recursive graph layout 23. (C) Visualization of the topic landscape using t-SNE 24, a method that places datapoints on a two-dimensional map based on their similarity. Nodes colored by classification; "other" includes biophysics, developmental biology, ecology, environmental sciences, plant biology, and sustainability science. local maxima in the Q space. The free parameter, γ, was selected by maximizing the Jaccard similar- ity 27 between the community-detection-based par- tition and the classification-based partition. After averaging over repeated maximizations, this value was determined to be γ = 1.2. Novel network measures We defined two novel network measures: de- viance and interdisciplinarity. The deviance for a given partition is the degree to which edge weights differ from their expectation under an exponential distribution. It is defined as follows: (cid:16) (cid:88) i(cid:54)=j (cid:17)2 Dp = wij − βpb , where wij is the observed edge weight in a cell, and βpb is the expected edge weight for a given block in the partitioned adjacency matrix, as estimated by an exponential model (see SI Methods). The interdisciplinarity is the degree to which a net- work is well-fit by a small-world structure that does not adhere to a known classification partition. It is defined as follows: ξ = φ ∗ Dc, where φ is the small-world propensity (see SI Methods, 28), and Dc is the deviance under the classification partition. 3 Results We used data from 65,290 articles published in PNAS between January, 2000 and November, 2017 to create a network of research topics. We drew po- tential topics from the keywords section of each arti- cle to allow for multi-word phrases. We determined the prevalence of each potential topic by finding the percentage of articles in which the word or phrase was contained in either the abstract or the key- words section. Based on this prevalence score, we identified the 1000 most common topics and repre- sented each as a node in the network (See Methods for details). Edges represented the co-occurrence of topics within abstracts, quantified by the φ coeffi- cient of association for binary variables 25 (Fig. 1). Negative correlations – comprising roughly 65% of edges – were removed to allow for the use of state- of-the-art analysis techniques; these edges had no- tably lower magnitude and less variability (range: [-0.10,0], interquartile range: 0.004) than the edges that remained (range: [0,0.84], interquartile range: 0.011). Structure of the topic network To understand the structure of the topic net- work, we calculated measures of interconnected- ness (global efficiency) and local clustering (average clustering coefficient); see SI Methods for math- ematical definitions. For comparison, we obtained null distributions from 100 random networks with equivalent degree and strength distributions 29. We observed that the topic network had significantly lower global efficiency (p < 0.01) and higher aver- age clustering (p < 0.01) than that observed in the null model, indicating locally dense, non-random connectivity. See Table S1 for robustness of re- sults to variations in network size. To probe the local contributions of a topic to this overall structure, we examined each node's general level of connectivity (degree, strength) and its role in bridging disparate regions of the network (be- tweenness centrality). We observed that between- ness centrality and degree were positively correlated (ρ = 0.30, p < 0.01) after accounting for strength, and that betweenness centrality and strength were negatively correlated (ρ = −0.27, p < 0.01) after accounting for degree (Fig. 2). These associations indicate that topics with high betweenness central- ity tended to be those with many relatively weak connections. Intuitively, this pattern is consistent with the presence of topics that are only occasion- ally covered but in a wide variety of research areas; topics exemplary of this pattern include protein ex- pression, physiology, and molecular mechanism. The observed high local clustering and the pres- ence of nodes with high betweenness but low strength could be parsimoniously explained by the principle of small-worldness. To evaluate this pos- sibility, we estimated the small-world propensity (SI Methods, 28); its value was 0.57, significantly higher than would be expected of a random net- work (p < 0.01). This result demonstrates that the relationships between topics have small-world properties, with more local clustering than would be expected of a random network and relatively ef- ficient pathways between clusters. The presence of small-worldness then suggests that the landscape of high-quality scientific research is naturally orga- nized into a structure that may be well-suited for advancement within topic clusters and innovation between them. Community structure of the topic network While the presence of small-worldness in the topic network suggests separation between topic clusters, it remains an open question whether these disparate communities are explained by known dis- ciplinary divisions. To answer this question, we di- rectly compared the communities inherent in the data to the communities implied by 16 disciplinary Figure 2: Relationships among betweenness central- ity, degree, and strength of topics. Topics are colored by their betweenness centrality percentile, from lowest (red) to highest (blue). Lines demonstrate the pattern of degree and strength for nodes in the first quartile (dark red), second quartile (light red), third quartile (light blue), and fourth quartile (dark blue). classifications formally assigned to each PNAS pub- lication (see Fig. 1). To extend the disciplinary classification to individual topics, we assigned each topic the most common classification among articles in which it appeared. We then partitioned topics into communities, where each community was com- prised only of topics with a given classification. A visualization of the network according to this classi- fication partition revealed relatively strong connec- tions between communities (Fig. 3A). Next we turned to the problem of identifying a natural partitioning of the topics based solely on the structure of the network, with no knowledge of the disciplinary classifications. We used a Louvain- like locally greedy algorithm 26 to maximize the modularity of the network 30, thereby obtaining a data-driven partition of the network into commu- nities. The resolution parameter γ was determined by maximizing the partition's Jaccard similarity 27 with the partition based on disciplinary classifi- cations in an attempt to optimize comparability (Fig. S1, see Methods for details). The data-driven partition yielded only eight distinct communities, each containing topics from various classifications, with relatively weak connections between commu- 4 Figure 3: The topic network's community structure. Nodes represent topic communities and edges represent the av- erage connection strength between affiliated nodes. (A) The graph reflecting communities composed of topics with the same classification. Labels from 1 to 6 refer to environmental sciences, sustainability science, ecology, plant biology, biophysics, and developmental biology, respectively. (B) The graph reflecting empirically-identified network communities, derived from modularity maximizations. Nodes show the proportion of topics with each classification in a given community. nities (Fig. 3B and Table S2). It can be seen that communities are typically dominated by topics from between one and three classifications. In a subse- quent sensitivity analysis, we demonstrate that the partition is robust to the exclusion of negative edge weights (Fig. S2). With the classification partition and data-driven partition in hand, we next sought to quantitatively compare the two. A natural way to formulate this comparison is to calculate the modularity Q-value (see Methods for details) for each partition to de- termine the degree of separation between commu- nities. As the data-driven partition was obtained by optimizing modularity, the magnitude of the in- crease in Q compared to the classification partition demonstrates the degree to which disciplinary clas- sifications do not optimally delineate research topic clusters. We observed that the modularity value was higher in the data-driven partition (Q = 0.37) than in the classification partition (Q = 0.25), in- dicating that the data-driven partition provided a more natural segregation into topic communities. Notably, this effect holds across a range of γ values, as the number of communities in the data-driven partition is varied from 8 to 16 (Table S3). As further confirmation of the data-driven par- tition's characterization of the community struc- ture, we considered the framework of the weighted stochastic block model (WSBM; 31), which provides another means of quantifying how well a partition fits the data. Specifically, a WSBM assumes a community structure in which connections within and between communities occur with an expected edge weight. To investigate which partition bet- ter characterized the edge weights between and within communities, we fit an exponential model to the edge weights in each within- or between- community block, and calculated the squared dif- ference between the observed edge weights and ex- pected edge weights (see Methods for details). A paired Wilcoxon rank sum test revealed that devi- ations from the expected weights were significantly higher under the classification partition than the data-driven partition (p < 0.0001). Notably, this effect also holds across γ values (Table S3). To- gether, these findings indicate that the data-driven partition yields both stronger community separa- tion and greater edge weight consistency within in- tracommunity and intercommunity blocks. Critically, not only is the data-driven partition a better fit to the data, but the communities strik- ingly differ in composition from those defined by classification. In comparison to the classification partition, we observe that the data-driven parti- tion displays lower disciplinarity, as measured by the average proportion of a community's topics that come from its dominant classification. For the classification partition, the disciplinarity value is 1 and for the data-driven partition the value is 0.48, indicating that the average community draws slightly less than half of its topics from its most popular classification. Importantly, the multidis- 5 temporal null model where the order of article ap- pearance was permuted uniformly at random. The null trajectories therefore represent change that would occur if topic prevalence and topic associ- ations were stable over the full time period. We first sought to test our hypothesis that the network would show strengthening connections be- tween and within communities over time, consis- tent with increasing and changing patterns of col- laboration 21,22. We tested for significant tempo- ral changes in strength and small-world propensity by comparing the variance explained by the linear effect of year (R2) to distributions of R2 created from the trajectories of the 100 temporal null net- works. Average strength (R2 = 0.75, p < 0.01) and small-world propensity (R2 = 0.25, p = 0.01) both showed significant positive linear trends over time (Fig. 4A; see Table S4 for consistent trends across network sizes). These results suggest that since 2000, associations between commonly covered scientific topics have grown stronger, and the degree to which these topics demonstrate high clustering and efficient pathways has increased as well. Next, we sought to investigate whether the network's interdisciplinarity showed a meaningful change over the time period under study. We de- fined a novel measure of journal interdisciplinarity, ξ, given by the product of the network's small-world propensity, φ, and the network's deviance from the classification partition, taken as the mean of the edge deviances described in the previous section (see Methods for details). Therefore, at each tem- poral window, ξ represents the degree to which the network has small-world structure that is not well- characterized by the assigned topic classifications. We found that classification deviance (R2 = 0.33, p < 0.01) and interdisciplinarity (R2 = 0.42, p < 0.01) both showed significant positive linear trends. However, because of the strong linear association between strength and time, it is difficult to remove any potential effect of strength on these measures without also eliminating temporal trends. Implications of interdisciplinarity To begin understanding how interdisciplinary re- search is perceived, we compared the standardized trajectory of interdisciplinarity to the trajectory of PNAS 's impact factor. We obtained yearly impact factors from 2000 to 2016 from the Web of Sci- ence, and fit a cubic spline to interpolate a smooth monthly trajectory. Interestingly, the number of ar- ticles published in a given time window explained Figure 4: Temporal features of the dynamic topic net- work. (A) Temporal trajectories of standardized small- world propensity (orange) and standardized mean edge strength (blue) over time. (B) Temporal trajectories of publication-residual impact factor (green) and strength- residual interdisciplinarity ξ (purple). ciplinarity of the data-driven partition holds when the number of communities is varied from 8 to 16 (Table S3). Taken together, these findings sug- gest that the interdisciplinary nature of research published in PNAS is underestimated by articles' disciplinary classifications. This implication is re- inforced by the fact that only 15% of articles pub- lished since 2000 were given more than one disci- plinary classification, whereas 99% of these articles covered topics from more than one discipline. Temporal changes in network structure While the static structure of the topic network is important, it does not provide insight into whether and how the landscape of scientific inquiry might change over time. To address this question, we cre- ated a dynamic network using a 12-month sliding window with an 11-month overlap over the period from January, 2000 to November, 2017 (see Meth- ods for details). Because some structural change would be expected due to random chance and pat- terns of journal publication over time, all measures were standardized relative to 100 iterations of a 6 61% of the variation in impact factor; we therefore only considered the residuals. We calculated the partial correlation between standardized interdis- ciplinarity and impact factor after accounting for strength 32, and we compared this value to a null correlation distribution, obtained using the set of standardized trajectories drawn from the 100 tem- poral null networks described previously. Interdisciplinarity showed a significant, positive partial correlation with impact factor (r = 0.45, p = 0.03) (Fig. 4B). This result suggests that in- creases in the interdisciplinarity of scientific top- ics covered in PNAS are associated with increases in the journal's impact. To determine whether this result was driven by only one of the compo- nents of ξ, we calculated the correlations for small- world propensity and classification deviance sepa- rately. Small-worldness alone was not associated with impact factor (r = 0.36, p = 0.10), and al- though deviance did show a significant correlation (r = 0.39, p = 0.04), the correlation between in- terdisciplinarity and impact factor was marginally greater (p < 0.10) and was more robust to changes in network size (Table S5). These differences indi- cate that the interdisciplinary small-worldness cap- tured by ξ is likely more associated with external measures of literature engagement than either of its component parts alone. Discussion Prior analyses of collaboration and citation net- works have produced deep insights into the struc- tures and relationships behind the production of scientific research 12,13,33,9,11,14. Yet little is known about the network structure of the scientific ideas themselves, or what features of this network might be most effective at facilitating innovation. Here, we set out to characterize the structure of a re- search topic network, investigate the degree to which topic communities fit into disciplinary clas- sifications, quantify how the landscape of topics is changing over time, and determine whether the net- work's interdisciplinarity may be related to the de- gree of engagement that its component research re- ceives. Structure of the topic network We constructed a network of research topics using seventeen years of PNAS articles, and found – un- surprisingly – that it had features uncharacteristic 7 of a random network. Specifically, the network had significantly higher clustering and lower efficiency than a random network. Interestingly, betweenness centrality of the topics in the network was posi- tively associated with degree, but negatively asso- ciated with strength. These results indicate that the network is made up of clustered topic areas that commonly co-occur, and high-degree, low-strength hubs that provide links within and between these clusters. Further supporting this conceptualization is the finding that the network shows a moderate to high degree of small-worldness compared to what would be expected of a random network. Both the graph statistical findings and the small-world classi- fication are consistent with the networks described in studies of co-authorship and citation 13,14, which would be expected to share many features with a network of research topics. Community structure of the topic network Although community detection was referenced only as a future direction in seminal collaboration network analysis 12, the modular structure found in the topic network is consistent with the pres- ence of communities in newer research on country- specific collaboration networks in both scientific and nonscientific fields 34,35. Comparisons between the community structure that arose from manual disciplinary classification and the empirical com- munity structure inherent to the data were espe- cially revealing. Specifically, compared to the par- tition arising from disciplinary classifications, the empirical partition showed stronger separation be- tween communities and provided a better fit to the within- and between-community edge weights. Additionally, as opposed to the monodisciplinary classification-specific communities, the empirical communities were found to typically contain an ap- proximately equal balance of topics from two or three distinct disciplines. One notable exception was a community made up almost exclusively of neuroscience topics (Fig. 3B), potentially reflect- ing neuroscience's unique status as a field both pop- ular enough to encompass many topics and young enough to remain largely insular. The superior fit of the empirical communities compared to the classification-specific communi- ties appears to indicate that research published in PNAS is more interdisciplinary than the arti- cle classifications suggest, an interpretation that is bolstered by the fact that 99% of articles contained topics from multiple fields while only 15% of articles were classified under multiple fields. These findings indicate that in spite of the ongoing conflicted dis- cussion regarding the merits and drawbacks of in- derdisciplinary research 5,6,7,8, researchers publish- ing in top journals may already be consciously or unconsciously integrating topics and ideas across fields. Temporal changes in network structure Though the structure of the static network yielded valuable insights into the relationships be- tween topics, the production of scientific research is far from static. Therefore, it was of great in- terest to examine temporal changes in the topic network. At the network scale, while generative evolution has been considered for authorship rela- tionships 33,9, the dynamic evolution of large-scale network properties has rarely been examined in the context of authorship or citation 36. Here we found that both edge strength and small-worldness sig- nificantly increased over time. The strengthening of connections between seemingly distant research areas could reflect a convergence of the scientific landscape towards a more interdisciplinary and in- terconnected network of ideas. This would repre- sent an interesting emergent property of the land- scape, potentially arising from individual scientists consciously or unconsciously changing their behav- ior over time to perform more innovative work. Implications of interdisciplinarity Despite the prevalence of multidisciplinary topic communities and the trend towards stronger cross- field ties, the merits of interdisciplinarity are still widely debated 5,6. Proponents view interdisci- plinary work as being crucial for "address[ing] the great questions of science" 37, while some skeptics instead believe that it too often represents "am- ateurism and intellectual voyeurism" 38. In this study, we defined a novel measure of network in- terdisciplinarity, ξ, and found it to be positively associated with PNAS 's impact factor. Although this finding only speaks to work of a high caliber, within that context it suggests that bodies of work that are more interdisciplinary in nature may receive more engagement from the sci- entific community. Yet it remains unclear whether the increased engagement is reflective of the gen- eration of more innovative scientific knowledge, or simply more effective dissemination of the knowl- edge across fields. In either case, this finding could reflect an important contribution to the discussion of interdisciplinary research, as previous research on the benefits of discipline-spanning has produced mixed results 6. Conclusion In this study, we investigated the network characteristics of scientific research topics cov- ered in PNAS. The topic network displayed small- world properties and interesting positive degree- betweenness/negative strength-betweenness associ- ations, indicating the presence of tightly connected clusters and high-degree, low-strength hub nodes serving as conceptual bridges. Community de- tection showed that assigned classifications map poorly onto the underlying clusters, with a data- driven partition revealing the existence of multi- disciplinary modules that contained topics from a variety of classifications. By investigating the tem- poral properties of the network, we found that both strength and small-worldness have been in- creasing over time. Interestingly, a novel measure of network interdisciplinarity was positively associ- ated with journal impact factor. Overall, this work demonstrates the value of network analysis in gain- ing insight into the structure of scientific knowl- edge, paints a picture of the surprisingly integrated nature of scientific ideas, and reveals a potentially important positive relationship between interdisci- plinarity and scientific engagement. Acknowledgements The authors would like to thank Lili Dworkin and Ipek Oguz for advice on data collection and anal- ysis, and Ann E. Sizemore and Richard F. Betzel for helpful feedback on the manuscript. RTS would like to acknowledge support from the National In- stitute of Neurological Disorders and Stroke (R01 NS085211 & R01 NS060910). DSB would like to acknowledge support from the John D. and Cather- ine T. MacArthur Foundation, the Alfred P. Sloan Foundation, and the National Science Foundation CAREER (PHY-1554488). The content is solely the responsibility of the authors and does not nec- essarily represent the official views of any of the funding agencies. Data Accessibility Data and code can be downloaded at https: //www.dropbox.com/sh/p2ksqq8ubvt6haq/ 8 AADdlSGfEpX6XL7eA4ua-gl6a?dl=0. J.D.D. can be reached for questions regarding the code at [email protected]. Author Contributions J.D.D., R.T.S., and D.S.B. designed research; J.D.D. performed research, wrote the code, and an- alyzed data; and J.D.D., R.T.S., and D.S.B. wrote the paper. References Quantifying [1] Dashun Wang, Chaoming Song, and Albert-Lszl im- Barabsi. Science, 342(6154):127–132, October 2013. pact. ISSN 0036-8075, 1095-9203. 10.1126/science. 1237825. URL http://www.sciencemag.org/lookup/ doi/10.1126/science.1237825. long-term scientific doi: [2] Daniel E. Acuna, Stefano Allesina, and Konrad P. Ko- rding. Predicting scientific success: Future impact. Na- ture, 489(7415):201–202, September 2012. ISSN 0028- 0836, 1476-4687. doi: 10.1038/489201a. URL http: //www.nature.com/articles/489201a. [3] E. Erosheva, S. Fienberg, and J. Lafferty. Mixed- membership models of scientific publications. Pro- ceedings of the National Academy of Sciences, 101 (Supplement 1):5220–5227, April 2004. ISSN 0027- 8424, 1091-6490. 10.1073/pnas.0307760101. URL http://www.pnas.org/cgi/doi/10.1073/pnas. 0307760101. doi: [4] E. M. Airoldi, E. A. Erosheva, S. E. Fienberg, C. Joutard, T. Love, and S. Shringarpure. Reconceptu- alizing the classification of PNAS articles. Proceedings of the National Academy of Sciences, 107(49):20899– 20904, December 2010. ISSN 0027-8424, 1091-6490. doi: 10.1073/pnas.1013452107. URL http://www.pnas.org/ cgi/doi/10.1073/pnas.1013452107. [5] D. Rhoten. Risks and rewards of an interdisciplinary research path. Science, 306(5704):2046–2046, December 2004. ISSN 0036-8075, 1095-9203. doi: 10.1126/science. 1103628. URL http://www.sciencemag.org/cgi/doi/ 10.1126/science.1103628. [6] Jerry A. Jacobs and Scott Frickel. Interdisciplinarity: Annual Review of Sociol- A critical assessment. ogy, 35(1):43–65, August 2009. ISSN 0360-0572, 1545-2115. doi: 10.1146/annurev-soc-070308-115954. URL http://www.annualreviews.org/doi/10.1146/ annurev-soc-070308-115954. [7] Jonathan M. Levitt and Mike Thelwall. Is multidisci- plinary research more highly cited? A macrolevel study. Journal of the American Society for Information Sci- ence and Technology, 59(12):1973–1984, October 2008. ISSN 15322882, 15322890. doi: 10.1002/asi.20914. URL http://doi.wiley.com/10.1002/asi.20914. [8] Erin Leahey and James Moody. Sociological innovation through subfield integration. Social Currents, 1(3):228– 256, October 2014. ISSN 2329-4965, 2329-4973. doi: 10.1177/2329496514540131. URL http://journals. sagepub.com/doi/10.1177/2329496514540131. [9] M. E. J. Newman. Clustering and preferential at- tachment in growing networks. Physical Review E, 64 (2), July 2001. ISSN 1063-651X, 1095-3787. doi: 10. 1103/PhysRevE.64.025102. URL https://link.aps. org/doi/10.1103/PhysRevE.64.025102. The [10] Stuart R. Borrett, James Moody, and Achim Edel- mann. rise of Network Ecology: Maps of the topic diversity and scientific collaboration. Ecological Modelling, 293:111–127, December 2014. ISSN 03043800. 10.1016/j.ecolmodel.2014. URL http://linkinghub.elsevier.com/ 02.019. retrieve/pii/S0304380014001136. doi: [11] C. Chen. Searching for intellectual turning points: Pro- gressive knowledge domain visualization. Proceedings of the National Academy of Sciences, 101(Supplement 1): 5303–5310, April 2004. ISSN 0027-8424, 1091-6490. doi: 10.1073/pnas.0307513100. URL http://www.pnas.org/ cgi/doi/10.1073/pnas.0307513100. [12] M. E. J. Newman. Coauthorship networks and pat- terns of scientific collaboration. Proceedings of the Na- tional Academy of Sciences, 101(Supplement 1):5200– 5205, April 2004. ISSN 0027-8424, 1091-6490. doi: 10.1073/pnas.0307545100. URL http://www.pnas.org/ cgi/doi/10.1073/pnas.0307545100. [13] M. E. J. Newman. The structure of scientific collabora- tion networks. Proceedings of the National Academy of Sciences, 98(2):404–409, January 2001. ISSN 00278424. doi: 10.1073/pnas.021544898. URL \left(. [14] Matthew L. Wallace, Vincent Larivire, and Yves Gin- gras. A small world of citations? The influence of collaboration networks on citation practices. PLoS ONE, 7(3):e33339, March 2012. ISSN 1932-6203. doi: 10.1371/journal.pone.0033339. URL http://dx.plos. org/10.1371/journal.pone.0033339. [15] Srinivasan Radhakrishnan, Serkan Erbis, Jacqueline A. Isaacs, and Sagar Kamarthi. Novel keyword co- occurrence network-based methods to foster system- atic reviews of scientific literature. PLOS ONE, 12 (3):e0172778, March 2017. doi: 10.1371/journal.pone.0172778. URL http://dx.plos. org/10.1371/journal.pone.0172778. ISSN 1932-6203. [16] Juan Zhang, Jun Xie, Wanli Hou, Xiaochen Tu, Jing Xu, Fujian Song, Zhihong Wang, and Zuxun Lu. Map- ping the knowledge structure of research on patient adherence: Knowledge domain visualization based co- word analysis and social network analysis. PLoS ONE, 7(4):e34497, April 2012. ISSN 1932-6203. doi: 10.1371/ journal.pone.0034497. URL http://dx.plos.org/10. 1371/journal.pone.0034497. [17] H.P.F. Peters and A.F.J. van Raan. Co-word-based science maps of chemical engineering. Part I: Rep- scaling. resentations Research Policy, 22(1):23–45, February 1993. ISSN 00487333. doi: 10.1016/0048-7333(93)90031-C. URL http://linkinghub.elsevier.com/retrieve/pii/ 004873339390031C. direct multidimensional by [18] Elizabeth Beam, L. Gregory Appelbaum, Jordynn Jack, James Moody, and Scott A. Huettel. Mapping the semantic structure of cognitive neuroscience. Journal of Cognitive Neuroscience, 26(9):1949–1965, September 2014. ISSN 0898-929X, 1530-8898. doi: 10.1162/jocn\ a\ 00604. URL http://www.mitpressjournals.org/ doi/10.1162/jocn_a_00604. [19] James Moody and Ryan Light. A view from above: The evolving sociological landscape. The American Sociol- ogist, 37(2):67–86, June 2006. ISSN 0003-1232, 1936- 4784. doi: 10.1007/s12108-006-1006-8. URL http: //link.springer.com/10.1007/s12108-006-1006-8. 9 [20] Alejandro F. Frangi, Zeike A. Taylor, and Ali Gooya. Precision Imaging: more descriptive, predictive and in- tegrative imaging. Medical Image Analysis, 33:27–32, October 2016. ISSN 13618415. doi: 10.1016/j.media. 2016.06.024. URL http://linkinghub.elsevier.com/ retrieve/pii/S1361841516301049. [21] Jarno Hoekman, Koen Frenken, and Robert J.W. Tijssen. Research collaboration at a distance: Changing spatial patterns of scientific collaboration Research Policy, 39(5):662–673, within Europe. June 2010. doi: 10.1016/j.respol. 2010.01.012. URL http://linkinghub.elsevier.com/ retrieve/pii/S0048733310000260. ISSN 00487333. [22] Jian Huang, Ziming Zhuang, Jia Li, and C. Lee Giles. Collaboration over time: characterizing and modeling network evolution. page 107. ACM Press, 2008. doi: 10. 1145/1341531.1341548. URL http://portal.acm.org/ citation.cfm?doid=1341531.1341548. [23] S. Martin, W. M. Brown, R. Klavans, and K. W. Boy- ack. Drl: Distributed recursive (graph) layout. SAND Reports, 2936:1–10, 2008. [24] L.J.P. van der Maaten and G.E. Hinton. Visualizing high-dimensional data using t-sne. Journal of Machine Learning Research, 9:2579–2605, 01 2008. [25] Ernest C. Davenport and Nader A. El-Sanhurry. Phi/Phimax: Review and synthesis. Educational and Psychological Measurement, 51(4):821–828, December 1991. 10.1177/ 001316449105100403. URL http://journals.sagepub. com/doi/10.1177/001316449105100403. ISSN 0013-1644, 1552-3888. doi: [26] L.G.S. Jeub, M. Bazzi, I.S. Jutla, and P.J. Mucha. A generalized Louvain method for community detec- tion implemented in MATLAB, 2011. URL http: //netwiki.amath.unc.edu/GenLouvain. [27] Matthew Steen, Satoru Hayasaka, Karen Joyce, and Paul Laurienti. Assessing the consistency of com- munity structure in complex networks. Physical Re- view E, 84(1), July 2011. ISSN 1539-3755, 1550- 2376. doi: 10.1103/PhysRevE.84.016111. URL https: //link.aps.org/doi/10.1103/PhysRevE.84.016111. [28] Sarah Feldt Muldoon, Eric W. Bridgeford, and Danielle S. Bassett. Small-world propensity and weighted brain networks. Scientific Reports, 6(1), April 2016. ISSN 2045-2322. doi: 10.1038/srep22057. URL http://www.nature.com/articles/srep22057. [29] Mikail Rubinov and Olaf Sporns. Weight-conserving characterization of complex functional brain net- NeuroImage, 56(4):2068–2079, June 2011. works. ISSN 10538119. 10.1016/j.neuroimage.2011. URL http://linkinghub.elsevier.com/ 03.069. retrieve/pii/S105381191100348X. doi: [30] M E J Newman. Modularity and community structure in networks. Proc. Natl. Acad. Sci. U.S.A., 103(23): 8577–8582, 2006. [31] C. Aicher, A. Z. Jacobs, and A. Clauset. Learning latent block structure in weighted networks. Jour- nal of Complex Networks, 3(2):221–248, June 2015. ISSN 2051-1310, 2051-1329. doi: 10.1093/comnet/ cnu026. URL https://academic.oup.com/comnet/ article-lookup/doi/10.1093/comnet/cnu026. [32] Bernadette C. M. van Wijk, Cornelis J. Stam, and An- dreas Daffertshofer. Comparing brain networks of dif- ferent size and connectivity density using graph the- ory. PLoS ONE, 5(10):e13701, October 2010. ISSN 1932-6203. doi: 10.1371/journal.pone.0013701. URL 10 http://dx.plos.org/10.1371/journal.pone.0013701. [33] Caroline S. Wagner and Loet Leydesdorff. Network structure, self-organization, and the growth of interna- tional collaboration in science. Research Policy, 34(10): 1608–1618, December 2005. ISSN 00487333. doi: 10. 1016/j.respol.2005.08.002. URL http://linkinghub. elsevier.com/retrieve/pii/S0048733305001745. [34] Borut Luar, Zoran Levnaji, Janez Povh, and Matja Perc. Community structure and the evolution of inter- disciplinarity in Slovenia's scientific collaboration net- work. PLoS ONE, 9(4):e94429, April 2014. ISSN 1932-6203. doi: 10.1371/journal.pone.0094429. URL http://dx.plos.org/10.1371/journal.pone.0094429. [35] Federico Battiston, Jacopo Iacovacci, Vincenzo Nicosia, Ginestra Bianconi, and Vito Latora. Emergence of mul- tiplex communities in collaboration networks. PLOS ONE, 11(1):e0147451, January 2016. ISSN 1932-6203. doi: 10.1371/journal.pone.0147451. URL http://dx. plos.org/10.1371/journal.pone.0147451. [36] Luka Kronegger, Anuka Ferligoj, and Patrick Dor- eian. On the dynamics of national scientific sys- tems. Quality & Quantity, 45(5):989–1015, August 2011. 10.1007/ s11135-011-9484-3. URL http://link.springer.com/ 10.1007/s11135-011-9484-3. ISSN 0033-5177, 1573-7845. doi: [37] Facilitating interdisciplinary research. National Academies Press, Washington, D.C., April 2004. ISBN 978-0-309-09435-1. URL http://www.nap.edu/ catalog/11153. DOI: 10.17226/11153. [38] Lennard J Davis. A grand unified theory of interdisci- plinarity. Chronicles of Higher Education, 53(40):B9, 2007. [39] M. Bordons, M. T. Fern´andez, and I. G´omez. Advan- tages and limitations in the use of impact factor mea- sures for the assessment of research performance. Sci- entometrics, 53:195–206, 02 2002. [40] Andrew P. Kurmis. Understanding the limitations of the journal impact factor. The Journal of Bone and Joint Surgery. American Volume, 85-A(12):2449–2454, December 2003. ISSN 0021-9355. Life and times of the impact factor: [41] M. Chew, E. V Villanueva, and M. B Van Der Wey- retro- den. spective analysis of trends for seven medical jour- nals (1994-2005) and their Editors' views. Journal of the Royal Society of Medicine, 100(3):142–150, March 2007. 10.1258/ jrsm.100.3.142. URL http://www.jrsm.org/cgi/doi/ 10.1258/jrsm.100.3.142. ISSN 0141-0768, 0141-0768. doi: [42] R: A language and environment for statistical comput- ing, 2015. [43] Gabor Csardi and Tamas Nepusz. The igraph soft- ware package for complex network research. Inter- Journal, Complex Systems:1695, 2006. URL http: //igraph.org. [44] Mikail Rubinov and Olaf Sporns. Complex network measures of brain connectivity: Uses and interpre- NeuroImage, 52(3):1059–1069, September tations. 2010. doi: 10.1016/j.neuroimage. 2009.10.003. URL http://linkinghub.elsevier.com/ retrieve/pii/S105381190901074X. ISSN 10538119. [45] Frank E Harrell Jr, with contributions and many 2016. others. Charles Dupont, Harrell Miscellaneous, //CRAN.R-project.org/package=Hmisc. version 4.0-2. from Hmisc: https: R package URL [46] Linton C. Freeman. Centrality in social networks conceptual clarification. Social Networks, 1(3):215– 239, January 1978. 10. 1016/0378-8733(78)90021-7. URL http://linkinghub. elsevier.com/retrieve/pii/0378873378900217. ISSN 03788733. doi: [47] A. Barrat, M. Barthelemy, R. Pastor-Satorras, and A. Vespignani. The architecture of complex weighted networks. Proceedings of the National Academy of Sciences, 101(11):3747–3752, March 2004. ISSN 0027-8424, 1091-6490. 10.1073/pnas. 0400087101. URL http://www.pnas.org/cgi/doi/10. 1073/pnas.0400087101. doi: [48] Vito Latora and Massimo Marchiori. Efficient behavior of small-world networks. Physical Review Letters, 87 (19), October 2001. ISSN 0031-9007, 1079-7114. doi: 10.1103/PhysRevLett.87.198701. URL https://link. aps.org/doi/10.1103/PhysRevLett.87.198701. [49] D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440–442, June 1998. ISSN 0028-0836. doi: 10.1038/30918. [50] M. E. J. Newman. Analysis of weighted networks. ISSN Physical Review E, 70(5), November 2004. 1539-3755, 1550-2376. 10.1103/PhysRevE.70. 056131. URL https://link.aps.org/doi/10.1103/ PhysRevE.70.056131. doi: [51] Sergio Gmez, Pablo Jensen, and Alex Arenas. Anal- ysis of community structure in networks of corre- lated data. Physical Review E, 80(1), July 2009. ISSN 1539-3755, 1550-2376. doi: 10.1103/PhysRevE. 80.016114. URL https://link.aps.org/doi/10.1103/ PhysRevE.80.016114. [52] Benjamin H. Good, Yves-Alexandre de Montjoye, and Aaron Clauset. Performance of modularity maximiza- tion in practical contexts. Physical Review E, 81(4), April 2010. doi: 10. 1103/PhysRevE.81.046106. URL https://link.aps. org/doi/10.1103/PhysRevE.81.046106. ISSN 1539-3755, 1550-2376. [53] Yuchung J. Wang and George Y. Wong. Stochastic blockmodels for directed graphs. Journal of the Amer- ican Statistical Association, 82(397):8–19, March 1987. ISSN 0162-1459, 1537-274X. doi: 10.1080/01621459. 1987.10478385. URL http://www.tandfonline.com/ doi/abs/10.1080/01621459.1987.10478385. 11 Supporting Information Network Measures SI Text Limitations Validity and generalizability of the findings pre- sented in this paper are limited by a few method- ological considerations. First, seminal work has shown that fields of study differ significantly in the structures of their authorship and citation net- works 12,13. Therefore it is conceivable that jour- nals may also have meaningful differences in the structure and correlates of topic networks. If this is the case, using journal-specific data may limit the degree to which the findings in this paper can be generalized to scientific research more broadly. Fu- ture work could expand the data source to include several top-tier journals within and across fields. Additionally, the restriction of the dataset to key- word sections and abstracts may ignore potential information contained in introduction and discus- sion sections. However, it is plausible that topics mentioned in introduction and discussion areas may not be an accurate reflection of the topics truly cov- ered in a given article, unlike those mentioned in the abstract and keyword sections. Future work could examine this assumption directly by implementing a manual rating system. Finally, impact factor is widely considered to be an imperfect measure of scientific engagement with published research. Although warnings against im- pact factor's use often highlight its inability to facil- itate valid comparisons between journals in differ- ent fields or different countries 39,40, within-journal changes over time are also incomplete and poten- tially subject to manipulation through editorial policies 41. Future work could consider associations between network structure and other measures of scientific engagement and journal quality. SI Methods Data analysis Topic networks and temporal null networks were created, visualized, and analyzed in the R statis- tical environment 42 using the iGraph package 43. Benchmark random networks were generated us- ing the Brain Connectivity Toolbox in MATLAB 44, but were analyzed using the iGraph package. Com- munity detection was carried out in MATLAB us- ing the GenLouvain toolbox 26. Correlation coeffi- cients and probability values were obtained using the Hmisc package in R 45. Here we provide a brief description of the network measures used in this study. The degree of a node is the number of edges, regardless of weight, connected to the node 44. De- gree then represents one aspect of the node's im- portance, measured by the number of neighbors it has in the network. It is defined as follows: (cid:88) j∈N ki = aij, where N is the set of all nodes in the network, and aij is 1 if nodes i and j are connected by an edge and 0 if not. The strength of a node is the sum of the weights of all edges connected to the node 44. This measure is similar to degree in that it sums a node's con- necting edges, but strength additionally allows for edges of varying weights. It is defined as follows: (cid:88) j∈N si = wij, where wij is the weight of the edge between nodes i and j if they are connected and 0 if not. The betweenness centrality of a node is the proportion of all shortest paths within the network that pass through the given node 46. Betweenness centrality represents the degree to which a specific node functions as a bridge between nodes in dis- parate parts of the network. It is defined as follows: (cid:88) bi = 1 (n − 1)(n − 2) h,j∈N ;h(cid:54)=j,h(cid:54)=i,j(cid:54)=i ρ(i) hj ρhj , where ρhj is the number of shortest weighted paths between h and j, ρ(i) is the number of shortest hj weighted paths between h and j that pass through node i, and n is the number of nodes in the graph. The clustering coefficient of a node can be defined as the probability that two of its adjacent nodes are connected to each other. A node's clus- tering coefficient then represents the amount of in- terconnectedness in a node's local neighborhood. The version used in the current study is a measure of transitivity, as given by Barrat 47. It is defined as follows: 12 cw i = 1 si(ki − 1) (cid:88) h,j∈N (wij + wih) 2 aijaihahj. The global efficiency of a network can be de- fined as the average inverse shortest path length between any two nodes 48. Global efficiency is of- ten thought of as representing the amount of inte- gration within and between disparate parts of the network. It is defined as follows: (cid:80) j∈N ;j(cid:54)=i d−1 n − 1 ij , (cid:88) i∈N Ew = 1 n where dij is the shortest weighted path length be- tween node i and node j. The path length of a network is the average shortest path length between all node pairs 49. In many graphs, path length is inversely correlated with global efficiency, and is therefore often inter- preted as representing an alternative measure of network integration. A version of the path length for a weighted network is as follows: (cid:88) i(cid:54)=j L = 1 n(n − 1) dij. The modularity of a network intuitively rep- resents the degree of separation between nodes in different groups 50. It quantifies how well the net- work can be separated into non-overlapping com- munities, with many within-group connections and few between-group connections. For a network con- taining only positive weights, the modularity can be defined as follows: Qw = 1 lw wij − sisj lw δmimj , (cid:88) (cid:104) i,j∈N (cid:105) and for a signed network, the modularity can be defined as follows 51: (cid:88) (cid:34) i s+ wij − s+ lw + j + s− i s− lw− j (cid:35) δmimj , Qw s = 1 lw + + lw− i,j∈N where lw is the sum of all of the weights in the net- work, lw + is the sum of all of the positive weights in the network, lw− is the sum of all of the nega- tive weights in the network, s+ is the strength of a i 13 i node's positive edges, s− is the strength of a node's negative edges, and δmimj is 1 if i = j and 0 oth- erwise. Here, we addressed the issue of near degen- eracy 52 in the modularity landscape by using 100 iterations of a Louvain-like locally greedy algorithm to maximize the modularity quality function 26, and we report the consensus partition over those itera- tions. The small-world propensity is the degree to which a network shows similar clustering to that of a lattice network, and similar average path length to that of a random network 28. This metric is sim- ilar to the commonly used small-world index, σ 49, but has been shown to be unbiased even in the con- text of networks with varying densities. Both mea- sures broadly represent how well a network can be characterized as having both disparate clusters and high levels of between-cluster integration. Small- world propensity is defined as follows: (cid:114) φ = 1 − ∆2 C + ∆2 L 2 , where and ∆C = Clattice − Cobserved Clattice − Crandom , ∆L = Lobserved − Lrandom Llattice − Lrandom , with C representing the network clustering coeffi- cient, defined as the average node-specific cw i values. The stochastic block model assumes a com- munity structure in which between- and within- group connections occur with a specific probabil- ity (in the unweighted case) or an expected edge weight (in the weighted case). Unlike modular- ity, which characterizes a community structure with many (strong) connections within groups and few (weak) connections between groups, the stochastic block model characterizes a community structure with consistent connection patterns within and be- tween groups. For the unweighted case 53, it is de- fined as follows: (cid:89) i(cid:54)=j (cid:0)1 − Bgigj (cid:1)(1−aij ) , Pg,B(A) = Baij gigj where g ∈ 1, ..., K n is a vector of community mem- berships, assuming K distinct communities, and B ∈ [0, 1]KxK is a matrix of community-wise edge probabilities. For the exponential weighted framework used in the current study 31, the model is defined as follows: (cid:89) i(cid:54)=j Pg,Λ(A) = Λgigj e −Λgigj wij , where Λ ∈ [0,∞)KxK is a matrix of community- wise rate parameters. 14 Network Measure N = 950 N = 1000 N = 1050 Small-world propensity (φ) Betweenness - degree correlation (r) Betweenness - strength correlation (r) 0.59** 0.28** -0.31** 0.58** 0.30** -0.27** 0.57** 0.31** -0.23** Table S1: Effect of network size on the results for the full network. Rows represent different network-level measures reported in the full text, columns represent their values and statistical significance for different choices of network size. Note: * = p < 0.05, ** = p < 0.01. Group # of topics Primary topic classification Secondary topic classification Tertiary topic classification 1 2 3 4 5 6 7 8 206 178 175 141 117 92 78 13 Biochemistry (49%) Medical Sciences (68%) Evolution (29%) Neuroscience (89%) Biochemistry (43%) Microbiology (40%) Biochemistry (32%) Biochemistry (38%) Biophysics and Comp. Biol (18%) Developmental Biology (4%) Chemistry (21%) Cell Biology (19%) Environmental Sciences (15%) Ecology (13%) Medical Sciences (4%) Genetics (20%) Immunology (37%) Cell Biology (28%) Medical Sciences (23%) Biochemistry (2%) Medical Sciences (14%) Medical Sciences (14%) Medical Sciences (19%) Neuroscience (23%) Table S2: Classification composition of empirically obtained topic communities. Rows represent the eight communities, and columns give the three most common classifications for the topics contained within each community. Number of communities Modularity (Q) Disciplinarity P-value for test of WSBM deviance 9 10 11 12 13 14 15 16 0.36 0.35 0.35 0.34 0.34 0.34 0.33 0.33 0.52 0.53 0.53 0.53 0.54 0.55 0.56 0.56 < 0.0001 < 0.0001 < 0.0001 < 0.0001 < 0.0001 < 0.0001 < 0.0001 < 0.0001 Table S3: Effect of the number of communities on features of the empirical partition. Rows represent partitions with between 9 and 16 communities. Columns represent the degree to which the partitions demonstrate modular structure, contain disciplinary communities, and better explain edge weights compared to the classification partition. Network Measure N = 950 N = 1000 N = 1050 Strength by time (R2) Interdisciplinarity by time (R2) Small-world propensity by time (R2) Classification deviance by time (R2) 0.77** 0.41** 0.26* 0.31** 0.75** 0.42** 0.25* 0.33** 0.74** 0.40** 0.20 0.33** Table S4: Effect of network size on the linear trajectories of the temporal network. Rows represent the variances explained by time for various measures of the temporal network. Columns represent their values and statistical significance for different choices of network size. Note: * = p < 0.05, ** = p < 0.01. Network Measure N = 950 N = 1000 N = 1050 Interdisciplinarity - impact factor correlation (r) Small-world propensity - impact factor correlation (r) Classification deviance - impact factor correlation (r) 0.44* 0.35 0.37 0.45* 0.36 0.39* 0.45* 0.35 0.38 Table S5: Effect of network size on the impact factor correlations of the temporal network. Rows represent the correlations with PNAS 's impact factor for various measures of the temporal network. Columns represent their values and statistical significance for different choices of network size. Note: * = p < 0.05, ** = p < 0.01. 15 Figure S1: Visualization of the Jaccard similarity between the empirical community structure and the assigned topic classifications. Jaccard similarities are plotted for a range of γ values, demonstrating the procedure for optimizing Jac- card similarity over γ that was used when performing com- munity detection. These values are shown for three different choices of network size. Figure S2: Visualization of the consistency, using Jaccard similarity, of the empirical community structure both (i) across sizes, and (ii) with or without negative edge weights. Community structure was consistent across sizes, and was reasonably consistent between positive weighted networks, and positive-and-negative weighted networks. 16
1309.7698
1
1309
2013-09-30T01:07:06
Signed Networks, Triadic Interactions and the Evolution of Cooperation
[ "cs.SI", "cs.GT", "cs.NE", "physics.soc-ph" ]
We outline a model to study the evolution of cooperation in a population of agents playing the prisoner's dilemma in signed networks. We highlight that if only dyadic interactions are taken into account, cooperation never evolves. However, when triadic considerations are introduced, a window of opportunity for emergence of cooperation as a stable behaviour emerges.
cs.SI
cs
Signed Networks, Triadic Interactions and the Evolution of Cooperation K´aroly Tak´acs Simone Righi MTA TK "Lendulet" Research Center for Educational and Network Studies (RECENS). Budapest (Hungary) [email protected] [email protected] We outline a model to study the evolution of cooperation in a population of agents playing the pris- oner's dilemma in signed networks. We highlight that if only dyadic interactions are taken into account, cooperation never evolves. However, when triadic considerations are introduced, a window of opportunity for emergence of cooperation as a stable behaviour emerges. Introduction. In this paper we examine how cooperation can be supported by negative ties and triadic interactions. Previous research has demonstrated that cooperation is more likely to evolve in social dilemma games, such as the Prisoners Dilemma, if the game is played in networks [1, 4, 5, 12]. Besides sparseness [3, 4, 5], the structure of the network is also important because on top of direct ties, indirect relations also control behavior and contribute to the establishment of cooperation through reputation mechanisms, such as image scoring [2]. These ideas have been fruitful in explaining why and under which conditions can cooperation evolve and be stable among humans. In these studies however, only positive relations between players are analyzed. Negative ties could potentially be better enforcers of cooperation than positive ones. At the dyadic level, social psychological mechanisms of vengeance and anger are manifested through the use of pow- erful trigger strategies in the repeated Prisoners Dilemma game [7, 8, 9, 10]. Another mechanism is selectivity that prescribes cooperation with those who are liked and defection with those who are dis- liked. Experiments demonstrate that subjects play differently in social dilemma games with related and unrelated others (e.g., [6]). There is also evidence of homophilous selection of partners that can stabi- lize cooperative regimes [11]. Furthermore, we hypothesize that when interactions happen on a triadic basis, cooperation can increase. For instance, if A and B are friends, and C is their common enemy, the presence of the negative ties towards C could strengthen cooperation between A and B. Signed relations could reliably signal cooperative or non-cooperative intentions, and hence could guarantee the spread of appropriate reputational information that result in confirming expectations about cooperation. Model. We incorporate both dyadic and triadic interaction mechanisms in an agent-based model in which the (random) signed network and cooperation co-evolve. Our model is inspired by the tradition of computational evolutionary game theory models where the more successful strategies tend to diffuse in the population. We analyze the evolutionary success of different strategies that are defecting or cooper- ating and sensitive to the sign of links from their partners to others to a different way and extent. Indeed, each agent in our setup can be of one of the following three types: • Unconditional Defector (UD): which will always defect. • Conditional Player(CO): whose strategy choice is influenced by the sign of his ties. He cooperates if he likes the opponent (positive tie) and he defects if he does not like the opponent (negative tie). A. Graudenzi, G. Caravagna, G. Mauri, M. Antoniotti (Eds.): Wivace 2013 - Italian Workshop on Artificial Life and Evolutionary Computation EPTCS 130, 2013, pp. 104 -- 107, doi:10.4204/EPTCS.130.17 c(cid:13) S. Righi, K. Tak´acs S. Righi, K. Tak´acs 105 • Unconditional Cooperator (UC): It cooperates always regardless to the sign of his ties. Starting with a population composed of a similar number of agents for each type we iterate the following steps until an equilibrium is reached: 1. Two (or three in the case of triadic interactions) connected agents are selected randomly. 2. The prisoner's dilemma is played between the two (or three, playing the game between each couple of the triad) agents selected and the total payoff is calculated for each of them1. 3. The signs of the network ties involved in the interactions evolve as consequence of the actions of the agents in step 3. In particular: • if both agents played the Defection strategy then the sign of their tie is turned negative. • if both agents played the Cooperation strategy then the sign between them is turned positive. • if one of the agent Cooperates while the other Defects then the tie is turned positive with probability Ppos and negative with probability Pneg. 4. The agent with higher payoff has a probability Pinv of invading the agent with lower payoff (in case of equality each agent has the same probability of invasion2). Studying this setup in the two different cases in which the Prisoner's dilemma is played in couples and in triads we obtain the preliminary results outlined in the next paragraph3 Outline of the results. In the presence of negative ties, cooperation cannot be sustained in a random network where only dyadic considerations affect the agents' behavior. The reason is described by the first panel of Figure 1. Here we consider the stability, in isolation, of each possible pair of agents and sign of the tie that links them. If a pair is unstable then the dynamics of the model will transform it in some other pair. In presence of only dyadic interactions only the pairs circled in blue4 are stable. However, since the prisoner's dilemma is not played in isolation but in a population of agents, one must also consider the stability of the dyads to invasion by other types of agents. Indeed, as UD always dominates UC in a dyadic comparison, the dyad UC+UC is only stable in isolation. Moreover, UD dominates CO in a dyadic comparison if they are linked by a positive tie, they are equivalent otherwise. So if Pneg > 0 then CO +CO and CO−CO are also only stable in isolation. Generalizing this result to the whole network we can conclude that the only stable configuration for the case of dyadic interactions is a population of Defectors linked by a network of negative signs. Introducing triadic interactions enlarges the window of opportunity for the diffusion of cooperative behavior allowing for the emergence of stable cooperative clusters. Indeed, with the same strategy used above5, we obtain the updating dynamics of the lower left panel of Figure 1: all triads formed of agents of the same types are stable in isolation. Moreover, as can be seen on the right panel of Figure 1 none of this triads dominates any other one. This allows us to conclude that if interactions happen in triads it is possible to observe the emergence of some degree of cooperation in an evolutionary prisoner's dilemma played on signed networks. The actual emergence of cooperation depends on the values assumed by the transition probabilities and from the network topology assumed. We are currently designing simulations to corroborate the conceptual analysis provided here. 1If a triad is selected all three agents need to have connections with each other so that everyone will play exactly twice. 2If there is a payoffs order a > b > c, then only a can invade one of the other agents. However, if the payoffs order is of the type a = b > c than either a or b can be selected. The selected agent will then randomly choose to invade one of the remaining players of the triad randomly. 3For reasons of space, in this paper we limit our analysis to a conceptual analysis. 4Namely: UC+UC, CO+CO, UD-UD and CO-CO. 5Signs are not reported in the image so to simplify the drawing. 106 Signed Networks, Triadic Interactions and the Evolution of Cooperation Figure 1: The first panel shows the effects of model's dynamics on each signed pair for the case in which only dyadic interactions are considered. The arrows between dyads indicate the possible transformations from one pair to another allowed by the model's dynamics. Only the four pairs circled in blue (the four left ones) are stable. The lower left panel repeat the same exercise for triadic interactions. The lower right panel shows that none of the triads which are stable in isolation is dominated by any other. The signs are omitted from the figure and each triad represent all possible triads with the combination of agents' types indicated, regardless of the signs that link them. The arrows between triads indicate possible transformations from one triad to another, accounting for the possibilities given by different network signs, allowed by the model's dynamics. . References [1] Hauert C & Doebeli M (2004): Spatial structure often inhibits the evolution of cooperation in the snowdrift game. Nature 428(6983), pp. 643 -- 646. doi:10.1038/nature02360 [2] Wedekind C & Milinski M (2000): Cooperation through image scoring in humans. Science 288(5467), pp. 850 -- 852. doi:10.1126/science.288.5467.850 [3] Nowak MA (2006): Five rules for the evolution of cooperation. Science 314(5805), pp. 1560 -- 1563. doi:10.1126/science.1133755 [4] Lieberman E Ohtsuki H, Hauert C & Nowak MA (2006): A simple rule for the evolution of cooperation on graphs and social networks. Nature 441(7092), pp. 502 -- 505. doi:10.1038/nature04605 [5] Pinheiro FL Pacheco JM & Santos FC (2009): Population structure induces a symmetry break- PLoS computational biology 5(12), p. e1000596. ing favoring the emergence of cooperation. doi:10.1371/journal.pcbi.1000596.g004 [6] Ferraro PJ & Cummings RG: Cultural diversity, discrimination, and economic outcomes: an experimental analysis. Economic Inquiry 45(2). [7] Axelrod R (1984): The Evolution of Cooperation. New York, Basic Books. S. Righi, K. Tak´acs 107 [8] Axelrod R (1997): The Complexity of Cooperation. Agent-Based Models of Competition and Collaboration. Princeton NJ, Princeton University Press. [9] Axelrod R & Hamilton WD (1981): The evolution of cooperation. Science 211(4489), pp. 1390 -- 1396. doi:10.1126/science.7466396. [10] Trivers RL (1971): The evolution of reciprocal altruism. Quarterly review of biology, pp. 35 -- 57. [11] Yamagishi T & Hayashi N (1996): Selective Play: Social Embeddedness of Social Dilemmas. In Liebrand WBG & Messick DM, editors: Frontiers in Social Dilemma Research, Springer, Berlin. [12] Zhang C Wang S, Szalay MS & Csermely P (2008): strategy adoption rules expand cooperative network topologies. doi:10.1371/journal.pone.0001917.s001 Learning and innovative elements of PLoS One 3(4), p. e1917. [13] Hayashi N Yamagishi T & Jin N (1994): Prisoners Dilemma Networks: Selection Strategy Versus Action Strategy. In Albers W Schulz U & Mueller U, editors: Social Dilemmas and Cooperation, Springer Verlag, Berlin.
1703.04837
1
1703
2017-03-14T23:43:15
SNE: Signed Network Embedding
[ "cs.SI" ]
Several network embedding models have been developed for unsigned networks. However, these models based on skip-gram cannot be applied to signed networks because they can only deal with one type of link. In this paper, we present our signed network embedding model called SNE. Our SNE adopts the log-bilinear model, uses node representations of all nodes along a given path, and further incorporates two signed-type vectors to capture the positive or negative relationship of each edge along the path. We conduct two experiments, node classification and link prediction, on both directed and undirected signed networks and compare with four baselines including a matrix factorization method and three state-of-the-art unsigned network embedding models. The experimental results demonstrate the effectiveness of our signed network embedding.
cs.SI
cs
SNE: Signed Network Embedding Shuhan Yuan1, Xintao Wu2, and Yang Xiang1 1 Tongji University, Shanghai, China, Email:{4e66,shxiangyang}@tongji.edu.cn 2 University of Arkansas, Fayetteville, AR, USA, Email:[email protected] Abstract. Several network embedding models have been developed for unsigned networks. However, these models based on skip-gram cannot be applied to signed networks because they can only deal with one type of link. In this paper, we present our signed network embedding model called SNE. Our SNE adopts the log-bilinear model, uses node representations of all nodes along a given path, and further incorporates two signed-type vectors to capture the positive or nega- tive relationship of each edge along the path. We conduct two experiments, node classification and link prediction, on both directed and undirected signed net- works and compare with four baselines including a matrix factorization method and three state-of-the-art unsigned network embedding models. The experimental results demonstrate the effectiveness of our signed network embedding. 1 Introduction Representation learning [1], which aims to learn the features automatically based on various deep learning models [15], has been extensively studied in recent years. Tra- ditionally, supervised learning tasks require hand-designed features as inputs. Deep learning models have shown great success in automatically learning the semantic rep- resentations for different types of data, like image, text and speech [6, 8, 12]. In this paper, we focus on representation learning of networks, in particular, signed networks. Several representation learning methods of unsigned networks have been developed recently [9, 26, 30, 31]. They represent each node as a low-dimensional vector which captures the structure information of the network. Signed networks are ubiquitous in real-world social systems, which have both posi- tive and negative relationships. For example, Epinions 3 allows users to mark their trust or distrust to other users on product reviews and Slashdot 4 allows users to specify other users as friends or foes. Most unsigned network embedding models [9,26,30] are based on skip-gram [20], a classic approach for training word embeddings. The objec- tive functions used in unsigned network embedding approaches do not incorporate the sign information of edges. Thus, they cannot simply migrate to signed networks be- cause the negative links change the theories or assumptions on which unsigned network embedding models rely [28]. In this paper, we develop a signed network embedding model called SNE. To the best of our knowledge, this is the first research on signed network embedding. Our SNE 3 http://www.epinions.com/ 4 https://slashdot.org/ 2 model adopts the log-bilinear model [21, 22], uses node representations of all nodes along a given path, and further incorporates two signed-type vectors to capture the pos- itive or negative relationship of each edge along the path. Our SNE significantly outper- forms existing unsigned network embedding models which assume all edges are from the same type of relationship and only use the representations of nodes in the target's neighborhood. We conduct two experiments to evaluate our model, node classification and link prediction, on both an undirected signed network and a directed signed net- work built from real-world data. We compare with four baselines including a matrix factorization method and three state-of-the-art network embedding models designed for unsigned networks. The experimental results demonstrate the effectiveness of our signed network embedding. 2 Preliminary In this section, we first introduce the skip-gram model, one of commonly used neural language models to train word embeddings [2]. We then give a brief overview of several state-of-the-art unsigned network embedding models based on the skip-gram model. Skip-gram model The skip-gram is to model the co-occurrence probability p(wjwi; θ) that word wj co-occurs with word wi in a context window. The co-occurrence proba- bility is calculated based on softmax function: (cid:80) p(wjwi; θ) = exp(vT wj j(cid:48)∈V exp(vT vwi) wj(cid:48) vwi) , (1) where V is the set of all words and vwj and vwi ∈ Rd are word embeddings for wj and wi, respectively. The parameters θ, i.e., vwi, vwj , are trained by maximizing the log likelihood of predicting context words in a corpus: V(cid:88) (cid:88) J = j∈context(i) i log p(wjwi), (2) where context(i) is the set of context words of wi. Network embedding Network embedding aims to map the network G = (V, E) into a low dimensional space where each vertex is represented as a low dimensional real vector. The network embedding treats the graph's vertex set V as the vocabulary V and treats each vertex vi as a word wi in the skip-gram approach. The corpus used for training is composed by the edge set E, e.g., in [30], or a set of truncated random walks from the graph, e.g., in [26] and [9]. To train the node vectors, the objective of previous network embedding models is to predict the neighbor nodes N (vi) of a given source node vi. However, predicting a number of neighbor nodes requires modeling the joint probability of nodes, which is hard to compute. The conditional independence assumption, i.e., the likelihood of observing a neighbor node is independent of observing other neighbor nodes given the source node, is often assumed [9]. Thus, the objective function is defined as: J = log p(N (vi)vi) = log p(v(cid:48) ivi), (3) (cid:88) (cid:88) vi∈V i∈N (vi) v(cid:48) (cid:88) vi∈V 3 ivi) is softmax function similar to Equation 1 except that the word vectors where p(v(cid:48) are replaced with node vectors. 3 SNE: Signed Network Embedding We present our network embedding model for signed networks. For each node's embed- ding, we introduce the use of both source embedding and target embedding to capture the two potential roles of each node. 3.1 Problem definition Formally, a signed network is defined as G = (V, E+, E−), where V is the set of vertices and E+ (E−) is the set of positive (negative) edges. Each edge e ∈ E+ ∪ E− is represented as euv = (u, v, εuv), where u, v ∈ V and εuv indicates the sign value of edge e, i.e., εuv = 1 if e ∈ E+ and εuv = −1 if e ∈ E−. In the scenario of signed directed graphs, euv is a directed edge where node node u denotes the source and v denotes the target. Our goal is to learn node embedding for each vertex in a signed network while capturing as much topological information as possible. For each vertex vi] where vvi ∈ Rd denotes its vi, its node representation is defined as ¯vvi = [vvi : v(cid:48) source embedding and v(cid:48) vi ∈ Rd denotes its target embedding. 3.2 Log-bilinear model for signed network embedding We develop our signed network embedding by adapting the log-bilinear model such that the trained node embedding can capture node's path and sign information. Recall that existing unsigned network embedding models are based on the skip-gram which only captures node's neighbour information and cannot deal with the edge sign. Log-bilinear model Given a sequence of context words g = w1, ..., wl, the log-bilinear model firstly computes the predicted representation for the target word by linearly com- bining the feature vectors of words in the context with the position weight vectors: l(cid:88) vg = cj (cid:12) vwi , (4) j=1 where (cid:12) indicates the element-wise multiplication and cj denotes the position weight vector of the context word wi. A score function is defined to measure the similarity between the predicted target word vector and its actual target word vector: s(wi, g) = vT g vwi + bwi , (5) where bwi is the bias term. The log-bilinear model then trains word embeddings v and position weight vectors c by optimizing the objective function similar to the skip-gram. SNE algorithm In our signed network embedding, we adopt the log-bilinear model to predict the target node based on its paths. The objective of the log-bilinear model is to predict a target node given its predecessors along a path. Thus, the signed network embedding is defined as a maximum likelihood optimization problem. One key idea of our signed network embedding is to use signed-type vector c+ ∈ Rd (c− ∈ Rd) to 4 represent the positive (negative) edges. Formally, for a target node v and a path h = [u1, u2, . . . , ul, v], the model computes the predicted target embedding of node v by linearly combining source embeddings (vui) of all source nodes along the path h with the corresponding signed-type vectors (ci): vh = ci (cid:12) vui, (6) l(cid:88) i=1 (cid:80) (cid:88) v∈V where ci ≡ c+ if εuiui+1 = 1, or ci ≡ c− if εuiui+1 = −1 and (cid:12) denotes element-wise multiplication. The score function is to evaluate the similarity between the predicted representation vh and the actual representation v(cid:48) h v(cid:48) v of target node v: s(v, h) = vT v + bv, (7) where bv is a bias term. To train the node representations, we define the conditional likelihood of target node v generated by a path of nodes h and their edge types q based on softmax function: p(vh, q; θ) = exp(s(v, h)) v(cid:48)∈V exp(s(v(cid:48), h)) , (8) where V is the set of vertices, and θ = [vui, v(cid:48) maximize the log likelihood of Equation 8: v, c, bv]. The objective function is to J = log p(vh, q; ; θ). (9) Algorithm 1 shows the pseudo-code of our signed network embedding. We first ran- domly initialize node embeddings (Line 1) and then use random walk to generate the corpus (Line 2). Lines 4-11 show how we specify ci based on the sign of edge euiui+1. We calculate the predicted representation of the target node by combining source em- beddings of nodes along the path with the edge type vectors (Line 12). We calculate the score function to measure the similarity between the predicted representation and the actual representation of the target node (Line 13) and compute the conditional likeli- hood of target node given the path (Line 14). Finally, we apply the Adagrad method [7] to optimize the objective function (Line 15). The procedures in Lines 4-15 repeat over each path in the corpus. For a large network, the softmax function is expensive to compute because of the normalization term in Equation 8. We adopt the sampled softmax approach [11] to reduce the computing complexity. During training, the source and target embeddings of each node are updated simultaneously. Once the model is well-trained, we get node embeddings of a signed network. We also adopt the approach in [26] to generate paths efficiently. Given each starting node u, we uniformly sample the next node from the neighbors of the last node in the path until it reaches the maximum length L. We then use a sliding window with size l + 1 to slide over the sequence of nodes generated by random walk. The first l nodes in each sliding window are treated as the sequence of path and the last node as the target node. For each node u, we repeat this process t times. Algorithm 1: The SNE algorithm 5 Input Output: Representation of each node ¯vi = [vi : v(cid:48) : Signed graph G = (V, E+, E−), embedding dimension d, length of path l, length of random walks L, walks per nodes t i] 1 Initialization: Randomly initialize the source and target node embeddings vi and v(cid:48) iof each node V if εuiui+1 == 1 then for j = 1 to l do ci ≡ c+ 2 Generate the corpus based on uniform random walk 3 for each path [u1, u2, . . . , ul, v] in the corpus do 4 5 6 7 8 9 10 11 12 13 14 15 16 end end compute vh by Equation 6 compute s(v, h) by Equation 7 compute p(vh, q; θ) by Equation 8 update θ with Adagrad ci ≡ c− end else end 4 Experiments To compare the performance of different network embedding approaches, we focus on the quality of their output, i.e., node embeddings. We use the generated node embed- dings as input of two data mining tasks, node classification and link prediction. For node classification, we assume each node in the network is associated with a known class label and use node embeddings to build classifiers. In link prediction, we use node embeddings to predict whether there is a positive, negative, or no edge between two nodes. In our signed network embedding, we use the whole node representation ¯vvi = [vvi : v(cid:48) vi. This approach is denoted as SNEst. We also use only the source node vector vvi as the node representation. This approach is denoted as SNEs. Comparing the performance of SNEst and SNEs on both directed and undirected networks expects to help better understand the performance and applicability of our signed network embedding. Baseline algorithms We compare our SNE with the following baseline algorithms. vi ] that contains both source embedding vvi and target embedding v(cid:48) – SignedLaplacian [14]. It calculates eigenvectors of the k smallest eigenvalues of the signed Laplacian matrix and treats each row vector as node embedding. – DeepWalk [26]. It uses uniform random walk (i.e., depth-first strategy) to sample the inputs and trains the network embedding based on skip-gram. – LINE [30]. It uses the breadth-first strategy to sample the inputs based on node neighbors and preserves both the first order and second order proximities in node embeddings. 6 – Node2vec [9]. It is based on skip-gram and adopts the biased random walk strategy to generate inputs. With the biased random walk, it can explore diverse neighbor- hoods by balancing the depth-first sampling and breath-first sampling. Datasets We conduct our evaluation on two signed networks. (1) The first signed net- work, WikiEditor, is extracted from the UMD Wikipedia dataset [13]. The dataset is composed by 17015 vandals and 17015 benign users who edited the Wikipedia pages from Jan 2013 to July 2014. Different from benign users, vandals edit articles in a delib- erate attempt to damage Wikipedia. One edit may be reverted by bots or editors. Hence, each edit can belong to either revert or no-revert category. The WikiEditor is built based on the co-edit relations. In particular, a positive (negative) edge between users i and j is added if the majority of their co-edits are from the same category (different categories). We remove from our signed network those users who do not have any co-edit relations with others. Note that in WikiEditor, each user is clearly labeled as either benign or vandal. Hence, we can run node classification task on WikiEditor in addition to link prediction. (2) The second signed network is based on the Slashdot Zoo dataset 5. The Slashdot network is signed and directed. Unfortunately, it does not contain node label information. Thus we only conduct link prediction. Table 1 shows the statistics of these two signed networks. Table 1: Statistics of WikiEditor and Slashdot Slashdot Directed WidiEditor Undirected Type # of Users (+, -) # of Links (+, -) 348255 (269251, 79004) 549202 (425072, 124130) 21535 (7852, 13683) 82144 (N/A, N/A) Parameter settings In our SNE methods, the number of randomly sampled nodes used in the sampled softmax approach is 512. The dimension of node vectors d is set to 100 for all embedding models except SignedLaplacian. SignedLaplacian is a matrix factorization approach. We only run SignedLaplacian on WikiEditor. This is because Slashdot is a directed graph and its Laplacian matrix is non-symmetric. As a result, the spectral decomposition involves complex values. For WikiEditor, SignedLaplacian uses 40 leading vectors because there is a large eigengap between the 40th and 41st eigenvalues. For other parameters used in DeepWalk, LINE and Node2vec, we use their default values based on their published source codes. 4.1 Node classification We conduct node classification using the WikiEditor signed network. This task is to predict whether a user is benign or vandal in the WikiEditor signed network. In our SNE training, the path length l is 3, the maximum length of random walk path L is 40, and the number of random walks starting at each node t is 20. We also run all baselines to get their node embeddings of WikiEditor. We then use the node embeddings generated by each method to train a logistic regression classifier with 10-fold cross validation. 5 https://snap.stanford.edu/data/ 7 Classification accuracy Table 2 shows the comparison results of each method on node classification task. Our SNEst achieves the best accuracy and outperforms all baselines significantly in terms of accuracy. This indicates that our SNE can capture the different relations among nodes by using the signed-type vectors c. All the other embedding methods based on skip-gram have a low accuracy, indicating they are not feasible for signed network embedding because they do not distinguish the positive edges from negative edges. Another interesting observation is that the accuracy of SNEs is only slightly worse than SNEst. This is because WikiEditor is undirected. Thus using only source embeddings in the SNE training is feasible for undirected networks. Visualization To further compare the node representations trained by each approach, we randomly choose representations of 7000 users from WikiEditor and map them to a 2-D space based on t-SNE approach [19]. Figure 1 shows the projections of node rep- resentations from DeepWalk, Node2vec, and SNEst. We observe that SNEst achieves the best and DeepWalk is the worst. Node2vec performs slightly better than DeepWalk but the two types of users still mix together in many regions of the projection space. Table 2: Accuracy for node classification on WikiEditor Accuracy SignedLaplacian DeepWalk Line Node2vec SNEs SNEst 73.78% 72.36% 73.85% 79.63% 82.07% 63.52% (a) DeepWalk (b) Node2vec (c) SNEst Fig. 1: Visualization of 7000 users in WikiEditor. Color of a node indicates the type of the user. Blue: "Vandals", red:"Benign Users". 4.2 Link prediction In this section, we conduct link prediction on both WikiEditor and Slashdot signed graphs. We follow the same procedure as [9] to make link prediction as a classification task. We first use node representations to compose edge representations and then use them to build a classifier for predicting whether there is a positive, negative or no edge between two nodes. Given a pair of nodes (u, v) connected by an edge, we use an 8 element-wise operator to combine the node vectors vu and vv to compose the edge vector euv. We use the same operators as [9] and show them in Table 3. We train and test the one-vs-rest logistic regression model with 10-fold cross validation by using the edge vectors as inputs. Table 3: Element-wise operators for combining node vectors to edge vectors Definition Operator Average euv = 1 2 (vu + vv) euv = vu ∗ vv Hadamard L1 Weight euv = vu − vv L2 Weight euv = vu − vv2 For Slashdot, we set the path length l = 1 in our SNE training, which corresponds to the use of the edge list of the Slashdot graph. This is because there are few paths with length larger than 1 in Slashdot. For WikiEditor, we use the same node representations adopted in the previous node classification task. We also compose balanced datasets for link prediction as suggested in [9]. We keep all the negative edges, randomly sample the same number of positive edges, and then randomly generate an equal number of fake edges connecting two nodes. At last, we have 79004 edges for each edge type (positive, negative, and fake) in WikiEditor and we have 124130 edges for each type in Slashdot. Experimental results Table 4 shows the link prediction accuracy for each approach with four different operators. We observe that our SNE with Hadamard operator achieves the highest accuracy on both WikiEditor and Slashdot. SNE also achieves good accu- racy with the L1 Weight and L2 Weight. For the Average operator, we argue that it is not suitable for composing edge vectors from node vectors in signed networks although it is suitable in unsigned networks. This is because a negative edge pushes away the two connected nodes in the vector space whereas a positive edge pulls them together [14]. When examining the performance of all baselines, their accuracy values are signifi- cantly lower than our SNE, demonstrating their infeasibility for signed networks. We also observe that there is no big difference between SNEst and SNEs on WikiEd- itor whereas SNEst outperforms SNEs significantly on Slashdot. This is because WikiEd- itor is an undirected network and Slashdot is directed. This suggests it is imperative to combine both source embedding and target embedding as node representation in signed directed graphs. 4.3 Parameter sensitivity Vector dimension We evaluate how the dimension size of node vectors affects the accuracy of two tasks on both WikiEditor and Slashdot. For link prediction, we use SNEst with Hadamard operation as it can achieve the best performance as shown in the last section. Figure 2a shows how the accuracy of link prediction varies with different dimension values of node vectors used in SNEst for both datasets. We can observe that the accuracy increases correspondingly for both datasets when the dimension of node vectors increases. Meanwhile, once the accuracy reaches the top, increasing the dimensions further does not have much impact on accuracy any more. Sample size Figure 2b shows how the accuracy of link prediction varies with the sam- ple size used in SNEst for both datasets. For WikiEditor, we tune the sample size by 9 Table 4: Comparing the accuracy for link prediction Dataset Approach Hadamard Average L1 Weight L2 Weight WikiEditor (Undirected) Slashdot (Directed) SignedLaplacian DeepWalk Line Node2vec SNEs SNEst DeepWalk Line Node2vec SNEs SNEst 0.3308 0.7744 0.7296 0.7112 0.9391 0.9399 0.6907 0.5823 0.6560 0.4789 0.9328 0.5779 0.6821 0.6750 0.6491 0.6852 0.6043 0.6986 0.6822 0.6475 0.5474 0.5810 0.5465 0.4515 0.5205 0.6787 0.8699 0.8495 0.5877 0.6158 0.4595 0.6078 0.8358 0.3792 0.4553 0.4986 0.6809 0.8775 0.8871 0.5827 0.6087 0.4544 0.6080 0.8627 changing the number of random walks starting at each node (t). In our experiment, we set t = 5, 10, 15, 20, 25 respectively and calculate the corresponding sample sizes. For Slashdot, we directly use the number of sampled edges in our training as the path length is one. For both datasets, the overall trend is similar. The accuracy increases with more samples. However, the accuracy becomes stable when the sample size reaches some value. Adding more samples further does not improve the accuracy significantly. (a) Dimension (b) Sample Size Fig. 2: The sensitivity of SNE on the WikiEditor and Slashdot Path length We use WikiEditor to evaluate how the path length l affects the accuracy of both node classification and link prediction. From Figure 3a, we observe that slightly increasing the path length in our SNE can improve the accuracy of node classification. This indicates that the use of long paths in our SNE training can generally capture more network structure information, which is useful for node classification. However, the performance of the SNEs and SNEst decreases when the path length becomes too large. One potential reason is that SNE uses only two signed-type vectors for all nodes along paths and nodes in the beginning of a long path may not convey much information 10 about the target node. In Figure 3b, we also observe that the accuracy of link prediction decreases when the path length increases. For link prediction, the performance depends more on local information of nodes. Hence the inclusion of one source node in the path can make our SNE learn the sufficient local information. (a) Node classification (b) Link prediction Fig. 3: The sensitivity of SNE on the WikiEditor by changing the path length (l) 5 Related Work Signed network analysis Mining signed network attracts increasing attention [5,14,16, 27,28]. The balance theory [10] and the status theory [16] have been proposed and many algorithms have been developed for tasks such as community detection, link prediction, and spectral graph analysis of signed networks [5, 14, 18, 28, 34, 35, 38]. Spectral graph analysis is mainly based on matrix decomposition which is often expensive and hard to scale to large networks. It is difficult to capture the non-linear structure information as well as local neighborhood information because it simply projects a global matrix to a low dimension space formed by leading eigenvectors. Network embedding Several network embedding methods including DeepWalk [26], LINE [30], Node2vec [9], Deep Graph Kernels [36] and DDRW [17] have been pro- posed. These models are based on the neural language model. Several network embed- ding models are based on other neural network model. For example, DNR [33] uses the deep auto-encoder, DNGR [3] is based on a stacked denoising auto-encoder, and the work [23] adopts the convolutional neural network to learn the network feature repre- sentations. Meanwhile, some works learn the network embedding by considering the node attribute information. In [32, 39] the authors consider the node label information and present semi-supervised models to learn the network embedding. The heteroge- neous network embedding models are studied in [4, 25, 29, 37]. HOPE [24] focuses on preserving the asymmetric transitivity of a directed network by approximating high- order proximity of a network. Unlike all the works described above, in this paper, we explore the signed network embedding. 11 6 Conclusion In this paper, we have presented SNE for signed network embedding. Our SNE adopts the log-bilinear model to combine the edge sign information and node representations of all nodes along a given path. Thus, the learned node embeddings capture the infor- mation of positive and negative links in signed networks. Experimental results on node classification and link prediction showed the effectiveness of SNE. Our SNE expects to keep the same scalability as DeepWalk or Node2vec because SNE adopts vectors to represent the sign information and uses linear operation to combine node representa- tion and signed vectors. In our future work, we plan to examine how other structural information (e.g., triangles or motifs) can be preserved in signed network embedding. Acknowledgments The authors acknowledge the support from the National Natural Science Foundation of China (71571136), the 973 Program of China (2014CB340404), and the Research Project of Science and Technology Commission of Shanghai Municipality (16JC1403000, 14511108002) to Shuhan Yuan and Yang Xiang, and from National Science Foundation (1564250) to Xintao Wu. This research was conducted while Shuhan Yuan visited Uni- versity of Arkansas. Yang Xiang is the corresponding author of the paper. References 1. Y. Bengio, A. Courville, and P. Vincent. Representation learning: A review and new perspec- tives. TPAMI, 35(8):1798–1828, 2013. 2. Y. Bengio, R. Ducharme, P. Vincent, and C. Jauvin. A neural probabilistic language model. Journal of Machine Learning Research, 3:1137–1155, 2003. 3. S. Cao, W. Lu, and Q. Xu. Deep neural networks for learning graph representations. In AAAI, 2016. 4. S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S. Huang. Heterogeneous network embedding via deep architectures. In KDD, 2015. 5. K.-Y. Chiang, C.-J. Hsieh, N. Natarajan, A. Tewari, and I. S. Dhillon. Prediction and clus- tering in signed networks: A local to global perspective. arXiv:1302.5145 [cs], 2013. 6. R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa. Natural lan- guage processing (almost) from scratch. Journal of Machine Learning Research, (12):2493– 2537, 2011. 7. J. Duchi, E. Hazan, and Y. Singer. Adaptive subgradient methods for online learning and stochastic optimization. The Journal of Machine Learning Research, 12:2121–2159, 2011. 8. A. Graves, A.-r. Mohamed, and G. Hinton. Speech recognition with deep recurrent neural networks. In arXiv:1303.5778 [cs], 2013. 9. A. Grover and J. Leskovec. node2vec: Scalable feature learning for networks. In KDD, 2016. 10. F. Heider. Attitudes and cognitive organization. The Journal of psychology, 21(1):107–112, 1946. 11. S. Jean, K. Cho, R. Memisevic, and Y. Bengio. On using very large target vocabulary for neural machine translation. arXiv:1412.2007 [cs], 2014. 12. A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolu- tional neural networks. In NIPS, 2012. 12 13. S. Kumar, F. Spezzano, and V. Subrahmanian. Vews: A wikipedia vandal early warning system. In KDD, 2015. 14. J. Kunegis, S. Schmidt, A. Lommatzsch, J. Lerner, E. W. De Luca, and S. Albayrak. Spectral analysis of signed graphs for clustering, prediction and visualization. In SDM, 2010. 15. Y. LeCun, Y. Bengio, and G. Hinton. Deep learning. Nature, 521(7553):436–444, 2015. 16. J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed networks in social media. In Pro- ceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2010. 17. J. Li, J. Zhu, and B. Zhang. Discriminative deep random walk for network classification. In ACL, 2016. 18. Y. Li, X. Wu, and A. Lu. On spectral analysis of directed signed graphs. CoRR, abs/1612.08102, 2016. 19. L. V. D. Maaten and G. Hinton. Visualizing data using t-sne. Journal of Machine Learning Research, 9:2579–2605, 2008. 20. T. Mikolov, G. Corrado, K. Chen, and J. Dean. Efficient estimation of word representations in vector space. In ICLR, 2013. 21. A. Mnih and G. Hinton. A scalable hierarchical distributed language model. NIPS, 2008. 22. A. Mnih and K. Kavukcuoglu. Learning word embeddings efficiently with noise-contrastive estimation. In NIPS, 2013. 23. M. Niepert, M. Ahmed, and K. Kutzkov. Learning convolutional neural networks for graphs. In ICML, 2016. 24. M. Ou, P. Cui, J. Pei, and W. Zhu. Asymmetric transitivity preserving graph embedding. In KDD, 2016. 25. S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang. Tri-party deep network representation. In IJCAI, 2016. 26. B. Perozzi, R. Al-Rfou, and S. Skiena. Deepwalk: Online learning of social representations. In KDD, 2014. 27. J. Tang, C. Aggarwal, and H. Liu. Node classification in signed social networks. In SDM, 2016. 28. J. Tang, Y. Chang, C. Aggarwal, and H. Liu. A survey of signed network mining in social media. arXiv:1511.07569 [physics], 2015. 29. J. Tang, M. Qu, and Q. Mei. Pte: Predictive text embedding through large-scale heteroge- neous text networks. In KDD, 2015. 30. J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei. Line: Large-scale information network embedding. In WWW, 2015. 31. F. Tian, B. Gao, Q. Cui, E. Chen, and T.-Y. Liu. Learning deep representations for graph clustering. In AAAI, 2014. 32. C. Tu, W. Zhang, Z. Liu, and M. Sun. Max-margin deepwalk: Discriminative learning of network representation. In IJCAI, 2016. 33. D. Wang, P. Cui, and W. Zhu. Structural deep network embedding. In KDD, 2016. 34. L. Wu, X. Wu, A. Lu, and Y. Li. On spectral analysis of signed and dispute graphs. In ICDM, pages 1049–1054, 2014. 35. L. Wu, X. Ying, X. Wu, A. Lu, and Z. Zhou. Spectral analysis of k-balanced signed graphs. In PAKDD, pages 1–12, 2011. 36. P. Yanardag and S. Vishwanathan. Deep graph kernels. In KDD, 2015. 37. C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang. Network representation learning with rich text information. In IJCAI, 2015. 38. Y. Yang, R. N. Lichtenwalter, and N. V. Chawla. Evaluating link prediction methods. Knowl- edge and Information Systems, 45(3):751–782, 2015. 39. Z. Yang, W. W. Cohen, and R. Salakhutdinov. Revisiting semi-supervised learning with graph embeddings. In ICML, 2016.
1201.1589
2
1201
2012-03-12T23:22:21
The Weakness of Weak Ties in the Classroom
[ "cs.SI", "physics.soc-ph" ]
Granovetter's "strength of weak ties" hypothesizes that isolated social ties offer limited access to external prospects, while heterogeneous social ties diversify one's opportunities. We analyze the most complete record of college student interactions to date (approximately 80,000 interactions by 290 students -- 16 times more interactions with almost 3 times more students than previous studies on educational networks) and compare the social interaction data with the academic scores of the students. Our first finding is that social diversity is negatively correlated with performance. This is explained by our second finding: highly performing students interact in groups of similarly performing peers. This effect is stronger the higher the student performance is. Indeed, low performance students tend to initiate many transient interactions independently of the performance of their target. In other words, low performing students act disassortatively with respect to their social network, whereas high scoring students act assortatively. Our data also reveals that highly performing students establish persistent interactions before mid and low performing ones and that they use more structured and longer cascades of information from which low performing students are excluded.
cs.SI
cs
1 The weakness of 'weak ties' in the classroom Luis M. Vaquero1 and Manuel Cebrian2 1 Hewlett-Packard Laboratories, Bristol BS34 8QZ, UK 2 Department of Computer Science and Engineering, University of California, San Diego, CA 92093, USA Abstract Granovetter's "strength of weak ties" hypothesizes that isolated social ties offer limited access to external prospects, while heterogeneous social ties diversify one's opportunities. We analyze the most complete record of college student interactions to date (approximately 80,000 interactions by 290 students -- 16 times more interactions with almost 3 times more students than previous studies on educational networks) and compare the social interaction data with the academic scores of the students. Our first finding is that social diversity is negatively correlated with performance. This is explained by our second finding: highly performing students interact in groups of similarly performing peers. This effect is stronger the higher the student performance is. Indeed, low performance students tend to initiate many transient interactions independently of the performance of their target. In other words, low performing students act disassortatively with respect to their social network, whereas high scoring students act assortatively. Our data also reveals that highly performing students establish persistent interactions before mid and low performing ones and that they use more structured and longer cascades of information from which low performing students are excluded. Introduction Computer Supported Collaborative Learning (CSCL) requires appropriate methods for evaluating col- laboration in a way that researchers and professors can gain more insight into the results of innovative experiences and lecturing/teaching procedures [1]. However, systematical gathering and analysis of educa- tional data in-vivo has only recently started. The literature highlights the key role of student interaction for effective learning. Interaction can take place by using many different tools and frameworks, which have proven to be useful for the evaluation of student's performance [2]. The study of the social and participatory aspects of learning is an ideal arena for social network analysis techniques [3]. The anal- ysis of social networks has demonstrated to be a valuable tool for CSCL applications, indeed, achieving desirable learning outcomes requires an appropriate social network [4]. Most studies focus their analysis on structural features of the network, such as node centrality. For instance, Nurmela et al. looked at the structure of the interactions trying to determine the central actors of the CSCL environment [5]. In this social structure, "key communicators" were assumed to be the most connected individuals [6]. Similar analyses were carried out by Mart´ınez et al. [2] and Chen and Watanabe, who focused on other parameters important for the final score: group structure, member's physical location distribution, and member's social position [7]. While it seems clear that the relevance of the network structure and interactions has been widely recognized [8], some other factors (e.g. social acceptance or willingness to communicate) affecting the dynamic interaction patterns of the classroom have recently been recognized as essential ingredients [9]. Granovetter's pioneering work recognized the importance of interaction patterns and proposed his well- known "strength of weak ties" phenomenon, where he hypothesized that isolated social ties offer limited access to external prospects, while heterogeneous social ties diversify one's opportunities [10]. Recent empirical work confirmed that the diversity of individuals' relationships is indeed strongly correlated with the economic development of communities [11]. It is tempting to make a direct extrapolation to educational contexts. However, understanding whether this relationship also holds in the classroom may provide insight to help shape better educational strate- gies. In general, it is not just about knowing who students interact with, but how and when they do it 2 and, importantly, what is the result of these interactions for the educational outcome [12]. Preliminary answers to the "how" come from several works that analyzed the "macroscopic" effects (effects on structure) depending on relationships reconstructed from the messages sent [13, 14] or also considering the type of interaction being held [15]. This trend on acquiring knowledge from interactions was also followed by Erlin et al., who considered the content under discussion in addition to the interac- tions themselves [16]. Most of the previous analyses correspond to a given static snapshot of the network at some point in time or a reduced number of samples, for instance, [2] analyze these macroscopic metrics in the four different assignments the course was structured in ((cid:39) once a month). This paper tries to gather details on the dynamics and mechanics of collaboration, by characterizing the type of interactions on temporal terms and relating these types with the final outcome of the course (student score). We also aimed to answer the "when" question by characterizing network evolution at a microscopic level (interaction level) at unprecedented temporal resolution. We hypothesize that gaining insight into these data could be a valuable tool to reduce course dropout rates. More than 1.2 million students drop out of school every year in the U.S., one every 26 seconds (per day figure derived by dividing 1.23 million by 180 school days per year. Per second figure derived by dividing 1.23 million by 31,536,000 seconds in a full calendar year [17]). 2007 dropouts will cost more than $300 billion in lost wages, taxes and productivity to the U.S. Dropouts contribute about $60,000 less in federal and state income taxes. Each cohort of dropouts costs the U.S. $192 billion in lost income and taxes [18]. A dropout student is more than 8 times as likely to be in jail or prison as a high school graduate and nearly 20 times as likely as a college graduate [19]. The rest of this paper is organized as follows. The next Section presents the main results obtained from our analysis. This exposition is followed by a discussion. The materials and methods employed for data analysis are detailed in the final section of the paper. Results We analyzed the most complete record of college student interactions1 to date and compared the social interaction data with the academic scores of the students. To this end, we analyzed records of 80, 000 interactions by 290 students -- approximately 16 times more interactions with almost 3 times more students than previous studies on educational networks. The data cover a high resolution of both social interactions in the classroom and out of the classroom (see Materials and Methods for more details), being independent of gender differences (correlation of gender to score was -0.04). Figure 1A shows the social graph for one of the classes being analyzed. Diversity and Assortativity Analysis Our first finding is that social diversity is negatively correlated with performance. This is explained by our second finding: highly performing students interact in groups of similarly performing peers. This effect is stronger the higher the student performance is. Indeed, low performance students tend to initiate many transient interactions no matter the performance of the students they interact with. In other words, low performing students act disassortatively with respect to their social network, whereas high scoring students act assortatively. In the following we give details of these findings. We start by comparing the score of each student with diversity metrics associated with the interactions held by each member of the social network (as shown in Materials and Methods). The number of connections (students a student has interacted with), number of interactions (times a user has contacted or been contacted with/by other student) and the topological diversity (a function of Shannon's entropy, see Materials and Methods) were all positively correlated with the final score of the student (Pearson's correlations of 0.81, 0.85, 0.74, respectively; p < 0.01), as shown in Figure 1See Course Details in the Materials and Methods scetion for a concrete definition on what we mean by interaction 3 1B. Principal component analysis of these metrics revealed that all of them were closely interrelated, resulting in non-significant improvement when combined (see Materials and Methods). However, social diversity negatively correlated with final scores (−0.34, p < 0.01) (Figure 1C), a more diverse number of interactions resulting in a reduced score. To further analyze the effects on score, students were grouped into high (> 6.5), mid (between 6.5 and 3.5) and low (< 3.5) scoring. To verify the suggested existence of less effective interactions (Figure 1C), we also classified the type of interactions in two types: 1) persistent, those sustained in time, and 2) transient, those never repeated. We find that 38 ± 12% of the interactions held by highly performing students were persistent, which is statistically different to those held by mid (17 ± 5%) or low (2 ± 2%) performance students (n = 290, p < 0.05). We analyzed the average number of persistent interactions per neighbor: a higher number indicating more targeted interaction to a reduced number of neighbors. This is illustrated in Figure 5 in the Materials and Methods (top panel) for one of the three classes under analysis. The presence of more focused and sustained interactions did not preclude high scoring students from interacting with colleagues with mid or low scores in a transient manner (similar number of transient interactions regardless of the score, see Figure 5, bottom panel). An assortativity analysis [20] (r = 0.5, p < 0.05 by using the Jackknife method, see Materials and Methods) on these persistent interactions indicated the existence of preferential interaction initiation. In other words, similarly scoring students tended to keep persistent interaction between themselves. Temporal Analysis One interesting finding is that the total number of interactions per week (normalized to the maximum value in all weeks) for all groups increases over time and it saturates around week 6 for mid and high performing students and around week 4 for high performing student (Figure 2). In both cases, the number of persistent and transient interactions increase as the week number increases until saturation. However, the number of interactions for low scoring students behaves in a strikingly different manner. The number of total interaction increases until week 4, where it starts dropping steadily until the end of the course (Figure 2). A closer look at the data reveals that the percentage of persistent interactions increases in all groups, but at different rates (3A, B, and C). As indicated in the table in Materials and Methods, the midpoint for the sigmoid function was 6.08, 4.81 and 3.2 for low, mid and high performing students (p < 0.05). This indicates that high performing students on average establish persistent interactions before mid and low performing students (1 and 2 weeks before, respectively). Also, mid performing students start to establish persistent interactions 1 week before low performing students do. If one takes the slope of the sigmoid as a reference, it can be observed that there is no significant difference in the rate of change from a "low interaction mode" to a "higher interaction mode" between mid and high performing students (0.58 vs. 0.4769). Taking these data on increasing % of persistent student interactions with the assortivity analysis (students prefer to interact with students in their own group) above is suggesting that at some point reciprocity Ri,j (measured as the fraction of times a student i in any given group responds to a student j outside her same group) may start dropping. Reciprocity remained unchanged with time and was similar between groups ((cid:39) 0.7), suggesting that even when high performing students do not usually initiate interactions with low performing ones, they answer back when they receive some request. This could be indicating that low performance is due to a lack of interest of the students or just that no valuable content was conveyed in these "forced" interactions. Since the content of these interactions was not logged, we needed to find other mechanism to determine how valuable content flows between students and groups of students. 4 Figure 1. A: shows a graph of one of the analyzed courses including 82 students. B: Scatter plot and linear regression for one of the variables analyzed (number of interactions) vs. scoring in one of the classes (R2 = 0.72). C: Scatter plot and linear regression for social diversity vs. scoring in one of the classes (R2 = 0.12). D: Normalized social diversity when students were grouped according to their performance. ∗p < 0.05 as compared to low;#p < 0.05 as compared to mid; n=290. Figure 2. Temporal evolution of the total number of interactions in all groups. The "y" axis indicates the number of interactions per group per week normalized to the value of the weeke when the maximum number of interactions was recorded for that group. 5 Figure 3. Evolution of the % of persistent interactions (relative to the average total # of interactions of that group) per week and per student group (low, A; mid, B; and high, C) relative to the total number of interactions per group per week. Continuous lines represent the fit of a curve to the points as indicated in Section on Materials and Methods. 6 % of Cascades % trivial Average Cascade length % stars % chain LOW MID HIGH 13.03 51 34.1 96.36 2.9 1.05 23.71 97.8 2.2 76.29 35.97 65.13 1.95 46.18 53.82 Table 1. Summary of the cascade analysis performed across the three groups of students. Information Cascades Information cascades reveal spread mechanisms in which an action or idea becomes widely adopted due to the inuence of others, typically, neighbors in some network like cascades in the context of a large product recommendation networks. In order to detect the presence of information cascades and determine the actual value of the communication, we needed to gain insight on the content of the messages exchanged by students. Since this would be a clear violation of students' privacy, we decided to analyze another source of information: file exchange of students in their home directories and in their BSCW accounts (see "Information Cascades" in Material and Methods below). We define as trivial cascades those implying a single transfer (a single originating source and a single destination) of information about the course, and non-trivial cascades, those with more complex patterns. We found a total of 845 cascades, and 53.37% of which were trivial cascades (T1 in Figure 4), 25% are non-trivial cascades involving transfer from a single source to many destinations in the same time frame, and the remaining 11% of the cascades are topologically more complex. The number of cascades is significantly different across all three groups 51%, 35.97% and 13.03% for high, mid and low performing students, respectively (see Table 1). Our data reveal that the length of the cascade (number of synchronous transfers) gradually increases as the average score of the students involved in the cascade increases. This is also supported by the fact that among non trivial cascades, the most common pattern for low performing students was star-like (T2 and T3 in Figure 4, 97.8%), while chained cascades (T4, T5 and T6 in Figure 4) were more common for mid (53.82%) and high (76.29%) performing students. Discussion and Conclusion Combining data from a large educational network with each student's individual score, we were able to gain insight into the following question: Do more diverse ties imply better academic performance? Our results show that a higher interaction number (independently of the number of distinct students involved) is usually an indicator of higher score. However, increased social diversity is negatively corre- lated with high scores, which indicates that not all the interactions are equally productive. The higher the score of the students, the higher the percentage of their iteractions that were persistent. As the score of the student increases, these persistent interactions are initiated with a reduced number of similarly performing colleagues (assortative interaction pattern). Low performing students have a larger number of transient interactions spread over a large number of neighbors. Social network diversity seems to be at the very least a strong structural signature for the (negative) academic performance of students. The fact that the number of interactions per week increases as the course progresses may indicate that students gain confidence in the course methodology and tools. The dynamics of these interactions reveal that once students start establishing persistent interactions they do it more and more until a maximum saturation point is reached. Highly performing students tend to initiate persistent interactions Figure 4. Most Frequent Cascades for Low Performing (A) and High Performing (B) students. Students initiating, relaying or receiving a document were supposed to be part of the cascade. 7 before lower performance ones, suggesting a higher willingness to collaborate. A striking fact is that these highly performing students still maintain more than (cid:39) 70% of transient interactions, mostly with mid performing students. Our reciprocity analysis shows that students try to contact high performing students and these feel some sort of obligation to respond. Evidently, we could not monitor the content of the private message of students and decided to per- form an information diffusion analysis that could help us to gain insight on the content being actually exchanged. Our results reveal that low performing students generally exchange documents in a trivial manner (i.e. in a forwarding manner that spans a single hop). On the contrary, more complex and longer cascades occur in highly performing groups. This indicates the existence of a highly organized network where similarly performing students exchange information in a well-structured fashion, following char- acteristic patterns that are different across groups. While highly performing students mainly exchange documents in a chained manner, low performing students spread the information to many other students at the same time, without this document apparently being relayed to other students beyond the recipient. Indeed, low performing students were not typically included in the information chains developed by high performing students. By this we do not mean to imply a mean behavior by students, but most likely it is indicating the presence of a benefit maximization process by which students focus their efforts in potentially more fruitful connections. Getting lower value information is just one side of the picture. Low performing students drastically reduce the number of interactions after week 4, which is indicating a clear lack of motivation that leads them to drop the course and focus on other tasks. The fact that the percentage of persistent interactions does not significantly increase indicates that these students initiate and drop interactions in an inefficient manner. This per se does not let us conclude a lack of skills or motivation by low performing students. We analysed these data and found that: 1) social diversity is a strong indicator of low performance and it is linked to weak interactions; 2) low performing students are not typically included in the highly- structured information exchanges held by highly performing colleagues; 3) low performing students dras- tically reduce the number of interactions they held. These three elements may be the causes or effects of a de-motivation phase in low performing students (studies targeted at detecting causality relationships between these three and scoring are needed). As part of our future work, we hypothesize that detecting this dropping behavior early in the course 8 and getting low performing students involved in high performing chains could help increase the final score of the students. Endowing educators with tools to allow them to pay additional attention to those more likely to drop their interactions and help them to focus on who they interact with. On the other hand, this may have a negative effect on highly scoring students who will get many more interactions they will feel obliged to respond to. Such a tool could result in huge benefits for the society in terms of reduced exclusion of individuals and also in economig terms $60,000 less in federal and state income taxes and $192 billion in lost income and taxes per dropout in the U.S. [18] Materials and Methods Course Details The data are of the interactions of 290 students at Universidad Rey Juan Carlos, Madrid, Spain, EU during two consecutive years of a 12-week long course on Basic Computer Science Skills (in Linux such as OpenOffice, GIMP, or content licensing techniques such as Creative Commons) for freshmen students of journalism. The students were belonged into three groups depending on their year class and on lab room availabil- ity. Two groups (79 and 82 students) belonged to the 2010 course and the remaining students were placed in a single group during the 2011 course. Thus, three different graphs were built to ease the analysis process and obtain an average behavior for all the students involved in this study. Students voluntarily signed a collaboration agreement including privacy clauses about their data and specific information on what was going to be kept. These data included the logs of class content-related communications between students done via Moo- dle, a classroom IRC, BSCW and a Canvas Chat application that they included in their Facebook account (up to 35% of the interactions were done via this canvas). An interaction is defined as a communication attempt via the aforementioned systems. In one-to-many communication mechanisms (e.g. a post in Moodle), the interaction count was increased only if the post received an answer. All students, but one (who was excluded from the study), were frequent Facebook users (daily utilization: 1.5 ± 0.9hours/day; average number of friends in Facebook: 142 ± 85). We transformed interaction data into a network by defining an undirected edge as an exchange of messages between two nodes, such that each party originated at least one message to the other. We also kept track of the number of interactions that took place over a given connections. The average age of the students was 18.5 ± 0.8 years, 65.51% were women. Data Anonymization and University Approval Student ids were obscured and randomly re- arranged so that the data analyzer could not track a student. Each recorded interaction was assigned an ID in each one of the employed systems. This timestamp-based ID was replaced by random, unique identifier for the different systems employed in this study. While deductive disclosure is always a possi- bility with logged interaction data, this provided adequate blinding for the study to acquire university's approval. Diversity Metrics We used several measures of the diversity in an individuals' social network, includ- ing topological diversity, assortativity, and structural holes. We characterize the nature and diversity of interaction ties within an individual's social network. Specifically, topological diversity is calculated as a j=1 pij log(pij )), where k is the number of i s contacts and pij , where Vij is the inter- action volume between node i and j. Then, social diversity is defined as Shannon's entropy associated function of Shannon's entropy (H(i) = −(cid:80)k is the proportion of i s total interaction volume that involves j, or pij = Vij(cid:80)k −(cid:80)k j=1 Vij with individual i s communication behavior, normalized by k : Dsocial(i) = j=1 pij log(pij ) log(k) [11]. 9 satisfied: (cid:80) ij eij = 1;(cid:80) Grouping Metrics The correlations between properties of adjacent network nodes are known in the ecology and epidemiology literature as "assortative mixing". If a node tends to establish edges with nodes that present some similarity with it (scoring groups in our setting), then they are said to present an assortative mixing, otherwise is it a disassortative mixing. In our directed network some rules are i eij = bj, where eij is the fraction of edges that connect a vertex of type i to another of type j and ai and bi are the fraction of each type of end of an edge attached (see [20] for more to vertices of type i. The assortativity coefficient is defined as: r = details). j eij = ai;(cid:80) (cid:80) i eii−(cid:80) 1−(cid:80) i aij bij i aij bij Principal Component Analysis After subtracting the mean value for each dimension, we calculated the covariance matrix for three dimensions: number of connections, interactions and the calculated topological diversity. We found that the eigenvalue proportions were (cid:39) 0.3 for all three eigenvalues. Interaction Classification An interaction between students iandj was classified as persistent if the contact ouccured at least twice (see Figure 5). Figure 5. (Top) Average number of total persistent interactions per group, (Bottom) Average number of transient interactions per scoring group. ∗p < 0.05 as compared to low;#p < 0.05 as compared to mid; n=290. 10 LOW MID HIGH Total 0.9 0.973 5.007 6.08 1.43 0.4769 26.79 3.2 0.58 13.6 4.81 0.44 a b c Table 2. Sigmoid Fitting Results. Temporal Analysis We first normalized the number of total interactions of the three courses to their respective maximum value of all weeks, in order to obtain a representative trace of the temporal course of the appearance of interactions. Then, we plotted the percentage of persistent interactions for all three groups of students as a function of time. We fitted these curves with a sigmoid function , where c represents the slope of change and b the midpoint where approximately y = a (1.0+exp(− (x−b) )) c 50% of the maximum value is reached. See the obtained results in Table 2. For error minimization we set a, b and c to minimizr the lowest sum of squared absolute error, resulting in a value that was consistently lower than 0.026. Information Cascades Students were highly encouraged to use a systematic naming mechanisms for their files (First author name, year, 4-5 first words of the title). We employed data from BSCW and an automated mechanism (bash script) to recursively determine the files in the HOME directory for each user. From this information we created a subgraph, where students are the nodes and links represent the "transfer" of a file from a user's account to another's. A directed student to student edge is weighted with the total number of links occurring between documents in source student and documents in the HOME of the destination student. Associated with each document is also the time, so we labelled the edges with the time difference δ between the appearance of the document in the HOME of the source and the destination. Let tu and tv denote appearance times of a document in the HOME of students u and v, then δ = tu − tv, where δ > 0 since there are no self-edges. These subgraphs lead to information cascades, which are induced subgraphs by edges representing the ow of information. We assumed this flow of information depends on the existence of an edge in the interaction graph. In other words, those students have interacted within the previous 72h2 prior to the appearance of the document in the HOME of the destination student. Acknowledgments We would like to thank Charles Elkan and Miranda Mowbray for their insightful comments on the manuscript. References 1. Neale DC, Carroll JM (1999) Multi-faceted evaluation for complex, distributed activities. In: Proceedings of the 1999 conference on Computer support for collaborative learning. International Society of the Learning Sciences, CSCL '99. URL http://portal.acm.org/citation.cfm?id= 1150240.1150293. 2Please note that the assignments in this course typically consisted on weekly works, so a smaller time adds little information, while longer periods result in too many events to establish reasonable causality relationships. 11 2. Martinez A, Dimitriadis Y, Rubia B, Gomez E, De La Fuente P (2003) Combining qualitative evaluation and social network analysis for the study of classroom social interactions. Computers & Education 41: 353 -- 368. 3. Wasserman S, Faust K (1994) Social network analysis: Methods and applications. Cambridge Univ Pr. 4. Morrison E (2002) Newcomers' relationships: The role of social network ties during socialization. Academy of Management Journal 45: 1149-1160. 5. Nurmela K, Lehtinen E, Palonen T (1999) Evaluating cscl log files by social network analysis. In: Proceedings of the 1999 conference on Computer support for collaborative learning. International Society of the Learning Sciences, pp. 54 -- es. 6. Cho H, Gay G, Davidson B, Ingraffea A (2007) Social networks, communication styles, and learning performance in a cscl community. Computers & Education 49: 309 -- 329. 7. Chen Z, Watanabe S (2007) A case study of applying sna to analyze cscl social network. In: Advanced Learning Technologies, 2007. ICALT 2007. Seventh IEEE International Conference on. pp. 18 -20. doi:10.1109/ICALT.2007.3. 8. Sundararajan B (2007) Impact of communication patterns, network positions and social dynam- ics factors on learning among students in a cscl environment. Ph.D. thesis, Troy, NY, USA. AAI3286342. 9. Yu AY, Tian SW, Vogel D, Chi-Wai Kwok R (2010) Can learning be virtually boosted? an investigation of online social networking impacts. Comput Educ 55: 1494 -- 1503. 10. Granovetter M (1973) The strength of weak ties. The American Journal of Sociology 78: 1360 -- 1380. 11. Eagle N, Macy M, Claxton R (2010) Network diversity and economic development. Science 328: 1029. 12. Ullrich C, Borau K, Stepanyan K (2010) Who students interact with? a social network analysis perspective on the use of twitter in language learning. In: Proceedings of the 5th European conference on Technology enhanced learning conference on Sustaining TEL: from innovation to learning and practice. Berlin, Heidelberg: Springer-Verlag, EC-TEL'10, pp. 432 -- 437. URL http: //portal.acm.org/citation.cfm?id=1889250.1889286. 13. Yeung YY (2005) Macroscopic study of the social networks formed in web-based discussion forums. In: Proceedings of th 2005 conference on Computer support for collaborative learning: learning 2005: the next 10 years! International Society of the Learning Sciences, CSCL '05, pp. 727 -- 731. URL http://portal.acm.org/citation.cfm?id=1149293.1149388. 14. Kepp SJ, Schorr H (2009) Analyzing collaborative learning activities in wikis using social network analysis. In: Proceedings of the 27th international conference extended abstracts on Human factors in computing systems. New York, NY, USA: ACM, CHI '09, pp. 4201 -- 4206. doi:http://doi.acm. org/10.1145/1520340.1520640. URL http://doi.acm.org/10.1145/1520340.1520640. 15. Cho H, Gay G, Davidson B, Ingraffea A (2007) Social networks, communication styles, and learning performance in a cscl community. Comput Educ 49: 309 -- 329. 12 16. Erlin B, Yusof N, Rahman A (2008) Integrating content analysis and social network analysis Information Technology, 2008. ITSim 2008. for analyzing asynchronous discussion forum. International Symposium on. volume 3, pp. 1 -8. doi:10.1109/ITSIM.2008.4631996. In: 17. (2007) Diplomas count 2007: Ready for what? preparing students for college careers and life after high school. Education Week . 18. Rouse C (2005) The labor market consequences of an inadequate education. princeton university and nber. In: Equity Symposium on The Social Costs of Inadequate Education at Teachers College, Columbia University. 19. Harlow C (2003) Education and correctional populations. In: U.S. Department of Justice, Bureau of Justice Statistics. 20. Newman M (2003) Mixing patterns in networks. Physical Review E 67: 026126.
1407.7071
3
1407
2015-04-16T15:41:08
Processing Social Media Messages in Mass Emergency: A Survey
[ "cs.SI", "cs.CY" ]
Social media platforms provide active communication channels during mass convergence and emergency events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the public can use this information to gain insight into the situation as it unfolds. In particular, many social media messages communicated during emergencies convey timely, actionable information. Processing social media messages to obtain such information, however, involves solving multiple challenges including: handling information overload, filtering credible information, and prioritizing different classes of messages. These challenges can be mapped to classical information processing operations such as filtering, classifying, ranking, aggregating, extracting, and summarizing. We survey the state of the art regarding computational methods to process social media messages, focusing on their application in emergency response scenarios. We examine the particularities of this setting, and then methodically examine a series of key sub-problems ranging from the detection of events to the creation of actionable and useful summaries.
cs.SI
cs
Processing Social Media Messages in Mass Emergency: A Survey A Muhammad Imran, Qatar Computing Research Institute Carlos Castillo, Qatar Computing Research Institute Fernando Diaz, Microsoft Research Sarah Vieweg, Qatar Computing Research Institute Social media platforms provide active communication channels during mass convergence and emergency events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the public can use this information to gain insight into the situation as it unfolds. In particular, many social media messages communicated during emergencies convey timely, actionable information. Processing social media messages to obtain such information, however, involves solving multiple challenges including: parsing brief and informal messages, handling information overload, and prioritizing different types of information found in messages. These challenges can be mapped to classical information processing operations such as filtering, classifying, ranking, aggregating, extracting, and summarizing. We survey the state of the art regarding computational methods to process social media messages and highlight both their contributions and shortcomings. In addition, we examine their particularities, and methodically examine a series of key sub-problems ranging from the detection of events to the creation of actionable and useful summaries. Re- search thus far has to a large extent produced methods to extract situational awareness information from social media; in this survey, we cover these various approaches, and highlight their benefits and their short- comings. We conclude with research challenges that go beyond situational awareness, and begin to look at supporting decision-making and coordinating emergency-response actions. General Terms: Design, Algorithms, Performance Additional Key Words and Phrases: Social media, Crisis computing, Disaster management, Mass emergen- cies 1. INTRODUCTION Crisis situations such as disasters brought on by natural hazards present unique chal- lenges to those who study them, creating conditions that call for particular research methods [Stallings 2002]. In this paper, we survey methods for studying disasters from the perspective of information processing and management, specifically methods for processing social media content. Crisis situations—particularly those with little to no warning (known as “sudden onset crises”)—generate a situation that is rife with questions, uncertainties, and the need to make quick decisions, often with minimal information. When it comes to in- formation scarcity, research in recent years has uncovered the increasingly important role of social media communications in disaster situations, and shown that informa- tion broadcast via social media can enhance situational awareness during a crisis situ- ation [Vieweg 2012]. However, social media communications during disasters are now so abundant that it is necessary to sift through hundreds of thousands, and even mil- lions, of data points to find information that is most useful during a given event. The goal of this survey is to provide computer science researchers and software de- velopers with computational methods they can use to create tools for formal response agencies, humanitarian organizations, and other end users with a way to success- fully identify, filter, and organize the overwhelming amount of social media data that are produced during any given crisis. Such tools can help stakeholders make time- critical—and potentially life-saving—decisions. 1.1. Social Media During Crisis Situations Brief History. The use of Internet technologies to gather and disperse information in disaster situations, as well as to communicate among stakeholders, dates back to 5 1 0 2 r p A 6 1 ] I S . s c [ 3 v 1 7 0 7 . 7 0 4 1 : v i X r a A:2 Imran et al. the late 1990s. Internet historians point to online newsgroups and email clients that were used to coordinate protests in Indonesia in 1998 [Poole et al. 2005]. In addition, there are cases of websites being set up in response to crises in 2003 [Palen and Liu 2007]. To the best of our knowledge, 2004 is the first year in which a user-generated content website was used in response to a crisis; after the Indian Ocean Tsunami of December 26 that year, an electronic bulletin board was set up and moderated for 10 days.1 In addition, in the aftermath of Hurricane Katrina, which struck the city of New Orleans in the United States in 2005, significant emergency response activity took place on MySpace [Shklovski et al. 2010]. One of the earliest known cases of people using microblogging service Twitter in an emergency was during severe wildfires that took place near San Diego, California (in the United States) in 2007.2 Since then, it has become common practice for affected populations and concerned others to use Twitter to communicate, ask questions, collect and spread information, and organize response efforts (among other tasks) [Starbird et al. 2010; Vieweg et al. 2010; Sarcevic et al. 2012; Starbird 2013; Imran et al. 2014a; Cobb et al. 2014]. Today. The growing adoption of social media during disasters has created opportuni- ties for information propagation that would not exist otherwise. Emergency response agencies routinely post information such as emergency alerts and advice through these channels,3 but social media enables much more than “top-down” communications. Peo- ple post situation-sensitive information on social media related to what they experi- ence, witness, and/or hear from other sources [Hughes and Palen 2009]. This practice allows both affected populations and those outside the impact zone to learn about the situation first hand and in near real-time. We know that information posted to social media platforms in time- and safety- critical circumstances can be of great value to those tasked with making decisions in these fraught situations. Previous research has shown that information which con- tributes to situational awareness is reported via Twitter (and other social media plat- forms) during mass emergencies [Vieweg et al. 2010; Vieweg 2012; Imran et al. 2014a]. Now, those tasked with formal response efforts—from local fire departments4 to inter- national aid agencies—are working to incorporate information broadcast on social me- dia platforms into their processes and procedures. Many emergency responders and humanitarian officials recognize the value of the information posted on social me- dia platforms by members of the public (and others), and are interested in finding ways to quickly and easily locate and organize that information that is of most use to them [Hughes 2012].5 Some agencies have even begun to formally incorporate social media monitoring and communication during mass emergency situations. The Ameri- can Red Cross (ARC), in a survey, reported the effectiveness of social media and mobile apps.6 ARC recently opened their Social Media Digital Operations Center for Human- itarian Relief. The goals of the center are to “source additional information from af- fected areas during emergencies to better serve those who need help; spot trends and better anticipate the public’s needs; and connect people with the resources they need, like food, water, shelter or even emotional support.”7 Though the ARC is currently one 1http://www.thefreelibrary.com/www.p-h-u-k-e-t.com+Has+Served+Its+Purpose+After+the+Tsunami%3B+ Site...-a0126803919 2Eric Frost, personal communication. 3See e.g. https://blog.twitter.com/2013/twitter-alerts-critical-information-when-you-need-it-most 4http://edition.cnn.com/2012/11/01/tech/social-media/twitter-fdny/ 5Andrej Verity, personal communication 6http://www.redcross.org/news/press-release/More-Americans-Using-Mobile-Apps-in-Emergencies 7http://www.redcross.org/news/press-release/The-American-Red-Cross-and-Dell-Launch-First-Of-Its-Kind- Social-Media-Digital-Operations-Center-for-Humanitarian-Relief Social Media in Mass Emergency A:3 of the few (possibly the only) formal agencies to support such a center, it is likely that similar operations will begin within other organizations. Among other similar exam- ples, the Australia Crisis Tracker,8 which is a machine-learning based tool to filter spam and categorize data into different event types, is also deployed with the Aus- tralian Red Cross.9 Though formal response agencies express interest in incorporating social media into their processes, obstacles exist. For example, a recent survey by the US Congressional Research Service cites administrative cost as a significant barrier to adopting social media during emergencies: “The number of personnel required to monitor multiple so- cial media sources, verify the accuracy of incoming information, and respond to and redirect incoming messages is also uncertain ... Responding to each message in a timely manner could be time consuming and might require an increase in the number of employees ...” [Lindsay 2011] Others have expressed concerns including issues re- lated to roles, responsibilities, and liabilities; difficulties evaluating the veracity, trust- worthiness, and reliability of information; and information overload in general [Vieweg et al. 2014; Hughes et al. 2014a]. Computational methods can help overcome some of these obstacles, by reducing the amount of information to be examined by humans. Automatic methods are necessary when human computation is limited, and in the fol- lowing sections, we detail what those methods entail. 1.2. Background Reading Sociologists began researching human behavior in mass emergency situations long before the Internet, or even modern computing. The purpose of this section is not to provide the reader with an exhaustive list of sociology of disaster literature; we high- light a few foundational readings that are helpful for the computer science, information science, technology, and social media scholars to gain quick insight into the rich and varied field of sociology of disaster. E.L. Quarantelli’s 2002 chapter “The Disaster Research Center (DRC) Field Studies of Organized Behavior in the Crisis Time Period of Disasters” (in Methods of Disaster Research edited by R.A. Stallings [2002]) provides a brief history of one of the foremost disaster research institutes in the United States. Quarantelli gives background on the Disaster Research Center, and explains the strategic as well as academically-oriented decisions that were made in order to highlight the importance of studying the social science aspects of disaster. In his edited volume “Disasters by Design,” Dennis S. Mileti [1999] and the con- tributing authors aim to reach a general (i.e. non-academic) audience and provide background on disasters caused by natural hazards. The volume is comprised of “syn- thesized statements of what is known, collectively, about hazards and human cop- ing strategies.” Mileti and colleagues point to causes of disaster, which happen when three major systems—the physical, social, and built environments—interact in com- plex ways. The authors’ goal is to give the reader a way to understand how to study disaster situations, with a final goal of helping members of the public create more resilient communities. When it comes to combining studies of disaster with the use of information technol- ogy, including social media, the Harvard Humanitarian Initiative [2011] presents an in-depth analysis of the response to the earthquake in Haiti in January 2010. With a stronger focus in social media, a recent survey by Hughes, Peterson and Palen con- siders the motivating factors of emergency responders regarding their use of social media data. The authors describe the challenges they face, best practices regarding 8http://www.crisistracker.com.au/ 9http://www.research.ibm.com/articles/crisis-tracker.shtml A:4 Imran et al. the adoption of social media by formal response organizations, and also touch on in- stances of integrated, end-to-end systems that are currently being built to meet these needs [Hughes et al. 2014a]. In addition, an article by Palen and Liu [2007] was one of the first to provide an early assessment regarding how information and communi- cation technology can support the participation of the public during crisis situations. Since then, many articles that focus on the role of social media in disaster have been published, but the two we mention here provide a good “first glance” to readers who are new to the field. Our brief overview of foundational reading would not be complete without mention- ing the much-discussed issue of trust and the use of social media. A recent ACM Com- puting Survey looks at this very topic [Sherchan et al. 2013]. The authors review the various definitions of “trust” from a variety of academic disciplines, discuss the factors that contribute to notions of trust, and combine the complex and much-scrutinized idea of trust with computing and social network research. 1.3. Scope and Organization The overarching problem we aim to confront in this article is that of extracting time- critical information from social media that is useful for emergency responders, affected communities, and other concerned populations in disaster situations. We note that social media analysis has been used for a number of applications in the domains of economics, politics (e.g. Hong and Nadler [2011]) and public health (e.g. Aramaki et al. [2011]); for a survey, see Weber and Mejova [2013]. Even if we con- sider only applications to time-critical settings, we note that often the same methods described in this survey can be applied to the analysis of social media during mass converge events, such as large political conventions, concerts, or sports events; or for monitoring the performance of a media campaign or a televised debate, among similar applications. However, while many of the methods and algorithms that we describe can be used for other purposes, we explain them from the perspective of their applications to mass emergencies, a topic that has a specific scientific and technical community, and that targets a particular set of use-cases. The following two sections briefly describe our target end-user audience, and their information needs (Section 2), and end-to-end integrated systems (Section 3). The sub- sequent sections form the main technical part of this survey and present a systematic analysis of the computational methods we cover. — Section 4 starts with a general characterization of social media messages broadcast during disasters. Next, it introduces methods for programmatically acquiring data from social media, and for pre-processing the data. — Section 5 covers methods for the detection of new events, which involves detecting the first message on a given topic or sub-topic. The section also covers how to track these events, i.e. how to collect further messages belonging to the same topic. — Section 6 outlines methods to mine and aggregate information. These methods in- clude unsupervised classification (and clustering), supervised classification, infor- mation extraction, and summarization. — Section 7 presents how semantic technologies can be applied in this domain. This corresponds, first, to enrich the content with semantic information, and second, to use an ontology for disaster management to describe the content of the messages. The final section concludes the survey, and outlines current research directions. 2. USERS AND INFORMATION NEEDS Much of the research we present here focuses on the computational aspects of pro- cessing social media messages in time- and safety-critical situations. It is additionally Social Media in Mass Emergency A:5 important to consider the end users of these technological solutions; those who benefit from having curated information that describes a disaster or crisis and enhances sit- uational awareness, including formal response agencies, humanitarian organizations, and members of the public. 2.1. Public Participation in Crises Ideally, to understand how the public participates in social media during crises, we should start by asking how the public reacts in general to crises. Contrary to Hollywood renditions of disaster situations, human response to crises is not one of panic and mayhem [Mitchell et al. 2000]. Victims of disaster do not lose control, run amok, nor flee the area in fear. Instead, they make quick decisions based on the information available to them at the time, which often allow them to save their own lives as well as help those around them [Mitchell et al. 2000]. Neighbors, friends, and other members of the public are the first to respond when a disaster strikes. They rush to the scene to perform search and rescue operations, administer first aid, and perform critical tasks necessary in the first moments of response. Often, these “first responders” are victims of the disaster themselves [Dynes 1970]. The role of the pub- lic in disaster response efforts is critical, and with the growing use of social media to gather and disperse information, organize relief efforts, and communicate, those mem- bers of the public who can play a valuable role in these situations is no longer limited to those in the area of impact. As Dynes [1994] explains, emergencies do not render victims incapable of helping themselves and others, nor create a situation in which they are unable to make intelli- gent, personally meaningful decisions. What emergencies do create is an environment in which new and perhaps unexpected problems are presented, which members of the public are called upon to solve. Research in recent years on the use of social media in disasters shows how members of the public, formal response agencies, and other stakeholders have taken to online outlets to perform tasks such as communicating about hospital availability [Starbird 2013], coordinating medical responses [Sarcevic et al. 2012], and communicating with the public during various crises [Cobb et al. 2014], among many others. These users interact in complex ways including producing, distributing and organizing content [Starbird et al. 2010]. 2.2. Differences in Information Needs The recognition that social media communications are a valid and useful source of in- formation throughout the disaster lifecycle (preparation, impact, response, and recov- ery) is increasing among the many stakeholders who take action in disaster situations. In particular, members of the public, formal response agencies, and local, national and international aid organizations are all aware of the ability to use social media to gather and disperse timely information in the aftermath of disaster, but the specific informa- tion they seek—and their ability to put it to use—may differ [Vieweg 2012]. Depending on the circumstances of the disaster, and what roles and duties the vari- ous stakeholders are responsible for, their specific information needs will vary. For ex- ample, in a wildfire situation that affects a community, members of a formal response organization such as local police or area firefighters can benefit from information such as where people are smelling smoke, what precautions they are taking (e.g. clearing brush, watering yards), and what traffic patterns look like. In a large-scale, sudden- onset disaster such as a typhoon or earthquake, humanitarian agencies, such as the various branches of the United Nations, benefit from information that details the cur- rent situation “on the ground,” such as where electricity has been disabled, or where people are without food and water. In any disaster situation, members of the public play a variety of roles and take on many tasks; the information they find valuable may A:6 Imran et al. Table I: Example systems described in the academic literature that extract crisis- relevant information from social media. System name Data; example capabilities Twitris SensePlace2 Twitter; semantic enrichment, classify automatically, geotag Twitter; geotag, visualize heat-maps based on geotags EMERSE: Enhanced Messaging for the Emergency Response Sector Twitter and SMS; machine-translate, classify automatically, alerts ESA: Emergency Situation Awareness Twitter; detect bursts, classify, cluster, geotag Twitcident Twitter and TwitPic; semantic enrichment, classify CrisisTracker Twitter; cluster, annotate manually Tweedr Twitter; classify automatically, extract information, geotag AIDR: Artificial Intelligence for Disaster Response Twitter; annotate manually, classify automatically Reference and URL [Sheth et al. 2010; Purohit and Sheth 2013] http://twitris.knoesis.org/ [MacEachren et al. 2011] http://www.geovista.psu.edu/SensePlace2/ [Caragea et al. 2011] http://emerse.ist.psu.edu/ [Yin et al. 2012; Power et al. 2014] https://esa.csiro.au/ [Abel et al. 2012] http://wis.ewi.tudelft.nl/twitcident/ [Rogstadius et al. 2013] https://github.com/jakobrogstadius/crisistracker [Ashktorab et al. 2014] https://github.com/dssg/tweedr [Imran et al. 2014a] http://aidr.qcri.org/ be very personal—i.e. hearing that a friend or loved one is safe, or it may be more broadly applicable, such as the status of a certain neighborhood or town. Overall, the information any individual, group, or organization finds useful and seeks out in a disaster will depend upon their goals. Is it a group interested in pro- viding food to children? Is it an organization that can set up a field hospital? Is it an individual living in a foreign country who is concerned about her or his family? The different types of information sought by these different stakeholders may be broadcast on Twitter, but to find it quickly, users rely on technological methods to sift through the millions of tweets broadcast at any given time to find useful information. Further information and a deeper perspective on users of social media in disaster can be found in Hughes et al. [2014a] and Hughes and Palen [2012]. 3. SYSTEMS FOR CRISIS-RELATED SOCIAL MEDIA MONITORING Table I provides examples of existing systems described in the literature that extract crisis-relevant information from social media.10 The systems we include have vary- ing degrees of maturity; some have been deployed in real-life situations, while others remain under development. Most existing systems are built around the concept of a dashboard, or a set of vi- sual displays that provides a summary of social media during the crisis according to temporal, spatial, and thematic aspects. Common elements in these displays include: — Lists/timelines showing recent or important messages, sometimes grouping the messages into clusters or categories. — Time series graphs representing the volume of a hashtag, word, phrase, or concept over time, and sometimes marking peaks of activity. — Maps including geotagged messages or interpolated regions, possibly layered ac- cording to different topics. — Pie charts or other visual summaries of the proportion of different messages. These visual elements are powered by computational capabilities that include: 10The list is not extensive, and does not include tools such as Radian6 (http://www.salesforcemarketingcloud. com/products/social-media-listening/) that have not been described in the literature, but might be relevant for other reasons—e.g. in the case of Radian6, because it is used by the American Red Cross. Social Media in Mass Emergency A:7 — Collections of social media messages matching a given criterion, from one or multi- ple social media and/or Short Message Service (SMS) streams, typically with a focus on Twitter (described in Section 4). — Natural Language Processing (NLP), including Named Entity Recognition (NER) and linking of named entities to concepts (described in Section 4.3). — Extraction of information from the messages, including geotagging (described in Section 4.4). — Monitoring the volume of messages (or sets of messages) to detect or help detect sub-events within a crisis, and sometimes the crisis itself (described in Section 5), possibly including the generation of user-defined alerts when certain conditions are met. — Clustering or automatic grouping of similar messages (described in Section 6.1.3). — Classification of messages or groups of messages manually or automatically (see Section 6.1.2). — Automatic translation of messages. Though some of these systems are based on input or feedback provided by emergency responders and other officials, we note that to a large extent they are framed as a way to process social media data during crisis situations; their goal is not to address specific needs of emergency responders or other stakeholders. This focus on processing social media data possibly impacts the adoption of these systems by the practitioner community. Methodologies such as participatory design have been proposed to improve the matching between e.g. the needs of public information officers during a crisis, and the tools built by researchers and developers [Hughes 2014]. When the goal of meeting the specific need of users is stated explicitly in the design of systems, it often revolves around enhancing situational awareness, defined in [Endsley 1995] as “the perception of elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future.” For instance, ESA [Yin et al. 2012; Power et al. 2014] aims at enhancing situational awareness with respect to crises induced by natural hazards, particularly earthquakes. This is done by presenting information in time (frequency series) and space (maps), which is achieved by performing event detection, text classification, online clustering and geotagging. Similarly, SensePlace2 [MacEachren et al. 2011] is presented as a geovisual analytics system, which filters and extracts geographical, temporal and the- matic information from tweets in order to present them in a layered map. Data from social media can also be presented along with data from physical sensors, for instance to overlay earthquakes detected by seismic sensors on a map presenting social media data [Avvenuti et al. 2014; Musaev et al. 2014]. In parallel to approaches that use Natural Language Processing (NLP) techniques to enhance situation awareness, Crisis Mapping emerged as an alternative type of sys- tem, by employing digital volunteers to collect, classify, and geotag messages [Okolloh 2009; Meier 2015], and eventually by using the input from those volunteers to train machines to perform these tasks automatically [Imran et al. 2014a]. 4. DATA CHARACTERIZATION, ACQUISITION, AND PREPARATION Both academics and practitioners gather social media data during crisis events. In this section, we describe the common practices used to collect, represent, and process these data. A:8 Imran et al. 4.1. Characteristics of Messages Broadcast on Social Media in Disaster Social media is a general term that encompasses a variety of platforms on which user- generated content can be disseminated and consumed, and where users can connect with others. This definition currently includes blogging and micro-blogging, social net- working sites, social media sharing platforms, and wikis [van Dijck 2013]. Activities such as staying in touch with friends and family, and connecting with others, have driven the growth of social media platforms.11 Currently, different social networking sites are used for different purposes, but commonalities do exist. For in- stance, the top 3 activities on Twitter are to (1) post about daily activities, (2) upload and share photos, and (3) comment on posts of others; while on Facebook they are to (1) upload and share photos, (2) message with friends on a one-on-one basis, and (3) comment on posts of friends [GlobalWebIndex 2013]. In any of these platforms, an increase in social media communications can be triggered by a variety of causes, which can be divided into endogenous and exoge- nous [Crane and Sornette 2008]. Endogenous causes refer to phenomena in which an idea or “meme” gains popularity by a process of viral contagion or information cascade, where content spreads rapidly through a network, potentially reaching a significant fraction of all the users [Chen et al. 2013]. Exogenous causes refer to large-scale events, usually happening in the physical world, of wide interest to social media users. Emergencies and mass convergence events are examples of an exogenous cause, and during such events, we know that com- munications activity increases. For instance, it has been observed that mobile network usage—both in terms of phone calls and SMS—increases in emergency situations [Gao et al. 2014]. The same is true for social media usage, which “rises during disasters as people seek immediate and in-depth information” [Fraustino et al. 2012].12 To illustrate the types of information that affected populations broadcast specifically on the popular microblogging platform Twitter, we turn to some example messages that have been highlighted in previous literature: — “OMG! The fire seems out of control: It’s running down the hills!” (bush fire near Marseilles, France, in 2009, quoted from Twitter in De Longueville et al. [2009]) — “Red River at East Grand Forks is 48.70 feet, +20.7 feet of flood stage, -5.65 feet of 1997 crest. #flood09” (automatically-generated tweet during Red River Valley floods in 2009, quoted from Twitter in Starbird et al. [2010]) — “Anyone know of volunteer opportunities for hurricane Sandy? Would like to try and help in any way possible” (Hurricane Sandy 2013, quoted from Twitter in Purohit et al. [2013]) — “My moms backyard in Hatteras. That dock is usually about 3 feet above water [photo]” (Hurricane Sandy 2013, quoted from Reddit in Leavitt and Clark [2014]) — “Sirens going off now!! Take cover...be safe!” (Moore Tornado 2013, quoted from Twitter in Blanford et al. [2014]) Though the above are only a few examples, they convey a sense of the types of in- formation posted during an event, and show that it is varied. Vieweg [2012] points to this variation in her research that is based on a detailed study of four crisis events, in which she identifies in Twitter 35 types of information in three broad categories defined by Mileti [1999]: social environment, built environment, and physical environ- ment. She points out that social environment messages describe anything having to do 11http://www.pewinternet.org/2011/11/15/why-americans-use-social-media/ 12For instance, activity on Facebook was observed to increase significantly in the areas most affected by the August 2014 earthquake in California, USA https://www.facebook.com/notes/facebook-data-science/ on-facebook-when-the-earth-shakes/10152488877538859 Social Media in Mass Emergency A:9 with people and their reactions to the crisis, built environment messages correspond to information and updates about property and infrastructure, and physical environment messages include updates about the hazard agent, weather, and other environmental factors (see Section 6.1.1 for details on different ways of categorizing this information). Quantifying the amount of information found in social media based on type is even more difficult than locating that information in the first place. Important variations have been observed across crises (even for similar events) and at different stages of a crisis [Blanford et al. 2014; Imran et al. 2013a]. Olteanu et al. [2014] looked at the prevalence of three broad categories of information in tweets related to six cri- sis events. The results show large variabilities in the number of tweets reporting the negative consequences of an event (20%-60%), those offering or asking for donations (15%-70%) and those warning about risks or providing advice (5%-20%). Using tweets as an indication of spatial zones during a disaster is also possible. For instance, Acar and Muraki [2011] examine the use of Twitter during an earthquake in Japan and observed that tweets from affected areas include more requests for help and more warnings, while tweets from other areas which are far from the disaster epicenter tend to mostly include other types of information, such as concern and condolences. 4.2. Data Acquisition Most large social media platforms provide programmatic access to their content through an Application Programming Interface (API). However, the details of these APIs vary substantially from one platform to another, and also change over time. APIs to access social media data typically belong to one of two types: those allowing to query an archive of past messages (also known as search APIs), and those allow- ing data collectors to subscribe to a real-time data feed (also known as streaming or filtering APIs). Both types of APIs typically allow data collectors to express an infor- mation need, including one or several of the following constraints: (i) a time period, (ii) a geographical region for messages that have GPS coordinates (which are currently the minority), (iii) a set of keywords that must be present in the messages, which re- quires the use of a query language whose expressiveness varies across platforms. In the case of archive/search APIs, messages are returned sorted by relevance (a com- bination of several factors, including recency), or just by recency. In the case of real- time/streaming/filtering APIs, messages are returned in order of their posting time. Data collection strategies impact the data obtained and analytic results. For in- stance, selecting messages in the geographical region affected by a disaster vs. select- ing messages based on a keyword-based query may return datasets having different characteristics [Olteanu et al. 2014]. Data availability. In addition to issues regarding network connectivity during disas- ters [Jennex 2012], access to social media data is in general limited, which is a serious obstacle to research and development in this space [Reuter and Scholl 2014]. First, historical, archived social media can typically only be queried through search APIs, which are limited in terms of number of queries or data requested per unit of time. The exceptions are (i) a 1% data sample collected from Twitter by the Internet Archive,13 and (ii) collections created by researchers using automatic data collection methods (e.g. web crawling), which are against the terms of services of most social media platforms. Second, access to real-time data is quite limited. Twitter offers a public streaming API providing a random sample of 1% of all postings, plus the possibility of filtering 13Available at https://archive.org/details/twitterstream A:10 Imran et al. all public postings by keywords.14 This is in contrast with most large social media platforms, which do not offer this level of data access publicly.15 The consequence of these limitations is that most work on crisis-related messages is done using Twitter data (with few exceptions e.g. Facebook [Bird et al. 2012] and Red- dit [Leavitt and Clark 2014]), which provides an incomplete view of a crisis situation, as there are many different online social media sites that might be used for different purposes. Limitations in the amount of data that can be collected and in general a de- pendency on a small set of data providers or APIs, further reduces the efficiency and effectiveness of tools for handling crisis-related social media messages. 4.3. Data Pre-Processing Most researchers and practitioners prepare social media data by pre-processing it, us- ing some of the methods outlined below, before performing the actual analysis. Many pre-processing techniques are available, and the choice depends on the type of data at hand and the goals of the analysis. Natural Language Processing (NLP). The text of the messages can be pre- processed by using an NLP toolkit. Typical operations include tokenization, part- of-speech tagging (POS), semantic role labeling, dependency parsing, named entity recognition and entity linking. A number of off-the-shelf implementations of these op- erations are available online, e.g. the Stanford NLP16 or NLTK for Python.17 Social media-specific NLP toolkits can also be used. For instance, ArkNLP [Owoputi et al. 2013], which is trained on Twitter data, is able to recognize Internet idioms such as “ikr” (I know, right?) and assign them the correct Part Of Speech (POS) tag (inter- jection, in this case). Additionally, higher-level operations can be applied, including applying sentiment analysis methods to infer aspects of the emotion conveyed by a piece of text [Pang and Lee 2008]. Feature extraction. For many automatic information processing algorithms (e.g. ma- chine learning), each data item must be represented accurately as an information record. The representation of choice for text is typically a numerical vector in which each position corresponds to a word or phrase—this is known as the vector space model in information retrieval. The value in each position can be a binary variable, indicating the presence or absence of that word or phrase in the message, or a number following some weighting scheme, such as TF-IDF, which favors terms that are infrequent in the collection [Baeza-Yates and Ribeiro-Neto 2011]. To avoid having too many variables, textual features can be discarded by removing stopwords and functional words, or by normalizing words using stemming or lemmatization (e.g. considering “damaging” and “damage” as equivalent), or other means. Additionally, other text-based features can be added, such as the length of the text in words or characters, and the number of question or exclamation marks. If some NLP pre-processing is performed on the text—such as part-of-speech-tagging—a feature such as noun:fire (instead of verb:fire) can be used to distinguish that the word “fire” is being used in a message as a noun (“I heard a fire alarm”) instead of a verb (“They should fire him”). In the case of tweets, characteristics such as the presence of user mentions (“@user”), URLs, or hashtags can be included as features. In the case of images or video, content- based features such as colors, textures and shapes can be included (see e.g. Liu et al. 14Available at https://dev.twitter.com/docs/api/streaming 15As of November 2014, we found no publicly-available equivalent of Twitter’s streaming API in Sina Weibo, Facebook, YouTube, Google Plus, or Tumblr. 16http://www-nlp.stanford.edu/software/ 17http://www.nltk.org/ Social Media in Mass Emergency A:11 [2007] for a survey). Additionally, features such as the date of a message, tags associ- ated with it, the number of views/comments it has received, or information about its author, are often available in a platform-dependent manner. Obviously, one can spend a great deal of time constructing features by hand. In order to guide this exploration, both researchers and practitioners should prioritize the development and understanding of features likely to be correlated with the target variable (e.g. tweet classification). By the same token, features valuable to one target variable may not be important at all for a different target variable. Although often under-appreciated, feature engineering is perhaps the most important part of a mod- eling exercise. De-duplication. Further reduction of the amount of data to be processed can be achieved by removing near-duplicate messages. Given that in many social media plat- forms the number of people re-posting a message can be interpreted as a measure of its importance, whenever removing near-duplicates it is advisable to save the number of near-duplicates that have been found (e.g. as done in Rogstadius et al. [2013] to pri- oritize highly-reposted stories). De-duplication can be done by applying a clustering method (see Section 6.1.3). Filtering. A fraction of the messages collected will not be relevant for a given crisis. This fraction depends on the specific collection method used, as discussed by Olteanu et al. [2014], and on other factors, such as the presence of off-topic messages using the same tags or keywords as the on-topic ones [Qu et al. 2011]. These messages can be post-filtered using human labeling or crowdsourcing, keyword-based heuristics, or automatic classification. Additionally, many messages are posted automatically on social media for financial gain, exploiting the attention that a certain hashtag has received. These unsolicited commercial messages are known as spam [Gupta and Kumaraguru 2012; Uddin et al. 2014] and there are well-studied methods that can remove a substantial portion of them [Benevenuto et al. 2010]. Finally, in some cases we might want to also remove messages posted by automatic agents or social media bots. Their identification is sim- ilar to that of spammers. 4.4. Geotagging and geocoding Attaching geographical coordinates to a message (a process known as geotagging) is useful for a number of tasks in disaster response [Graham et al. 2014; Ikawa et al. 2013; Lingad et al. 2013]. Geotagging allows the retrieval of information about a lo- cal event, by filtering the messages corresponding to a particular geographical region. It allows the visualization of information about an event on a map, possibly making it more actionable for emergency responders. Geotagging can also be used for higher- level tasks, such as helping predict epidemic transmission of diseases based on geo- graphical proximity [Brennan et al. 2013]. The availability of machine-readable location information in social media messages, in the form of metadata, depends on the user’s device having the capacity to know its location (e.g. via Global Positioning System (GPS)), on the specific client software having the capability to read this from the device, and most importantly, on the user enabling this feature explicitly (opting-in). In practice, only 2% of crisis-related mes- sages include machine-readable location information [Burton et al. 2012]. However, while explicit metadata about locations may be absent, many messages in social media do contain implicit references to names of places (e.g. “The Christchurch hospital is operational”). Geocoding refers to finding these geographical references in the text, and linking them to geographical coordinates. This can be done by using a named entity extractor to extract potential candidates, and then comparing those A:12 Imran et al. candidates with a list of place names. This is the approach used by e.g. MacEachren et al. [2011] which uses Gate18 for the first task and Geonames19 for the second. While building a comprehensive database of geospatial information, including place names, is an important component of geotagging (see e.g. Middleton et al. [2014]), geo- tagging is not merely a dictionary look-up process because of ambiguities. These ambi- guities are known as “geo/non-geo” and “geo/geo.” A geo/non-geo ambiguity occurs for instance in the message “Let’s play Texas Hold ’em,” that does not refer to the state of Texas in the USA. A geo/geo ambiguity is found in the message “There is a fire in Paris,” which may refer to the capital of France, or to any of more than a dozen places on Earth sharing the same name. For instance, in Sultanik and Fink [2012], authors proposed an unsupervised approach to extract and disambiguate location mentions in Twitter messages during crisis situations. In general, geotagging is done through probabilistic methods (see e.g. Cheng et al. [2010]), often exploiting contextual clues. These clues may include the general loca- tion of a crisis, information about nearby places, and location information indicated by users in their profiles [Gelernter and Mushegian 2011]. 4.5. Archived versus Live Data Processing Depending on the urgency with which the output of an analysis is required, data may be provided to an algorithm either as an archive, for retrospective analysis, or as a live data feed, for real-time analysis. These correspond to two standard concepts in computer science: off-line processing and on-line processing. Retrospective data analysis (off-line processing) starts with a batch of data relevant to an event, usually containing messages over the entire time range of interest. For example, we might consider re-constructing a timeline of events in the aftermath of an earthquake, by looking at all of the tweets from the moment of the earthquake up to two weeks after. In deciding how to build the timeline, we have the complete context of events during this two week window. Live data analysis (on-line processing) is done over a stream of data relevant to the event, usually provided in real-time or with a short delay. For example, we might consider constructing a timeline of the events in the aftermath of an earthquake as we observe new tweets; in deciding how to build the timeline, we have an incomplete context of the events and their future repercussions. It is possible for algorithms to lie in between, operating on small batches of data at regular intervals (e.g. hourly, daily). The trade-off between retrospective and live data is a matter of accuracy versus latency. Retrospective data analysis maximizes our context and, as a result, gives us an accurate picture of the data. However, because we have to wait for the data to accumulate, we incur latency between when an event happens and when it is processed. Live data analysis, on the other hand, minimizes the latency but, because we have partial information, we may incur lower accuracy. The choice of collection methodology depends on the use case. Crisis responders may want lower latency in order to better respond to a developing situation; forensic analysts may want higher accuracy and have the benefit of waiting for data to be collected. While developing an algorithm, we can use retrospective data to simulate live data. This is a standard experimental methodology that has been used in the past for in- formation filtering tasks [Voorhees and Harman 2005] and, more recently, for crisis informatics [Guo et al. 2013; Aslam et al. 2013]. 18https://gate.ac.uk/ 19http://geonames.org/ Social Media in Mass Emergency A:13 4.6. Challenges There are a number of challenges associated with the processing of social media mes- sages. In this section, we group them into two high-level categories: scalability and content. We defer specific challenges (e.g. challenges to event detection) to their re- spective technical sections. Scalability issues. Large crises often generate an explosion of social media activity. Data size may be an issue, as for crises that last several days, millions of messages may be recorded. While the text of each message can be sorted, a data record for e.g. a Twit- ter message (140 characters of text) is around 4KB when we consider the metadata attached to each message. Thus, a Twitter collection for a crisis is then on the order of several hundred megabytes to a few gigabytes. In addition, multimedia objects such as images and videos may significantly increase the storage space requirements. Data velocity may be a more challenging issue, especially considering that data does not flow at a constant rate but experiences drastic variations. The largest documented peak of tweets per minute during a natural hazard that we are aware of is 16,000 tweets per minute.20 Finally, redundancy, which is commonly cited as a scalability challenge, to some extent cannot be avoided in this setting. Repeated (re-posted/re-tweeted) messages are common in time-sensitive social media, even encouraged, as in some platforms messages that gain more notoriety are those that are simply repeated more. Content issues. Microblog messages are brief and informal. In addition, this type of messaging is often seen by users to be more akin to speech, as opposed to a form of writing, which—compounded with technological, cross-lingual and cross-cultural factors—implies that on the Internet “we find language that is fragmentary, laden with typographical errors, often bereft of punctuation, and sometimes downright inco- herent” [Baron 2003]. This poses significant challenges to computational methods, and can lead to poor and misleading results by what is known as the “garbage in, garbage out” principle. Messages are also highly heterogeneous, with multiple sources (e.g. traditional me- dia sources, eyewitness accounts, etc.), and varying levels of quality. Quality itself is an important and complex question for crisis managers, and encompasses a num- ber of attributes including objectivity, clarity, timeliness and conciseness, among oth- ers [Friberg et al. 2011]. Additionally, different languages can be present in the same crisis and sometimes in the same message—a phenomena known as “borrowing,” and “code switching.” This makes it difficult for both machines and humans (e.g. content annotators) to understand or classify messages. Finally, brief messages sent during a crisis often assume a shared context from which only a minor part is sometimes made explicit. The area of study in linguistics known as pragmatics focuses on “communication in context,” and explains how people are able to infer the meaning of the communications because humans are very adept at under- standing context. So, in the case of Twitter communications, a reader can understand the tweet author’s intent because she or he knows the context within which that tweet is being broadcast. Current computational methods are not able to make the same in- ferences humans do, and thus cannot achieve the same level of understanding [Vieweg and Hodges 2014]. Privacy issues. Social media, since it is, by definition, content directly created by end users, might carry personally identifiable information (PII). Researchers and practi- tioners should be mindful of any explicit or inferred PII in the data. For example, an 20During Hurricane Sandy in 2012: http://www.cbsnews.com/news/social-media-a-news-source-and-tool- during-superstorm-sandy/ A:14 Imran et al. individual may not explicitly reveal PII such as location for privacy reasons; infer- ring this user’s location may be in conflict with her expectation of privacy. As a result, academic work may have to be approved by a human subjects review process (ethics approval). Practitioners, on the other hand, may be subject to a response organization’s own standards and policies (see e.g. Gilman and Baker [2011] and ICRC [2013]). 5. EVENT DETECTION AND TRACKING Most systems for social media processing during crises start with event detection. An event is the occurrence of something significant which is associated with a specific time and location [Brants et al. 2003]. However, due to the online nature of social media communications, events as they play out in social media may or may not be necessarily associated with a physical location. In the context of social media, Dou et al. [2012] define an event as: “An occurrence causing changes in the volume of text data that discusses the associated topic at a specific time. This occurrence is characterized by topic and time, and often associated with entities such as people and location”. Crisis and emergency situations typically fall into two broad categories: predicted (or forewarned) and unexpected. Some disaster events can be predicted to a certain level of accuracy based on meteorological or other data (e.g. this is the case with most large storms and tornadoes), and information about them is usually broadcast publicly be- fore the actual event happens. Sometimes an event may not be explicitly anticipated, for example as with a mass protest, but still may be forecast from social media and other data [Ramakrishnan, Naren et al. 2014]. Other events cannot be predicted (e.g. earthquakes), and in this case an automatic detection method is useful to find out about them as quickly as possible once they happen. In this section, we study tech- niques available for the automatic detection of both predicted, and unexpected events. Historically, methods for event detection and tracking in social media in the context of crises and emergencies, are adaptations of methods to perform these tasks with a more general scope: that of detecting news. These methods, in turn, are adaptations of methods to find new topics in general document collections. 5.1. Background on Event Detection and Discovery A well-studied problem in Information Retrieval is detecting events in a stream of documents (see e.g. Allan [2002]). These documents can be news articles from tra- ditional media sources, or posts on social media (e.g., tweets, Facebook posts, Flickr images). Traditionally, the Topic Detection and Tracking (TDT) research community uses newswires as source data streams for event detection. Various techniques are employed in TDT including story segmentation, topic de- tection, new event detection, link detection, and topic tracking. Story segmentation focuses on determining story boundaries from streaming speech recognition output, usually from radio or television broadcasts. Topic detection groups related documents together into cohesive topics. New event detection processes each new document to decide if it describes a previously unseen story. Link detection detects that if two docu- ments are similar or not. Finally, event tracking follows the evolution of an event/topic to describe how it unfolds. Event detection on social media is different from the traditional event detection ap- proaches that are suitable for other document streams. Social media data emerge more quickly, and in larger volumes than traditional document streams. In addition, social media data are composed of short, noisy, and unstructured content that often require a different approach than what is used with traditional news articles. Considering the unique characteristics of social media streams, we focus the remainder of this section on new event detection and event tracking. Nevertheless, techniques and evaluation Social Media in Mass Emergency A:15 metrics from the TDT community provide insight into methods that might work for the Twitter domain. 5.2. New Event Detection (NED) In the context of mass emergencies, New Event Detection (NED) refers to the task of discovering the first message related to an event by continuously monitoring a stream of messages. NED decides whether a message is about something new that has not been reported in previous messages, or not [Yang et al. 2009]. “New” is normally opera- tionalized as sufficiently different according to a similarity metric. Hellinger similarity, Kullback-Leibler divergence, and cosine similarity are among the metrics commonly used in NED [Kumaran et al. 2004]. As observed in Section 4.5, we can do retrospective (off-line) or on-line analysis [Yang et al. 1998]. While the most useful NED systems for emergencies are those who per- form this analysis on-line, they are often adaptations or improvements of off-line meth- ods, which we discuss next. 5.2.1. Retrospective New Event Detection. Retrospective NED refers to the process of identifying events using messages or documents that have arrived in the past. Meth- ods for retrospective NED involve the creation of clusters of documents or messages based on a suitable definition of similarity between them, which may involve more than one dimension of them, e.g. using similar words, involving similar groups of peo- ple, occurring close to each other in time and/or space, etc. For instance, Zhao et al. [2007] introduce a retrospective NED method that uses textual, social and temporal characteristics of the documents to detect events on social streams such as weblogs, message boards, and mailing lists. They build multi-graphs using social textual streams, where nodes represent social actors, and edges represent the flow of information between actors. Clustering techniques and graph analysis are combined to detect an event. Sayyadi et al. [2009] introduce a retrospective NED approach that overlays a graph over the documents, based on word co-occurrences. They assume that keywords co- occur between documents when there is some topical relationship between them. Next, a community detection method over the graph is used to detect and describe events. Pohl et al. [2012] describe a two-phase clustering approach to identify crisis-related sub-events in photo-hosting site Flickr and video-hosting site YouTube. During the first phase, which is to identify sub-events, clusters are formed by using only items that contain geographical coordinates. These coordinates are added automatically by the device used to capture the photo or video, or are added later by its author/uploader. Next, they calculate term-based centroids of the identified clusters using cosine dis- tance to further describe the identified sub-events. Another retrospective NED approach is presented in Chen and Roy [2009], with experiments run on Flickr. It uses photos, user-defined tags, and other meta-data in- cluding time and location to detect events. This approach simultaneously analyzes the temporal and geographical distribution of tags, and determines the event type (e.g. whether it is recurring) to form clusters. Finally, for each tag cluster, the correspond- ing photos are retrieved. Ritter et al. [2012] extract significant events from Twitter by focusing on certain types of words and phrases. In their system, called TwiCal, they extract event phrases, named entities, and calendar dates. To extract named entities, they use a named entity tagger trained on 800 randomly selected tweets. To extract event mentions they use a Twitter-tuned part-of-speech tagger [Ritter et al. 2011]. The extracted events are clas- sified retrospectively into event types using a latent variable model that first identifies event types using the given data, and then performs classification. A:16 Imran et al. Li et al. [2012b] introduce Twevent, a system that uses message segments instead of individual words to detect events. The authors claim that a tweet segment, which rep- resents one or more consecutive words in tweets, contains more meaningful informa- tion than unigrams. The Twevent approach works in phases. First, the individual tweet is segmented, and bursty segments are identified using the segments’ frequency in a particular time window. Next, identified segments are retrospectively clustered using K-Nearest Neighbors (KNN) clustering. Finally, a post-filtering step uses Wikipedia concepts to filter the detected events. 5.2.2. Online New Event Detection. Online new event detection does not use previously seen messages or any prior knowledge about the events to be identified. Online NED is typically performed with low latency (in real-time), in the sense that the time between seeing a document corresponding to a new event, and reporting that a new event has been detected, is relatively short. Methods based on keyword burst. A straightforward approach is to assume that words that show sharp frequency increases over time are related to a new event. For instance, Robinson et al. [2013a] introduce a system to detect earthquakes using Twit- ter. The earthquake detector, which is based on the Emergency Situation Awareness (ESA) platform [Power et al. 2014], checks for the keywords “earthquake” and “#eqnz” in the real-time Twitter stream, and applies a burst detection method to analyze word frequencies in fixed-width time-windows and compare them to historical word frequen- cies. Unusual events are identified if the observed frequencies are much higher than those recorded in the past. Earle et al. [2012] have compared simple keyword-based ap- proaches with data from seismological sensors, finding that while many earthquakes are not detected by Twitter users, detections are fast, “considerably faster than seis- mographic detections in poorly instrumented regions of the world.” Marcus et al. [2011] introduced TwitInfo, a system for detecting, summarizing and visualizing events on Twitter. TwitInfo collects tweets based on a user-defined query (e.g. keywords used to filter the Twitter stream). It then detects events by identifying sharp increases in the frequency of tweets that contain the particular user-defined query as compared to the historical weighted running average of tweets that contain that same query. Further, tweets are obtained from the identified events to identify and represent an aggregated sentiment (i.e., classifying tweets into positive and negative classes). The authors evaluated the system on various events such as earthquakes and popular football games. A similar system, TwitterMonitor [Mathioudakis and Koudas 2010], also collects tweets from the Twitter stream and detects trends (e.g. emerging topics such as break- ing news, or crises) in real-time. The trend detection approach proposed in their paper works in two phases. During the first phase, TwitterMonitor identifies bursty keywords which are then grouped based on their co-occurrences. Once a trend is identified, ad- ditional information from the tweets is extracted to analyze and describe the trend. For example, the system uses Grapevine’s entity extractor [Angel et al. 2009] which identifies entities mentioned in the trends. Another Twitter-specific event detection approach introduced by Petrovi´c et al. [2010] uses Locality Sensitive Hashing (LSH) for hashing a fixed number of recent documents in a bounded space, and processed in a bounded time, to increase the per- formance of nearest neighbors search. With so many event detection systems, it is interesting to think about how they compare. McMinn et al. [2013] describe a corpus to evaluate event detection methods, composed of 500 news events sampled over a four-week period, and including tweet- level relevance judgments for thousands of tweets referring to these events. While Social Media in Mass Emergency A:17 existing NED systems have not been evaluated against this corpus, we anticipate this calibration of systems to occur in the future. Beyond keyword bursts. There are well-known problems of relying on increases in the frequency of a keyword (or a segment) to detect events. For instance, consider pop- ular hashtags such as “#musicmonday,” which is used to suggest music on Mondays, or “#followfriday/#ff,” which are used to suggest people to follow on Fridays. In these cases, there should be big pseudo-events detected every Monday and every Friday. To address this problem, Becker et al. [2011] present an approach to classify real- world events from non-events using Twitter. They use four types of features, which are temporal, social, topical, and Twitter-specific, to identify real events using the Twit- ter stream in real-time. First, based on temporal features (i.e., volume of messages posted during an hour), they form initial clusters using the most frequent terms in the messages. Clusters are then refined using social features (i.e., users’ interactions like re-tweets, replies, mentions). Next, they apply heuristics, for example, a high percent- age of re-tweets and replies often indicates a non-event, whereas a high percentage of mentions indicates that there is an event. Further, cluster coherence is estimated using a cosine similarity metric between messages and cluster centroid. Finally, as the au- thors report that multi-word hashtags (e.g. “#musicmonday” and “#followfriday”) are highly indicative of some sort of Twitter specific discussion and do not represent any real event, they check the frequency of such hashtags used in each cluster to further refine the results. Weng et al. [2011] present an algorithm for event detection from tweets using clus- tering of wavelet-based signals. Their approach involves three steps. First, they use wavelet transformation and auto correlation to find bursts in individual words, and keep only the words with high signal auto-correlations as event features. Then, the similarity for each pair of event-features is measured using cross correlation. Finally, they use a modularity-based graph partitioning algorithm to detect real-life events. One of the strong points of this approach over the traditional event detection ap- proaches is the capability of differentiating real-life big events from trivial ones. This is achieved mainly by two factors: the number of words, and the cross-correlation among the words related to an event. Unlike the approaches presented above, Corley et al. [2013] present a method to de- tect and investigate events through meta-data analytics and topic clustering on Twit- ter. Various features such as re-tweets, usage of different terms, and hashtags are analyzed for a certain time period to determine a baseline and a noise ratio. An event is detected once a particular feature value exceeds its noise boundaries and expected threshold. Once an event has been detected, its related topics are identified using the topic clustering approach. Domain-specific approaches. As in many natural language processing applications, approaches that are specific to a certain domain generally perform better than the approaches that are open-domain or generic. For instance, Phuvipadawat and Murata [2010] describe a method for detecting breaking news from Twitter. First, tweets containing the hashtag “#breakingnews” or the phrase “breaking news” are fetched from the Twitter streaming API. Group- ing of the extracted tweets is then performed, based on content similarity, and using a variant of the TF-IDF technique. Specifically, the similarity variant assigns a high similarity score to hashtags and proper nouns, which they identify using the Stanford Named Entity Recognizer (NER) implementation. The authors consider three types of features associated with tweets: statistical fea- tures (i.e., number of words in a tweet, position of the query word within a tweet), keyword-based features (i.e., the actual words in a tweet), and contextual features A:18 Imran et al. (e.g., words appearing nearby the query term, for instance if “earthquake” is a query, terms such as “magnitude” and “rocks” would be features in the tweet “5.3 magnitude earthquake rocks parts of Papua New Guinea”). In order to determine if a tweet corre- sponds to one of these hazards or crises, they use Support Vector Machines (SVM)— a known supervised classification algorithm (more about supervised classification in Section 6.1.2). Data from traditional media sources can also be used for detecting newsworthy events. Not surprisingly, traditional media and social media have different editorial styles, perceived levels of credibility, and response delays to events. Tanev et al. [2012] find news articles describing security-related events (such as gun fights), and use key- words in their title and first paragraph to create a query. This query is issued against Twitter to obtain tweets related to the event. Dou et al. [2012] describe LeadLine, an interactive visual analysis system for event identification and exploration. LeadLine automatically identifies meaningful events in social media and news data using burst detection. Further, named entities and geo-locations are extracted from the filtered data to visualize them on a map through their interface. Another domain-specific event-detection method is based on pre-specified rules and introduced in Li et al. [2012a]. Their system, TEDAS, detects, analyzes, and identifies relevant crime and disaster related events on Twitter. First, tweets are collected based on iteratively refined rules (e.g., keywords, hashtags) from Twitter’s streaming API. Next, tweets are classified via supervised learning based on content as well as Twitter- specific features (i.e., URLs, hashtags, mentions). Additionally, location information is extracted using both explicit geographical coordinates and implicit geographical refer- ences in the content. Finally, tweets are ranked according to their estimated level of importance. Sakaki et al. [2010] detect hazards and crises such as earthquakes, typhoons, and large traffic jams using temporal and spatial information. LITMUS [Musaev et al. 2014] detects landslides using data collected from multiple sources. The system, which depends on the USGS seismic activity feed provider, the TRMM (NASA) rainfall feed, and social sensors (e.g. Twitter, YouTube, Instagram), detects landslides in real-time by integrating multi-sourced data using relevance ranking strategy (Bayesian model). Social media data is processed in a series of filtering steps (keyword-based filtering, removing stop-words, geotagging, supervised classification) and mapped based on geo- information either obtained from meta-data or from content. Events with high rele- vancy are identified as “real events.” 5.3. Event Tracking and Sub-Event Detection Event tracking. Event tracking refers to the task of studying how events evolve and unfold. For a general discussion on the subject, see Allan [2002] and Lee et al. [2013]. The way in which emergency response agencies deal with crisis events varies as a crisis unfolds. Emergency situations typically consist of four phases: warning, impact, emergency, and recovery [Killian 2002, page 51]. During the warning phase, the focus is on monitoring the situation. Impact is when the disaster agent is actually at work, while the emergency phase is the immediate post-impact period during which rescue and other emergency activities take place. Recovery is the period in which longer-term activities such as reconstruction and returning to a “normal” state occur. Various techniques have been proposed to identify event phases. For instance, Iyen- gar et al. [2011] introduce an approach to automatically determine different phases of an event on Twitter. The approach, which is mainly based on content-based fea- tures of tweets, uses an SVM classifier and a hidden Markov model. Various content- specific features such as bag of words, POS (part-of-speech) tags, etc. are used to au- Social Media in Mass Emergency A:19 Table II: Some of the event detection tools surveyed. The table includes the types of events for which the tool is built (open domain or specific), whether detection is per- formed in real-time, the type of query (open or “kw”=keyword-based), and whether it has spatio/temporal or sub-event detection capabilities. Sorted by publication year. System/tool Approach Event types TwitterMonitor burst detection open domain TwitInfo earthquakes+ burst detection Twevent burst segment detection open domain TEDAS supervised classification crime/disasters LeadLine burst detection TwiCal supervised classification conflicts/politics Tweet4act dictionaries ESA burst detection disasters open domain open domain Spatio- temporal Real- time yes yes kw yes no no no yes kw yes kw Query type open no Sub- events no yes no open no no yes kw kw no yes open temporal no no no spatial no spatial Reference [Mathioudakis and Koudas 2010] [Marcus et al. 2011] [Li et al. 2012b] [Li et al. 2012a] [Dou et al. 2012] [Ritter et al. 2012] [Chowdhury et al. 2013] [Robinson et al. 2013a] tomatically classify tweets into three phases of an event: before, during, and after. A disaster-specific lexicon of discriminative words for each phase of the event can also be employed [Chowdhury et al. 2013]. Sub-event detection. The detection of large-scale events has been studied with more attention than the detection of small-scale “sub-events” that happen as a crisis unfolds. Pohl et al. [2012] show the importance of sub-event detection during crisis situa- tions. They use multimedia meta-data (tags and title) associated with content found on social media platforms such as YouTube and Flickr. Their framework uses a cluster- ing approach based on self-organizing maps to detect sub-events. First, a pre-selection of the data is performed based on user-identified keywords. The selected data is then passed to a sub-event detection module that performs clustering to further split the data into sub-events. Khurdiya et al. [2012] present a system for event and sub-event detection using Conditional Random Fields (CRF) [Lafferty et al. 2001]. Their system consists of four main modules: (1) a CRF-based event extractor to first extract actor, action, date, and location; event titles are also extracted using using CRFs; (2) an event resolution to find similar events; (3) an event compiler that characterizes events; and (4) an event reporting module which is the end-user interface used to browse events details. Hua et al. [2013] introduce STED, a semi-supervised targeted-interest event and sub-event detection system for Twitter. To minimize the human effort required for labeling, they introduce an automatic label creation and expansion technique, which takes labels obtained from newspaper data and transfers them to tweets. They also propagate labels using mentions, hashtags, and re-tweets. Next, they build mini- clusters using a graph partitioning method to group words related to the event, and use supervised learning to classify other tweets using the examples provided by each mini-cluster. A final step on the classified output is to perform a location estimation using information from geo-coded tweets. Table II lists event detection systems. The majority of them are surveyed above; additional tools are covered in the following sections. 5.4. Challenges In addition to the discussion of general data challenges in Section 4.6, the following are particularly relevant to event detection. Inadequate spatial information. Spatial and temporal information are two integral components of an event. Most systems that rely on Twitter data for event detection face challenges to determine geographical information of tweets that lack GPS information. In this case, automatic text-based geotagging can be used, as described on Section 4.4. A:20 Imran et al. Mundane events. People post mundane events on social media sites. These data points introduce noise, which creates further challenges for an event detection algo- rithm to overcome. For such cases, separation of real-life big events from trivial ones is required. Describing the events. Creating a description or label for a detected event is in gen- eral a difficult task. Often the keywords that are more frequent during the event are presented as a description for the event in the form of a list of words (e.g. { sandy, hurricane, new york } ), but that list does not constitute a grammatically well-formed description (e.g. “Hurricane Sandy hits New York”). We will see one approach to ad- dress this in Section 6.2.2. 6. CLUSTERING, CLASSIFICATION, EXTRACTION AND SUMMARIZATION Once we have found social messages related to a crisis event or topic, there are several ways in which we might process them. In this section, we describe some approaches. Broadly, we separate techniques into those classifying the data item as a whole and those extracting useful information from the content of one or more data items. 6.1. Classifying Social Media Items In many situations, we are interested in classifying social media items into one or more categories. In this section, we will describe three methods of classification with decreasing levels of manual human supervision. Text classification is a large field of research, so we will cover literature relevant to disasters. Interested readers should refer to other sources for a broader discussion [Srivastava and Sahami 2009]. 6.1.1. Content Categories. There is not a single standard or widely-accepted way of cat- egorizing crisis-related social media messages. While some crisis-related ontologies have been proposed (see Section 7.2), in general, different works use different ap- proaches. Table III summarizes various dimensions of social media content that different re- search articles have used to classify information: (1) By factual, subjective, or emotional content: to separate between facts (or combi- nations of facts and opinions), from opinions, or expressions of sympathy. (2) By information provided: to extract particular categories of information that are useful for various purposes. (3) By information source: to select messages coming from particular groups of users, e.g. eyewitness accounts or official government sources. (4) By credibility: to filter out messages that are unlikely to be considered credible. (5) By time: to filter messages that refer to different stages of an event, when temporal boundaries for the event are unclear. (6) By location: to select messages according to whether they originate from or near the place that was affected by an event, or from areas that were not affected. Other classification dimensions can be envisioned. In general, we observe that the selection of the set of categories used by researchers and practitioners is usually driven by two main factors: the data that is present in social media during crises, and the information needs of response agencies. None of these factors is static, as both can change substantially from one crisis situation to another. We also remark that different types of disaster elicit different distributions of messages [Olteanu et al. 2015]. 6.1.2. Supervised Classification. When a set of example items in each category is pro- vided, a supervised classification algorithm can be used for automatic classification. This type of algorithm ‘learns’ a predictive function or model from features of these examples (see Section 4.3) in order to label new, unseen data items. This set of exam- Social Media in Mass Emergency A:21 Table III: Classification of various dimensions of content posted on social media during high impact events with description and related work references. Description/examples Classification dimension By factual, subjective, or emotional content Factual information Opinions Sympathy Antipathy Jokes By information provided Caution and advice Affected people Infrastructure/utilities Needs and donations Other useful information By information source Eyewitnesses/Bystanders Government NGOs News Media By credibility Credible information Rumors By time Pre-phase/preparedness Impact-phase/response Post-phase/recovery By location Ground-zero Near-by areas Outsiders (Examples under “By information provided”) opinions, criticism (e.g. of government response) condolences, sympathy [Kumar et al. 2013]; condolences [Acar and Muraki 2011]; sup- port [Hughes et al. 2014b]; thanks, encouragement [Bruns 2014]; prayers [Olteanu et al. 2014] schadenfreude, animosity against victims (e.g. because of long-standing conflict) jokes, trolling [Metaxas and Mustafaraj 2013] caution and advice [Imran et al. 2013b]; warnings [Acar and Muraki 2011]; hazard, preparation [Olteanu et al. 2014]; tips [Leavitt and Clark 2014]; advice [Bruns 2014]; status, protocol [Hughes et al. 2014b] people trapped, news [Caragea et al. 2011]; casualties, people missing, found or seen [Imran et al. 2013b]; self reports [Acar and Muraki 2011]; injured, missing, killed [Vieweg et al. 2010]; looking for missing people [Qu et al. 2011] infrastructure damage [Imran et al. 2013b]; collapsed structure [Caragea et al. 2011]; built environment [Vieweg et al. 2010]; closure and services [Hughes et al. 2014b] donation of money, goods, services [Imran et al. 2013b]; food/water shortage [Caragea et al. 2011]; donations or volunteering [Olteanu et al. 2014]; help requests, relief coor- dination [Qu et al. 2011]; relief, donations, resources [Hughes et al. 2014b]; help and fundraising [Bruns 2014] hospital/clinic service, water sanitation [Caragea et al. 2011]; help requests, reports about environment [Acar and Muraki 2011]; consequences [Olteanu et al. 2014] members of public [Metaxas and Mustafaraj 2013], victims, citizen reporters, eyewit- nesses [Diakopoulos et al. 2012; Olteanu et al. 2014; Bruns 2014] administration/government [Olteanu et al. 2014]; police and fire services [Hughes et al. 2014b]; government [Bruns 2014]; news organization and authorities [Metaxas and Mustafaraj 2013] non-government organizations [De Choudhury et al. 2012] news organizations and authorities, blogs [Metaxas and Mustafaraj 2013], journalists, media, bloggers [De Choudhury et al. 2012]; news organizations [Olteanu et al. 2014]; professional news reports [Leavitt and Clark 2014]; media [Bruns 2014] newsworthy topics, credibility [Castillo et al. 2013]; credible topics [Canini et al. 2011]; content credibility [Gupta and Kumaraguru 2012]; users and content credibility [Gupta et al. 2014]; source credibility [Thomson et al. 2012]; fake photos [Gupta et al. 2013] rumor [Hughes et al. 2014b; Castillo et al. 2013] posted before an actual event occurs, helpful for the preparedness phase of emergency management [Petak 1985]; pre-disaster, early information [Iyengar et al. 2011; Chowd- hury et al. 2013] posted during the impact phase of an event, helpful for the response phase of emer- gency management [Petak 1985]; during-disaster [Iyengar et al. 2011; Chowdhury et al. 2013] posted after the impact of an event, helpful during the recovery phase [Petak 1985]; post-disaster information [Chowdhury et al. 2013; Iyengar et al. 2011] information from ground zero (victims reports, bystanders) [De Longueville et al. 2009; Ao et al. 2014] information originating close to the affected areas [De Longueville et al. 2009] information coming from other parts of world, sympathizers [Kumar et al. 2013]; dis- tant witness (in the sense of [Carvin 2013]); not on the ground [Starbird et al. 2012]; location inference [Ikawa et al. 2012] A:22 Imran et al. ples is referred to as the training set. After a model has been learned from the training data, it is evaluated using a different, hold-out set of labeled items, not used during the training. This second set of examples is referred to as the testing set. Depending on the nature of data in hand, different pre-processing techniques can be used. In any case, the input items are transformed into feature vectors, following the methods described in Section 4.3. Training examples. The number of training examples required to achieve good accu- racy depends on many factors, including the number of categories into which messages have to be classified, and the variability of messages inside each category. Typical sizes of training sets range from a few hundred [Yin et al. 2012] to a few thousand [Imran et al. 2014a]. More examples yield better results in general, with diminishing results after a certain point. In general, the accuracy of models created using training data from one crisis decreases when applied to a different crisis, or when applied to the same crisis but at a different point in time [Imran et al. 2014b]. Feature selection. Even if messages are brief, the feature space in which they are represented is typically high dimensional (e.g. one dimension for every possible term). This introduces a number of problems including the amount of computational re- sources required for the data analysis, and it also increases the chances of over-fitting the training data. In this case, a feature selection method (e.g. mutual information) should be employed as a first step to discard input features that have little or no cor- relation with the given training labels. Feature selection is an active area of machine learning research and state of the art techniques can be found in modern textbooks or journals (e.g. Guyon and Elisseeff [2003]). Learning algorithms. After features have been extracted and selected, a machine learning algorithm can be applied. Supervised classification algorithms include, among others, naıve Bayes, Support Vector Machines (SVM), logistic regression, decision trees, and random forests. The choice of a method is largely dependent on the spe- cific problem setting. For instance, ESA [Yin et al. 2012; Power et al. 2014] uses naıve Bayes and SVM, EMERSE [Caragea et al. 2011] uses SVM, AIDR [Imran et al. 2014a] uses random forests, and Tweedr [Ashktorab et al. 2014] uses logistic regression. While in most cases algorithms are used to predict a single label for each element, adapta- tions of these algorithms that generate multiple labels for each element are sometimes employed (e.g. Caragea et al. [2011]). Ensemble/stacked classification. In some cases an explicit model of a certain fac- tor is desired, as exemplified by the work of Verma et al. [2011]. They observe that messages that contribute the most to situational awareness are also those that are ex- pressed using objective (as opposed to subjective) language. In this case, one can cre- ate a stacked classifier in which at one level certain characteristics of the message are modeled (e.g. by having a classifier that classifies messages as objective or subjective) and at the next level these characteristics are combined with other characteristics also modeled by specific classifiers (e.g. writing styles such as formal or informal), and with features from the message itself. Verma et al. [2011] find that this approach performs better than directly using the input features. Comparison in terms of classification effectiveness/accuracy is a non-trivial task. This is due to the use of different datasets, different baselines, and different perfor- mance measures (e.g. AUC, F1, precision). However, classification accuracies reported by most of the systems we have reviewed for this survey range from 0.60 to 0.90. Recent collections available for research may contribute to make systems easier to compare.21 21http://crisislex.org/ Social Media in Mass Emergency A:23 6.1.3. Unsupervised Classification. Clustering is an unsupervised machine learning method; a family of methods that seek to identify and explain important hidden pat- terns in unlabeled data. Unsupervised machine learning methods include clustering, dimensionality reduction (e.g. principal component analysis), and hidden Markov mod- els, among others. The process of performing clustering, begins by ingesting a set of items (e.g., docu- ments, tweets, images) which are then processed with the objective of grouping sim- ilar items together. In general, the goal is to form clusters in such a way that ele- ments within a cluster are more similar to each other than to the elements that belong to other clusters. Many clustering algorithms have been developed based on differ- ent approaches, examples include K-means (centroid-based), hierarchical clustering (connectivity-based), DBSCAN (density-based), among many others. For an overview of clustering methods, see Zaki and Meira [2014, Part III]. In the context of dealing with social media data during crises, clustering can help reduce the number of social media messages that need to be processed/examined by hu- mans, for instance by displaying multiple equivalent messages as a single item instead of multiple ones. This is the approach used by CrisisTracker [Rogstadius et al. 2013], which is a crowdsourced social media curation system for disaster awareness. The system, which collects data from Twitter based on predefined filters (i.e., keywords, bounding box), groups these tweets into stories, which are clusters of tweets. These stories are then curated/classified by humans, whose effort can be greatly reduced if they are asked to classify entire clusters instead of single tweets. The specific cluster- ing method employed in this case is locality-sensitive hashing, an efficient probabilistic technique that uses hash functions to detect near-duplicates in data. Another exam- ple is SaferCity [Berlingerio et al. 2013], which identifies and analyzes incidents re- lated to public safety in Twitter, adopting a spatio-temporal clustering approach based on the modularity maximization method presented in Blondel et al. [2008] for event identification. Clusters are then classified using a semantic labeling approach using a controlled vocabulary and based on a rank score provided by the Lucene library.22 In addition to clustering methods that partition the items into groups, there are soft clustering methods that allow an item to simultaneously belong to several clusters with varying degrees. This is the case of topic modeling methods, out of which Latent Dirichlet Allocation (LDA) is one of the most popular. In the crisis domain, Kireyev et al. [2009] use topics extracted using LDA, including a weighting scheme that ac- counts for the document frequency (number of tweets containing a word) of the words in the tweet, as well as for the length of the tweet. When applied to data from an Earthquake in Indonesia in 2009, it detects topics that cover different aspects of the crisis such as { tsunami, disaster, relief, earthquake }, { dead, bodies, missing, victims } and { aid, help, money, relief }. There is free software available for creating these topics models, such as MALLET [McCallum 2002], which has been applied to crisis data by Karandikar [2010]. 6.1.4. Discussion. In the context of social media data analysis, many factors influence the choice of a learning approach (i.e. supervised vs. unsupervised). For instance, ap- proaches based on unsupervised learning certainly have advantages over supervised ones in cases where obtaining training examples would be prohibitively costly, would introduce an unacceptable delay or would simply not be possible. Unsupervised ap- proaches are more useful in cases where information classes are completely unknown from a information seeker point of view. 22http://lucene.apache.org/ A:24 Imran et al. However, in terms of usefulness, the output of an unsupervised approach might be considered less useful than an approach based on supervised learning. Emergency re- sponders may be used to specific categorizations and methodologies (e.g. the MIRA framework used by the United Nations23) and may expect that software tools output the same categories. 6.2. Sub-Document Analysis In contrast to text classification schemes which make predictions about data items, sub-document analysis techniques extract granular information from the content of the data items. In this section we present two important sub-document analysis methods in the context of crisis situations: information extraction and text summarization. 6.2.1. Information Extraction. The task of automatically extracting structured informa- tion from unstructured (e.g., plain text documents) or semi-structured (e.g., web pages) data is known as Information Extraction (IE). The most common information extrac- tion task is named entity extraction, which consists of detecting regions of a text refer- ring to people, organizations, or locations [Liu et al. 2011; Ritter et al. 2011]. This is the first step towards semantic enrichment (see Section 7.1). In the context of crisis-related social media, information extraction can be used, for instance, to transform tweets reporting injured people in natural language (e.g. “5 injured and 10 dead in Antofagasta”) to normalized records such as {<people- affected=5, report-type=injury, location=Antofagasta, Chile>, <people-affected=10, report-type=fatal-casualty, location=Antofagasta, Chile>}. These records are machine- readable, which means they can be easily filtered, sorted, or aggregated. Information extraction from social media is a challenging task because of the infor- mal writing style and the presence of many ungrammatical sentences, as was noted in Section 4.6. State-of-the-art approaches to information extraction involve the use of probabilistic sequential models such as hidden Markov models, conditional Markov models, maximum-entropy Markov models, or conditional random fields. Heuristics based on regular expressions can also be applied to this problem, although these are in general less effective than probabilistic methods. Varga et al. [2013] use linguistic patterns and supervised learning to find “trouble expressions” in social media messages. For instance, in a tweet such as “My friend said infant formula is sold out. If somebody knows shops in Sendai-city where they still have it in stock, please let us know,” the nucleus of the problem is the sentence “infant formula is sold out.” This extraction is then used to match tweets describing problems to tweets describing solutions to those problems. Imran et al. [2013a; 2013b] apply conditional random fields to the extraction of in- formation from tweets. Their method proceeds in two steps. First, tweets are classified to consider categories such as “infrastructure damage,” “donations,” and “caution and advice.” Then, a category-dependent extraction is done, where for instance for “infras- tructure damage” tweets, the specific infrastructure reported damaged is extracted, while for “donations” tweets, the item being offered in donation is extracted. 6.2.2. Summarization. Another approach to dealing with information overload involves presenting users with a text-based representation of the evolving event. Text summa- rization refers to the generation of a text summary of a document or set of documents [Nenkova and McKeown 2011]. Text summarization systems are optimized to gener- ate a text summary that contain only the core topics discussed in the set of documents. Most systems produce this summary by extracting key sentences from the input docu- 23https://docs.unocha.org/sites/dms/Documents/mira final version2012.pdf (accessed Nov. 2014). Social Media in Mass Emergency A:25 Table IV: Example summary from the TREC 2013 Temporal Summarization Track. Updates reflect new or updated information as it is reported. time Nov 21, 2012 10:52 Nov 22, 2012 20:49 Nov 26, 2012 04:33 Nov 26, 2012 14:49 Nov 29, 2012 04:55 Nov 30, 2012 05:22 Nov 30, 2012 06:47 update Tel Aviv bus bombing; 13 injuries; reported on bus line 142; occured on Shaul Hamelech street; No claims of responsibility; 3 badly hurt; occured in the heart of Tel Aviv near military hdqtrs occurred in an area with many office buildings; occured in area with heavy pedestrian traf- fic; first notable bombing in Tel Aviv since 2006; At least 28 people were wounded; Hamas’ television featured people praising the attack; Khaled Mashal, leader of Hamas, categorically rejected any connection of the bombing to his group; ... an Israeli Arab man was arrested on charges of planting the explosive device on the bus; Sus- pect was reportedly connected to Hamas; Suspect was reportedly connected to the Islamic Ji- had The Romanian Foreign Minister condemned the bombing, govt rep refers to attack as terrorist attack Fears about Bus Bomb Before the Cease-Fire: Could derail peace talks The suspect remotely detonated the explosive device; suspect hid device in advance on the bus; The explosive device contained a large quantity of metal shrapnel designed to cause maximum casualties; The suspect later on confessed to carrying out the bus attack; suspect prepared the explosive device; suspect chose the target of the attack; ... ment. This is in contrast to systems that produce a summary by abstracting or gener- ating new sentences. During crisis events, text summarization must be done in an incremental and tem- poral manner. Incremental text summarization, also known as update summarization, refers to generating a summary given: (1) the set of documents to be summarized, and (2) a reference set of documents which the user has read. The objective for the sys- tem is to produce a summary only of data the user has not already read [Dang and Owczarzak 2008]. Temporal text summarization refers to creating an extractive sum- mary from a set of time-stamped documents, usually in retrospect [Allan et al. 2001; Nallapati et al. 2004; Feng and Allan 2009]. Drawing on the work from summarization research, the TREC Temporal Summa- rization track focuses on generating updates relating to unfolding crisis events imme- diately after their occurrence [Aslam et al. 2013]. Table IV presents an example of this type of summary. The focus of this initiative is to first define standardized metrics for the task and then to encourage the development of systems optimizing them. These metrics include time-sensitive versions of precision and recall, ensuring that systems are penalized for latency: delivering information about an event long after it occurred. In addition, the metrics include a redundancy penalty to prevent systems from de- livering repetitive information. In order to optimize these metrics, systems can use staged text analysis with standard information retrieval measures [McCreadie et al. 2013]. Alternatively, systems can use regression-based combinations of features from classic text summarization literature [Guo et al. 2013; Xu et al. 2013]. Other methods are purely content-based, hierarchically clustering sentence text [Wang and Li 2010]. In the context of social media, Shou et al. [2013] propose a system for online update summarization based on incremental clustering. The performance is evaluated under experimental conditions different from the TREC track, making it difficult to compare with other results. Although algorithms for summarization exist for crisis events, their development is still preliminary and several challenges remain. Foremost, the relative importance of different features is not well understood. To date, research has primarily used features from batch text summarization. A second challenge is scale. Many algorithms require aggressive inter-sentence similarity computation, a procedure which scales poorly. A:26 Imran et al. 6.3. Challenges In addition to the discussion on generic data-related challenges in Section 4.6, the following are particularly relevant to mining: Combining manual and automatic labeling. In a supervised learning setting, hu- man labels are necessary, but they may be costly to obtain. This is particularly prob- lematic in crises that attract a multilingual population, or for tasks that require do- main knowledge (e.g. people who know informal, local place names in Haiti, and who speak Haitian Creole). Labeled data are not always reliable, and may not be available at the time of the disaster; in this case, a hybrid approach that mixes human labeling and automatic labeling can be employed [Imran et al. 2013c]. The selection of items to be labeled by humans can be done using active learning, a series of methods to maximize the improvement in classification accuracy as new labels are received. Domain adaptation. Ideally, one would like to avoid having to re-train an automatic classifier every time a new crisis occurs. However, simply re-using an existing clas- sifier trained on data from a previous crisis does not perform well in practice, as it yields a substantial loss in accuracy, even when the two crises have several elements in common [Imran et al. 2013a]. In machine learning, domain adaptation (or domain transfer) is a series of methods designed to maximize the accuracy of a classifier trained on one dataset, adapting it to continue to perform well on a dataset with different characteristics. To the best of our knowledge, these methods have not been applied to crisis-related social media data. 7. SEMANTIC TECHNOLOGIES IN DISASTER RESPONSE One of the main goals of semantic technologies is to allow users to easily search through complex information spaces, and to find, navigate, and combine information. In the context of social media use during crises and mass convergence events, this is achieved by linking data elements to concepts in a machine-readable way, enabling the representation of a situation as a complex and interrelated set of elements. 7.1. Semantic Enrichment of Social Media Content Semantic technologies are particularly useful in social media, because they provide a powerful method for dealing with the variety of expressions that can be used to refer to the same concept, and with the many relationships that can exist between concepts. For instance, suppose we are looking for messages related to infrastructure damage using a keyword-query search. We would think that searching for something such as “damage AND (airport OR port OR bridge OR building ...)” would be sufficient, until we notice that it is not only difficult to cover every particular type of infrastructure (airport, port, bridge, building, etc.) but also to cover every particular instance of that type (for instance, there are tens of thousands of airports in the world). Named entity linking is a widely-used semantic technology that deals with the above problem. It operates in two phases. First, a named entity recognizer module detects entities—such as names of persons, places, and organizations. Second, for each named entity that is found, a concept is located that more closely matches the meaning of that named entity in that context. Concepts are generally operationalized as Uniform Resource Locators (URLs). For instance, Zhou et al. [2010] link named entities to the URLs of articles on Wikipedia. In a phrase such as “Terminal 2 of JFK was dam- aged,” the named entity corresponding to the segment “JFK” would be linked to the URL https://en.wikipedia.org/wiki/John F. Kennedy International Airport. There are Social Media in Mass Emergency A:27 several free, and commercial services that can be used to perform named entity link- ing, including Alchemy,24 Open Calais,25 and Zemanta.26 Once an element is linked to a concept, further automatic annotation can be done by following links from the concept. Returning to our example of “Terminal 2 of JFK was damaged,” if we go to its Wikipedia page,27 we can learn that “JFK” is an instance of the class “airport.” The airport concept is represented in this case by the URL of a Wikipedia category page to which the JFK Airport page belongs (https://en.wikipedia.org/wiki/Category:Airports), which in turn belongs to the cat- egory of transport building and structures (https://en.wikipedia.org/wiki/Category: Transport buildings and structures). After named entity linking, messages that have been semantically enriched can be used to provide faceted search, a popular approach to interactively search through complex information spaces. In faceted search the information of interest can be found not only by specifying a related keyword, but also by specifying a concept or concepts associated with the items of interest. In the example, we could select “airport” from a list of buildings and structures and then find a series of social media messages that are relevant, but that do not necessarily include the specific word “airport” in them. Abel et al. [2011], present an adaptive faceted search framework to find relevant messages on Twitter. The framework enriches tweets with semantics by extracting entities (i.e. persons, locations, organization), and then finding and linking those en- tities with external resources to create facets. Each facet enables search and navi- gation of relevant semantically related content. In follow-up work [Abel et al. 2012], they introduce Twitcident, a system that supports semantic filtering, faceted search and summarization of tweets. The semantic-based approach is also implemented in Twitris 2.0 [Jadhav et al. 2010] and EDIT [Traverso et al. 2014], which present event- related social media capturing semantics in terms of spatial, temporal, and thematic dimensions. 7.2. Ontologies for Disaster Management Information technologies to support disaster response often involve interactions be- tween software operated by different agencies, and/or provided by different developers or vendors. Allowing computer systems to communicate information in a unified way is a key challenge in general, but especially during crisis events where different agencies must address different dimensions of a problem in coordination with each other [Hiltz et al. 2011]. Interoperability at the semantic level requires centralized specifications describing machine-understandable common vocabularies of concepts and linkages be- tween them. An effective way of achieving this is to use machine-understandable on- tologies that define, categorize and maintain relationships between different concepts to facilitate common understanding, and unified communication. Table V lists some of the ontologies that have been introduced in recent years. Some examples from this table: — The Humanitarian eXchange Language (HXL)28 is an ontology created in 2011 and 2012 and is currently under review; it describes 49 classes and 37 properties. The focus of HXL is mainly on four areas: organization (i.e., formal response agencies like military, charities, NGOs), disaster (i.e., classification of disasters such as nat- 24http://www.alchemyapi.com/ 25http://www.opencalais.com/ 26http://developer.zemanta.com/ 27Or to its related semantic resource, DBPedia http://dbpedia.org/. 28http://hxl.humanitarianresponse.info/ A:28 Imran et al. Table V: Crisis ontologies, including some of the classes and attributes they cover, and the format in which they are specified (OWL: Ontology Web Language, RDF: Resource Description Framework). Coverage Format Reference Ontology Name SOKNOS HXL SIADEX OTN MOAC FOAF AktiveSA IntelLEO ISyCri WB-OS resources, damage, disasters damage, geography, organization, disasters processes, resources, geography specific to infrastructure damage, disasters, processes, resources emergency management people transportation, meteorology, processes, resources, people OWL [Smart et al. 2007] response organizations damages, processes, disasters features, components and information to build crisis management web sites OWL [Babitski et al. 2011] RDF RDF OWL [Lorenz et al. 2005] RDF RDF RDF http://www.intelleo.eu/ OWL [B´enaben et al. 2008] XML [Chou et al. 2011] http://hxl.humanitarianresponse.info/ [de la Asunci´on et al. 2005] http://observedchange.com/moac/ns/ http://www.foaf-project.org/ EDXL-RM data exchange language for resource management XML https://www.oasis-open.org/ ural, man-made), geography (i.e., event location, geo-location of displaced people), and damage (i.e., damages related to humans, infrastructure). — Management of A Crisis (MOAC)29 is an ontology with 92 classes and 21 proper- ties covering four areas: disaster, damage, processes (i.e., rescue, search, evacuation processes), and resources (i.e., services, vehicles, tents). HXL and MOAC have el- ements in common: in both cases the objective is to describe different aspects of a crisis, including its effects, the needs of those affected, and the response to the crisis. — Integrated Data for Events Analysis (IDEA)30 is a framework for coding social, eco- nomic and political events. It is used in the Global Database of Events, Language and Tone (GDELT),31 which is a machine-generated list of event data extracted from news reports. — Service-orientierte ArchiteKturen zur Unterst utzung von Netzwerken im Rahmen Oeffentlicher Sicherheit (“Service-oriented architectures supporting networks of public security,” SOKNOS)32 is an ontology for information integration for resource planning, including damage and resource categorization during disasters. To support communication among different ontology-based systems, the problem of ontology heterogeneity needs to be solved by performing an ontology mapping, which is the process of mapping the concepts of two ontologies from the same or from overlap- ping domains. Many approaches have been proposed to perform ontology mapping. For instance, Tang et al. [2006] treated this as a decision-making problem and proposed an approach based on Bayesian decision theory. For a survey on ontology mapping techniques, see Noy [2004]. The ontologies in Table V are crisis-specific, but not social-media specific. However, they can be combined with ontologies describing social media concepts such as users, tagging, sharing, and linking. For instance, the “Semantically Interlinked Online Com- munities” (SIOC)33 ontology, originally developed to model sites such as blogs and online forums, has recently been extended to support the modeling of microblogs by adding concepts such as follower or follows. An ontology specific to Twitter appears in Celino et al. [2011] and includes user sentiments and locations, while Passant and 29http://observedchange.com/moac/ns/ 30http://vranet.com/IDEA.aspx 31http://gdeltproject.org/ 32http://soknos.de/ 33http://sioc-project.org/ Social Media in Mass Emergency A:29 Laublet [2008] enables semantic tagging of social media data through an ontology called Meaning-Of-A-Tag (MOAT). For a survey on ontologies developed for social me- dia, see Bontcheva and Rout [2012]. 8. SUMMARY AND FUTURE RESEARCH DIRECTIONS In a relatively short time period—roughly 4 to 6 years—the research community work- ing on the topics we have covered here has achieved a fairly high degree of maturity with respect to filtering, classifying, processing, and aggregating social media data during crises. However, the underlying (although sometimes explicitly stated) claim behind this line of work, i.e. that this research is useful for the public and/or formal response agencies, that it has the potential to save lives and/or property during an emergency, remains to be seen. While there are notable exceptions including the American Red Cross, the US Federal Emergency Management Agency, UN Office for the Coordination of Humanitarian Affairs and the Filipino Government, among others, the use of social media is still experimental for many organizations and not yet part of their normal, day-to-day operations. There are two main directions in which we see future research going. First, continue deepening the data processing capabilities that have been the main focus of comput- ing research on this topic thus far. Second, engage more deeply with human-centered approaches toward making the computing research the foundation of viable systems that emergency responders can implement. 8.1. Deepening Data Processing Capabilities From situational awareness to decision support. The systems we described in Section 3 for processing social media during disasters have a strong focus on situa- tional awareness, which is an important first step but might not be enough for emer- gency management. During an emergency, social media is used as an information source in order to make decisions. Therefore, next-generation systems should be de- signed and evaluated in terms of their decision-support capabilities. This might even include forecasting using signals from social media. Extending to other types of media. Data from various sources should be pro- cessed and integrated: “The strategies of emergency services organizations must also recognize the significant interweaving of social and other online media with conven- tional broadcast and print media.” [Bruns 2014]. There are some examples of the pro- cessing of other types of information items during crises, including short messages (SMS) [Melville et al. 2013], news articles in traditional news media and blogs [Lee- taru and Schrodt 2013], and images [Abel et al. 2012]. Verifying information. Systems that receive user-generated content are always ex- posed to abuse, which can be countered by a mixture of automatic and manual meth- ods. For instance, algorithms to detect false product reviews are deployed by most ma- jor online retailers [Liu 2012, Chapter 10]. In the crisis domain, determining the cred- ibility of information posted on social media is a major concern for those who process information (e.g. computer scientists, and software engineers), and for the informa- tion consumers (e.g. the public and formal response organizations) [Hiltz et al. 2011; Hughes et al. 2014a]. Automatic classification can be used to filter out content that is unlikely to be con- sidered credible [Gupta and Kumaraguru 2012; Castillo et al. 2013], or to annotate messages seen by users with credibility scores automatically [Gupta et al. 2014]. Ad- ditionally, the public itself can be mobilized to confirm or discredit a claim through crowdsourcing [Popoola et al. 2013]. A:30 Imran et al. 8.2. Beyond Data Processing Designing with the users. Considering the number of systems that have been de- signed and built so far, there is little research on how usable and useful are those systems (with some exceptions, e.g. [Robinson et al. 2013b; Tucker et al. 2012]). How should information be presented to users? How should users interact with it? The key to answering these question lies with the users themselves, who should be brought into the process of designing the systems, dashboards, and/or visualizations they require to serve their needs. A highly regarded methodology for achieving this is participatory design [Hughes 2014]. Helping governments and NGOs communicate with the public. Three days be- fore Typhoon Pablo made its landfall in the Philippines in 2012, government officials were already calling users to use the hashtag “#pabloph” for updates about the ty- phoon. An effective use of hashtags has also been encouraged by the United Nations Office for the Coordination of Humanitarian Affairs [UN OCHA 2014]. Computational methods can be used not only to help formal response agencies choose which hashtags to use, but more generally, to help them design and evaluate effective communication strategies in social media (see Veil et al. [2011] regarding best practices for crisis com- munications using social media). The conversation between the public and formal organizations can also be conducted through platforms that, instead of passively waiting for people to post information, ask them directly to answer certain questions that are relevance for the emergency response or relief operations [Ludwig et al. 2015]. Social media for coordinating actions. The final output of the processing of social media messages is not limited to the presentation of information in a given format. Computational methods can be applied to augment the information in a number of ways. For instance, Varga et al. [2013] match problem-tweets (“infant formula is sold out in Sendai”) to solution-tweets (“Jusco supermarket is selling infant formula”), and Purohit et al. [2013] match tweets describing urgent need of resources (“we are coor- dinating a clothing drive for families affected”) with tweets describing the intention to donate them (“I’ve a bunch of clothes I want to donate”). We regard these efforts as preliminary results towards the ability to use social media as a mechanism for coordi- nation of action in future emergency situations. A recent special issue of the Journal on Computer Supported Collaborative Work explores various ways in which computing can support collaboration and coordination during an emergency [Pipek et al. 2014]. Acknowledgments. We are thankful to Jakob Rogstadius and Per Aarvik who pointed us to historical information. We would like to thank our collaborators and co-authors Patrick Meier, Alexandra Olteanu, and Hemant Purohit. REFERENCES Fabian Abel, Ilknur Celik, Geert-Jan Houben, and Patrick Siehndel. 2011. Leveraging the semantics of tweets for adaptive faceted search on twitter. In The Semantic Web. Springer, 1–17. Fabian Abel, Claudia Hauff, Geert-Jan Houben, Richard Stronkman, and Ke Tao. 2012. Semantics + filtering + search = Twitcident. Exploring information in social web streams. In Proc. of Hypertext. 285–294. Adam Acar and Yuya Muraki. 2011. Twitter for crisis communication: lessons learned from Japan’s tsunami disaster. International Journal of Web Based Communities 7, 3 (2011), 392–402. James Allan. 2002. Topic detection and tracking: event-based information organization. Springer. James Allan, Rahul Gupta, and Vikas Khandelwal. 2001. Temporal summaries of new topics. In Proc. of SIGIR. ACM, 10–18. Albert Angel, Nick Koudas, Nikos Sarkas, and Divesh Srivastava. 2009. What’s on the grapevine?. In Proc. of SIGMOD. ACM, 1047–1050. Ji Ao, Peng Zhang, and Yanan Cao. 2014. Estimating the Locations of Emergency Events from Twitter Streams. Procedia Computer Science 31 (2014), 731–739. Social Media in Mass Emergency A:31 Eiji Aramaki, Sachiko Maskawa, and Mizuki Morita. 2011. Twitter catches the flu: detecting influenza epi- demics using Twitter. In Proc. of EMNLP. Association for Computational Linguistics, 1568–1576. Zahra Ashktorab, Christopher Brown, Manojit Nandi, and Aron Culotta. 2014. Tweedr: Mining Twitter to inform disaster response. In Proc. of ISCRAM. Javed A. Aslam, Fernando Diaz, Matthew Ekstrand-Abueg, Virgil Pavlu, and Tetsuya Sakai. 2013. TREC 2013 Temporal Summarization. In Proc. of TREC. Marco Avvenuti, Stefano Cresci, Andrea Marchetti, Carlo Meletti, and Maurizio Tesconi. 2014. EARS (earth- quake alert and report system): a real time decision support system for earthquake crisis management. In Proc. of KDD. ACM, 1749–1758. Grigori Babitski, Simon Bergweiler, Olaf Grebner, Daniel Oberle, Heiko Paulheim, and Florian Probst. 2011. SoKNOS–Using Semantic Technologies in Disaster Management Software. In The Semanic Web: Research and Applications. Springer, 183–197. Ricardo Baeza-Yates and Berthier Ribeiro-Neto. 2011. Modern Information Retrieval: The Concepts and Technology behind Search (2 ed.). Addison-Wesley Professional. N. S. Baron. 2003. Language of the Internet. In The Stanford handbook for language engineers, A. Farghali (Ed.). CSLI publications, Stanford, CA, USA, 59–127. Hila Becker, Mor Naaman, and Luis Gravano. 2011. Beyond Trending Topics: Real-World Event Identifica- tion on Twitter. Proc. of ICWSM (2011), 438–441. Fr´ed´erick B´enaben, Chihab Hanachi, Matthieu Lauras, Pierre Couget, and Vincent Chapurlat. 2008. A metamodel and its ontology to guide crisis characterization and its collaborative management. In Proc. of ISCRAM. Fabrıcio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgılio Almeida. 2010. Detecting spammers on twitter. In Proc. of CEAS, Vol. 6. 12. Michele Berlingerio, Calabrese Francesco, Lorenzo Giusy, Di, Dong Xiaowen, Gkoufas Yiannis, and Dim- itrios Mavroeidis. 2013. SaferCity: A System for Detecting and Analyzing Incidents from Social Media. In Proc. of ICDMW. 1077–1080. Deanne Bird, Megan Ling, and Katharine Haynes. 2012. Flooding Facebook-the use of social media during the Queensland and Victorian floods. The Australian Journal of Emergency Management 27, 1 (2012). Justine I Blanford, Jase Bernhardt, Alexander Savelyev, Gabrielle Wong-Parodi, Andrew M Carleton, David W Titley, and Alan M MacEachren. 2014. Tweeting and Tornadoes. In Proc. of ISCRAM. Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment 10 (2008). Kalina Bontcheva and Dominic Rout. 2012. Making sense of social media streams through semantics: a survey. Semantic Web (2012). Thorsten Brants, Francine Chen, and Ayman Farahat. 2003. A system for new event detection. In Proc. of SIGIR. ACM, 330–337. Sean Brennan, Adam Sadilek, and Henry Kautz. 2013. Towards understanding global spread of disease from everyday interpersonal interactions. In Proc. of IJCAI. AAAI Press, 2783–2789. Axel Bruns. 2014. Crisis Communication. The Media and Communications in Australia (2014), 351–355. Scott H Burton, Kesler W Tanner, Christophe G Giraud-Carrier, Joshua H West, and Michael D Barnes. 2012. ”Right Time, Right Place” Health Communication on Twitter: Value and Accuracy of Location Information. Journal of Medical Internet Research 14, 6 (Nov-Dec 2012), e156. Kevin Robert Canini, Bongwon Suh, and Peter L Pirolli. 2011. Finding credible information sources in social networks based on content and social structure. In Proc. of PASSAT. IEEE, 1–8. Cornelia Caragea, Nathan McNeese, Anuj Jaiswal, Greg Traylor, H Kim, Prasenjit Mitra, Dinghao Wu, A Tapia, Lee Giles, Bernard J Jansen, and others. 2011. Classifying text messages for the Haiti earth- quake. In Proc. of ISCRAM. Andy Carvin. 2013. Distant Witness. CUNY Journalism Press. Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2013. Predicting information credibility in time- sensitive social media. Internet Research 23, 5 (2013), 560–588. Irene Celino, Daniele Dell’Aglio, Emanuele Della Valle, Yi Huang, Tony Kyung-il Lee, Stanley Park, and Volker Tresp. 2011. Making Sense of Location-based Micro-posts Using Stream Reasoning. In Proc. of MSM. 13–18. Ling Chen and Abhishek Roy. 2009. Event detection from flickr data through wavelet-based spatial analysis. In Proc. of CIKM. ACM, 523–532. Wei Chen, Laks V.S. Lakshmanan, and Carlos Castillo. 2013. Information and Influence Propagation in Social Networks. Synthesis Lectures on Data Management 5, 4 (2013), 1–177. A:32 Imran et al. Zhiyuan Cheng, James Caverlee, and Kyumin Lee. 2010. You Are Where You Tweet: A Content- based Approach to Geo-locating Twitter Users. In Proc. of IKM (CIKM ’10). ACM, 759–768. DOI:http://dx.doi.org/10.1145/1871437.1871535 Chen-Huei Chou, Fatemeh Zahedi, and Huimin Zhao. 2011. Ontology for developing Web sites for natu- ral disaster management: methodology and implementation. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 41, 1 (2011), 50–62. Soudip Roy Chowdhury, Muhammad Imran, Muhammad Rizwan Asghar, Sihem Amer-Yahia, and Carlos Castillo. 2013. Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages. In Proc. of ISCRAM. Camille Cobb, Ted McCarthy, Annuska Perkins, Ankitha Bharadwaj, Jared Comis, Brian Do, and Kate Starbird. 2014. Designing for the Deluge: Understanding & Supporting the Distributed, Collaborative Work of Crisis Volunteers. In Proc. of CSCW. Courtney D Corley, Chase Dowling, Stuart J Rose, and Taylor McKenzie. 2013. SociAL Sensor Analytics: Measuring phenomenology at scale. In Proc. of ISI. IEEE, 61–66. Riley Crane and Didier Sornette. 2008. Robust dynamic classes revealed by measuring the response function of a social system. PNAS 105, 41 (2008), 15649–15653. H.T. Dang and K. Owczarzak. 2008. Overview of the TAC 2008 Update Summarization Task. In Proc. of TAC. Munmun De Choudhury, Nicholas Diakopoulos, and Mor Naaman. 2012. Unfolding the Event Landscape on Twitter: Classification and Exploration of User Categories. In Proc. of CSCW. Marc de la Asunci´on, Luis Castillo, Juan Fdez-Olivares, ´Oscar Garc´ıa-P´erez, Antonio Gonz´alez, and Fran- cisco Palao. 2005. SIADEX: An interactive knowledge-based planner for decision support in forest fire fighting. AI Communications 18, 4 (2005), 257–268. Bertrand De Longueville, Robin S Smith, and Gianluca Luraschi. 2009. OMG, from here, I can see the flames!: a use case of mining location based social networks to acquire spatio-temporal data on forest fires. In Proc. of LBSN. ACM, 73–80. Nicholas Diakopoulos, Munmun De Choudhury, and Mor Naaman. 2012. Finding and assessing social media information sources in the context of journalism. In Proc. of CHI. Wenwen Dou, Xiaoyu Wang, Drew Skau, William Ribarsky, and Michelle X Zhou. 2012. Leadline: Interactive visual analysis of text data through event identification and exploration. In Proc. of VAST. IEEE, 93– 102. Russell R. Dynes. 1970. Organized Behavior in Disaster. Heath LexingtonBooks. Russell R. Dynes. 1994. Community emergency planning: False assumptions and inappropriate analogies. (1994). Paul S Earle, Daniel C Bowden, and Michelle Guy. 2012. Twitter earthquake detection: earthquake moni- toring in a social world. Annals of Geophysics 54, 6 (2012). Mica R Endsley. 1995. Toward a theory of situation awareness in dynamic systems. Human Factors: The Journal of the Human Factors and Ergonomics Society 37, 1 (1995), 32–64. Ao Feng and James Allan. 2009. Incident Threading for News Passages. In Proc. of CIKM. ACM, 1307–1316. Julia D. Fraustino, Brooke Liu, and Yan Jin. 2012. Social Media Use during Disasters: A Review of the Knowledge Base and Gaps (Final Report, START). Technical Report. Human Factors/Behavioral Sci- ences Division, Science and Technology Directorate, U.S. Department of Homeland Security. Therese Friberg, Stephan Prodel, and Rainer Koch. 2011. Information quality criteria and their importance for experts in crisis situations. In Proc. of ISCRAM. 145–149. Liang Gao, Chaoming Song, Ziyou Gao, Albert-Laszlo Barabasi, James P. Bagrow, and Dashun Wang. 2014. Quantifying Information Flow During Emergencies. 4 (2014). Judith Gelernter and Nikolai Mushegian. 2011. Geo-parsing Messages from Microtext. Transactions in GIS 15, 6 (2011), 753–773. Daniel Gilman and Leith Baker. 2011. Humanitarianism in the Age of Cyber-warfare: Towards the Princi- pled and Secure Use of Information in Humanitarian Emergencies. Technical Report. United Nations Office for the Coordination of Humanitarian Affairs. GlobalWebIndex. 2013. Stream Social Survey 2013 Q2. (9 2013). Mark Graham, Scott A. Hale, and Devin Gaffney. 2014. Where in the World Are You? Geolocation and Language Identification in Twitter. The Professional Geographer 66, 4 (2014), 568–578. Qi Guo, Fernando Diaz, and Elad Yom-Tov. 2013. Updating Users about Time Critical Events. In Advances in Information Retrieval. Springer Berlin Heidelberg, 483–494. Social Media in Mass Emergency A:33 Aditi Gupta and Ponnurangam Kumaraguru. 2012. Credibility ranking of tweets during high impact events. In Proc. of PSOSM. ACM, 2. Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. TweetCred: Real-Time Credibility Assessment of Content on Twitter. In Proc. of SocInfo. Springer, 228–243. Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking Sandy: charac- terizing and identifying fake images on Twitter during Hurricane Sandy. In Proc. of WWW (companion). IW3C2, 729–736. Isabelle Guyon and Andr´e Elisseeff. 2003. Special issue on variable and feature selection. Journal of Ma- chine Learning Research 3 (March 2003). Harvard Humanitarian Initiative. 2011. Disaster Relief 2.0 Report: The Future of Information Sharing in Humanitarian Emergencies. Washington, DC and Berkshire, UK. Starr Roxanne Hiltz, Paloma Diaz, and Gloria Mark. 2011. Introduction: Social media and collaborative sys- tems for crisis management. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 4 (2011). Sounman Hong and Daniel Nadler. 2011. Does the early bird move the polls?: the use of the social media tool’Twitter’by US politicians and its impact on public opinion. In Proc. of DGR. ACM, 182–186. Ting Hua, Feng Chen, Liang Zhao, Chang-Tien Lu, and Naren Ramakrishnan. 2013. STED: semi-supervised targeted-interest event detectionin in twitter. In Proc. of KDD. ACM, 1466–1469. Amanda L. Hughes. 2012. Supporting the Social Media Needs of Emergency Public Information Officers with Human-Centered Design and Development. Ph.D. Dissertation. University of Colorado at Boulder. Amanda L. Hughes. 2014. Participatory Design for the Social Media Needs of Emergency Public Information Officers. In Proc. of ISCRAM. Amanda L. Hughes and Leysia Palen. 2009. Twitter adoption and use in mass convergence and emergency events. Int. Journal of Emergency Management 6, 3 (2009), 248–260. Amanda L. Hughes and Leysia Palen. 2012. The evolving role of the public information officer: An exami- nation of social media in emergency management. Journal of Homeland Security and Emergency Man- agement (2012), 1–20. Amanda L. Hughes, Steve Peterson, and Leysia Palen. 2014a. Social Media in Emergency Management. In Issues in Disaster Science and Management: A Critical Dialogue Between Scientists and Emergency Managers. FEMA in Higher Education Program. Amanda L. Hughes, Lise A. St. Denis, Leysia Palen, and Kenneth Anderson. 2014b. Online Public Commu- nications by Police & Fire Services During the 2012 Hurricane Sandy. In Proc. of CHI. ICRC. 2013. Professional Standards for Protection Work Carried out by Humanitarian and Human Rights Actors in Armed Conflict and Other Situations of Violence. Technical Report. International Committee of the Red Cross. Yohei Ikawa, Miki Enoki, and Michiaki Tatsubori. 2012. Location inference using microblog messages. In Proc. of WWW. ACM, 687–690. Yohei Ikawa, Maja Vukovic, Jakob Rogstadius, and Akiko Murakami. 2013. Location-Based Insights from the Social Web. In Proc. of SWDM. IW3C2. Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, and Sarah Vieweg. 2014a. AIDR: Artificial intelligence for disaster response. In Proc. of WWW (companion). IW3C2, 159–162. Muhammad Imran, Carlos Castillo, Ji Lucas, M Patrick, and Jakob Rogstadius. 2014b. Coordinating human and machine intelligence to classify microblog communications in crises. Proc. of ISCRAM (2014). Muhammad Imran, Shady Elbassuoni, Carlos Castillo, Fernando Diaz, and Patrick Meier. 2013a. Practical extraction of disaster-relevant information from social media. In Proc. of WWW (Companion). 1021– 1024. Muhammad Imran, Shady Mamoon Elbassuoni, Carlos Castillo, Fernando Diaz, and Patrick Meier. 2013b. Extracting information nuggets from disaster-related messages in social media. In Proc. of ISCRAM. Muhammad Imran, Ioanna Lykourentzou, and Carlos Castillo. 2013c. Engineering Crowdsourced Stream Processing Systems. CoRR abs/1310.5463 (2013). Akshaya Iyengar, Tim Finin, and Anupam Joshi. 2011. Content-based prediction of temporal boundaries for events in Twitter. In Proc. of PASSAT. IEEE, 186–191. Ashutosh Jadhav, Hemant Purohit, Pavan Kapanipathi, Pramod Ananthram, Ajith Ranabahu, Vinh Nguyen, Pablo N Mendes, Alan Gary Smith, and Amit Sheth. 2010. A.: Twitris 2.0: Semantically em- powered system for understanding perceptions from social data. In Proc. of SWC. Murray E Jennex. 2012. Social Media–Truly Viable For Crisis Response. Proc. of ISCRAM (2012), 1–5. Anand Karandikar. 2010. Clustering short status messages: A topic model based approach. Master’s thesis. University of Maryland. A:34 Imran et al. Arpit Khurdiya, Lipika Dey, Diwakar Mahajan, and Ishan Verma. 2012. Extraction and Compilation of Events and Sub-events from Twitter. In Proc. of WI-IAT. IEEE Computer Society, 504–508. Lewis M. Killian. 2002. Methods for Disaster Research: Unique or Not? In Methods of Disaster Research, Robert A. Stallings (Ed.). Xlibris, Philadelphia, USA, 49–93. Kirill Kireyev, Leysia Palen, and K Anderson. 2009. Applications of topics models to analysis of disaster- related twitter data. In NIPS Workshop on Applications for Topic Models: Text and Beyond, Vol. 1. Shamanth Kumar, Fred Morstatter, Reza Zafarani, and Huan Liu. 2013. Whom should I follow?: identifying relevant users during crises. In Proc. of Hypertext. Girdhar Kumaran, James Allan, and Andrew McCallum. 2004. Classification models for new event detection. Technical Report. University of Massachusetts Amherst. John Lafferty, Andrew McCallum, and Fernando CN Pereira. 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. (2001). Alex Leavitt and Joshua A. Clark. 2014. Upvoting Hurricane Sandy: Event-based News Production Pro- cesses on a Social News Site. In Proc. of CHI. ACM, 1495–1504. Pei Lee, Laks VS Lakshmanan, and Evangelos E Milios. 2013. Event Evolution Tracking from Streaming Social Posts. arXiv preprint arXiv:1311.5978 (2013). Kalev Leetaru and Philip A. Schrodt. 2013. GDELT: Global Database of Events, Language, and Tone. In Proc. of ISA. http://gdelt.utdallas.edu/ Chenliang Li, Aixin Sun, and Anwitaman Datta. 2012b. Twevent: segment-based event detection from tweets. In Proc. of CIKM. ACM, 155–164. Rui Li, Kin Hou Lei, Ravi Khadiwala, and KC-C Chang. 2012a. Tedas: A twitter-based event detection and analysis system. In Proc. of ICDE. IEEE, 1273–1276. Bruce R. Lindsay. 2011. Social Media and Disasters: Current Uses, Future Options, and Policy Considera- tions. Technical Report. Congressional Research Service. John Lingad, Sarvnaz Karimi, and Jie Yin. 2013. Location Extraction from Disaster-related Microblogs. In Proc. WWW (Companion) (WWW ’13 Companion). IW3C2, 1017–1020. Bing Liu. 2012. Sentiment Analysis and Opinion Mining. Morgan & Claypool. Xiaohua Liu, Shaodian Zhang, Furu Wei, and Ming Zhou. 2011. Recognizing named entities in tweets. In Proc. of ACL. Association for Computational Linguistics, 359–367. Ying Liu, Dengsheng Zhang, Guojun Lu, and Wei-Ying Ma. 2007. A survey of content-based image retrieval with high-level semantics. Pattern Recognition 40, 1 (2007), 262–282. Bernhard Lorenz, Hans J urgen Ohlbach, and Laibing Yang. 2005. Ontology of transportation networks. (2005). Thomas Ludwig, Tim Siebigteroth, and Volkmar Pipek. 2015. CrowdMonitor: Monitoring Physical and Dig- ital Activities of Citizens During Emergencies. In Proc. of CHI. 421–428. Alan M MacEachren, Anuj Jaiswal, Anthony C Robinson, Scott Pezanowski, Alexander Savelyev, Prasenjit Mitra, Xiao Zhang, and Justine Blanford. 2011. Senseplace2: Geotwitter analytics support for situa- tional awareness. In Proc. of VAST. IEEE, 181–190. Adam Marcus, Michael S Bernstein, Osama Badar, David R Karger, Samuel Madden, and Robert C Miller. 2011. Twitinfo: aggregating and visualizing microblogs for event exploration. In Proc. of CHI. 227–236. Michael Mathioudakis and Nick Koudas. 2010. Twittermonitor: trend detection over the twitter stream. In Proc. of SIGMOD. ACM, 1155–1158. Andrew Kachites McCallum. 2002. Mallet: A machine learning for language toolkit. Richard McCreadie, M-Dyaa Albakour, Stuart Mackie, Nut Limosopathan, Craig Macdonald, Iadh Ounis, and B. Taner Dinc¸er. 2013. Experiments with Terrier in Contextual Suggestion, Temporal Summarisa- tion and Web Tracks. In Proc. of TREC. Andrew J. McMinn, Yashar Moshfeghi, and Joemon M. Jose. 2013. Building a Large-scale Corpus for Eval- uating Event Detection on Twitter. In Proc. of CIKM. ACM, 409–418. Patrick Meier. 2015. Digital Humanitarians. CRC Press. Prem Melville, Vijil Chenthamarakshan, Richard D. Lawrence, James Powell, Moses Mugisha, Sharad Sapra, Rajesh Anandan, and Solomon Assefa. 2013. Amplifying the Voice of Youth in Africa via Text Analytics. In Proc. of KDD. ACM, 1204–1212. DOI:http://dx.doi.org/10.1145/2487575.2488216 Panagiotis Metaxas and Eni Mustafaraj. 2013. The rise and the fall of a citizen reporter. In Proc. of WebSci. Stuart E. Middleton, Lee Middleton, and Stefano Modafferi. 2014. Real-Time Crisis Mapping of Natural Disasters Using Social Media. Intelligent Systems, IEEE (2014), 9–17. Dennis Mileti. 1999. Disasters by Design: A Reassessment of Natural Hazards in the United States. Joseph Henry Press. Social Media in Mass Emergency A:35 Jeffrey T Mitchell, Deborah SK Thomas, Arleen A Hill, and Susan L Cutter. 2000. Catastrophe in reel life versus real life: perpetuating disaster myth through Hollywood films. International Journal of Mass Emergencies and Disasters 18, 3 (2000), 383–402. Aibek Musaev, De Wang, and Calton Pu. 2014. LITMUS: Landslide Detection by Integrating Multiple Sources. Proc. of ISCRAM (2014). Ramesh Nallapati, Ao Feng, Fuchun Peng, and James Allan. 2004. Event threading within news topics. In Proc. of CIKM. ACM, 446–453. Ani Nenkova and Kathleen McKeown. 2011. Automatic Summarization. Vol. 5. 103–233 pages. Natalya F. Noy. 2004. Semantic integration: a survey of ontology-based approaches. ACM Sigmod Record 33, 4 (2004), 65–70. Ory Okolloh. 2009. Ushahidi, or’testimony’: Web 2.0 tools for crowdsourcing crisis information. Participatory learning and action 59, 1 (2009), 65–70. Alexandra Olteanu, Carlos Castillo, Fernando Diaz, and Sarah Vieweg. 2014. CrisisLex: A Lexicon for Col- lecting and Filtering Microblogged Communications in Crises. In Proc. of ICWSM. Alexandra Olteanu, Sarah Vieweg, and Carlos Castillo. 2015. What to Expect When the Unexpected Hap- pens: Social Media Communications Across Crises. In Proceedings of the 18th ACM Conference on Com- puter Supported Cooperative Work and Social Computing (CSCW ’15). ACM, New York, NY, USA, 994– 1009. DOI:http://dx.doi.org/10.1145/2675133.2675242 Olutobi Owoputi, Brendan O’Connor, Chris Dyer, Kevin Gimpel, Nathan Schneider, and Noah A Smith. 2013. Improved part-of-speech tagging for online conversational text with word clusters. In Proc. of NAACL-HLT. 380–390. Leysia Palen and Sophia B Liu. 2007. Citizen communications in crisis: anticipating a future of ICT- supported public participation. In Proc. of CHI. ACM, 727–736. Bo Pang and Lillian Lee. 2008. Opinion mining and sentiment analysis. Foundations and trends in informa- tion retrieval 2, 1-2 (2008), 1–135. Alexandre Passant and Philippe Laublet. 2008. Meaning Of A Tag: A collaborative approach to bridge the gap between tagging and Linked Data.. In Proc. of LDOW. William J Petak. 1985. Emergency management: A challenge for public administration. Public Administra- tion Review (1985), 3–7. Sasa Petrovi´c, Miles Osborne, and Victor Lavrenko. 2010. Streaming first story detection with application to twitter. In Proc. of ACL. Association for Computational Linguistics, 181–189. Swit Phuvipadawat and Tsuyoshi Murata. 2010. Breaking news detection and tracking in twitter. In Proc. of WI-IAT, Vol. 3. IEEE, 120–123. Volkmar Pipek, Sophia Liu, and Andruid Kerne (Eds.). 2014. Special Issue: Crisis Informatics and Collabo- ration. Computer Supported Cooperative Work, Vol. 23. Daniela Pohl, Abdelhamid Bouchachia, and Hermann Hellwagner. 2012. Automatic identification of crisis- related sub-events using clustering. In Proc. of ICMLA, Vol. 2. IEEE, 333–338. Hilary W Poole, Laura Lambert, Chris Woodford, and Christos JP Moschovitis. 2005. The Internet: a histor- ical encyclopedia. Abc-Clio Inc. Abdulfatai Popoola, Dmytro Krasnoshtan, Attila-Peter Toth, Victor Naroditskiy, Carlos Castillo, Patrick Meier, and Iyad Rahwan. 2013. Information verification during natural disasters. In Proc. of WWW (companion). IW3C2, 1029–1032. Robert Power, Bella Robinson, John Colton, and Mark Cameron. 2014. Emergency situation awareness: Twitter case studies. In Proc. of ISCRAM Med. 218–231. Hemant Purohit, Carlos Castillo, Fernando Diaz, Amit Sheth, and Patrick Meier. 2013. Emergency-relief co- ordination on social media: Automatically matching resource requests and offers. First Monday (2013). Hemant Purohit and Amit Sheth. 2013. Twitris v3: From citizen sensing to analysis, coordination and action. In Proc. of ICWSM. Yan Qu, Chen Huang, Pengyi Zhang, and Jun Zhang. 2011. Microblogging after a major disaster in China: a case study of the 2010 Yushu earthquake. In Proc. of CSCW. Enrico L. Quarantelli. 2002. The Disaster Research Center (DRC) field studies of organized behavior in disasters. In Methods of Disaster Research, Robert A. Stallings (Ed.). Xlibris, Philadelphia, USA, 94– 116. Ramakrishnan, Naren et al. 2014. ’Beating the News’ with EMBERS: Forecasting Civil Unrest Using Open Source Indicators. In Proc. of KDD. ACM, 1799–1808. Christian Reuter and Simon Scholl. 2014. Technical Limitations for Designing Applications for Social Media. In Mensch & Computer 2014–Workshopband. Walter de Gruyter GmbH & Co KG, 131. A:36 Imran et al. Alan Ritter, Sam Clark, Oren Etzioni, and others. 2011. Named entity recognition in tweets: an experimental study. In Proc. of EMNLP. Association for Computational Linguistics, 1524–1534. Alan Ritter, Oren Etzioni, Sam Clark, and others. 2012. Open domain event extraction from twitter. In Proc. of KDD. ACM, 1104–1112. A Robinson, Alexander Savelyev, Scott Pezanowski, and Alan M MacEachren. 2013b. Understanding the utility of geospatial information in social media. In Proc. ISCRAM. 918–922. Bella Robinson, Robert Power, and Mark Cameron. 2013a. A sensitive Twitter earthquake detector. In Proc. of WWW (companion). IW3C2, 999–1002. Jakob Rogstadius, Maja Vukovic, Claudio Teixeira, Vassilis Kostakos, Evangelos Karapanos, and Jim Alain Laredo. 2013. CrisisTracker: Crowdsourced social media curation for disaster awareness. IBM J. of Research and Development 57, 5 (2013), 4–1. Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time event detection by social sensors. In Proc. of WWW. ACM, 851–860. Aleksandra Sarcevic, Leysia Palen, Joanne White, Kate Starbird, Mossaab Bagdouri, and Kenneth Ander- son. 2012. Beacons of hope in decentralized coordination: learning from on-the-ground medical twitter- ers during the 2010 Haiti earthquake. In Proc. of CSCW. ACM, 47–56. Hassan Sayyadi, Matthew Hurst, and Alexey Maykov. 2009. Event Detection and Tracking in Social Streams. In Proc. of ICWSM. Wanita Sherchan, Surya Nepal, and Cecile Paris. 2013. A Survey of Trust in Social Networks. ACM Comput. Surv. 45, 4, Article 47 (Aug. 2013), 33 pages. DOI:http://dx.doi.org/10.1145/2501654.2501661 Amit Sheth, Hermant Purohit, Ashutosh Jadhav, Pavan Kapanipathi, and Lu Chen. 2010. Understanding events through analysis of social media. In Proc. of WWW. Irina Shklovski, Moira Burke, Sara Kiesler, and Robert Kraut. 2010. Technology Adoption and Use in the Aftermath of Hurricane Katrina in New Orleans. American Behavioral Scientist (2010), 1228–1246. Lidan Shou, Zhenhua Wang, Ke Chen, and Gang Chen. 2013. Sumblr: Continuous Summarization of Evolv- ing Tweet Streams. In Proc. of SIGIR. ACM, 533–542. Paul R Smart, Alistair Russell, Nigel R Shadbolt, Leslie A Carr, and others. 2007. Aktivesa: A technical demonstrator system for enhanced situation awareness. Comput. J. 50, 6 (2007), 703–716. Ashok Srivastava and Mehran Sahami. 2009. Text Mining: Classification, Clustering, and Applications (1st ed.). Chapman & Hall/CRC. Robert A. Stallings. 2002. Methods for Disaster Research: Unique or Not? In Methods of Disaster Research, Robert A. Stallings (Ed.). Xlibris, Philadelphia, USA, 21–44. Kate Starbird. 2013. Delivering patients to sacr´e coeur: collective intelligence in digital volunteer commu- nities. In Proc. of CHI. ACM, 801–810. Kate Starbird, Grace Muzny, and Leysia Palen. 2012. Learning from the crowd: Collaborative filtering tech- niques for identifying on-the-ground Twitterers during mass disruptions. Proc. of ISCRAM (2012). Kate Starbird, Leysia Palen, Amanda L Hughes, and Sarah Vieweg. 2010. Chatter on the red: what hazards threat reveals about the social life of microblogged information. In Proc. of CSCW. ACM, 241–250. Evan A Sultanik and Clayton Fink. 2012. Rapid Geotagging and Disambiguation of Social Media Text via an Indexed Gazetteer. In Proc. of ISCRAM, Vol. 190. 1–10. Hristo Tanev, Maud Ehrmann, Jakub Piskorski, and Vanni Zavarella. 2012. Enhancing Event Descriptions through Twitter Mining.. In Proc. of ICWSM. Jie Tang, Juanzi Li, Bangyong Liang, Xiaotong Huang, Yi Li, and Kehong Wang. 2006. Using Bayesian decision for ontology mapping. Web Semantics: Science, Services and Agents on the World Wide Web 4, 4 (2006), 243–262. Robert Thomson, Naoya Ito, Hinako Suda, Fangyu Lin, Yafei Liu, Ryo Hayasaka, Ryuzo Isochi, and Zian Wang. 2012. Trusting Tweets: The Fukushima disaster and information source credibility on twitter. In Proc. of ISCRAM. 10. Stefania Traverso, Valentina Cerutti, Kristin Stock, and Mike Jackson. 2014. EDIT: A Methodology for the Treatment of Non-authoritative Data in the Reconstruction of Disaster Scenarios. In Proc. of ISCRAM Med. 32–45. DOI:http://dx.doi.org/10.1007/978-3-319-11818-5 4 S Tucker, V Lanfranchi, N Ireson, A Sosa, G Burel, and F Ciravegna. 2012. “Straight to the information I need:” assessing collational interfaces for emergency response. In Proceedings of the 9th international ISCRAM conference. Vancouver. Muhammad Moeen Uddin, Muhammad Imran, and Hassan Sajjad. 2014. Understanding Types of Users on Twitter. In Proc. of SocialCom. Social Media in Mass Emergency A:37 UN OCHA. 2014. Hashtag Standards For Emergencies. Technical Report. United Nations Office for the Coordination of Humanitarian Affairs. Jose van Dijck. 2013. The Culture of Connectivity: A Critical History of Social Media. Oxford Uni. Press. Istv´an Varga, Motoki Sano, Kentaro Torisawa, Chikara Hashimoto, Kiyonori Ohtake, Takao Kawai, Jong- Hoon Oh, and Stijn De Saeger. 2013. Aid is Out There: Looking for Help from Tweets during a Large Scale Disaster.. In Proc. of ACL. 1619–1629. Shari R Veil, Tara Buehner, and Michael J Palenchar. 2011. A Work-In-Process Literature Review: Incorpo- rating Social Media in Risk and Crisis Communication. Journal of contingencies and crisis management 19, 2 (2011), 110–122. Sudha Verma, Sarah Vieweg, William J Corvey, Leysia Palen, James H Martin, Martha Palmer, Aaron Schram, and Kenneth Mark Anderson. 2011. Natural Language Processing to the Rescue? Extracting ”Situational Awareness” Tweets During Mass Emergency.. In Proc. of ICWSM. Sarah Vieweg. 2012. Situational Awareness in Mass Emergency: A Behavioral and Linguistic Analysis of Microblogged Communications. Ph.D. Dissertation. University of Colorado at Boulder. Sarah Vieweg, Carlos Castillo, and Muhammad Imran. 2014. Integrating Social Media Communications into the Rapid Assessment of Sudden Onset Disasters. In Proc. of SocInfo. 444–461. Sarah Vieweg and Adam Hodges. 2014. Rethinking Context: Leveraging Human and Machine Computation in Disaster Response. Computer 47, 4 (April 2014), 22–27. DOI:http://dx.doi.org/10.1109/mc.2014.97 Sarah Vieweg, Amanda L. Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging During Two Nat- ural Hazards Events: What Twitter May Contribute to Situational Awareness. In Proc. of CHI. Ellen M. Voorhees and Donna K. Harman (Eds.). 2005. TREC: Experiment and Evaluation in Information Retrieval. MIT Press. Dingding Wang and Tao Li. 2010. Document update summarization using incremental hierarchical cluster- ing. In Proc. of CIKM. ACM, 279–288. Ingmar Weber and Yelena Mejova. 2013. Twitter and the Real World. CIKM’13 tutorial. (2013). https://sites. google.com/site/twitterandtherealworld/home Jianshu Weng and Bu-Sung Lee. 2011. Event Detection in Twitter. In Proc. of ICWSM. Tan Xu, Paul McNamee, and Douglas W. Oard. 2013. HLTCOE Temporal Summarization. In Proc. of TREC. Christopher C Yang, Xiaodong Shi, and Chih-Ping Wei. 2009. Discovering event evolution graphs from news corpora. IEEE Transactions on Systems, Man and Cybernetics (2009), 850–863. Yiming Yang, Tom Pierce, and Jaime Carbonell. 1998. A study of retrospective and on-line event detection. In Proc. of SIGIR. ACM, 28–36. Jie Yin, Andrew Lampert, Mark Cameron, Bella Robinson, and Robert Power. 2012. Using social media to enhance emergency situation awareness. IEEE Intelligent Systems 27, 6 (2012), 52–59. Mohammed J. Zaki and Wagner Meira. 2014. Data Mining and Analysis: Fundamental Concepts and Algo- rithms. Cambridge University Press. Qiankun Zhao, Prasenjit Mitra, and Bi Chen. 2007. Temporal and information flow based event detection from social text streams. In Proc. of AAAI, Vol. 7. 1501–1506. Yiping Zhou, Lan Nie, Omid Rouhani-Kalleh, Flavian Vasile, and Scott Gaffney. 2010. Resolving surface forms to wikipedia topics. In Proc. of COLING. Association for Computational Linguistics, 1335–1343.
1207.3603
1
1207
2012-07-16T08:49:05
Qualitative Comparison of Community Detection Algorithms
[ "cs.SI", "cs.CV", "physics.soc-ph" ]
Community detection is a very active field in complex networks analysis, consisting in identifying groups of nodes more densely interconnected relatively to the rest of the network. The existing algorithms are usually tested and compared on real-world and artificial networks, their performance being assessed through some partition similarity measure. However, artificial networks realism can be questioned, and the appropriateness of those measures is not obvious. In this study, we take advantage of recent advances concerning the characterization of community structures to tackle these questions. We first generate networks thanks to the most realistic model available to date. Their analysis reveals they display only some of the properties observed in real-world community structures. We then apply five community detection algorithms on these networks and find out the performance assessed quantitatively does not necessarily agree with a qualitative analysis of the identified communities. It therefore seems both approaches should be applied to perform a relevant comparison of the algorithms.
cs.SI
cs
Qualitative Comparison of Community Detection Algorithms Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 1 Galatasaray University, Computer Science Department, Istanbul, Turkey 2 University of Burgundy, LE2I UMR CNRS 5158, Dijon, France [email protected] Abstract. Community detection is a very active field in complex networks analysis, consisting in identifying groups of nodes more densely interconnected relatively to the rest of the network. The existing algorithms are usually tested and compared on real-world and artificial networks, their performance being assessed through some partition similarity measure. However, artificial networks realism can be questioned, and the appropriateness of those measures is not obvious. In this study, we take advantage of recent advances concerning the characterization of community structures to tackle these questions. We first generate networks thanks to the most realistic model available to date. Their analysis reveals they display only some of the properties observed in real-world community structures. We then apply five community detection algorithms on these networks and find out the performance assessed quantitatively does not necessarily agree with a qualitative analysis of the identified communities. It therefore seems both approaches should be applied to perform a relevant comparison of the algorithms. Keywords: Complex Networks, Community Detection, Community Properties, Algorithms Comparison. 1 Introduction The use of networks as modeling tools has spread through many application fields during the last decades: biology, sociology, physics, computer science, communication, etc. (see [1] for a very complete review of applied studies). Once a system has been modeled, the resulting network can be analyzed or visualized thanks to some of the many tools designed for graph mining. Such large real -world networks are characterized by a heterogeneous structure, leading to specific properties. In particular, a heterogeneous distribution of links often results in the presence of a so - called community structure [2]. A community roughly corresponds to a group of nodes more densely interconnected, relatively to the rest of the network [3]. The way such a structure can be interpreted is obviously dependent on the modeled system. However, independently from the nature of this system, it is clear the community structure conveys some very important information, necessary to a proper 2 Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 understanding [4]. Detecting communities is therefore an essential part of modern network analysis. Many different community detection algorithms exist [2], which can diverge in two ways: first the process leading to an estimation of the community structure, but also the nature of the estimated communities themselves. This raises a question regarding the comparison of these algorithms, from both a theoretical and a practic al point of view. Authors traditionally test their community detection algorithms on real -world and/or artificial networks [5, 6]. The performance is assessed by comparing the estimated communities with some community structure of reference using a quality (e.g. modularity [3]) or association (e.g. Normalized Mutual Information [7]) measure. This single value is then compared with those obtained when applying preexisting algorithms on the same data. The ma in problem with this approach is its purely quantitative aspect: it completely ignores the nature of the considered community structures. Two algorithms can reach the exact same level of performance, but still estimate very different community structures. Besides performance evaluation, the data used to perform the tests are also subject to some limitations. For realism reasons, it is necessary to apply the algorithms to real-world networks, but these are not sufficient because 1) reference communities (i.e. ground truth) can rarely be defined objectively, and 2) the topology of the selected networks can hardly be diverse enough to represent all types of systems. Testing on artificial networks can be seen as complementary, because they overcome these limitations. Indeed, a random model allows generating as many networks as desired, while controlling some of their topological properties. The only issue is the realism of the obtained networks, which should mimic closely real -world networks in order to get relevant test results. Some properties common to most real -world networks are well-identified: power- law distributed degree, small-worldness, non-zero degree correlation and relatively high transitivity [8]. Additionally, networks with a community structure are characterized by a power-law distributed community size [9]. Several generative models with increasing realism were successively designed [6] before finally meeting these constraints [6, 10, 11]. However, recent studies showed other properties besides the community size distribution can be used to characterize real-world community structures [4, 12], such as community-wise density and average distance, hub dominance, embeddedness. They allow giving a more detailed description of the internal topology of the communities, and of the way they are interconnec ted. To our opinion, these new results have two important consequences on the problem of community detection assessment. First, the question to know whether the artificial networks used as benchmark also exhibit these properties arises naturally. But more importantly, it is now possible to perform a qualitative comparison of the communities identified by different algorithms, instead of relying only on a single performance measure. In this article, we try to answer both questions using the realistic generative model LFR [6] and a representative set of community detection algorithms. In section 2, we review in greater details the properties used to describe community structures in complex networks. In section 3, we shortly present the LFR model and its properties, and introduce an adjustment allowing to improve the realism Qualitative Comparison of Community Detection Algorithms 3 of the networks it generates. We also review the various approaches used in the literature to define the concept of community, and describe a selection of community detection algorithms from this perspective. In section 4, we first analyze the properties of the generated networks. We then compare the community structures detected by the selected algorithms on these networks. We consider both their similarity to the community structure of interest, and how community properties differ from one algorithm to the other. Finally, we discuss our results and explain how our work could be extended. 2 Characterization of a Community Structure Complex networks are often characterized at microscopic and macroscopic levels , i.e. by studying the characteristics of nodes taken individually and of the network considered as a whole, respectively. The microscopic approach focuses on some nodes of interest, and tries to identify which features allow distinguishing them from the rest of the network (degree, centrality, local transitivity, etc.). At the macroscopic level, one can take advantage of the multiplicity of nodes to derive statistics or distributions summarizing some of the network features (degree distribution, degree correlation, average distance, transitivity, etc.). The development of community detection corresponds to the apparition of a mesoscopic level, and highlights the need for adapted tools to characterize the community structure. In this section, we present a selection of the mesoscopic measures recently proposed and indicate how real -world networks behave relatively to them. In some cases, no general observation can be made, and one has to consider the class of the network: communication, biological, social, etc. Note other measures exist besides those described here, such as the network community profile [12] or roles distribution [13]. The community size distribution is considered as an important characteristic of the community structure. It has been largely studied in real-world networks, and seems to follow a power law [9, 14] with exponent ranging from to [15]. This means their sizes are heterogeneous, with many small communities and only a few very large ones. The embeddedness measure assesses how much the direct neighbors of a node belong to its own community. It is defined as the ratio of the internal degree to the total degree of the considered node [4]: (1) This internal degree is the number of links the nodes has with other nodes from the same community, by opposition to its external degree , which corresponds to connections with nodes located in other communities. The maximal embeddedness of is reached when all the neighbors are in its community ( ), whereas the minimal value of corresponds to the case where all neighbors belong to different communities ( ). In real-world networks, a majority of nodes, usually with low degree, have a very high embeddedness. The rest are distributed depending on the considered class: communication, Internet and biological networks exhibit a peak 4 Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 around , whereas social and information networks have a more uniform distribution. In all cases, the whole range of is significantly represented, even small values [4]. The density of a community is defined as the ratio of links it actually contains, noted , to the number of links it could contain if all its nodes were connected. In the case of an undirected network, the latter is , where is the number of nodes in the community, and we therefore get . When compared to the overall network density, the density allows assessing the cohesion of the community: by definition, a community is supposed to be denser than the network it belongs to. The scaled density is a variant obtained by multiplying the density by the community size [4]: (2) If the considered community is a tree, it has only links, and . If it is a clique (completely connected subgraph), then and we have . The scaled density therefore allows charactering the structure of the community. Some real-world networks such as the Internet or communication networks have essentially tree-like communities. On the contrary, for other classes like social and information networks, the scaled density increases with the community size. Finally, biological networks exhibit a hybrid behavior, their small communities being tree-like whereas the large ones are denser and close to cliques [4]. The distance between two nodes corresponds to the length of their shortest path. When averaged over all pairs of nodes in a community, it allows assessing the cohesion of this community. In real-world networks, small communities ( ) are supposedly small-world, which means the average distance should increase logarithmically with the community size [4]. For larger communities, the average distance still increases, but more slowly, or even stabilizes for certain cla sses like communication networks. A small average distance can be explained by a high density (social), the presence of hubs (communication, Internet), or both (biological, information). From a community structure perspective, a hub is a node connected to many of the other nodes belonging to the same community. The presence of a central hub in a community can be assessed using the hub dominance measure, which corresponds to the following ratio: The numerator is the maximal internal degree found in , and the denominator is the maximal degree theoretically possible given the community size. The hub dominance therefore reaches when at least one node is connected to all other nodes in the community. It can be only if no nodes are connected, which is unlikely for a community. In real-world networks, the behavior of this property depends on the considered class. For communication networks, it is close to the maximum for all community sizes, meaning hubs are present in all communities. Considering their communities are sparse and tree-like, one can conclude they are star-shaped. Other (3) Qualitative Comparison of Community Detection Algorithms 5 classes do not have as many hubs in their large communities, which is why the ir hub dominance generally decreases with community size increase [4]. 3 Methods Our experiment is two-stepped: first we generate a set of artificial networks and study the realism of their community-related topological properties; second we apply a selection of community detection algorithms on these networks and analyze the properties of the community structure they estimate. In this section, we first describe the LFR model we applied during the first step, which supposedly a llows generating the most realistic networks in terms of overall properties (degree distribution, small - worldness, etc.) [6, 10, 11]. Then, we shortly describe the community detection algorithms we selected, and explain how they differ on the way they handle the concept of community. 3.1 Network Generation Only a few models have been designed to generate networks possessing a community structure. Girvan and Newman seemingly defined the first one [5], which produces networks taking roughly the form of sets of small interconnected Erdős -Rényi networks [16]. Although widely used to test and compare community detection algorithms, the Girvan-Newman method is limited in terms of realism [6], mainly because the degree is not power -law distributed and the communities are small, few, and even-sized. Several variants were defined, allowing to produce larger networks and communities with heterogeneous sizes [2, 7, 17]. More recently, a different approach appeared, based on a rewiring process [6, 18]. It increased the realism level even more by generating networks with power-law distributed degree. Among these newer models, we selected the LFR model, which seems to be the more realistic and was previously used as a benchmark to compare community detection algorithms [6, 10, 19]. The LFR model was proposed by Lancichinetti et al. [6] to randomly generate undirected and unweighted networks with mutually exclusive communities. The model was subsequently extended to generate weighted and/or directed networks, with possibly overlapping communities [19]. However, in this article, we focus on undirected unweighted networks with non-overlapping communities, because the community structure-related properties we want to study have been defined and/or used only for this type of networks. The model allows to control directly the following parameters: number of nodes , desired average and maximum degrees, exponent for the degree distribution, exponent for the community size distribution, and mixing coefficient . The latter represents the desired average proportion of links between a node and nodes located outside its community, called inter-community links. Consequently, the proportion of intra-community links is – . A node of degree has therefore an external degree of and an internal degree of . 6 Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 The generative process first uses the configuration model (CM) [20] to generate a network with average degree , maximum degree and power-law degree distribution with exponent . Second, virtual communities are defined so that their sizes follow a power-law distribution with exponent . Each node is randomly affected to a community, provided the community size is greater or equal to the node internal degree. Third, an iterative process takes place to rewire certain links, in order to approximate , while preserving the degree distribution. For each node, the to tal degree is not modified, but the ratio of internal and external links is changed so that the resulting proportion gets close to . By construction, the LFR method guaranties to obtain values considered as realistic [1, 8] for several properties: size of the network, power law distributed degrees and community sizes. Other properties are not directly controlled, but were studied empirically [10]. It turns out LFR generates small-world networks, with relatively high transitivity and degree correlation. This is realistic [8], but holds only under certain conditions. In particular, transitivity and degree correlation are dramatically affected by changes in , and become clearly unrealistic when it gets different from . An adjustment was proposed to solve this issue, consisting in using a different generative model during the first step [11]. By applying Barabási & Albert’s preferential attachment model (BA) [21] instead of the CM, the degree correlation and transitivity become more stable relatively to changes in . It is rather clear the mixing coefficient is complementary to the embeddedness presented in section 2 (eq. 1): . Yet, it was mentioned in the same section the embeddedness varies much from one node to the other in real -world networks, exhibiting bimodal and flat distributions. From this point of view, the LFR model is not realistic, since it produces networks whose nodes have all roughly the same mixing coefficient. To solve this problem, we implemented a small adjustment allowing to specify the complete distribution of in place of a single objective value. 3.2 Community Detection Because of their number and great diversity, it is difficult to categorize community detection algorithms. Here, we chose to characterize them not by considering the process they implement, as it is usually done, but rather the definition of the community concept they rely upon. We selected a representative set of algorithms, favoring fast ones because of the size of the analyzed networks. We give very partial descriptions in this section, so the reader might want to consult the review by Fortunato [2] to find more information concerning community detection. A very widespread informal definition of the community concept considers it as a group of nodes densely interconnected compared to the other nodes [2, 14, 22]. In other terms, a community is a cohesive subset clearly separated from the rest of the network. Formal definitions differ in the way they translate and combine both these aspects of cohesion and separation. A direct translation of the informal definition given above consists in first specifying two distinct measures to assess separately cohesion and separation, and then processing an overall measure by considering their difference or ratio. This Qualitative Comparison of Community Detection Algorithms 7 approach led to many variants, differing on how the measures are defined and combined. The most widespread one is certainly the modularity, a chance -corrected measure which assesses cohesion and separation through the number of intra - and inter-community links, respectively. We selected two modularity optimization algorithms, which differ in the way they perform this optimization. Fast Greedy applies a basic greedy approach [3], and Louvain includes a community aggregation step to improve processing on large networks [23]. Another family of approaches is based on node simi larity measures. Such a measure allows translating the topological notions of cohesion and separation in terms of intra-community similarity and inter-community dissimilarity. In other terms: a community is viewed as a group of nodes which are similar to each other, but dissimilar from the rest of the network. Once all node -to-node similarities are known, detecting a community structure can be performed by applying a similarity-based classic cluster analysis algorithm [24]. We selected the Walktrap algorithm, which uses a similarity based on random walks and applies a hierarchical agglomerative clustering approach [17]. Some approaches based on data compression do not use the cohesion and separation concepts like the previous definitions. They consider the community structure as a set of regularities in the network topology, which can be used to represent the whole network in a more compact way. The best community structure is supposed to be the one maximizing compactness while minimizing information loss. The quality of the representation is assessed through measures derived from mutual information. Algorithms essentially differ in the way they represent the community structure and how they assess the quality of this representation. We selected the InfoMap algorithm [25], whose representation is based on coded ids affected to nodes. The definition of the community concept is not always explicit: procedural approaches exist, in which the notion of community is implicitly defined as the result of the processing. To illustrate this, we selected the MarkovCluster algorithm, which simulates a diffusion process in the network to detect communities [26]. This approach relies on the transfer matrix of the network, which describes the transition probabilities for a random walker evolving in this network. Two transformations are iteratively applied on this matrix until convergence. The resulting matrix can be interpreted as the adjacency matrix of a network with disconnected components, which correspond to communities in the original network. We have to mention another family of algorithms based on link centrality. They iteratively remove the most central links until disconnected components are obtained , which are interpreted as the network communities. The community structure largely depends on the selected centrality measure, e.g. edge -betweenness [5]. However, the computational cost of such algorithms is very high and we were not able to apply them to our data. 8 Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 4 Results and Discussion 4.1 Properties of the Generated Communities Using our review of the literature, we selected realistic values for the parameters the LFR model lets us control. We used three different network sizes: , constant average and maximal degrees , , and exponent for the degree power -law distribution. The exponent was for the community size distribution, whose bounds were and . The mixing coefficient was distributed uniformly over its definition domain . We generated instances of network for each combination of parameter values, in order to check for consistency. Among the community-related properties we described in section 2, two are directly controlled by the LFR model: the community size and embeddedness distributions. Our measurements confirm on all networks that the community sizes follow a power-law distribution as expected (cf. Fig. 1). Note the range of these sizes varies much from one real-world network to the other, and it is therefore difficult to describe a typical set of values. However, we can say the communities we generated are very similar in size to those from real-world networks of comparable size. For instance, we have communities containing between and nodes for , which is compliant with what was observed in networks of this size [4]. For the embeddedness, we obtained a uniform distribution, as expected. It is close enough to what can be observed in social and information networks. The main difference is we do not have as many nodes with very high embeddedness as in those real-world networks. This could be easily corrected though, by specifying a more appropriate distribution when applying the modified LFR model. We now focus our attention on the uncontrolled properties. The results are very similar independently from the size of the network. The only difference seems to be that values measured on larger networks exhibit slightly smaller dispersion. For this reason we present only results for networks with size . The scaled density increases from to along with the community size. This means the smallest communities are clique-like ( ), and no tree-like communities are generated ( ). These features cannot be considered as realistic: as mentioned before, in real-world networks the small communities are tree - like and the large ones are either tree-like too, or much more clique-like. In other words: real-world networks exhibit two different behaviors, but the generated networks can be compared to none of them. It seems the links are distributed too homogeneously over the generated networks, making small communities too dense and large ones too sparse. As shown in Fig. 1, the average distance increases regularly from to along with the community size. The main difference with real-world networks is these have a much lower average distance for smallest communities, reaching values slightly greater than . Consequently, we do not observe for the generated networks the fast increase of average distance which was characteristic of the real-world networks. For the rest of the communities, the observed distribution is comparable with Qualitative Comparison of Community Detection Algorithms 9 communication networks though, with a stable average distance for medium and large communities. Moreover, the values measured for these communities are also realistic in terms of magnitude. Fig. 1. Properties of the generated communities. Each network instance is represented with a different shape/color. Points are averages over logarithmic bins of the community size. The dotted lines in the scaled density plot represents its limits ( and , cf. section 2). Hub dominance is very high for the smallest communities, with values close to . For large communities, there is no general trend in networks: the property varies much over the networks we generated. This dispersion decreases when the network size increases though, and networks show a hub dominance decrease with community size increase, reaching values close to . This behavior is compatible with most classes of real-world networks, which exhibit hubs dominance mainly for small communities. Moreover, the same dispersion was also observed on real-world networks [4]. This measure completely relies on the way high degree nodes are distributed over communities, since it directly depends on the maximal internal degree found in communities. The fact there are much less large communities, due to their power law-distributed sizes, can explain this dispersion. A possible solution would be to consider a measure based on the highest internal degrees of the community instead of a single one. To summarize our observations: the generated communities exhibit some, but not all, of the properties observed on real-world networks. Their sizes are realistic, but the distribution of links is not always appropriate. The small communities are too dense and clique-like, when they should be sparser and tree-like, with a smaller average distance. In other terms, they should be star-shaped. They possess the high hub dominance characteristic of such structures though, but this is certainly due to their clique-like configuration. The fact their average distance is much higher than in comparable real-world communities is a surprise. Indeed, one would expect such dense, hub-dominated communities to have a lower average distance. It turns out they are constituted of a clique core and a few very low degree nodes connected to this 1011021030.00.20.40.60.81.0HubDominanceCommunitySize10110210312345AverageDistanceCommunitySize101100102ScaledDensity10−410−310−210−1100Frequency 10 Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 core: the latter explain the relatively high average distance. The larger communities, on the contrary, should be substantially denser and more clique-like. In some cases, their hub dominance is relatively low despite their small average distance and low density, which seems to indicate they do not contain a main central hub, but several interconnected medium ones. By definition, this feature is not reflected by the hub dominance measure, which only considers the maximal degree in the community. Another issue is the fact generated networks do not comply with a specific class of real-world networks, but rather have similarities with different classes depending on the considered property. Their average distance have common points with communication networks, whereas this is not the case at all for their embeddedness and hub dominance distributions, which look like social and biological networks. Despites these limitations, the model produces what we think to be the most realistic networks to date, which is why the generated networks constitute an appropriate benchmark to analyze community detection algorithms. 4.2 Comparison of the Estimated Communities We applied the selected community detection algorithms on the generated networks: Louvain (LV), Fast Greedy (FG), MarkovCluster (MC), InfoMap (IM) and Walktrap (WT). For time matters, it was possible to process networks with sizes and , but not . We however generated denser networks, with (instead of ), in order to study the effect of density. Table 1 displays the performance of each algorithm expressed in terms of Normalized Mutual Information (NMI), which is a measure assessing the similarity of two partitions (in our case: the reference and estimated community structures). It is considered to be a good performance measure for community detection, and was used in several studies [6, 7, 10]. According to the NMI, IM clearly finds the closest community structure to the reference, followed by MC, LV, and WT, while FG is far behind. This type of quantitative analysis is characteristic of existing works dealing with algorithms comparison. In the rest of this section, we complete it with a qualitative analysis based on the previously presented community properties. We first focus on the results obtained on networks. As we can see on Fig. 2, most algorithms have found communities whose sizes distribution is reminiscent of the power-law used during network generation. However, important differences exist between them. First, MC visibly finds many very small communities ( ), and the other sizes are consequently strongly under-represented. A more thorough verification showed most of these communities are even single nodes, which is particularly problematic since community identification consists in grouping them . It is important to remark this does not appear on the NMI values, since MC has the second best score. This raises a question regarding the appropriateness of this measure to assess community detection performance. IM also finds some small communities, but much less than MC, and the rest of the distribution is more similar to the reference. Compared to the reference and the other algorithms, communities detected by FG and LV have sizes distributed rather uniformly. Interestingly, these two algorithms have very different performances in terms of NMI, so despite the relatively Qualitative Comparison of Community Detection Algorithms 11 similar sizes of their communities, their community structures are probably very different too. For WT, the size distribution is very close to the reference. Again, this fact alone is not equivalent to a high NMI value, since its performance is substantially lower to IM. Table 1. Algorithms performances, as measured with the Normalized Mutual Information. Algorithm , , Louvain Fast Greedy MarkovCluster InfoMap Walktrap For the embeddedness, MC and WT are clearly different from the reference, displaying a distribution with very few extreme embeddedness values. The small numbers of highly embedded nodes and the fact almost half the nodes have very low embeddedness with MC seems to be linked to the community size distribution. Many of the smallest communities identified by MC are certainly grouped together in the reference, leading to a smaller number of intercommunity links. Compared to the reference, WT does not contain nodes with low embeddedness, whereas it has more nodes with medium embeddedness. In this case, it cannot be related to the community sizes though, since they are comparable to those of the reference. Maybe the lack of low embeddedness nodes can be interpreted as a failure to classify interface nodes, located at the limit of their community and largely connected with other commu nities. The embeddedness distributions observed for FG and LV are again very similar. They also lack low embeddedness nodes, but not as much as WT . Finally, IM presents the values the most similar to the reference. When considering the scaled density (Fig. 2), IM, MC and WT are very close to the reference, except IM and MC present very low values for their smallest communities (meaning these are tree-like). For FG and LV, the scaled density is relatively stable, and does not present the slow increase which is characteristic of the reference. This can be interpreted as the fact the communities detected by these algorithms all present the same structure, independently from their size. The average distances measured on the FG and LV communities are much dispersed and do not follow the evolution observed for the reference. FG, in particular, has a much higher average distance than the reference and the other algorithms. This property is a good indicator of cohesion, so it seems this quality is absent from the communities identified by FG. The remaining algorithms (IM, MC, WT) are very close to the reference. IM displays two outliers though: the average distance is surprisingly high for its smallest and largest communities. For hub dominance, IM, MC and WT seem to follow the reference, with a positive bias. The fact these algorithms have slightly higher scaled -density and lower hub dominance, relatively to the reference, is consistent with their slightly lower average distance. The inverse observation is valid for the smallest and largest communities 12 Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 detected by IM: sparse and non-centralized communities lead to high average distance. FG and LV once again display similar behaviors, with hub dominance values clearly bellow the reference. When also considering their stable scaled density, this can explain their increasing average distance. Fig. 2. Properties of the detected communities. Each shape/color corresponds to a different algorithm, whereas the reference is represented by a solid line. Points are averages over logarithmic bins of the community size. The dotted lines in the scaled density plot represent the limits of this property, as in Fig. 1. The topological analysis of the estimated community structures gives a new perspective to the quantitative performance measures. The communities detected by IM, the best algorithm in terms of NMI, are unsurprisingly very close to the reference ones. However, MC, the second algorithm and not far from IM, presents a very different community structure, characterized by much more very small communities. On the contrary, most of the properties of the communities identified by WT are very similar to the reference. It only differs clearly in terms of embeddedness distribution, which is apparently sufficient to rank it only fourth in terms of NMI , relatively far from IM. It thus seems there is no equivalence between a high NMI value and a community structure with properties close to the reference. We conclude both approaches are complementary to perform a relevant analysis of community detection results. It is worth noticing LV and FG, both based on modularity optimization, 1011021030.00.20.40.60.81.0HubDominanceCommunitySize10110210312345AverageDistanceCommunitySize101102103ScaledDensityCommunitySize10110010200.20.40.60.8110−310−210−1100EmbeddednessFrequency10110210310−510−410−310−210−1100FrequencyCommunitySizeReferenceLouvainFastGreedyMarkovClusterInfoMapWalktrap Qualitative Comparison of Community Detection Algorithms 13 comparably differ from the reference, which confirms the importance of considering the community definition which characterizes an algorithm. Fig. 3. Community size distributions for size networks, with (left) and (right). Shapes/colors meaning is the same as in Fig. 2, and points are also averages over logarithmic bins of the community size. On size networks, FG and LV find communities much larger than the reference ones, as shown in Fig. 3. For these algorithms, roughly ranges from to , when it goes from to in the reference. Both are based on modularity optimization, so this might be due to the resolution limit characteristic of this measure [27], which prevents them from finding smaller communities. IM is relatively close to the reference, but not as much as it is on networks. WT is also very similar to the reference, but it departs from it by finding a very large community ( ). MC results are relatively similar to those obtained on the networks, i.e. it finds many very small communities. In order to separate the effects of network size and density on the algorithms, we generated additional networks with the same size, but maximal degree (instead of ). This reduces slightly the overestimation of FG and LV community sizes, whereas MC has roughly the same results. On the contrary, IM and WT properties are excellent, they follow almost perfectly the reference values. 5 Conclusion In this study, we took advantage of recent advances relative to the characterization of community structures in complex networks to tackle two questions: 1) Do artificial networks used as benchmark exhibit real-world community properties? 2) How do community detection algorithms compare in qualitative terms, by opposition to the usual quantitative measurement of their performances. We first applied a variant of the LFR model [6] to generate a set of artificial networks with realistic parameters retrieved from the literature. We studied their properties and concluded some of them are realistic (community sizes, hub dominance), some are only partly realistic (embeddedness, average distance), and others are not realistic at all (scaled density). We then applied on these networks a representative set of five fast community detection algorithms: Fast Greedy, InfoMap, Louvain, MarkovCluster and Walktrap. 101102103104CommunitySize10110210310410−510−410−310−210−1100FrequencyCommunitySize 14 Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2 It turns out the performance assessed quantitatively through the widely used Normalized Mutual Information (NMI) measure does not necessarily agree with a qualitative analysis of the identified communities. On the one hand, MarkovCluster, ranked second in terms of NMI, actually found an extremely large number of very small communities and almost no large community. On the other hand, the properties of the community structure estimated by Walktrap are very close from the reference ones, but the algorithm comes fourth in terms of NMI, with a score relatively far from MarkovCluster’s one. It therefore seems both approaches should be applied to perform a relevant comparison of the algorithms. Our contributions are as follow. First, we introduced a slight modification to the LFR model, in order to make the embeddedness distribution more realistic in the generated networks. Second, we studied these generated networks in terms of community-centered properties. This complements some previous analyses focusing on network-centered properties such as transitivity or degree correlation [6, 10, 11]. Third, we applied several community detection algorithms on these networks and characterized their results relatively to the same community-centered properties. Previous studies adopted a quantitative approach based on some performance measure [6, 7, 10, 11, 18]. Our work can be extended in various ways. First, it seems necessary to either increase the realism of the LFR model or to define a completely new approach able to generate more realistic networks. Second, by lack of time, we could test only a few algorithms, on a few relatively large networks. A more thorough analysis would consist in using much larger networks, with more repetitions to improve statistical significance. Moreover, applying several algorithms relying on the same definition of the community concept would allow to compare their properties and maybe associate a certain type of community structure to a certain family of algorithms. It could additionally be interesting to use other performance measures than the NMI to assess their relevance with the studied topological properties. Third, it would noticeably be interesting to apply classic network-wise measures to communities (transitivity, degree correlation, centrality, etc.), and to consider additional community specific measures, such as those designed in [13], which seem complementary to the embeddedness, and the concept of community profile [12], although this one looks particularly costly from a computational point of view. Acknowledgments. This project is supported by the Galatasaray University Research Fund. References 1. da Fontura Costa, L., Oliveira Jr., O.N., Travieso, G., Rodrigues, r.A., Villas Boas , P.R., Antiqueira, L., Viana, M.P., da Rocha, L.E.C.: Analyzing and Modeling Real -World Phenomena with Complex Networks: A Survey of Applications. arXiv physics.soc -ph, 0711.3199 (2008) 2. Fortunato, S.: Community Detection in Graphs. Phys Rep 486, 75 -174 (2010) Qualitative Comparison of Community Detection Algorithms 15 3. Newman, M.E.J., Girvan, M.: Finding and Evaluating Community Structure in Networks. Phys Rev E 69, 026113 (2004) 4. Lancichinetti, A., Kivelä, M., Saramäki, J., Fortunato, S.: Characterizing the Community Structure of Complex Networks. PLoS ONE 5, e11976 (2010) 5. Girvan, M., Newman, M.E.J.: Community Structure in Social and Biological Networks. PNAS 99, 7821-7826 (2002) 6. Lancichinetti, A., Fortunato, S., Radicchi, F.: Benchmark Graphs for Testing Community Detection Algorithms. Phys Rev E 78, 046110 (2008) 7. Danon, L., Diaz-Guilera, A., Arenas, A.: The Effect of Size Heterogeneity on Community Identification in Complex Networks. J Stat Mech 11010 (2006) 8. Newman, M.E.J.: The Structure and Function of Complex Networks. SIAM Rev 45, 167 - 256 (2003) 9. Guimerà, R., Danon, L., Díaz-Guilera, A., Giralt, F., Arenas, A.: Self-Similar Community Structure in a Network of Human Interactions. Phys Rev E 68, 065103 (2003) 10. Orman, G.K., Labatut, V.: A Comparison of Community Detection Algorithms on Artificial Networks. Lecture Notes in Artificial Intelligence 5808, 242–256 (2009) 11. Orman, G.K., Labatut, V.: The Effect of Network Realism on Community Detection Algorithms. In: ASONAM, 301-305, Odense, DK (2010) 12. Leskovec, J., Lang, K.J., Dasgupta, A., Mahoney, M.W.: Statistical Properties of Community Structure in Large Social and Information Networks. In: WWW, ACM, Beijing, CN (2008) 13. Guimerà, R., Amaral, L.A.N.: Functional Cartography of Complex Metabolic Networks. Nature 433, 895-900 (2005) 14. Newman, M.E.J.: Detecting Community Structure in Networks. Eur Phys J B 38, 321 -330 (2004) 15. Palla, G., Derenyi, I., Farkas, I., Vicsek, T.: Uncovering the Overlapping Community Structure of Complex Networks in Nature and Society. Nature 435, 814 -818 (2005) 16. Erdõs, P., Rényi, A.: On Random Graphs. Publ Math 6, 290 -297 (1959) 17. Pons, P., Latapy, M.: Computing Communities in Large Networks Using Random Walks. LNCS 3733, 284-293 (2005) 18. Bagrow, J.P.: Evaluating Local Community Methods in Networks. J Stat Mech - (2008) 19. Lancichinetti, A., Fortunato, S.: Community Detection Algorithms: A Comparative Analysis. Phys Rev E 80, 056117 (2009) 20. Molloy, M., Reed, B.: A Critical Point for Random Graphs with a Given Degree Sequence. Random Structures and Algorithms 6, 161-179 (1995) 21. Barabási, A.-L., Albert, R.: Emergence of Scaling in Random Networks. Science 286, 509 (1999) 22. Danon, L., Duch, J., Arenas, A., Díaz-Guilera, A.: Community Structure Identification. Large Scale Structure and Dynamics of Complex Networks: From Information Technology to Finance and Natural Science, 93-113. World Scientific (2007) 23. Blondel, V.D., Guillaume, J.-L., Lambiotte, R., Lefebvre, E.: Fast Unfolding of Communities in Large Networks. J Stat Mech P10008 (2008) 24. Gan, G.a.M., C. and Wu, J.: Data Clustering: Theory, Algorithms, and Applications. Society for Industrial and Applied Mathematics, Philadelphia, US-PA (2007) 25. Rosvall, M., Bergstrom, C.T.: Maps of Random Walks on Complex Networks Reveal Community Structure. PNAS 105, 1118 (2008) 26. van Dongen, S.: Graph Clustering Via a Discrete Uncoupling Process. SIAM J Matrix Anal Appl 30, 121-141 (2008) 27. Fortunato, S., Barthelemy, M.: Resolution Limit in Community Detection. PNAS 104, 36 - 41 (2007)
1302.2376
1
1302
2013-02-10T22:29:35
Modeling Morphology of Social Network Cascades
[ "cs.SI", "physics.soc-ph" ]
Cascades represent an important phenomenon across various disciplines such as sociology, economy, psychology, political science, marketing, and epidemiology. An important property of cascades is their morphology, which encompasses the structure, shape, and size. However, cascade morphology has not been rigorously characterized and modeled in prior literature. In this paper, we propose a Multi-order Markov Model for the Morphology of Cascades ($M^4C$) that can represent and quantitatively characterize the morphology of cascades with arbitrary structures, shapes, and sizes. $M^4C$ can be used in a variety of applications to classify different types of cascades. To demonstrate this, we apply it to an unexplored but important problem in online social networks -- cascade size prediction. Our evaluations using real-world Twitter data show that $M^4C$ based cascade size prediction scheme outperforms the baseline scheme based on cascade graph features such as edge growth rate, degree distribution, clustering, and diameter. $M^4C$ based cascade size prediction scheme consistently achieves more than 90% classification accuracy under different experimental scenarios.
cs.SI
cs
Modeling Morphology of Social Network Cascades Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA M. Zubair Shafiq and Alex X. Liu {shafiqmu,alexliu}@cse.msu.edu 3 1 0 2 b e F 0 1 ] I S . s c [ 1 v 6 7 3 2 . 2 0 3 1 : v i X r a ABSTRACT Cascades represent an important phenomenon across vari- ous disciplines such as sociology, economy, psychology, po- litical science, marketing, and epidemiology. An important property of cascades is their morphology, which encompasses the structure, shape, and size. However, cascade morphol- ogy has not been rigorously characterized and modeled in prior literature. In this paper, we propose a Multi-order Markov Model for the Morphology of Cascades (M 4C) that can represent and quantitatively characterize the morphol- ogy of cascades with arbitrary structures, shapes, and sizes. M 4C can be used in a variety of applications to classify different types of cascades. To demonstrate this, we apply it to an unexplored but important problem in online social networks -- cascade size prediction. Our evaluations using real-world Twitter data show that M 4C based cascade size prediction scheme outperforms the baseline scheme based on cascade graph features such as edge growth rate, degree distribution, clustering, and diameter. M 4C based cascade size prediction scheme consistently achieves more than 90% classification accuracy under different experimental scenar- ios. Categories and Subject Descriptors C.4 [Computer System Organization]: Performance of Systems -- Modeling techniques; J.4 [Computer Applica- tions]: Social and Behavioral Sciences General Terms Experimentation, Measurement, Theory Keywords Cascades, Markov Chains, Social Networks Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 2013 ACM X-XXXXX-XX-X/XX/XX ...$10.00. 1. INTRODUCTION 1.1 Background and Motivation The term cascade describes the phenomenon of something propagating along the links in a social network. That some- thing can be information such as a URL, action such as a monetary donation, influence such as buying a product, dis- cussion such as commenting on a blog article, and a resource such as a torrent file. Based on what is being propagated, we can categorize cascades into various classes such as informa- tion cascades [6], action cascades [8], influence cascades [20], discussion cascades [13], and resource cascades [33]. Con- sider a toy example where user A, connected to users B and C in a social network, broadcasts a piece of information (e.g. a picture or a news article) to his neighbors. Users B and C, after receiving it from user A, may further rebroadcast it to their neighbors resulting in the formation of a cascade. Cascade phenomenon has been a fundamental topic in many disciplines such as sociology, economy, psychology, po- litical science, marketing, and epidemiology with research literature tracing back to the 1950s [30]. A key challenge in these studies is the lack of large scale cascade data. As online social networks have recently become a primary way for people to share and disseminate information, the massive amount of data available on these networks pro- vides unprecedent opportunities to study cascades at a large scale. Recent events, such as the Iran election protests, Arab Spring, Japanese earthquake, and London riots, have been significantly impacted by campaigns via cascades in online social networks [36, 27, 10]. Studying cascades in online so- cial networks will benefit a variety of domains such as social campaigns [36], product marketing and adoption [25], online discussions [13], sentiment flow [26], URL recommendation [29], and meme tracking [14]. 1.2 Problem Statement The goal of this paper is to study the morphology of cas- cades in online social networks. Cascade morphology en- compasses many aspects of cascades such as their structures, shapes, and sizes. Specifically, we aim to develop a model that allows us to represent and quantitatively characterize cascade morphology; which are extremely difficult without a model. There are two important requirements on the de- sired model of cascade morphology. First, this model should have enough expressivity and scalability to allow us to repre- sent and describe cascades with arbitrary structures, shapes, and sizes. Real-world cascades sometimes have large sizes, containing thousands of nodes and edges [22]. Second, this model should allow us to quantitatively characterize and rig- orously analyze cascades based on the features extracted from this model. 1.3 Limitations of Prior Art Despite the numerous publications regarding different as- pects of online social networks, little work has been done on the morphology of cascades. Recently some researchers have studied the structure of cascades [23, 22, 36, 13]; however, their analysis of cascade structures is limited to basic struc- tural properties such as degree distribution, size, and depth. These structural properties of cascades are important; how- ever, they are far from being sufficient to precisely describe and represent cascade morphology. 1.4 Proposed Model In this paper, we propose a Multi-order Markov Model for the Morphology of Cascades (M 4C) that can represent and quantitatively characterize the morphology of cascades with arbitrary structures, shapes, and sizes. M 4C has two key components: a cascade encoding algorithm and a cas- cade modeling method. The cascade encoding algorithm uniquely encodes the morphology of a cascade for quantita- tive representation. It encodes a cascade by first perform- ing a depth-first traversal on the cascade graph and then compressing the traversal results using run-length encoding. The cascade modeling method models the run-length en- coded sequence of a cascade as a discrete random process. This random process is further modeled as a Markov chain, which is then generalized into a multi-order Markov chain model. M 4C satisfies the aforementioned two requirements. First, this model can precisely represent cascades with arbi- trary structures, shapes, and sizes. Second, this model al- lows us to quantitatively characterize cascades with different attributes using the state information from the underlying multi-order Markov chain model. 1.5 Experimental Evaluation To demonstrate the effectiveness of our M 4C model in quantitatively characterizing cascades, we use it to investi- gate an unexplored but important problem in online social networks -- cascade size prediction: given the first τ1 edges in a cascade, we want to predict whether the cascade will have a total of at least τ2 (τ2 > τ1) edges over its lifetime. This prediction has many real-world applications. For example, media companies can use it to predict social media stories that can potentially go viral [15, 29]. Furthermore, solving this problem enables early detection of epidemic outbreaks and political crisis. Despite its importance, this problem has not been addressed in prior literature. We validate the effectiveness of M 4C based cascade size prediction scheme on a real-world data set collected from Twitter containing more than 8 million tweets, involving more than 200 thousand unique users. The results show that our M 4C based cascade size prediction scheme consis- tently achieves more than 90% classification accuracy under different experimental scenarios. We also compare our M 4C based cascade size prediction scheme with a baseline predic- tion scheme based on cascade graph features such as edge growth rate, degree distribution, clustering, and diameter. The results show that M 4C allows us to achieve significantly better classification accuracy than the baseline method. 1.6 Key Contributions In this paper, we not only propose the first cascade mor- phology model, but also propose the first cascade size pre- diction scheme based on our model. In summary, we make the following key contributions in this paper. 1. We propose M 4C for representing and quantitatively characterizing the morphology of cascades with arbi- trary structures, shapes, and sizes. 2. To demonstrate the effectiveness of our M 4C model in quantitatively characterizing cascades, we develop a cascade size prediction scheme based on M 4C features and compare its performance with that based on non- M 4C features. The rest of this paper proceeds as follows. We first review related work in Section 2. We then introduce our proposed model in Section 3. We describe the details of our Twitter data set in Section 4. We present the experimental results of the aforementioned application in Section 5. Finally, we conclude in Section 6 with an outlook to our future work. 2. RELATED WORK Cascades in online social networks have attracted much attention and investigation; however, little work has been done on cascade morphology. Below we summarize the prior work related to cascade morphology. 2.1 Shape Zhou et al. studied Twitter posts (i.e., tweets) about the Iranian election [36]. In particular, they studied the fre- quency of pre-defined shapes in cascades. Their experimen- tal results showed that cascades tend to have more width than depth. The largest cascade observed in their data has a depth of seven hops. Leskovec et al. studied patterns in the shapes and sizes of cascades in blog and recommenda- tion networks [24, 23]. Their work is also limited to studying the frequency of fixed shapes in cascades. 2.2 Structure Kwak et al. investigated the audience size, tree height, and temporal characteristics of the cascades in a Twitter data set [22]. Their experimental results showed that the audience size of a cascade is independent of the number of neighbors of the source of that cascade. They found that about 96% of the cascades in their data set have a height of 1 hop and the height of the biggest cascade is 11 hops. They also found that about 10% of cascades continue to expand even after one month since their start. Romero et al. specifically stud- ied Twitter cascades with respect to hashtags in terms of degree distribution, clustering, and tie strengths [31]. The results of their experiments showed that cascades from di- verse topics (identified using hashtags), such as sports, mu- sic, technology, and politics, have different characteristics. Similarly, Rodrigues et al. studied structure-related proper- ties of Twitter cascades containing URLs [29]. They stud- ied cascade properties like height, width, and the number of users for cascades containing URLs from different web domains. Sadikov et al. investigated the estimation of the sizes and depths of information cascades with missing data [32]. Their estimation method uses multiple features includ- ing the number of nodes, the number of edges, the number (a) Follower Graph (b) Cascade (c) Depth First Tree Figure 1: Toy example of cascade construction and encoding. of isolated nodes, the number of weakly connected compo- nents, node degree, and non-leaf node out-degree. Their em- pirical evaluation using a Twitter data set showed that their method accurately estimates cascade properties for varying fractions of missing data. 2.3 Simulation Gomez et al. studied the structure of discussion cascades in Wikipedia, Slashdot, Barrapunto, and Meneame using features solely based on the depth and degree distribution of cascades [13]. They also developed a generative model based on the maximum likelihood estimation of preferential at- tachment process to simulate synthetic discussion cascades. However, their model does not capture morphological prop- erties of cascades and is limited to generation of synthetic discussion cascades. 3. PROPOSED MODEL In this section, we present M 4C for quantitatively repre- senting the morphology of cascades in online social networks. It consists of two major components. The first component encodes a given cascade graph for quantitative represen- tation such that its morphological information is retained. The second component models the encoded sequence using a multi-order Markov chain. Before we describe these two components, we first present the details of the cascade graph construction process. 3.1 Cascade Graph Construction A social network can be represented using two graphs, a relationship graph and a cascade graph. Both graphs share the same set of nodes (or vertices) V , which represents the set of all users in a social network. A relationship graph rep- resents the relationships among users in a social network. In this graph, nodes represent users and edges represent the relationship among users. If the edges are directed, where a directed edge from user u to user v denotes that v is a fol- −→ lower of u, then this graph is called a follower graph, denoted Ef is the set of as (V, directed edges. If the edges are undirected, where an undi- rected edge between user u and user v denotes that u and v are friends, then this graph is called a friendship graph, −→ Ef ), where V is the set of users and denoted as (V, Ef ), where V is the set of users and Ef is the −→ set of undirected edges. By the nature of our study, we focus on the follower graph denoted as Gf = (V, Ef ). The cascade graph represents the dynamic activities that are taking place in a social network (such as users sharing a URL or joining a −→ group). A cascade graph is an acyclic directed graph denoted as Gc = (V, Ec is a set of directed edges where a directed edge e = (u, v) from user u to user v represents the propagation of something from Ec and output is the time when the propagation along edge e happens. u to v, and T is a function whose input is an edge e ∈ −→ −→ Ec, T ) where V is the set of users, While the static relationship graph is easy to construct from a social network, the dynamic cascade graph is non- trivial to construct because there maybe multiple propaga- tion paths from the cascade source to a node. So far there is no consensus on cascade graph construction in prior liter- ature. In this paper, we use a construction method that is similar to the method described in [32]. We next explain our construction method through a Twitter example. Consider the follower graph in Figure 1(a). Let (u, t) denote a user u performing an action, such as posting a URL on u's Twit- ter profile, at time t. Suppose the following actions happen in the increasing time order: (A, t1), (B, t2), (D, t3), (C, t4), (E, t5), where t1 < t2 < t3 < t4 < t5. Suppose (A, t1) de- notes that A posts a URL on his Twitter profile, and all other actions (namely (B, t2), (D, t3), (C, t4), and (E, t5)) are reposting the same URL from A. The cascade graph regarding the propagation of this URL is constructed as follows. First, A is the root of the cascade graph because it is the origin of this cascade. Second, B reposting A's tweet (which is a URL in this example) at time t2 must be under A's influence because there is only one path from A to B in the follower graph in Figure 1(a). Therefore, in the cascade graph in Figure 1(b), there is an edge from A to B with time stamp t2. Note that each repost (or retweet in Twitter's terminology) contains the origin of the tweet (A in this example). Third, however, D reposting A's tweet at time t3 could be under either A's influence (because there is a path from A to D in the follower graph in Figure 1(a) and t1 < t3) or B's influence (because there is a path from B to D in the follower graph as well and t2 < t3). Note that even if D sees A's tweet through B's retweet, the repost of A's tweet on D's profile does not contain any information about B and only shows that the origin of the tweet is A. In this scenario, we assume that D is partially influenced by both A and B, instead of assuming that D is influenced by either user B or A, because this way we can retain more information with respect to the corresponding follower graph. Therefore, there is an edge from A to D and another edge from B to D in the cascade graph shown in Figure 1(b), where the time stamps of both edges are t3. Similarly, we add the edge from B to C with a time stamp t4 and the edge from D to E with a time stamp t5 in the cascade graph. 3.2 Cascade Encoding The first step in cascade encoding is to encode the con- structed cascade graph as a binary sequence that uniquely represents the structure of the cascade graph. Graph encod- ing has been studied for a wide range of problems across several domains such as image compression, text and speech recognition, and DNA profiling [28, 3, 16]. The typical goal of graph encoding is to transform large geometric data into a succinct representation for efficient storage and processing. However, our goal here is to encode a given cascade graph in a way that its morphological information is captured. To- wards this end, we use the following graph encoding algo- rithm. We first conduct a depth-first traversal of the constructed cascade graph starting from the root node, which results in a spanning tree. To result in a unique spanning tree, at each node in the cascade graph, we sort the outgoing edges in the increasing order of their time stamps, i.e., sort the outgoing edges e1, e2,··· , ek of a node so that T (e1) < T (e2) < ··· < T (ek); and then traverse them in this order. For each edge, we use 1 to encode its downward traver- sal and 0 to encode its upward traversal. Figure 1(c) shows the traversal of the cascade graph in Figure 1(b) and the encoding of each downward or upward traversal. The binary −→ encoding results from this traversal process is 11011000. Let C represent the binary code of a cascade graph G = (V, E ). Then the length of the binary code C is always twice the size of the edge set −→ E. Furthermore, let C[i] be the i-th element of the binary code and I(C[i]) be an indicator function so that I(C[i]) = 1 if C[i] = 1, and I(C[i]) = −1 if C[i] = 0. Because each edge is exactly tra- versed twice, one downward and one upward, we have: E, i.e., C = 2−→ C(cid:88) I(C[i]) = 0. i=1 The second step in cascade encoding is to convert the bi- nary sequence, which is obtained from the depth-first traver- sal of the cascade graph, into the corresponding run-length encoding. A run in a binary sequence is a subsequence where all bits in this subsequence are 0s (or 1s) but the bits before and after the subsequence are 1s (or 0s), if they exist. By replacing each run in a binary sequence with the length of the run, we obtain the run-length encoding of the binary se- quence [19]. For example, for the binary sequence 11011000, the corresponding run-length encoding is 2123. Since the bi- nary sequence obtained from our depth-first traversal of a cascade graph always starts with 1, the run-length encoding uniquely and compactly represents the binary sequence. 3.3 Markov Chain Model of Cascades We want to model cascade encoding to capture charac- teristics of cascades so that they can be used to identify the similarities and differences among cascades. This model should allow us to extract morphological features for differ- ent classes of cascades and then use these features to classify them. We first present our model, and then demonstrate its usefulness in classifying cascades. Consider the run-length encoded sequence C of a cascade graph G. We can model this sequence using a discrete ran- dom process { Ck}, k = 1, 2, ..., C. Basic analysis of this pro- cess reveals that there is some level of dependencies among the consecutive symbols emitted by the random process. In other words, it would be unreasonable to assume that the process is independent or memoryless. Meanwhile, to bal- ance between capturing some of the dependencies within the process and to simplify the mathematical treatment of this encoded sequence, we resort to invoking the Markovian assumption [5]. As we show later, this assumption can be reasonably justified (to some extent) by analyzing the au- tocorrelation function of the underlying process { Ck}. For a first order Markov process, this implies the following as- sumption: P r[ Cn = cn C1 = c1, C2 = c2, ..., Cn−1 = cn−1] = P r[ Cn = cn Cn−1 = cn−1]. Equivalently: P r[c1, c2, ..., cn] = P r[c1]P r[c2c1]...P r[cncn−1]. (1) In other words, we invoke the Markovian assumption about the underlying cascade process and its morphology, which is represented by the encoded sequence C. Given the Markovian assumption with homogeneous time- invariant transition probabilities, C can be represented using a traditional Markov chain. Figure 2 shows the Markov chain corresponding to the toy example in Figure 1, where each unique symbol in C is represented as a state. The Markov chain in Figure 2 has 3 states because there are 3 unique symbols in its run-length encoding. Figure 2: Markov chain model for the toy example. A Markov chain can also be specified in terms of its state transition probabilities, denoted as T . Hence, for the toy example of Figure 2, we have:  P11 P12 P13 P21 P22 P23 P31 P32 P33  , T = where Pij represents the conditional probabilities P r[ Cn = i Cn−1 = j]. The Markov chain framework allows us to quan- 231P12P31P23P13P11P22P33P21P31 tify the probability of an arbitrary sequence of states by us- ing Equation 1. This will help us to identify sequences that are more (or less) probable in one class of cascades. We next further generalize the above basic Markov chain model. 3.4 Multi-order Generalization Each element of the state transition matrix of a Markov chain is equivalent to a sub-sequence of C, which in turn is equivalent to a subgraph of the corresponding cascade. We can generalize a Markov chain model by incorporating multi- ple consecutive transitions as a single state in the state tran- sition matrix, which will allow us to specify arbitrary sized subgraphs of cascades. Such generalized Markov chains are called multi-order Markov chains and are sometimes referred to as full-state Markov chains [21]. The order of a Markov chain represents the extent to which past states determine the present state. The basic Markov chain model introduced earlier is of order 1. Autocorrelation is an important statistic for selecting ap- propriate order for a Markov chain model [5]. For a given lag t, the autocorrelation function of a stochastic process, Xm (where m is the time or space index), is defined as: E{X0Xt} − E{X0}E{Xt} , ρ[t] = σX0 σXt (2) where E(·) represents the expectation operation and σXi is the standard deviation of the random variable at time or space lag i. The value of the autocorrelation function lies in the range [−1, 1], where ρ[t] = 1 indicates perfect cor- relation at lag t and ρ[t] = 0 means no correlation at lag t. Figure 3 plots the sample autocorrelation function of the run-length encoding of an example cascade. The dashed hor- izontal lines represent the 95% confidence envelope. For this particular example, we observe that sample autocorrelation values jump outside the confidence envelope at lag = 3. This indicates that the underlying random process has the third order dependency. Thus, we select the third order for Markov chain model for this particular cascade. The autocorrelation- based analysis of more complex cascades can lead to even higher order Markov chains. Figure 3: Sample autocorrelation function for the toy example. The number of possible states of a Markov chain increase exponentially with an increase in the order of the Markov chain model. For the n-th order extension of a Markov chain with k states, the total number of states is kn. Figure 4 shows the plot of the second order extension of the 3-state, 1-st order Markov chain model shown in Figure 2. This second order Markov chain contains a total of 32 = 9 states, 4 of which are shown in the figure due to space limitations. In this second order Markov chain model, the conditional probabilities are in the form Pi,jk,l and the state transition matrix is now defined as follows.  T2 = P1,11,1 P1,11,2 P1,11,3 P1,21,1 P1,21,2 P1,21,3 P1,31,1 P1,31,2 P1,31,3 . . . . . . P3,21,1 P3,21,2 P3,21,3 P3,31,1 P3,31,2 P3,31,3 ... P1,13,3 ... P1,23,3 ... P1,33,3 . . . . . . ... P3,23,3 ... P3,33,3 . .  Figure 4: Multi-order generalization of the Markov chain model for the toy example. For a set of cascade encoding sequences, let T denote the set of selected orders as per the aforementioned criterion. We select the maximum value in T, denoted by Tmax, as the order of a single Markov chain model that we want to employ. 3.5 Cascade Classification As mentioned in Section 1.2, an important desirable prop- erty for our proposed model is to identify differentiating fea- tures of cascade morphology that can be potentially lever- aged for automated classification of cascades. We now show how to use the aforementioned Markov chain model to clas- sify cascades. 3.5.1 Feature Selection The essence of our modeling approach is to capture the morphology of a cascade through the states of the multi- order Markov model. Each state in the Markov chain repre- sents a likely sub-structure of cascades' morphology. Thus, we can use these states to serve as underlying features that can be used to characterize a given cascade and to determine the class that it might belong to. However, as mentioned earlier, the number of states in a Markov chain increase ex- ponentially for higher orders and so does the complexity of the underlying model. Furthermore, higher order Markov 05101520−0.4−0.200.20.40.60.8LagSample Autocorrelation1,21,31,1P1,11,2P1,21,1P1,31,2P1,31,1P1,21,3P1,11,33,3P3,31,1...P1,13,3P3,31,2P3,31,3P1,33,3P1,23,3P1,11,1P1,21,2P1,31,3P3,33,3 chains require a large amount of training data to identify a subset of states that actually appear in the training data. In other words, a Markov chain model trained with limited data is typically sparse. Therefore, we use the following two approaches to systematically reduce the number of states in the Markov chain of order Tmax. First, we can combine multiple states in the Markov chain to reduce its number of states. By combining states in a multi-order Markov chain, we are essentially using states from lower order Markov chains. We need to establish a criterion to combine states in the Markov chain. Towards this end, we use the concept of typicality of Markov chain states. Typicality allows us to identify a typical subset of Markov chain states by generating its realizations [5]. Be- fore delving into further details, we first state the well- known typicality theorem below: For any stationary and irreducible Markov process X and a constant c, the se- quence x1, x2, ..., xm is almost surely (n, )-typical for every n ≤ c log m as m → ∞. A sequence x1, x2, ..., xm is called (n, )-typical for a Markov process X if P (x1, x2, ..., xn) = 0, whenever P (x1, x2, ..., xn) = 0, and (cid:12)(cid:12)(cid:12)(cid:12) < , when P (x1, x2, ..., xn) > 0. − 1 (cid:12)(cid:12)(cid:12)(cid:12) P (x1, x2, ..., xn) P (x1, x2, ..., xn) Here P (x1, x2, ..., xn) and P (x1, x2, ..., xn) are the empirical relative frequency and the actual probability of the sequence x1, x2, ..., xn, respectively. In other words, P (x1, x2, ..., xn) ≈ P (x1, x2, ..., xn). This theorem shows us a way of empirically identifying typ- ical sample paths of arbitrary length for a given Markov process. Based on this theorem, we generate realizations (or sample paths) of arbitrary lengths from the transition ma- trix of the Markov process. By generating a sufficiently large number of sample paths of a given length, we can identify a relatively small subset of sample paths that are typical. Using this criterion, we select a subset of up to top-100, 000 typical states as potential features, whose lengths vary in the range [0, Tmax]. In what follows, we further short-list the Markov states from the top-100, 000 typical subset and use them as features to classify cascades. Second, to further reduce the number of features to be employed in a classifier, we need to prioritize the aforemen- tioned typical Markov states. The prioritization of features can be based on their differentiation power. An information theoretic measure that can be used to quantify the differ- entiation power of features (Markov states in our case) is information gain [7]. In this context, information gain is the mutual information between a given feature Xi and the class variable Y . For a given feature Xi and the class variable Y , the information gain of Xi with respect to Y is defined as: IG(Xi; Y ) = H(Y ) − H(Y Xi), where H(Y ) denotes the marginal entropy of the class vari- able Y and H(Y Xi) represents the conditional entropy of Y given feature Xi. In other words, information gain quan- tifies the reduction in the uncertainty of the class variable Y given that we have complete knowledge of the feature Xi. Note that, in this paper, the class variable Y is {0, 1} because we apply our morphology modeling framework to problems that require differentiating between two classes of cascades (as described later). In this study, we eventually only select the top-100 features with highest information gain. 3.5.2 Classification Let us assume that the presence of a state i is represented by a binary random variable Xi, i = 1, 2, ..., 100. Hence, P (Xi = 1) represents the probability for the presence of state Xi. We can think of the Xis as the variables repre- senting potential features. Thus, our training process pro- ceeds as follows. For a given class Y of cascades, we evalu- ate the presence of a given feature (state) Xi in Y by an- alyzing a sufficiently large number of sample cascades that belong to the class Y . Subsequently, we are able to evaluate the a-priori conditional probability P (XiY ) for each class Y ∈ {1, 2, ..., k}, where the number of classes k is usually very small. In our case, we are interested in the traditional binary classifier with k = 2. However, note that this classifi- cation methodology can be extended to the cases with k > 2 using the well-known one-against-one (pairwise) or multiple one-against-all formulations [17]. We can jointly use multiple features to differentiate be- tween two sets of cascades belonging to different classes. In particular, given the top-100 features with respect to infor- mation gain, we can classify cascades by deploying a ma- chine learning classifier. In this study, we use a Bayesian classifier to jointly utilize the selected features to classify cas- cades. Naıve Bayes is a popular probabilistic classifier that has been widely used in the text mining and bio-informatics literature, and is known to outperform more complex tech- niques in terms of classification accuracy [35]. It trains us- ing two sets of probabilities: the prior, which represents the marginal probability P (Y ) of the class variable Y ; and the a- priori conditional probabilities P (XiY ) of the features Xi given the class variable Y . As previously explained, these probabilities can be computed from the training set. Now, for a given test instance of a cascade with observed features Xi, i = 1, 2, ..., n, the a-posteriori probability P (Y X (n)) can be computed for both classes Y ∈ {0, 1}, where X (n) = (X1, X2, ..., Xn) is the vector of observed features in the test cascade under consideration: P (Y X (n)) = P (X (n), Y ) P (X (n)) = P (X (n)Y )P (Y ) P (X (n)) (3) n(cid:89) The naıve Bayes classifier then combines the a-posteriori probabilities by assuming conditional independence (hence the "naıve" term) among the features. P (X (n)Y ) = P (XiY ). (4) i=1 Although the independence assumption among features makes it feasible to evaluate the a-posteriori probabilities with much lower complexity, it is unlikely that this assump- tion truly holds all the time. For our study, we mitigate the effect of the independence assumption by pre-processing the features using the well-known Karhunen-Loeve Transform (KLT) to uncorrelate them [9]. In the following section, we provide details of the data set that we have collected to demonstrate the usefulness of our M 4C model. (a) Radial layout of example cascade # 1 (b) Circular layout of example cascade # 1 (c) Radial layout of example cascade # 2 (d) Circular layout of example cascade # 2 Figure 5: Typical examples of real-world Twitter cascades. 4. DATA SET 4.1 Data Collection Among the popular online social networks, Twitter is one of the social networks that allows systematic collection of public data from its site. Therefore, we chose to study the morphology of cascades appearing on Twitter. To collect data from Twitter, we focused on tweets related to the Arab Spring event, which represents an ideal case study because it spans several months. For countries involved in the Arab Spring event, we collected data from Twitter during one complete week in March 2011. We provide more details of the data collection process in the following text. For our study, we separately collected two data sets from Twitter. The first data set was collected using Twitter's streaming API, which allows the realtime collection of public tweets matching one or more filter predicates [2]. To collect tweet data pertaining to a given country, we provided rel- evant keywords as filter predicates. For example, we used the keywords 'Libya' and 'Tripoli' to collect tweets related to Libya. In total, we collected tweets for 8 countries over a period of a week in March 2011. Using Twitter's streaming API, we collected more than 8 million tweets involving more than 200 thousand unique users. As mentioned in Section 3.1, we cannot accurately con- struct cascade graphs without information about whom the users are following. The one-way following policy of Twit- ter results in three types of relationships between two given users: (1) both follow each other, (2) only one of them fol- lows the other, and (3) they do not follow each other. Twitter provides follower information for a given user via a separate interface called REST API [2]. REST API employs aggres- sive rate limiting by allowing clients to make only a limited number of API calls in an hour. Twitter applies this limit based on the public IP address or authentication token from the client who issues the request. Currently, rate limiting for REST API permits only 150 requests per hour for unau- thenticated users and 350 requests per hour for authenti- cated users. In our tweet data set, we encountered more than 200, 000 unique users and we were required to make at least one request per user to get the follower list. For each user who follows more than 5000 users, we had to make a separate call to get each subset of 5000 users. Here it is noteworthy that some users were following or were being fol- lowed by millions of users, requiring thousands of separate calls for each user. It would take us several months to collect this data if we were to use a single authentication token or a single external IP address. To overcome this limitation, we utilized dozens of public proxy servers to parallelize calls to Twitter's REST API [34]. Using this methodology, we collected follower lists of all users in less than a month. Twitter provides a "re-tweet" functionality which allows users to re-post the tweet of other users to their profiles. The reference to the user with original tweet is maintained in all subsequent re-tweets. There is no information on in- termediate users in re-tweets. Using the follower graph, we constructed cascade graphs for all sets of re-tweets which are essentially cascades. Therefore, the overall graph is a union of all cascades in our data. In Figure 5, we visualize two cascades in our data set using radial and circular layout methods in Graphviz [1]. In a radial layout, we choose the user with original tweet as a center vertex (or root vertex in general) and the remaining vertices are put in concen- tric circles based on their proximity to the center vertex. In a circular layout, all components are plotted separately with their respective vertices in a circular format. Visualiza- tion of two example cascades provides us interesting insights about their morphology. From the first example, we observe that the degree of vertices typically decreases as their dis- tance from the root vertex increases. However, for the second example, we observe that subsequent vertices have degrees comparable to the root vertex. In this paper, our aim is to capture such differences in an automated fashion using our proposed model. 4.2 Data Analysis We now analyze the structural features of the cascades in our collected data set in terms of degree, path, and con- nectivity. Later in Section 5, we will use these features for baseline comparison with our proposed model in terms of classification accuracy. For structural features that can only be computed from undirected graphs, such as clustering co- efficient and diameter, we compute them on the undirected versions of cascade graphs. 4.2.1 Degree Properties We first jointly study the number of edges and the number of nodes for all cascades in our data set. The cascade graphs in our data set are connected and each user in the cascade graph has at least one inward or outward edge. Therefore, the number of edges in a cascade graph E has the lower (a) Edge and node counts (b) Root node degree and average path length (c) Diameter (d) Number of spanning trees (e) Clustering coefficient (f) Clique number Figure 6: Distributions of various cascade graph attributes in the Twitter data set. bound: E ≥ V − 1, where V is the number of users par- ticipating in the cascade. Figure 6(a) shows the scatter plot between edge and node counts for all cascades in our data set. Note that we use the logarithmic scale for both axes. From this figure, we observe that the scatter plot takes the form of a strip whose thickness represents the average num- ber of additional edges for each node. The average thickness of this strip approximately corresponds to having twice the number of edges compared to the number of nodes. 4.2.2 Path Properties Another important characteristic of a cascade is the degree of the root node (user who initiated the cascade), which typ- ically has the highest degree compared to all other nodes in a cascade graph. In our data set, the root node has the high- est degree compared to all other nodes in cascade graphs for more than 92% of the cascades. The degree of the root node essentially represents the number of different routes through which cascade propagates in an online social network. Note that these paths may merge together after the first hop; however, we expect some correlation between the degree of 100101102103100101102103Edge CountNode Count10010110210311.522.533.54Root Node DegreeAverage Shortest Path Length024681000.20.40.60.81DiameterProbability1020304050607080901000.850.90.951Spanning Tree Count (ex) CDF0.00.10.20.30.40.50.60.70.80.91.00.860.880.90.920.940.960.981Average Clustering CoefficientCDF123456700.20.40.60.81Clique NumberProbability root node and the number of unique routes through which a cascade propagates. One relevant characteristic of a graph is average (shortest) path length (AP L), which denotes the average of all-pair shortest paths [4]. (cid:88) AP L = ∀i,j∈V,i(cid:54)=j d(i, j) V (V − 1) , where d(i, j) is the shortest path length between users i and j. We expect the average path length of a cascade to be pro- portional to the degree of the root node. Figure 6(b) shows the scatter plot of the root node degree and the average path length. As expected, we observe that cascades with higher root node degrees tend to have larger average path lengths. We have changed the x-axis to logarithm scale to emphasize this relationship. Another fundamental characteristic of a graph is called diameter, which denotes the largest value of all-pair shortest paths [4]. Figure 6(c) shows the distribution of diameter of cascades in our data set. The bars represent the probability mass function and the line represents the cumulative density function (CDF). The minimum diameter is 1 because the minimum number of nodes in a cascade is 2. Cascades with more than 2 nodes can have a diameter of 1 only if they are cliques. In our data set, approximately 40% cascades have a diameter of 1. The largest cascades in our data set have a diameter of 9. Finally, we can characterize the number of unique paths that connect nodes in a graph by using the notion of span- ning trees. For a given graph, the number of unique paths between nodes is proportional to the number of spanning trees. The number of spanning trees of a graph G, denoted by t(G), is given by the product of non-zero eigenvalues of the Laplacian matrix and the reciprocal of the number of nodes [4]. t(G) = 1 n λ1λ2...λn−1, where n is the number of nodes of the graph and λi is the i-th eigenvalue of the Laplacian matrix of the graph and λi (cid:54)= 0,∀i. Figure 6(d) shows the CDF of the number of spanning trees for cascades in our data set. Note that the x-axis is converted to logarithm scale. We observe that only a small fraction (< 15%) of cascades have more than one spanning tree in our data set, which highlights their sparsity. 4.2.3 Connectivity Properties The clustering coefficient of a vertex vi is denoted by ci and is defined as the ratio of the number of existing edges among vi and vi's neighbors and the number of all possible edges among them [4]. Using ∆i to denote the number of triangles containing vertex vi and di to denote the degree of vertex vi, the clustering coefficient of vertex vi is defined as: ∆i(cid:0)di (cid:1) = 2 ci = 2∆i di(di − 1) The average clustering coefficient of a graph G with n nodes is simply the mean of clustering coefficients of individual nodes. (cid:88) ∀i ci Cavg = 1 n Figure 6(e) shows the CDF of the average clustering coeffi- cient for all cascades in our data set. We note that approx- imately 86% of all cascades in our data set have average clustering coefficient value equal to 0, i.e., they do not have a single triangle. Only a small fraction (less than 2%) of cascades in our data set have clustering coefficient values greater than 0.5, which again highlights their sparsity. We are also interested in investigating the sizes of cliques in cascades that have one or more triangles. Towards this end, we study the clique numbers of all cascade graphs in our data set. The clique number of a graph is the number of vertices in its largest clique [4]. Figure 6(f) shows the distribution of clique number for all cascades in our data set. Similar to our observation in Figure 6(e), we observe that approximately 86% of cascades have a clique number of 2, which means that they do not have a triangle. A little more than 10% of cascades have at least one triangle. The largest clique number observed in our data set is 6. 5. CASCADE SIZE PREDICTION To demonstrate the effectiveness of our M 4C model in quantitatively characterizing cascades, we use it to investi- gate an unexplored but fundamental problem in online social networks - cascade size prediction: given the first τ1 edges in a cascade, we want to predict whether the cascade will have a total of at least τ2 (τ2 > τ1) edges over its lifetime. Be- sides serving the purpose of validating the relevance of our M 4C model, this prediction has many real-world applica- tions. For instance, it is useful for media organizations to forecast popular news stories [15]. Likewise, popular videos on social media -- if predicted early -- can be cached by con- tent distribution networks at their servers to achieve better performance [29]. Furthermore, solving this problem enables the early detection of epidemic outbreaks and political crisis. To the best of our knowledge, this problem has not been investigated in prior literature. The closest effort is that Galuba et al. analyzed the cascades of URLs on Twitter to predict URLs that users will tweet [12]. Their proposed approach achieved about 50% true positive rate with about 15% false positive rate. Unfortunately, this accuracy is not much useful in practice. We compare the prediction performance of M 4C based scheme with a baseline scheme that uses the following 8 cas- cade graph features with Naıve Bayes classifier: (1) edge growth rate, (2) number of nodes, (3) degree of the root node, (4) average shortest path length, (5) diameter, (6) number of spanning trees, (7) clustering coefficient, and (8) clique number. We evaluate the effectiveness of these schemes in terms of the following decision sets. 1. True Positives (TPs): The set of cascades that are cor- rectly predicted to have a total of at least τ2 edges over their lifetime. 2. False Positives (FPs): The set of cascades that are incorrectly predicted to have a total of at least τ2 edges over their lifetime. 3. True Negatives (TNs): The set of cascades that are correctly predicted to have a total of less than τ2 edges over their lifetime. 4. False Negatives (FNs): The set of cascades that are incorrectly predicted to have a total of less than τ2 edges over their lifetime. We further quantify the effectiveness of both cascade size prediction schemes in terms of the following three Receiver (a) Detection Rate (b) False Positive Rate (c) Precision Figure 7: Classification results of M 4C and baseline schemes for varying values of τ1, at τ2 − τ1 = 10. Figure 8: Evaluation setup for varying τ1. Figure 9: ROC plot of M 4C based scheme for varying τ1. Operating Characteristic (ROC) metrics [11]. T P s T P s + F N s Detection Rate = False Positive Rate = F P s F P s + T N s Precision = T P s + T N s T P s + T N s + F P s + F N s (5) (6) (7) the values of τ1 and τ2 − τ1 are, the more imbalanced the two classes are. To mitigate the potential adverse effect of class imbalance [18], we employ instance re-sampling to en- sure that both classes have equal number of instances before the cross-validation evaluations. Below we discuss the clas- sification accuracies of both schemes as we vary the values of τ1 and τ2. To ensure that the classification results are generalizable, we divide the data set into k folds and use k − 1 of them for training and the left over for testing. We repeat these exper- iments k times and report the average results in the follow- ing text. This setup is called stratified k-fold cross-validation procedure [35]. For all experimental results reported in this paper, we use the value of k = 10. In this paper, we treat the cascade size prediction prob- lem to an equivalent cascade classification problem: given a cascade with τ1 edges, classify it into two classes: the class of cascades that will have less than τ2 edges over their lifetime and the class of cascades that will have greater than or equal to τ2 edges over their lifetime. We use the initial τ1 edges to train both the cascade size prediction scheme based on our M 4C model and the baseline scheme that is based on the known cascade graph features. For thorough evaluation, we vary the values of τ1 and τ2. Because the distribution of the number of edges in our data set is skewed, that is, most cas- cades having only a few edges over their lifetime, the larger Impact of Varying τ1 5.1 Figure 8 shows the evaluation setup as we vary the values of τ1 ∈ {10, 50, 100}, while keeping τ2 − τ1 fixed at 10. The solid, dashed, and dotted vertical black lines corresponds to τ1 = 10, 50, and 100. The solid, dashed, and dotted vertical grey lines all correspond to τ2 − τ1 = 100. The value of τ1 impacts the classification results because it determines the number of edges in each cascade that are available for train- ing. Therefore, larger values of τ1 generally improve training quality of both cascade size prediction schemes and lead to better prediction accuracy. Figure 7 plots the detection rate, false positive rate, and precision of M 4C and baseline schemes for varying τ1 ∈ {10, 50, 100}, while keeping τ2 − τ1 fixed at 10. Overall, we observe that M 4C consistently outperforms the baseline scheme with peak precision of 96% at τ1 = 100, τ2−τ1 = 10s. With some exceptions, we generally observe that the effec- tiveness of both schemes decreases as the value of τ1 is in- 10501000.50.60.70.80.91τ1Detection Rate M4CBaseline105010000.10.20.30.4τ1False Positive Rate M4CBaseline10501000.60.70.80.91τ1Precision M4CBaseline1001011021030.40.50.60.70.80.91Number of EdgesCDFτ1 = 10 →τ1 = 50 →τ1 = 100 →00.10.20.30.40.50.50.60.70.80.91False Positive RateDetection Rate τ1 = 100τ1 = 50τ1 = 10 (a) Detection Rate (b) False Positive Rate (c) Precision Figure 11: Classification results of M 4C and baseline schemes for varying values of τ2 − τ1, at τ1 = 10. Figure 10: Evaluation setup for varying τ2 − τ1. creased. The standard ROC threshold plots of M 4C shown in Figure 9 also confirm this observation. 5.2 Impact of Varying τ2 − τ1 Figure 10 shows the evaluation setup as we vary the values of τ2 − τ1 ∈ {10, 50, 100}, while keeping τ1 fixed at 10. The solid vertical black line corresponds to τ1 = 10. The solid, dashed, and dotted vertical grey lines correspond to τ2−τ1 = 10, 50, and 100, respectively. The value of τ2−τ1 also impacts the classification results because it determines the separation or distance between the two classes. Therefore, larger values of τ2 − τ1 generally lead to better prediction accuracy. Figure 11 plots the detection rate, false positive rate, and precision of M 4C and baseline schemes for varying values of τ2 − τ1. Once again, we observe that M 4C consistently outperforms the baseline scheme with peak precision of 99% at τ2 − τ1 = 100, τ1 = 10. We also observe that the classifi- cation performance of both methods improves as the value of τ2 − τ1 is increased. The standard ROC threshold plots of M 4C shown in Figure 12 also confirm this observation. Figure 12: ROC plot of M 4C based scheme for vary- ing τ2 − τ1. terize the morphology of cascades with arbitrary structures, shapes, and sizes. We then demonstrate the relevance of our M 4C model in solving the cascade size prediction problem. The experimental results using a real-world Twitter data set showed that M 4C significantly outperforms the base- line scheme in terms of prediction accuracy. In summary, our M 4C model allows us to formally and rigorously study cascade morphology, which is otherwise difficult. In this paper, we applied our M 4C model in the context of online social networks; however, our model is generally appli- cable to cascades in other contexts as well such as sociology, economy, psychology, political science, marketing, and epi- demiology. Applications of our model in these contexts are interesting future work to pursue. 7. REFERENCES [1] Graphviz - graph visualization software. http://www.graphviz.org. [2] Twitter API documentation. https://dev.twitter.com/docs. 6. CONCLUSIONS AND FUTURE WORK In this paper, we first propose M 4C, a multi-order Markov chain based model to represent and quantitatively charac- [3] A. Biem. Minimum classification error training for online handwriting recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:1041 -- 1051, 2006. 10501000.50.60.70.80.91τ2 − τ1Detection Rate M4CBaseline105010000.10.20.30.4τ2 − τ1False Positive Rate M4CBaseline10501000.60.70.80.91τ2 − τ1Precision M4CBaseline1001011021030.40.50.60.70.80.91Number of EdgesCDFτ1 = 10 →←τ2−τ1 = 10←τ2−τ1 = 50←τ2−τ1 = 10000.10.20.30.40.50.50.60.70.80.91False Positive RateDetection Rate τ2 − τ1 = 100τ2 − τ1 = 50τ2 − τ1 = 10 [4] A. Bondy and U. Murty. Graph Theory. Springer, [24] J. Leskovec, A. Singh, and J. Kleinberg. Patterns of influence in a recommendation network. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2006. [25] X. Li. Informational cascades in IT adoption. Communications of the ACM, 47(4), 2004. [26] M. Miller, C. Sathi, D. Wiesenthal, J. Leskovec, and C. Potts. Sentiment flow through hyperlink networks. In AAAI ICWSM, 2011. [27] T. Ray. The 'story' of digital excess in revolutions of the arab spring. Journal of Media Practice, 12(2):189 -- 196, 2011. [28] M. Reid, R. Millar, and N. D. Black. Second-generation image coding: An overview. Second-Generation Image Coding: An Overview, 29:3 -- 29, 1997. [29] T. Rodrigues, F. Benevenuto, M. Cha, K. P. Gummad, and V. Almeida. On word-of-mouth based discovery of the web. In ACM IMC, 2011. [30] E. M. Rogers. Diffusion of Innovations. Cambridge University Press, 2003. [31] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the mechanics of information diffusion across topics: Idioms, political hashtags, and complex contagion on Twitter. In ACM WWW, 2011. [32] E. Sadikov, M. Medina, J. Leskovec, and H. Garcia-Molina. Correcting for missing data in information cascades. In WSDM, 2011. [33] J. A. Starr and I. C. MacMillan. Resource cooptation via social contracting: Resource acquisition strategies for new ventures. Strategic Management Journal, 11:79 -- 92, 1990. [34] L. Wang, K. Park, R. Pang, V. Pai, and L. Peterson. Reliability and security in the CoDeeN content distribution network. In USENIX Annual Technical Conference, 2004. [35] I. H. Witten, E. Frank, and M. A. Hall. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 2011. [36] Z. Zhou, R. Bandar, J. Kong, H. Qian, and V. Roychowdhury. Information resonance on Twitter: Watching Iran. In SOMA, 2010. 2008. [5] P. Bremaud. Markov Chains. Springer, 2008. [6] M. Cha, A. Mislove, and K. P. Gummadi. A measurement-driven analysis of information propagation in the Flickr social network. In ACM WWW, 2009. [7] T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley-Interscience, 1991. [8] K. Dave, R. Bhatt, and V. Varma. Modelling action cascades in social networks. In AAAI Conference on Weblogs and Social Media, 2011. [9] R. Dony. The Transform and Data Compression Handbook, Chapter 1. CRC Press, 2001. [10] T. Douglas. Social media's role in the riots. BBC news, August 2011. [11] T. Fawcett. ROC Graphs: Notes and Practical Considerations for Researchers. Technical report, HP Laboratories, 2004. [12] W. Galuba, K. Aberer, D. Chakraborty, Z. Despotovic, and W. Kellerer. Outtweeting the twitterers - predicting information cascades in microblogs. In Workshop on Online Social Networks, 2010. [13] V. Gomez, H. J. Kappen, and A. Kaltenbrunner. Modeling the structure and evolution of discussion cascades. In ACM HT, 2011. [14] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. In ACM KDD, 2010. [15] D. Gruhl, R. Guha, R. Kumar, J. Novak, and A. Tomkins. The predictive power of online chatter. In ACM KDD, 2005. [16] S.-Y. Hsieha, C.-W. Huanga, and H.-H. Choub. A DNA-based graph encoding scheme with its applications to graph isomorphism problems. Applied Mathematics and Computation, 203:502 -- 512, 2008. [17] C.-W. Hsu and C.-J. Lin. A comparison of methods for multiclass support vector machines. IEEE Transactions on Neural Networks, 13(2):415 -- 425, 2002. [18] N. Japkowicz and S. Stephen. The class imbalance problem: A systematic study. Intelligent Data Analysis, 6(5):429 -- 449, 2002. [19] N. S. Jayant and P. Noll. Digital Coding of Waveforms: Principles and Applications to Speech and Video. Prentice Hall, 1984. [20] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In proceedings of KDD, 2003. [21] S. A. Khayam and H. Radha. Markov-based modeling of wireless local area networks. In ACM Mobicom Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2003. [22] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In ACM WWW, 2010. [23] J. Leskovec, M. McGlohon, C. Faloutsos, N. Glance, and M. Hurst. Cascading behavior in large blog graphs. In SIAM International Conference on Data Mining (SDM), 2007.
1608.08278
1
1608
2016-08-29T22:47:05
Optimal Deployment of Resources for Maximizing Impact in Spreading Processes
[ "cs.SI", "cond-mat.stat-mech", "physics.soc-ph" ]
The effective use of limited resources for controlling spreading processes on networks is of prime significance in diverse contexts, ranging from the identification of "influential spreaders" for maximizing information dissemination and targeted interventions in regulatory networks, to the development of mitigation policies for infectious diseases and financial contagion in economic systems. Solutions for these optimization tasks that are based purely on topological arguments are not fully satisfactory; in realistic settings the problem is often characterized by heterogeneous interactions and requires interventions over a finite time window via a restricted set of controllable nodes. The optimal distribution of available resources hence results from an interplay between network topology and spreading dynamics. We show how these problems can be addressed as particular instances of a universal analytical framework based on a scalable dynamic message-passing approach and demonstrate the efficacy of the method on a variety of real-world examples.
cs.SI
cs
Optimal Deployment of Resources for Maximizing Impact in Spreading Processes Andrey Y. Lokhov1 and David Saad2 1Center for Nonlinear Studies and Theoretical Division T-4, Los Alamos National Laboratory, Los Alamos, NM 87545, United States 2The Nonlinearity and Complexity Research Group, Aston University, Birmingham B4 7ET, United Kingdom The effective use of limited resources for controlling spreading processes on networks is of prime significance in diverse contexts, ranging from the identification of "influential spreaders" for maxi- mizing information dissemination and targeted interventions in regulatory networks, to the devel- opment of mitigation policies for infectious diseases and financial contagion in economic systems. Solutions for these optimization tasks that are based purely on topological arguments are not fully satisfactory; in realistic settings the problem is often characterized by heterogeneous interactions and requires interventions over a finite time window via a restricted set of controllable nodes. The optimal distribution of available resources hence results from an interplay between network topol- ogy and spreading dynamics. We show how these problems can be addressed as particular instances of a universal analytical framework based on a scalable dynamic message-passing approach and demonstrate the efficacy of the method on a variety of real-world examples. Spreading corresponds to omnipresent processes de- scribing a vast number of phenomena in social, natural and technological networks [1 -- 4] whereby information, viruses and failures propagate through their edges via the interactions between individual constituents. Spreading cascades have a huge impact on the modern world, be it negative or positive. An 11 minute power grid distur- bance in Arizona and California in 2011 led to cascading outages and left 2.7 million customers without power [5]. As many as 579,000 people around the world could have been killed by the H1N1 influenza pandemic character- ized by a rapid spreading through the global transporta- tion networks [6]. The U.S. economy losses from the 2008 financial crisis resulted from cascading bankruptcies of major financial institutions are estimated at the level of $22 trillion [7]. Therefore, it is not surprising that ef- ficient prediction and control of these undesired spread- ing processes are regarded as fundamental questions of paramount importance in developing policies for opti- mal placement of cascade-preventing devices in power grid, real-time distribution of vaccines and antidotes to mitigate epidemic spread, regulatory measures in inter- banking lending networks and other modern world prob- lems, such as protection of critical infrastructures against cyber-attacks and computer viruses [8]. On the other hand, spreading processes can also be considered beneficial. The ice bucket challenge campaign in social networks raised $115 million donations to the ALS association fighting the Amyotrophic Lateral Scle- rosis, in particular due to a significant involvement of celebrities acting as "influencers" [9]. In the context of political campaigning, there are already winners [10, 11] and losers, and this division is likely to become more pro- nounced and critical in the future [12]. Winners are those who use communication and social networks effectively to set the opinions of voters or consumers, maximizing the impact of scarce resource such as activists or advertise- ments by applying control to the most influential groups of nodes at the right time; while losers will spend their re- source sub-optimally relying on intuition and serendipity. Additional examples of domains where optimal resource allocation plays a crucial role in enhancing the effect of spreading include viral marketing campaigns [13], tar- geted chemically-induced control of dynamic biological processes [14]; drug discovery [15]; and even gaining mil- itary advantage through the propagation of disinforma- tion [16]. All these applications share several important common properties such as restricted budget, finite-time windows for control interventions and the need for fast and scalable optimization algorithms which can be de- ployed in real time. There exists a large body of work on optimal resource deployment in various spreading settings. A widely addressed formulation focuses on identifying influential spreaders, i.e. nodes that play important role in the dy- namical process. Identification is often done by employ- ing different centrality measures based on the topology of the underlying interaction network, including selec- tion strategies based on high-degree nodes [17], neighbors of randomly selected vertices [18], betweenness central- ity [19], random-walk [20], graph-partitioning [21], and k-shell decomposition [22], to name a few. It is quite natural that algorithms based exclusively on topological characteristics appear to have variable performance de- pending on particular network instances and dynamical models used [23, 24]. Another line of work consists in studying the NP-complete problem of network disman- tling [25 -- 27]: the underlying reasoning is that removal of nodes breaking the giant component to small pieces is likely to prevent the global percolation of the conta- gion. The localization of an optimal immunization set has been addressed using a belief propagation algorithm built on top of percolation-like equations for SIR (Sus- ceptible, Infected, Recovered) and SIS (Susceptible, In- fected, Survived) models [28], based on cavity method techniques developed previously for deterministic thresh- old models [29, 30]. This formulation is close to the prob- lem of finding optimal seeds, i.e. the smallest set of initial nodes which maximizes the spread asymptotically [13]. It was rigorously analyzed [31, 32] for two simple diffu- sion models with a special submodularity property, In- dependent Cascade (IC) and Linear Threshold, and was shown to be NP-hard for both. A greedy algorithm based on a sampling subroutine has been explored for the IC model [33] in the setting of finite time horizon. For other spreading models the impact maximization problem at fi- nite time and resources has been addressed in the setting of optimal control as reported in a recent survey [34]. However, only deterministic mean-field dynamics have been considered so far; this approximation ignores the topology of the specific network considered and yields non-distributed solutions to the control problem. All of these techniques consider the problem of static (open-loop) resource allocation, preplanned at some ini- tial time. A less explored direction consists in developing an online policy of assigning a limited remedial budget dynamically based on real-time feedback, also known as a closed-loop control. The impact of vaccination of the largest degree nodes or of those with the largest number of infected neighbors was investigated in [35, 36], while an alternative strategy is focused on the largest reduction in infectious edges [37]. Finally, an online policy based on the resolution of the minimal maxcut problem was intro- duced [38], where optimization is carried out with respect to the expected time to extinction of the SIS epidemic. We introduce a general optimization framework which accommodates both dynamical and topological aspects of the problem and which allows for a broad range of objectives. The framework is principled, probabilistic, computationally efficient and incorporates the topologi- cal properties of the specific network under consideration. It facilitates the optimization of objective functions be- yond the maximization or minimization of the spread, including: targeting specific nodes at specific times given a subset of accessible nodes; a limited global budget, pos- sibly distributed over time; and an optimal dynamic vac- cination strategy using the feedback from the spreading process. The problem is stated in a dynamical control setting with finite-time horizon that requires an explicit resolution of the dynamics, which is addressed via a dis- tributed message-passing algorithm. We test the efficacy of the method on particular synthetic optimization prob- lems as well as on a set of real-world instances. 2 I. RESULTS A. Model A large number of spreading models have been sug- gested in the literature to describe stochastic dynam- ical processes in epidemiology, information and rumor propagation, and cascades in biological and infrastruc- ture networks [2 -- 4]. They all share the same common features: the nodes transition from inactive to active state due to spontaneous activation mechanism associ- ated with the nodes themselves, or due to interactions with active neighbours through the network edges. As an illustration of our approach, we have chosen a pop- ular stochastic spreading process known as susceptible- infected-recovered, or SIR model, which is often used to describe propagation of infectious diseases or information spreading [2]. More precisely, we consider a generalized version of the discrete-time SIR model defined as follows. A node i in the interaction graph G = (V, E), where V de- notes the set of nodes, and E is the set of pairwise edges, at time step t can be found in either of three states σt i : "susceptible" σt i = I or "recovered" σt i = R. At each time step, an infected (or, depending on the application domain, informed or active) individual i can transmit the activation signal to one of its suscep- tible (respectively, uninformed or inactive) neighbors j with probability αij, associated with the edge connecting them. Independently on the interaction between nodes a node i in the S state can turn active, assuming state I, with the probability νi(t), or spontaneously become re- covered (uninterested, protected) with probability µi(t) at time step t. The first mechanism corresponds to a node activation due to an external influence such as ad- vertisement in the context of information spreading. In the case of the epidemic spreading the second mechanism models the effect of vaccination: once a node goes to the protected R state, it becomes immune to the infection at all times. These probabilistic transmission rules at each time step t can be summarized using the following schematic rules: i = S, "infected" σt S(i) + I(j) νi(t)−−−→ I(i), S(i) αji−−→ I(i) + I(j), µi(t)−−−→ R(i). S(i) (1) (2) In the definition of the dynamic rules (1) and (2), νi(t) and µi(t) represent control parameters we could manip- ulate with a certain degree of freedom defined by a par- ticular instance of the problem. In what follows, we as- sume that the spreading couplings αij are known (or can be estimated) and are fixed in time. In some applica- tions, αij may vary in time (e.g. this is true for temporal networks) or may represent a set of control parameters themselves. We outline such scenarios in the Discussion section; the optimization scheme presented below can be straightforwardly generalized to include the edge-related control parameters. However, for simplicity we will only present optimization involving node-related control pa- rameters. 3 To quantify the success of the spreading process, one may look for instance at the expected spread (the total number of infected nodes) at finial time horizon T , S(T ), given by (cid:34)(cid:88) i∈V (cid:35) (cid:88) i∈V S(T ) =E 1[σT i = I] = P i I (T ), (3) S(T ) and P i where the expectation is taken with respect to the re- alization of the stochastic dynamics and P i I (T ) denotes the marginal probability of node i to be found in the state I at time T . The quantities P i R(T ) can be defined in a similar way for the susceptible and re- covered states, respectively. Hence, it is important to understand how to compute approximately the marginal probabilities P i σ(t) on a given network, σ assuming the corresponding state; note that in the general case, an ex- act estimation of marginals in the SIR model is an NP- hard problem [39]. We use the recently introduced Dy- namic Message-Passing (DMP) equations [40 -- 42] which provide the estimates (asymptotically exact on sparse graphs) of the probabilities P i σ(t) with a linear computa- tional complexity in the number of edges and time steps. When applied to real-world loopy networks, the DMP algorithm typically yields a accurate prediction of the marginal probabilities as validated empirically [42] for a large class of spreading models on real-world networks. In the Methods section, we provide an intuitive derivation of the corresponding DMP equations for the generalized SIR model. An example of the DMP performance on real-world networks is provided in the Figure 1, where the method predictions are compared to values obtained through extensive Monte Carlo simulations of the SIR dynamics on a network of flights between major U.S. hubs (a detailed description of this data set is provided in the Results section and in the Appendix A). The accu- racy of marginals estimation supports the use of the DMP equations at the core of our optimization algorithm. B. Optimization framework We formulate the dynamic allocation of resource as a general optimization problem with respect to an objec- tive function O and a set of constraints associated with the budget of available resources B, accessible values of control parameters P, initial conditions I and the dy- namical model equations D. We employ the Lagrangian formulation of the constrained optimization problem: L = O(cid:124)(cid:123)(cid:122)(cid:125) (cid:124) (cid:123)(cid:122) (cid:125) objective constraints +B + P + I + D . (4) FIG. 1: Performance of DMP equations for the generalized SIR model on a network of flights between major US air- ports. The network represents M = 383 flight routes between the N = 61 largest US hubs. The weights αij are propor- tional to the average number of transported passengers on each route and are distributed in the interval [0.05, 0.5]; νi and µi are generated at random in the range [0, 0.1]. The scatter plot represents marginal probabilities P i I (T ) obtained from the DMP equations and by averaging over 107 Monte Carlo simulations. There is one randomly selected active node at the initial time and the dynamics is simulated for t = 5 time steps. O - Many objective functions of interest relate to the delivered information at particular times defined for each node. So for the general case we define: (cid:34)(cid:88) i∈U O =E (cid:35) (cid:88) i 1[σti i = I] = P i I (ti), (5) where ti is the required activation time for node i and the sum is over the subset of nodes U ⊂ V that is required to be activated. We refer to this general formulation as the targeting problem. The popular problem of maximiz- ing the total spread S(T ) is a special case whereby U = V and ti = T for all i ∈ V . B - In many relevant situations, resources are not fully available at a given time, but rather become available on the fly, and their amount may vary across the time steps. For example, it takes some time to develop and produce the vaccines or the advertisement budget is allocated in stages depending on the success of the campaign. Hence, we define the budget constraints in the following form: νi(t) = Bν(t), µi(t) = Bµ(t), (6) (cid:88) i∈V (cid:88) i∈V where Bν(t) and Bµ(t) denote the available total budget for the control parameters νi(t) (spontaneous infection) and µi(t) (recovery) at time t. The constraint B reads T−1(cid:88) t=0 (cid:34)(cid:88) i∈V (cid:35) B = λν B(t) νi(t) − Bν(t) , (7) Let us discuss the form of each term in the expression (4). with a similar expression for the parameters µi(t), where B(t) and λµ λν B(t) are the associated Lagrange multipliers, 0.30.50.70.90.30.50.70.9MC-predictedPiI(t)DMP-predictedPiI(t) respectively. Clearly, one is not forced to use the whole available budget at each time step; in this case, we as- sume that Bν(t) and Bµ(t) are reallocated accordingly at subsequent time steps. However, in cases where specific targeting times are not required, using monotonicity ar- guments, it is easy to show that it is always advantageous to use all available budget fully at each step for maximiz- ing the impact at a later stage. Allocation of budget at the initial time only corresponds to the optimal seeding problem. P - In an unrestricted scenario, where all nodes are ac- cessible, control parameters associated with node i, νi(t) and µi(t), may take arbitrary values from zero to one de- pending on total budget. However, in realistic situations access level to different nodes may differ: for example, only a subset W ⊆ V of nodes may be controllable to- gether with additional restrictions on parameter values. The parameter block P is introduced to enforce parame- ters νi(t) to take values in the range [νt i ] at each time step. This can be accomplished with the help of "bar- rier" functions, widely used in constrained optimization, assuming the form i , νt P =  log νi(t) − νt i + log i − νi(t) νt , (8) (cid:104) T−1(cid:88) (cid:88) (cid:16) t=0 i∈V (cid:105) (cid:104) (cid:105)(cid:17) where  is a small regularization parameter chosen to minimize the impact on the objective O in the regime of allowed νi(t) values, away from the borders. An equiva- lent expression can be written for the constraints on the µi(t) values. I and D - Finally, the constraints I and D enforce the given initial conditions and dynamics of the system via the associated Lagrange multipliers. For example, if no active individuals are present at initial time, then we set I (0) = 0 for all nodes using the constraint set I; if some P i infected or recovered nodes are present, they assume an initial values 1 for the respective marginal probabilities. The set D encodes the evolution of the marginal probabil- ities with the DMP equations, as explained in the Meth- ods section. The extremization of the Lagrangian (4) is done as follows. Variation of L with respect to the dual vari- ables (Lagrange multipliers) results in the DMP equa- tions starting from the given initial conditions, while derivation with respect to the primal variables (control and dynamic parameters) results in a second set of equa- tions, coupling the Lagrange multipliers and the primal variable values at different times. We solve the coupled systems of equations by forward-backward propagation, a widely used method for learning and optimization in ar- tificial neural networks [43], detailed in the Methods sec- tion. This method has a number of advantages compared to other localized optimization procedures such as gradi- ent descent and its variants. In particular, it is simple to implement, is of modest computational complexity, does not require any adjustable parameters and is less prone to being trapped in local minima since the optimization is performed globally [44]. 4 C. Targeting problem We first demonstrate the approach using the general targeting problem, one of the new features of the sug- gested framework. In this toy example, we consider dis- information spreading on a small network extracted from the study of terrorists associations [46]. We assume that the spreading dynamics follows a particular case of the dynamical model with µi(t) = 0 ∀ t and i ∈ V , cor- responding to the Susceptible-Infected, or SI model with controlled spontaneous transition to the informed state I due to external influence via the control parameters νi(t). The activation of nodes is required in a predefined prior- ity order, targeting selected nodes at specific times. The DMP-based optimization scheme converges to a unique optimal solution within a few forward-backward itera- tions as reported in Figure 2. The resources are al- located dynamically over time such that the activation path meets the targeting requirements: P i I (ti) > 0.95 is achieved at all nodes, with the majority of nodes targeted with probability one. Targeting is quite a general task and can provide al- gorithms to solve a number of related problems. For instance, identifying the origin of the spreading process from measurements at sparsely located sensors at differ- ent times [47] is a difficult problem that has been ad- dressed by other approaches [48, 49] but can be equally viewed as optimally allocating a budget at time zero in order to target the sensor nodes at specific times that correspond to the times when measurements were taken. D. Optimal seeding The majority of existing algorithms [17 -- 22, 25, 28, 31] have been designed to solve the seeding problem -- finding an optimal set of nodes which would lead to the maxi- mum number of activations at subsequent times. In the SI model of information spreading, even a single active node at initial time will ultimately lead to the activa- tion of the whole connected network. However, a more interesting problem is the one of finding the best initial conditions which would lead to the maximum impact at finite time T . In the formulation involving control pa- rameters νi(t), setting the initial conditions at time t = 1 is equivalent to distributing the activation budget at time t = 0 in the system where all nodes are at state S; optimal distribution of the budget at time t = 0 would thus lead through spontaneous infection to the maximum spread S(T + 1). 5 FIG. 2: Optimal targeting with the DMP algorithm on a small network of terrorists associations. Edge thickness indicates the strength of the corresponding pairwise transmission probability αij, generated uniformly at random in the interval [0, 1]. The size of nodes relates to the time activation requirements: large nodes should be activated by the corresponding time. In this example, two chosen nodes should be activated at time t = 2, another two nodes by time t = 4, three particular nodes by time t = 6 and all remaining nodes by time t = 9; available budget for each time step has been fixed to Bν (t) = 0.1 · N . Color intensity (gradually from white to black) indicates the value of the marginal probabilities P i I (t) which result from the dynamics using the optimal distribution of resources provided by the DMP algorithm. The visualization has been created using the MuxViz software [45]. For demonstration and validation purposes, we first consider the small network of relations between Slovene parliamentary parties in 1994; links represent estimated similarity relations based on a sociological survey of the parliament members who were asked to estimate the distance between each pair of parties in the political space [50]. Given the total campaigning budget Bν(0), the goal is to maximize the total informational "influ- ence" at time T by optimally distributing the "lobby- ing" budget at initial time. One advantage of this small test case is that we can check the validity of the scheme via an explicit symbolic solution of the DMP equations, obtaining a closed-form expression of the objective func- tion O = S(T + 1) that represents the final information spread as a function of the independent control param- eters; a more in-depth description of this procedure is given in the Appendix B. As in the previous example, the forward-backward optimization scheme in this case quickly converges to a unique optimal solution starting from an arbitrary initial values of the control parame- ters. The ground-truth optimal values of parameters can be established by a direct maximization of the objective function O plotted in the Figure 3. The optimal solu- tion is in full agreement with the solution of the forward- backward iteration scheme up to the insignificant domain border perturbations due to the finite value of , the regu- larization parameter that keeps values away from border values. This example validates our optimization proce- dure on this small scale problem. Studies of the optimal seeding problem usually fo- cus on a limited setting of homogeneous strength of links under deterministic dynamics and a search for the integer-valued deterministic budget deployment to spe- cific nodes. To test the efficacy of the DMP-optimization approach on large scale instances we compare its per- formance to that of popular heuristics for this restricted setting. Although one should point out that our method addresses a broad range of problems and has not been optimized for this particular task, it is useful to assess its performance in the case where the structure of the ground-truth solution is known: for the deterministic SI spreading, it is clear that the initial distribution of seeds should target some combination of the high-degree nodes, and a number of well-performing centrality tech- niques [17, 22, 25] are known to select the respective com- bination (see the Appendix B for a detailed discussion of methods used for comparison). Table I presents the normalized total spread for some of the best-performing centrality measures and the DMP algorithm after T = 3 time steps of the dynamics on different benchmark networks of various topologies and sizes. The transmission probabilities have been set to a uniform value α = 0.99, and the total available seed- ing budget is equal to Bν(0) = 0.05 N . Note that the DMP-estimated marginals provide a natural and conve- nient measure for comparing the performance of different algorithms in the finite time horizon setting, especially on large graphs where running extensive Monte Carlo simu- 6 TABLE I: Comparison of the DMP algorithm for the seeding problem in the setting of deterministic dynamics with popular well-performing heuristics on various real-world networks. The left of the Table provides topological information on the networks considered [51 -- 54]. On the right are presented values of the normalized total spread S(T )/N at time T = 3 for the different algorithms: assignment to randomly-selected nodes, an adaptive version of the high-degree strategy of [17] (HDA), k-shell decomposition [22], Collective Influence CIl [25] (with l = 2 and l = 4), uniform assignment and the DMP algorithm. For different test cases, solutions obtained by DMP span the range between delocalized and node-centric assignments and are on par with the best-performing centrality heuristics. Network Road EU Protein US Power Grid GR Collaborations Internet Web-sk N 1174 2361 4941 5242 22963 121422 M 1417 6646 6594 14484 48436 334419 Random 0.305 0.736 0.367 0.565 0.880 0.645 HDA 0.480 0.863 0.602 0.644 0.998 0.833 k-shell 0.160 0.769 0.209 0.296 0.969 0.239 CI2 0.500 0.861 0.605 0.660 0.996 0.751 CI4 0.468 0.838 0.565 0.658 0.994 0.734 Uniform 0.324 0.752 0.397 0.634 0.891 0.699 DMP 0.513 0.856 0.601 0.710 0.972 0.837 This suggests that the DMP algorithm performs well also for more general dynamic resource allocation problems with heterogeneous couplings, for which other principled methods do not exist. In terms of computational com- plexity, solving the dynamics with DMP is linear in T and E; the number of forward-backward iterations is typically small and can be controlled, as explained in the Methods section. This compares well against the other al- gorithms even in the considered restricted setting where taking into account the dynamics is not required, and allows one to use the DMP approach for very large real- world networks. Additional implementation details and remarks are given in the Appendix B. Given that the problem is NP-hard, it is not surprising that the optimization landscape is much more complex in the case of large networks due to a presence of multiple solutions with comparable costs; the forward-backward iteration scheme no longer converges to a unique op- timum as in the case of small networks considered be- fore. Instead, the algorithm "jumps" between local op- tima that representing different control-parameter distri- butions that obey the budget constraints (6). This is an indication that it is arguably more appropriate to view the different seeding sets as a collective phenomenon, rather than assigning "influence" measure to individual nodes. In principle, several different initializations for νi(t) can be used to achieve the best solution; the results reported here correspond to the uniform starting values of the control parameters. Note that the initial distri- bution of νi(t) does not have to satisfy the budget con- dition (6), but the solutions obey the constraint already after the first forward-backward iteration. FIG. 3: Validation of the DMP algorithm on a small network of relations between Slovene parliamentary parties with an explicit evaluation of the objective function. Edge weights have been renormalized such that the maximum pairwise mutual "influence" receives the value αmax ij = 0.5 and other weights are distributed proportionally to the survey data. We assume that only three nodes in this network belong to a controllable set W = {1, 3, 5}, and the total campaigning budget Bν (0) = 1.5 so that ν3(0) = 1.5−ν1(0)−ν5(0). The plotted surface represents the the total informational "influence" O(ν1(0), ν5(0)) as a function of two independent seeding control parameters ν1(0) and ν5(0), com- puted via a symbolic solution of the DMP equations. Color variations reflect the change of the value of the objective, changing gradually from the minimum (blue) to the maximum (red). The DMP algorithm correctly recovers the parameter values that maximize the total spread at the finial time (the corresponding solution is marked by a green circle). lations is computationally prohibitive. Results presented in the Table I show that the DMP algorithm is close to the best-performing heuristics in all cases, showing a con- sistently good performance. Notice that our method does not rely explicitly on topological features such as target- ing high-degree nodes, but instead explores a large space of parameters with impact on the full dynamic trajectory. E. Online mitigation of epidemic spreading To illustrate the suitability of the DMP algorithm to online deployment of resources in a dynamic setting with feedback we employ a prototypical example: developing an effective mitigation policy for confining an infectious 00.511.500.511.533.64.24.8ν5(0)ν1(0)DMP disease -- a practical and challenging question of public concern. A SIR model with vaccination is an appropri- ate dynamic model in this case, where the νi(t) variables are set to zero, and the parameters µi(t) play the role of vaccination control, allowing the nodes to assume a protected state R. In contrast to the seeding problem, the initial conditions (origin of the epidemic) are speci- fied in this setting and the vaccination budget has to be allocated dynamically according to the current state of the spreading process (monitored at each time step) in order to suppress the epidemic. The goal is to deploy the resources optimally so that the total number of in- fected nodes S(T ) at the final time is minimized. The assumption of a time-distributed budget Bµ(t) is highly reasonable due to the restricted vaccine availability. Previously developed real-time strategies for mitigat- ing contagion on a given network [35, 37, 38] explored policies that are based on topological characteristics of the graph under the assumption of homogeneous trans- mission probabilities. The common denominator of ex- isting approaches consists in local interventions which ensure the islanding of infected nodes. We generalize the methods [35, 38] to the case of heterogeneous trans- mission probabilities using a "high-risk" [36] ranking of nodes according to their probability of getting infected at the next time step. This measure is defined in our case as i (S → I) = 1 − (cid:89) P t j∈∂i (1 − αji1[σt j = I]), (9) where ∂i denotes the set of neighbors of node i. A reason- able local intervention strategy for benchmarking consists in distributing the vaccination budget to priority nodes with a high-risk measure (9). This algorithm will be re- ferred to as the greedy strategy. Several policies can be conceived using the DMP optimization framework. As a reference, we consider the planned deployment of resources which does not take into account feedback from an actual realization of the process, but merely follows the solution of the dynamic resource allocation problem with a specified initial condi- tion. Two other closed-loop strategies take into account the real-time information on the spreading process, us- ing the seeding formulation as a subroutine: (a) The first, termed DMP-greedy, is close in spirit (but differs in the algorithmic implementation, based here on the DMP op- timization framework) to the greedy algorithm and uses the current state of the epidemic as the initial condition, aiming to minimize the spread at the next time step only. (b) The second utilizes the full power of the DMP frame- work by exploiting the up-to-date information available to reinitialize the dynamics at each time step t to allocate the resources at the next time step t + 1, by running the optimization procedure for the remaining T−t time steps. This DMP-optimal policy is similar to the planned strat- egy, but takes advantage of the new information available from the realization of the process. 7 We compare these strategies for the case of infection spreading mediated by air traffic, which has been recog- nized to play an important role in recent world's pan- demics [56]. As a particular example, we study the real- world transportation network of busiest flight routes be- tween major U.S. airports, extracted from the Bureau of Transportation Statistics data (BTS) [55] and depicted in Figure 4 (a). We employ a plausible assumption that the infection transmission probability associated with a link between airports is proportional to the number of passengers carried along this route, see the Appendix C for a detailed description of the network and data used. The "vaccination" interventions on this network can be interpreted as quarantine measures taken in different air- ports using the updates on the new infected cases. In the simulations, we assume that the epidemic starts at the largest airport hub of Atlanta. The comparison of different mitigation algorithms is given in Figure 4 (b), showing the average number of infected sites as a function of time under different miti- gation strategies. As expected, the DMP-optimal scheme represents the best performing policy, which leads to sta- bilization of the expected number of infected nodes by t = 6, at a lower level compared to the greedy algorithm that optimizes the spread at the next time step only. No- tice that on a short time scale, the greedy algorithm has a slightly better performance, which represents a typi- cal situation when localized and immediate optimal deci- sions lead ultimately to sub-optimal global optimization results. II. DISCUSSION We introduced an efficient, versatile and principled op- timization framework for solving dynamic resource allo- cation problems in spreading processes, which allows for the synthesis of previously studied settings using a gen- eral targeting formulation. This probabilistic framework allows for the study of problems that involve a finite-time horizon, which requires an explicit solution of the dynam- ics, the targeting of specific nodes at given times and it accommodates scenarios where only a subset of the nodes is accessible. This is done in our scheme using the DMP equations for spreading processes. Although in this work we focused on the examples involving the discrete-time generalized SIR model, the approach can be straightfor- wardly applied to the case of continuous dynamics (the continuous formulation is expounded in the Appendix D) and to other spreading models, such as cascading and threshold models as well as rumor dynamics [42]. An- other possible application area of the present framework relates to systems defined on temporal graphs, where net- work dynamics can be encoded into the time-dependent coefficients αij(t) within the existing framework. Although we showed that the method can be employed in the case where transmission probabilities are uniform 8 FIG. 4: Online mitigation of air-traffic mediated epidemic on the network of flights between major U.S. hubs. (a) A geographical layout of the air transportation sub-network extracted from the BTS data [55]. The transmission probabilities are indicated by the thickness of the corresponding edges, which is proportional to the aggregated traffic between airports. Different colors of airports (yellow, red and green) represent an outcome of a single realization of the spreading dynamics (nodes in the susceptible, infected and recovered states, respectively) under the DMP-optimal policy. (b) Comparisons of mitigation strategies showing the average number of infected sites as a function of time, averaged over 100 random realizations of the dynamics, as a result of applying different policies. In the simulations the epidemic starts at the largest airport hub of Atlanta; a budget of Bµ(t) = 0.5 N is available at each time step and the objective is to suppress the epidemic by T = 10. The DMP-optimal algorithm demonstrates the best performance in the number of infected nodes at time T . (c) An illustration of a radically different decisions taken by the DMP-optimal and greedy algorithms already at the first step of the optimization: the greedy policy chooses to vaccinate nodes which are most "in danger" at the next time step, while the decision done by the DMP-optimal scheme takes into account the forecasted evolution of the dynamics. and only the detailed topology of the network is known, its major advantage consists in the ability to incorporate efficiently detailed information on transmission probabil- ities when such prior information is available, or can be either estimated (as in the examples of the Slovene polit- ical parties or flight transportation networks) or learned from observations of the dynamics [57]. The optimization method used is interesting in itself being based on changes to the entire trajectory instead of taking incremental improvement steps in the direction of the gradient; thus, the suggested algorithm results in large steps and arguably explores more effectively the pa- rameter space. In spite of the global budget constraints involving all network nodes the resulting message-passing scheme is fast and distributed, requiring a number of op- erations which grows linearly in time and with respect to the number of edges in the network. An attractive property of the suggested framework is its versatility: in- stead of optimizing the spread given a fixed budget one can minimize the budget needed to meet certain require- ments on the spread, imposed as a constraint in the La- grangian formulation. Another interesting scenario is the optimization over the spreading parameters αij: this for- mulation is useful in the design of technological networks or for mitigation of an epidemic by removing and adding links in the graph. Finally, it would be interesting to ap- ply the presented optimization scheme to the percolation- type equations describing the asymptotic T → ∞ limit of the spreading dynamics with heterogeneous couplings. Work on these research directions are underway. III. METHODS A. Dynamic message-passing equations Dynamic message-passing belongs to the family of al- gorithms derived using the cavity method of statistical physics and may be given an interpretation of passing messages along the graph edges. The obtained marginals are exact on tree graphs, and asymptotically exact on sparse random networks. We provide an intuitive deriva- tion of the DMP equations for the adopted generalized SIR model, defined by (1) and (2). On a given in- stance of a network, these equations allow one to com- pute the marginal probability distributions P i σ(t), where σ ∈ {S, I, R} denotes the node state. The first key equa- tion reads: (1 − νi(t(cid:48)))(1 − µi(t(cid:48))) θk→i(t). (cid:32)t−1(cid:89) t(cid:48)=0 P i S(t) = P i S(0) (cid:33) (cid:89) k∈∂i (10) It states the probability of node i to be susceptible at time t and is equal to the probability that i was in the S state at initial time P i S(0) and remained so until time t. It neither changed states by following the ν and µ mech- anisms (in brackets), nor by being infected by a neighbor qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqSIRa 0 10 20 30 40 50 60 0 2 4 6 8 10I(t)tbno controlgreedyDMP-greedyDMP-plannedDMP-optimalqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqATLLGAFLLMCOTPADFWPHXLAXDMP-optimalgreedycSEA (final term on right); the dynamic message θk→i(t) has a meaning of the probability that node k did not pass an activation message to node i until time t. Strictly speak- ing, Eq. (10) is only valid on a tree graph; only in this case θk→i(t) are independent for all k ∈ ∂i, so that the corresponding probability is factorized as in (10). How- ever, in practice the decorrelation assumption holds to a good precision even on general networks, even with small loops, see [42] for in-depth discussions and supporting nu- merical experiments. The quantities θk→i(t) are updated as follows: θk→i(t) = θk→i(t−1) − αkiφk→i(t−1), (11) which corresponds to the fact that θk→i(t) can only de- crease if an activation signal is passed along the directed link (ki); the corresponding probability equals the prod- uct of αki and the dynamic variable φk→i(t− 1), which has a meaning of the probability that node k is in the state I at time t, but has not infected node i until time t−1. To simplify further explanations we introduce the dynamic messages P k→i R (t), which denote the probabilities that node k is found at time t in the states S, I or R, respectively, conditioned on node i remaining in state S. Alternatively, these variables can be thought of as the probabilities of k being susceptible, infected or recovered on a cavity graph, on which node i has been removed. Formally, (t) and P k→i (t), P k→i S I P k→i S (t) = P k S (0) (1−νk(t(cid:48)))(1−µk(t(cid:48))) θl→k(t), (cid:33) (cid:89) l∈∂k\i (cid:32) t−1(cid:89) t(cid:48)=0 9 The marginals P i tained using (10), while P i via S(t) used throughout the text are ob- R(t) are computed I (t) and P i R(t−1)+µi(t−1)P i S(t−1), P i R(t) = P i I (t) = 1−P i P i S(t)−P i R(t). (17) (18) The computational complexity of the DMP equations for solving the dynamics up to time T is given by O(ET ), where E is the number of edges in the graph, which makes them scalable to sparse networks with millions of nodes. B. Enforcing dynamical constraints and backward equations The dynamics D and initial conditions I constraints are enforced in a similar way to that of P and the bud- get B constraints in Eqs. (7) and (8). To each generic dynamic variable ξi(t) and message χk→i(t) we associate the corresponding Lagrange multipliers λξ k→i(t) which enforce the relation between dynamic variables at subsequent times. For instance, the evolution of the R(t)}i∈V in the Lagrangian L is enforced quantities {P i i (t) and λχ via the term(cid:88) T−1(cid:88) i (t+1)(cid:2)P i λR i∈V t=0 R(t+1)−P i R(t)−µi(t)P i S(t)(cid:3) . (12) which coincides with the expression (10), except that θi→k(t) is not included in the product on the right (∂k\i denotes the set of neighbors of k without i). We also have P k→i R (t) = P k→i R (t−1) + µk(t−1)P k→i S (t), (13) which expresses the monotonic increase of P k→i each time step with the probability µk(t−1)P k→i R (t) at (t), and S P k→i I (t) = 1−P k→i S (t)−P k→i R (t) (14) due to the properties of linked probabilities. We are now ready to formulate the last relation which leads to the closure of the system of message-passing equations. The evolution of the message φk→i(t) reads: I I I (t−1) (t)−P k→i (t−1) ≡ P k→i φk→i(t) = (1−αki)φk→i(t−1)+∆P k→i (15) (t−1). The phys- where ∆P k→i ical meaning of equation (15) is as follows: φk→i(t) de- creases if the activation signal is actually transmitted (first term) and increases if node k transitions to the state I at the current time step. Equations (10)-(15) can be iterated in time starting from the given initial conditions {P i R(0)}i∈V , with S(0), P i I I (0), P i θi→j(0) = 1, φi→j(0) = δσ0 i ,I = P i I (0). (16) Variation with respect to the dual variables λξ i (t) and λχ k→i(t) returns the forward DMP equations (10)-(18), while setting to zero the derivative of L with respect to the primal dynamic variables yields the relations between the Lagrange multipliers at subsequent times, which we interpret as the backward dynamic equations in our scheme. Similarly to (10)-(15), the backward equations have a distributed message-passing structure with linear computational complexity O(ET ), and are used to up- date the values of control parameters νi(t) and µi(t) at each iteration, taking into account the budget require- ments (6). Specifically, initializing the control parame- ters νi(t) and µi(t) to some arbitrary values (e.g., uniform over all nodes and times), we first propagate the DMP equations forward in time, up to the horizon T ; then, using the existing primal parameter values we fix end- point conditions for the dual parameters and propagate the equations for the dual parameters backward in time, updating the control parameters respecting the budget and variation constraints. These two steps are iterated for a predefined number of times or until global conver- gence of the process. In the large-scale problems, where the algorithm ex- plores the space of parameters by hopping from one so- lution to another, we choose a simple strategy: we run the forward-backward algorithm for several iterations for a range of values of the regularization parameter  which appears in the P block, and keep track of the best local optimum which provides the solution to the optimization problem after a maximum number of iterations (kept be- low the desired threshold which determines the compu- tational complexity) is reached. The choice of  impacts on the type of solution obtained: larger values of  cor- respond to solutions where the budget is disseminated more uniformly across nodes, while smaller values lead to weight concentration on particular nodes. Depending on the application and the level of control over nodes, one type of solution can be preferred to another; this flexibility represents an attractive feature of the DMP algorithm. An explicit form of the Lagrangian for the problems considered in this work together with additional details is given in the Appendices B and C. 10 Acknowledgments The authors are grateful to M. Chertkov, S. Misra and M. Vuffray for fruitful discussions and valuable com- ments. A.Y. Lokhov acknowledges support from the LDRD Program at Los Alamos National Laboratory by the National Nuclear Security Administration of the U.S. Department of Energy under Contract No. DE- AC52-06NA25396. D. Saad acknowledges support from the Leverhulme Trust RPG-2013-48. Appendix A: Model and DMP equations All models considered in the main text represent variants of a SIR model with possible spontaneous infection and vaccination transitions. We refer to this model as generalized SIR model, because usually the spontaneous S → I and S → R transitions are not considered; instead, the standard SIR model contains a spontaneous recovery transition I → R which was not relevant for the examples considered in the paper and therefore was ignored. However, the inclusion of this transition in the DMP equations is very easy and has been done in [42]. Hence, the model we consider here is defined as follows: at each time step t, the transitions from the state S to I and R occur with the probabilities summarized in the Figure 5 for individual nodes and edges. In the discrete time setting considered throughout the work, it may occur that both transitions to I and R states are realized at the same time; in this case, we assume that the transition to the R state effectively takes place. Note that in the continuous time setting (see Section D), this effect is of a second order in the discretization step dt, and hence this tie-breaking rule is not required for sufficiently small dt. FIG. 5: Transition diagram summarizing dynamic rules in the generalized SIR model considered in this work. In the case of a simultaneous transition of a susceptible node (marked in yellow) to the states I (infected - red) and R (recovered - green) at time t, it assumes a recovered state at the next time step. The DMP equations associated with this model, as well as the intuition behind them are described in the Methods section of the main text. We repeat them here for consistency: (cid:32) t−1(cid:89) (cid:33)(cid:32) t−1(cid:89) P k→i S (t) = P k S (0) (1 − νk(t (cid:48) )) t(cid:48)=0 t(cid:48)=0 R (t − 1) + µk(t − 1)P k→i P k→i R (t) = P k→i θk→i(t) = θk→i(t − 1) − αkiφk→i(t − 1), φk→i(t) = (1 − αki)φk→i(t − 1) + P k→i (cid:104)(cid:16) S S (t − 1), (cid:33) (cid:89) l∈∂k\i (1 − µk(t (cid:48) )) θl→k(t), (cid:17) −(cid:16) R (t) − P k→i P k→i R (t − 1) (t − 1) − P k→i S (t) The initial conditions are θi→j(0) = 1, φi→j(0) = δσ0 i ,I = P i I (0) = 1 − P i S(0). (cid:17)(cid:105) . (A1) (A2) (A3) (A4) (A5) ijijISαijiν (t)iiIISIiμ (t)iiRS 11 (A6) (A7) (A8) (A9) The marginal probabilities for nodes to be in the states S or I at time t are computed via (cid:32) t−1(cid:89) P i S(t) = P i (1 − νi(t (cid:48) S(0) R(t − 1) + µi(t − 1)P i t(cid:48)=0 )) P i R(t) = P i I (t) = 1 − P i P i S(t) − P i R(t). (cid:33) (cid:89) k∈∂i (1 − µi(t (cid:48) )) θk→i(t), (cid:33)(cid:32) t−1(cid:89) t(cid:48)=0 S(t − 1), As explained in the main text, the optimization problem is stated in the form of a Lagrangian to be extremized: L = O(cid:124)(cid:123)(cid:122)(cid:125) (cid:124) +B + D + I + P , (cid:123)(cid:122) (cid:125) objective constraints where O is the objective function one would like to maximize, and B, D, I and P correspond to the constraints representing budget, dynamics, initial conditions and limits on the parameters, respectively. Below we discuss in detail how to obtain an approximate solution to the optimal control problem using this framework, for the examples of the spread maximization or minimization under different constraints. In all examples, we assume that budget constraints for spontaneous infections or vaccination take a global form over a subset W ⊆ V of nodes in the network, and are specified at each time step: νi(t) = Bν (t), µi(t) = Bµ(t). (A10) (cid:88) i∈W (cid:88) i∈W Without loss of generality and for the sake of simplicity, in the equations below we assume that all nodes in the network are controllable, W = V ; this case is the hardest in terms of the optimization procedure. Extending the derivation to the general case of any subset W is straightforward (an illustration for the case W (cid:54)= V will be given in the Section B 3 below). Appendix B: Maximizing information spread under special targeting policy In this section, we write the detailed form of the Lagrangian for the targeting problem, explained in the main text: we assume that for each node i ∈ V the activation is required at a predefined time ti. We derive the corresponding forward and backward equations for the particular case of the generalized SIR model without a vaccination transition, i.e. assuming µi(t) = 0 for all i ∈ V and t ∈ [0, T − 1]. 1. Lagrangian formulation The Lagrangian in this case takes the following form: (cid:34)(cid:88) (cid:123)(cid:122) (cid:17) (cid:125) T−1(cid:88) (cid:124) (cid:34) t=0 L = S(ti) + λν B(t) νi(t) − Bν (t) i∈V B S(t)(1 − νi(t)) S(t + 1) − P i P i λS i (t + 1) (cid:3) + log (cid:104) +  (cid:35) (cid:125) (cid:124) (cid:89) k∈∂i T−1(cid:88) (cid:88) (cid:16) t=0 i∈V log(cid:2)νi(t) − νt (cid:123)(cid:122) (cid:35) P i θk→i(t + 1) θk→i(t)  θl→k(t + 1) θl→k(t) (cid:89) (cid:105) l∈∂k\i (cid:105)(cid:17) i − νi(t) (cid:125) νt D  (cid:105) λS k→i(t + 1) (t + 1) − P k→i S (t)(1 − νk(t)) λθ k→i(t + 1) θk→i(t + 1) − θk→i(t) + αkiφk→i(t) S P k→i (cid:104) (cid:104) λφ k→i(t + 1) φk→i(t + 1) − (1 − αki)φk→i(t) − P k→i (t) + P k→i S (t + 1) S(0) − 1 + δσ0 (cid:104) P i θk→i(0) − 1 i ,I + + λθ k→i(0) λS k→i(0) P k→i S (0) − 1 + δσ0 (cid:105) k,I λφ k→i(0) φk→i(0) − δσ0 . k,I (cid:105) (cid:105) (cid:88) (cid:88) (ki)∈E (ki)∈E (cid:104) (cid:104) (cid:105) S I O t=0 i∈V i∈V 1 − P i (cid:16) (cid:88) (cid:124) (cid:123)(cid:122) T−1(cid:88) (cid:88) T−1(cid:88) (cid:88) T−1(cid:88) (cid:88) T−1(cid:88) (cid:88) (cid:104) (cid:88) (cid:88) λS i (0) (ki)∈E (ki)∈E (ki)∈E i∈V t=0 t=0 t=0 (ki)∈E + + + + + + 12 k→i(t) in D and I enforce the dynamics given by the k→i(t) and λφ In this expression, the dual variables λS DMP equations as well as the initial conditions at time zero, while λν B(t) is the corresponding Lagrange multiplier for the budget constraint in B. The parameter constraint P has a form of the logarithmic barrier function, often used in constrained optimization, forcing each of the parameters νi(t) to take vales inside the interval [νt i ]; for sufficiently small value of a positive coefficient , this regularization has a negligible impact on the objective function away from the extreme values. k→i(t), λθ i (t), λS i , νt Note that in the formulation above we have made an implicit assumption that αki < 1 for all (ki) ∈ E, so that the ratios θk→i(t+1) θk→i(t) are correctly defined. In most situations, the case αki = 1 for some (ki) ∈ E is somewhat trivial, because there is no need for control for the nodes adjacent to these links. This assumption can be easily avoided by introducing other auxiliary variables in order to decouple θk→i(t) at different times, which results in a slightly more complicated formulation. 2. Forward and backward equations Once the form of the Lagrangian is established, we use a standard derivation with respect to primal and dual variables. The k→i(t) give us back the direct DMP equations (A1)-(17), B(t) yields the cost constraint (A10). Setting the derivatives with respect to the primal variation with respect to the multipliers λS while the variation with respect to λν variables to zero leads to the following set of dual equations: k→i(t) and λφ k→i(t), λθ i (t), λS αkiλθ k→i(t + 1) − (1 − αki)λφ k→i(t + 1) k→i(t) = 0, ∂L/∂φk→i(t) = ∂L/∂P k→i S (t) = λS k→i(t) + λφ k→i(t) k→i(t + 1)(1 − νk(t)) ∂L/∂θk→i(t) = λθ k→i(t) − λθ (cid:89) θl→k(t + 1) θl→k(t) l∈∂k\i k→i(t + 1)1[t (cid:54)= T ] i→l(t)P i→l λS S (t − 1)(1 − νi(t − 1)) − λS − (cid:88) (cid:88) + l∈∂i\k l∈∂i\k i→l(t + 1)P i→l λS S (t)(1 − νi(t)) 1 θk→i(t) − λS i (t)P i S(t − 1)(1 − νi(t − 1)) + λS i (t + 1)P i S(t)(1 − νi(t)) 1 ∂L/∂P i S(t) = −1[t = ti] + λS θk→i(t − 1) 1 (cid:89) m∈∂i\k θm→i(t + 1) θk→i(t) i (t) − λS θm→i(t) m∈∂i i (t + 1)(1 − νi(t)) (cid:105) 1[t (cid:54)= T ] + λφ  1[t (cid:54)= T ] = 0, (cid:89) θm→i(t) + λφ k→i(t + 1) θm→i(t − 1) 1[t (cid:54)= 0] θk→i(t − 1) 1 (cid:89) (cid:89) m∈∂i\l m∈∂i\{k,l} θm→i(t + 1) θm→i(t) θm→i(t) θm→i(t − 1) 1[t (cid:54)= T ] 1[t (cid:54)= 0] 1[t (cid:54)= T ] = 0. (cid:89) k∈∂i θk→i(t + 1) θk→i(t) 1[t (cid:54)= T ] = 0. (cid:104) (cid:88) l∈∂i (B1) (B2) (B3) (B4) (B5) Finally, the variation with respect to the parameters νi(t) for t < T gives ∂L/∂νi(t) = λν B(t) + i→l(t + 1)P i→l λS S (t) (cid:89) m∈∂i\l + λS i (t + 1)P i S(t) θm→i(t + 1) θm→i(t)  (cid:16) + νi(t) − νt i (cid:17) − (cid:16)  i − νi(t) νt (cid:89) (cid:17) = 0. m∈∂i θm→i(t + 1) θm→i(t) This set of forward and backward equations is sufficient for determining {νi}i∈V , using the following optimization procedure, analogous to [43, 44]. First, Initialize νi(t) to some initial values, for example using the uniform assignment νi(t) = 1/N T for all i ∈ V and t ∈ [0, T − 1]. Then repeat the following steps for a fixed number of iterations or until convergence: 1. Starting from the initial values for the dynamics variables (A5), propagate the DMP equations (A1)-(A8) forward, storing the values of dynamic messages at different times. 2. Use equations (B1)-(B5) for fixing the boundary values of Lagrange multipliers at time T : • (B1) assigns λφ • (B2) gives λS k→i(T ) = 0; k→i(T ) = 0; 13 • (B4) gives λS • (B5) sets λν i (T ) = δti,T ; B(T − 1) and νi(T − 1) through λS (cid:16) λν B(t) + ψi(t) + we first express νi(T − 1) for each i ∈ V as a function of λν control parameters can take all possible values between 0 and 1, meaning that νt t ∈ [0, T − 1], then there are two a priori possible solutions: B(t) + ψi(t) − 2 ±(cid:112)(λν λν ± i (t) = ν B(t) + ψi(t))2 + 42 2λν B(t) + 2ψi(t) i (T ) and λS  νi(t) − νt i  i − νi(t) νt (cid:17) = 0, k→i(T ). Writing (B5) as (cid:16) (cid:17) − B(T − 1) as a solution of the second order equation. When i = 1 for all i ∈ V and i = 0 and νt (B6) . (B7) Assuming that  is positive, we choose the solution with the positive sign in front of the square root which always i (t) < 1, thus expressing {νi(T − 1)}i∈V as a function of λν B(T − 1) leads to 0 < ν+ i (T − 1)}i∈V ) from the numerical solution of the budget constraint equation (A10). (and hence {ν ± • (B3) gives λθ k→i(T ) through λS B(T − 1). We then determine λν k→i(T ) and νi(T − 1). i (T ), λS 3. Using the computed values for dynamic messages at different times, propagate the equations (B1)-(B5) backward to compute the values of the Lagrange multipliers and parameters at all times (compute values at time t given values at times t + 1): • Eq. (B1) gives λφ • solve (B2) and (B4) for evaluating λS • compute λν k→i(t); k→i(t) and λS i (t), correspondingly. B(t − 1) and νi(t − 1) using (B5) and (A10) in the same way as it has been done for t = T − 1, see equation (B7); • Eq. (B3) gives λθ k→i(t) through λθ k→i(t + 1), λS i (t + 1), λS k→i(t + 1), λS i (t), λS k→i(t), νi(t) and νi(t − 1). 4. Using the updated values of νi(t) in the step 1. At each iteration, this procedure leads to "jumps" between local optima of the objective O verifying the budget con- straint (A10), where we keep track of the best local optimum which provides the solution to the optimization problem after a maximum number of iterations is reached. Additionally, several different initializations for {νi(t)}i,t and  can be used in this scheme in order to achieve the best solution. Note that the initial distribution of {νi(t)}i,t does not have to satisfy the budget condition (A10), but the solutions obey the constraint already after the first forward-backward iteration. In the case of a small number of nodes in the network N which corresponds to a simpler optimization landscape, we observed that the scheme quickly converges to a unique optimum starting from an arbitrary initial condition. In the next subsection, we describe tests of this scheme on a number of real-world networks. 3. Tests on real-world networks and comparisons with popular heuristics For validating the optimization scheme and its performance against existing approaches, we test the algorithm on a particular case of the targeting setting: the optimal seeding problem which corresponds to optimizing the initial conditions. Indeed, the initial conditions at time one can be defined as an optimization over {νi(0)}i∈V at time t = 0 at which nodes will have a spontaneous probability of switching to the infected state at time zero. This leads to a more general space of possible initial conditions, without restrictions to a selection of an integer number of infected seeds. A classical setting corresponding to the selection of a group of "influential spreaders" at initial time t = 1 can be recovered in our framework by imposing additional constraints to the domain of variation of {νi(0)}i∈V , restricting them to take only values close to zero or one (e.g. using an appropriate barrier potential). a. Comparison with an explicit symbolic resolution of the DMP equations As a validation example considered in the main text, we run the optimization scheme on a small network of relations between Slovene parliamentary parties in 1994, depicted in the Figure 6. The nodes in this network correspond to Slovene political parties in 1994, and the links represent the similarity relations estimated from a sociological survey of the parliament members which were asked to estimate the distance between pairs of parties in the political space [50]. We have renormalized the weights of edges in such a way that the maximum pairwise mutual "influence" receives the value αmax ij = 0.5, and the other weights are distributed proportionally to the survey data. We use this real-world network for the first tests in the seeding problem, which 14 FIG. 6: A small network of relations between Slovene parliamentary political parties from the social study of [50]. The edge thickness is proportional to the estimated mutual "influence" αij between a pair of parties. Only red nodes are assumed to be controllable in this network. The sizes of the nodes reflect the optimal distribution of the seeding budget Bν (0) = 1.5 for maximizing the global impact: small-size nodes do not require any control, and the spontaneous activation probabilities associated with the medium and large-size nodes are equal to 0.5 and 1.0, respectively. was defined as follows. We assumed that three nodes in this network belong to a controllable set W = 1, 3, 5, corresponding to the parties SKD, ZS-ESS and SDSS, correspondingly. Given the total campaigning budget Bν (0) = 1.5, the goal is to maximize the total informational "influence" at time T = 3 by finding the optimal initial distribution of the associated control parameters ν1(0), ν5(0) and ν3(0) = 1.5 − ν1(0) − ν5(0). O =(cid:80) As suggested in subsection B 3, the forward-backward optimization scheme in this case converges to a unique optimal solution in about 7 iterations with  = 5 · 10−4 starting from an arbitrary initial values of the control parameters, outputting the values ν∗ 1 (0) = 0.993217 and ν∗ 5 (0) = 0.505758. One advantage of this small test case is that we can check of the validity of the scheme via an explicit symbolic resolution of DMP equations, obtaining a closed-form expression of the objective function I (T ), representing the final spread at time T as a function of the independent control parameters ν1(0) and ν5(0): O = − 0.0213192ν5(0)3ν1(0) − 0.0113728ν5(0)4 − 0.00149759ν5(0)3 + 0.125857ν5(0)2ν1(0) i∈V P i + 1.19019ν5(0)2 + 1.05873ν5(0)ν1(0) − 1.5701ν5(0) − 0.00130489ν1(0)4 + 0.0456274ν1(0)3 − 0.754842ν1(0)2 + 1.74962ν1(0) − 0.00124248ν1(0)3ν5(0)2 − 0.00274613ν1(0)2ν5(0)3 − 0.00470875ν1(0)2ν5(0)2 + 0.00523158ν1(0)3ν5(0) + 0.121085ν1(0)2ν5(0) − 0.0017293ν1(0)ν5(0)4 − 2.9969 · 10 + 0.000238133ν1(0)2ν5(0)4 + 0.000244127ν1(0)ν5(0)5 − 0.000234529ν5(0)5 + 8.23747 · 10 + 2.10571 · 10 −6ν5(0)5ν1(0)2 + 8.42285 · 10 −7ν5(0)4ν1(0)3 + 1.26343 · 10 −7ν5(0)7 + 3.63985. −7ν5(0)3ν1(0)4 + 8.42285 · 10 −7ν5(0)6ν1(0) + 2.10571 · 10 −5ν1(0)3ν5(0)3 + 8.88018 · 10 −5ν5(0)6 −6ν1(0)4ν5(0)2 + 7.3384 · 10 −6ν1(0)4ν5(0) The optimal parameter values can be obtained by a direct maximization of O(ν1(0), ν5(0)) plotted in Figure 2 of the main text. The optimal parameter values are given in this case by ν∗ 5 (0) = 0.5, see Figure 6, in full agreement with the solution of the forward-backward iteration scheme up to domain border perturbations due to the finite value of . 1 (0) = 1.0 and ν∗ b. Description of popular heuristics used for comparisons on large real-world networks In the main text, we described the performance of the DMP algorithm for the seeding problem on real-world networks of different nature, topology and size, and presented comparisons with well-preforming heuristics in the case of deterministic spreading in the SI model. Here we briefly describe the algorithms used for comparisons. 1. Naive strategies. As a reference, we present results obtained by a naive allocation of budget to randomly-selected nodes (Random) and a uniform allocation of the budget in a probabilistic way (Uniform). 2. High degree adaptive (HDA). The algorithm is based on the idea that the best spreaders correspond to nodes with the highest degree [17], which is a valid and reasonable assumption for a large number of models, including the SI model considered here. The budget is iteratively attributed to the nodes with the current largest degree. Note the adaptive nature of the algorithm: once the node is selected, it is effectively removed from the network, and the degrees of all nodes SKDZLSDSDSSLDSZS-ESSZSDSSLSSPSSNS are recomputed accordingly; this strategy is much more efficient than the allocation of the budget to the high-degree nodes computed once and for all nodes in the original graph. 3. k-shell decomposition. In this algorithm, the influential spreaders are ranked according to their belonging to the k-core with maximum k. However, it has been noted in [22] that while this strategy is successful in identifying a single "influential" node, it performs badly when a group of nodes is selected, which is confirmed by our findings. 15 4. Collective influence. The relation between the destruction of the giant component and "optimal percolation" has been suggested in [25], where the authors have put forward another topological centrality measure called Collective Influence, defined as CIl = (di − 1) (dj − 1), (cid:88) j∈∂B(i,l) (B8) where ∂B(i, l) denotes the set of nodes at a distance l from node i. This topological characteristic results from mapping the spreading process asymptotically onto percolation [58] (in a particular instance of the Linear Threshold model [59]). The intuition behind this measure is that the "collective influence" of node i is not only given by its degree, but also by the contribution of the degrees of nodes at a certain distance from it. However, on many graphs the number of nodes in the set ∂B(i, l) grows exponentially with l, which makes the computation of CIl rather involved even for small values of l. Similarly to HDA, the algorithm is adaptive: after an allocation of resources to the node with the highest score, the measure is recomputed for all nodes. It is intuitive that in the case of a finite-time horizon objective, the best performance should be attained for l ≤ T ; indeed, we find that l = 2 realizes the best choice for the algorithm, with CI4 leading to sub-optimal results in this near-deterministic spreading case. Note that studying the minimization of the spread on networks is less interesting, because the optimal solution corresponds to activating nodes in clusters which are disconnected from the majority of nodes belonging to the giant component. Appendix C: Offline and online mitigation of epidemic via optimal vaccination Here we consider the problem of spread minimization, for example in the case of an undesired spreading process such as the propagation of epidemic. The minimization of the spread at time T is achieved by an effective distribution of vaccines to vulnerable susceptible nodes in a dynamical fashion. We use the variant of the generalized SIR model with a vaccination transition: the optimization parameters in this case are given by {µi(t)}i∈V for t ∈ [0, T − 1], and we assume that the spontaneous transition to the I state is absent, meaning that νi(t) = 0 for all i and t. Modifications with respect to the case considered previously in the Section B include: 1. We are interested in maximizing the objective(cid:80) (cid:0)1 − P i I (T )(cid:1) =(cid:80) i∈V (cid:0)P i has a different sign with respect to the previous case of the spread maximization; R(T )(cid:1) at this time, so the objective i∈V S(T ) + P i 2. Since now nodes can transit to the R state, we additionally need to keep track of the evolution of the quantities P i R(t) and P i→j R (t); 3. Similarly to the formulation in the spread maximization, it is possible to include additional information on a list of target nodes which require priority protection, thus forcing the optimization to minimize the probability of infection on "key" nodes first; 4. In the setting of "online" mitigation of the spreading process one should reinitialize the optimization process at each time step once the new state of the network is available, getting a more accurate and updated account of the state of the system. One then solves the optimization problem of spread minimization at the horizon t = T for the allocation of resources at the next time step only (seeding problem) using new data as initial conditions for the DMP equations. Running optimization for a few more time steps results in a vaccine distribution plan with forcasted estimates, which might be an important feature in realistic settings. 1. Lagrangian and forward-backward equations The corresponding Lagrangian in the case of spreading minimization under vaccination constraints takes the following form: L = S(T ) + P i P i R(T ) µi(t) − Bµ(t) (cid:17) (cid:125) T−1(cid:88) (cid:124) t=0 + λµ B(t) (cid:34)(cid:88) (cid:123)(cid:122) i∈V B (cid:34) (cid:104) λS i (t + 1) S(t + 1) − P i P i S(t)(1 − µi(t)) λR i (t + 1) R(t + 1) − P i P i R(t) − µi(t)P i S(t) (cid:35) (cid:125) +  (cid:124) T−1(cid:88) t=0 (cid:88) (cid:35) i∈V θk→i(t + 1) θk→i(t) (cid:89) (cid:105) k∈∂i 16 (cid:3) + log (cid:16) log(cid:2)µi(t) − µt (cid:123)(cid:122) i P (cid:104) (cid:105)(cid:17) i − µi(t) (cid:125) µt (cid:123)(cid:122) O t=0 t=0 i∈V i∈V i∈V (cid:16) (cid:88) (cid:124) T−1(cid:88) (cid:88) (cid:88) T−1(cid:88) T−1(cid:88) (cid:88) (cid:88) T−1(cid:88) T−1(cid:88) (cid:88) (cid:88) T−1(cid:88) (cid:88) (cid:88) λS i (0) (ki)∈E (ki)∈E (ki)∈E (ki)∈E i∈V t=0 t=0 t=0 t=0 + + + + + + + + (ki)∈E (cid:104) λS k→i(t + 1) λR k→i(t + 1) (t + 1) − P k→i S (t)(1 − µk(t)) R (t + 1) − P k→i P k→i R (t) − µk(t)P k→i S (t) λθ k→i(t + 1) θk→i(t + 1) − θk→i(t) + αkiφk→i(t)  θl→k(t + 1) θl→k(t) (cid:89) l∈∂k\i (cid:105) (cid:105) S P k→i (cid:104) (cid:104) (cid:104) (cid:105) (cid:88) λφ k→i(t+1) φk→i(t+1)−(1−αki)φk→i(t)−P k→i S (t)+P k→i S (t+1)−P k→i R (t)+P k→i R (t+1) (cid:105) (cid:88) (cid:104) (cid:105) + i ,S S(0) − δσ0 (cid:104) P i i∈V R (0) − δσ0 P k→i (cid:105) k,R λR k→i(0) λR i (0) R(0) − δσ0 (cid:104) P i λθ k→i(0) + i ,R (ki)∈E θk→i(0) − 1 (cid:105) + (ki)∈E λS k→i(0) P k→i S (cid:88) + (ki)∈E (0) − δσ0 (cid:104) k,S λφ k→i(0) φk→i(0) − δσ0 k,I (cid:104) (cid:88)  (cid:105) D I (cid:105) . The variation of the Lagrangian with respect to the dual variables yield the forward DMP equations (A1)-(A8). The derivation of the backward equations follow the same principles as in the case of the SI model, with obvious modifications: change of the control parameters νi(t) → µi(t), additional equations ∂L/∂P i ∂L/∂P k→i R(t) = 1[t = T ] + λR k→i(t) − λR R (t) = λR i (t + 1)1[t (cid:54)= T ] = 0, i (t) − λR k→i(t + 1)1[t (cid:54)= T ] + λφ k→i(t) − λφ k→i(t + 1)1[t (cid:54)= T ] = 0, and additions to the previous backward equations due to the new terms S(t) = −λR ∆∂L/∂P i ∆∂L/∂P k→i ∆∂L/∂µi(t) = −λR (t) = −λR S i (t + 1)µi(t)1[t (cid:54)= T ], k→i(t + 1)µk(t)1[t (cid:54)= T ], S(t) − (cid:88) k∈∂i i (t + 1)P i i→k(t + 1)P i→k λR S (t). (C1) (C2) (C3) (C4) (C5) 2. Description of the data set used for tests As a test example for the vaccination problem, we constructed a transportation network of busiest flight routes between major U.S. airports, extracted from the publicly available Bureau of Transportation Statistics data [55]. We used the data table providing the number of transported passengers by different companies between U.S. airports over the past several years. First of all, we extracted the sub-table of flights between 61 biggest airports in terms of the total number of emplaned passengers per year, including 30 "major" and 31 "largest" hubs according to the BTS classification. Then multiple entries corresponding to the same route have been aggregated, and the routes carrying less then 10% of the passengers transported by the busiest route have been pruned as less significant ones, primarily for rending the network reasonably sparse for a clear visualization. This resulted in a network with M = E = 383 edges. Finally, we have assigned the spreading couplings αij (ij)∈E proportionally to the number of carried passengers in such a way that the lightest route had the value αmin ij = 0.05, and hence the busiest route ij (cid:39) 0.495. This choice is based on a reasonable assumption that the probability of infection transmission received the value αmax along each link is proportional to the number of carried passengers on this route. Appendix D: Case of continuous dynamics 17 The optimization procedure described in this work can be directly applied to the case of continuous dynamics, which might be more relevant in other applications. In the continuous case, the backward equations are obtained through the variation of the Lagrangian resulting in the continuous Euler-Lagrange equations. In this section, we illustrate the approach in the setting of maximizing the spread in the SI model using the continuous version of the DMP equations. 1. Maximization of spread at the time horizon T In the continuous case, the marginal probability for node i to be in the state S at time t reads P i S(t) = P i S(0) θk→i(t). (D1) −νi(t(cid:48))t(cid:48)(cid:19) (cid:89) (cid:48) dt e (cid:18)(cid:90) t 0 k∈∂i In the case of constant rates αij, we define the transmission function as fij(t) = αije−αij t. Then the functions θi→j(t) are computed as follows [40]: (cid:90) t 0 θi→j(t) = 1 − dτ fij(τ ) −αij t + P i = e S(0)αije 1 − P i (cid:90) t −αij t S(0) (cid:18)(cid:90) t−τ 0 dτ eαij τ (cid:48) −νi(t(cid:48))t(cid:48)(cid:19) (cid:89) (cid:18)(cid:90) τ e k∈∂i\j −νi(t(cid:48))t(cid:48)(cid:19) (cid:89) (cid:48) dt dt e 0 0 k∈∂i\j θk→i(t − τ )  θk→i(τ ). (D2) In order to compute the dynamic messages θi→j(t), we can either integrate the Eq. (D2) numerically, or transform it into an ordinary differential equation by differentiating with respect to t: θi→j(t) = −αijθi→j(t) + αijP i S(0) (cid:48) dt e θk→i(t), (D3) (cid:18)(cid:90) t 0 −νi(t(cid:48))t(cid:48)(cid:19) (cid:89) k∈∂i\j which represents the dynamics of θi→j(t) (the dot notation represents d conditions θi→j(0) = 1. To derive the dynamics of P i S(t) one can differentiate (D1) to obtain: dt ) and can be solved numerically starting from initial Maximizing O =(cid:80) P i S(t) = P i S(0)e θk→i(t) + P i S(t) −νi(t)t (cid:89) k∈∂i (cid:88) k∈∂i i∈V P i I (T ) is equivalent to minimizing O(T ) = P i S(T ) = (cid:90) T 0 (cid:88) i∈V P i S(t)dt under the constraints imposed by (D3), (D4) and the budget constraint (A10) (cid:88) i∈V (cid:88) i∈V νi(t) = Bν (t). θk→i(t) θk→i(t) . (D4) (D5) (D6) All constraints will be imposed by the corresponding Lagrange multipliers. The Lagrangian to be extremized takes the form (cid:18)(cid:90) t 0 S(0) P i S(t) + λν λθ i→j(t) i∈V B(t) (cid:34)(cid:88) νi(t) − Bν (t) (cid:35)  θi→j(t) + αijθi→j(t) − αijP i (cid:35) −νi(t)t (cid:89) (cid:34)(cid:88) S(0)e νi(t) − Bν (t) k∈∂i B(t) P i S(t) + λν (cid:20) i∈V λθ i→j(t) θi→j(t) + αijθi→j(t) − αij P i S(t) θj→i(t) S(t) − P i P i θk→i(t) − P i S(t) 0 i∈V (i,j)∈E (cid:40)(cid:88) (cid:90) T (cid:88) (cid:88) (cid:40)(cid:88) (cid:90) T (cid:88) (cid:88) (i,j)∈E λS i (t) i∈V i∈V λS i (t) 0 i∈V (cid:34) (cid:34) L = + + = + + S(t) − P i P i S(0)e  θk→i(t) 18 (D7) −νi(t(cid:48))t(cid:48)(cid:19) (cid:89) (cid:35)(cid:41) k∈∂i\j θk→i(t) θk→i(t) dt (cid:35)(cid:41) dt θk→i(t) θk→i(t) e (cid:48) dt (cid:88) k∈∂i (cid:88) k∈∂i (cid:21) −νi(t)t (cid:89) (cid:90) T k∈∂i L = 0 θk→i(t) − P i S(t) F (t, y, y) dt Variational maximization of a Lagrangian where F (t, y, y) is a function of some variable t, y and y its derivative with respect to t, is carried out by varying y with respect to a small perturbation  → 0, throughout the t interval [60], to y + δy. Extremizing L by setting dL d = 0 and using integration by parts one obtains the optimization condition Both the Euler-Lagrange equation Varying (D7) with respect to δP i (cid:12)(cid:12)(cid:12)(cid:12)=0 dL d (cid:20) ∂F (cid:90) T (cid:105) 0 (cid:21) (cid:20) ∂F (cid:21)T (cid:104) ∂F ∂ y 0 should be zero. − d dt ∂F ∂ y λS = ∂y ∂ y 0 ∂F ∂ y dt = 0 . δy dt + (cid:88) λθ i→jαij θj→i(t) and the boundary conditions (cid:104) ∂F ∂y − d S(t) and δθi→j(t) results in the following differential equations: i (t) = −(cid:88) P j i→j(t)αij − (cid:88) (cid:105)T (cid:89)  + λS −νj (t)t (cid:89) k∈∂j/i j→k(t)αjkP j λθ S(t) θk→j(t)θi→j(t) θk→j(t) − P j θk→i(t) θk→i(t) i→j(t)αij + λθ P j S(t) θi→j(t) S(t) θi→j(t) − δt,0λS − δt,0λS θk→i(0), [θi→j(t)]2 (cid:89) j→i(t)αji − λS j (0)P j − λS = λθ S(0)e S(t) S(t) i (0) k∈∂i k∈∂i j∈∂i j (t) j (t) i (t) P j λθ i→j(t) = λθ k∈∂j/i θk→i(0), k∈∂j/i (D8) (D9) , where the expression for θk→i(t) in both equations (D8) and (D9) are calculated on the basis of (D3) and the expressions for λS j (t) and P j S(t) in (D9) are taken from (D8) and (D4), respectively, and were employed in the simplifications of (D9). These equations will be integrated back on the basis of end points. Varying (D7) with respect to δνi(t) one obtains: which can be re-written as Using the condition(cid:80) B(t) = −tλS λν i (t)P i S(0)e (cid:20) νi(t) = − 1 t ln − k∈∂i −νi(t)t (cid:89) S(0)(cid:81) (cid:34) B(t) λν θk→i(t) , (cid:21) k∈∂i θk→i(t) −tλS i (t)P i S(0) . (cid:35) . θk→i(t) (cid:89) k∈∂i tλS i (t)P i (cid:88) i∈V 1 t ln i∈V νi(t) = Bν (t) we obtain Bν (t) = − N t ln λν B(t) + (D10) (D11) (D12) That leads to a straightforward solution for λν (cid:34) −tλS i (t)P i S(0) ln 19 (cid:89) k∈∂i θk→i(t) (cid:35) − t N (cid:41) Bν (t) , (D13) (cid:40) B(t) (cid:88) i∈V 1 N λν B(t) = exp from which the νi(t) values can be calculated. Remark: An alternative path to the derivation of (D11) and (D13) consists in directly using the normalized representation e−βi(t) j∈V e−βj (t) Bν (t) . instead of enforcing the budget constraint with the Lagrange multiplier λν βi(t) in this case it is then possible to use νi(t) = (cid:80) Optimization with respect to βi(t) gives νi(t) = which is equivalent to (D11) and (D13). (cid:4) = −(cid:88) j∈V ∂ ∂βk (cid:80) [δjkνk(t) − νk(t)νj(t)] ∂ ∂νj . λS i (t)P i j∈V λS j (t)P j k∈∂i θk→i(t) k∈∂j θk→j(t) S(0)e−νi(t)t(cid:81) S(0)e−νj (t)t(cid:81) (cid:105) (cid:104) 1 + λS i (0) S(0) (cid:35) j (T ) S(T )λS θj→i(T ) − δθi→j(0) (cid:104) (cid:34) (cid:105) − δP i i (T ) i→j(T ) − P j λθ 0 = δP i S(T ) 1 + λS 0 = δθi→j(T ) Additionally, one should enforce the boundary conditions in the two sets of equations: Since δP i S(0) = δθi→j(0) = 0 ∀i, j ∈ V it provides the end conditions: i (T ) = −1 λS P j S(T ) θj→i(T ) λθ i→j(T ) = . B(t) in (D7). For the optimization with respect to Bν (t) , (D14) (cid:34) i→j(0) − P j λθ j (0) S(0)λS θj→i(0) (cid:35) . (D15) (D16) (D17) (D18) Note that λS λS i (T ) = 1. i (T ) = −1 is a result of the minimization of O(T ); a maximization of O would provide a boundary condition of The optimization process should be carried out as follows: 1. Using the initial conditions θi→j(0) = 1 ∀i and P i S(0) according to the case studied, and some valid initial set of νi(t) (can be uniform), one can solve forward the equations (D3) and (D4) to obtain (and register) values throughout the dynamics t = 0 → T . 2. Using the boundary conditions (D18) and (D17) one solve backward (D8) and (D9) and updates the values of νi(t) according to (D13) and (D11). 3. The process is repeated until it converges and the final νi(t) values represent the solution. 2. Continuous dynamics with targeted and accessible nodes In this variant of the problem one targets specific nodes i ∈ U where U ⊆ V is the subset of all nodes V , aiming to maximize the impact at predefined times ti, which may be different for each of the nodes. We will define T ≡ maxi∈U ti. We also assume one has access to a subset on the nodes i ∈ W where W ⊆ V and W ∩ U = ∅. Again, maximizing O is equivalent to minimizing Since the budget for nodes i /∈ W is zero by definition νi(t) = 0,∀i /∈ W,∀t, and the cost constraint corresponding to (A10) becomes νi(t) = Bν (t) , (D20) P i S(ti) = P i S(t) dt . (D19) (cid:88) i∈U O = (cid:90) ti (cid:88) i∈U 0 (cid:88) i∈W (i,j)∈E 0 P i (cid:90) ti (cid:40) (cid:88) (cid:34) P i λS i (t) (cid:90) ti (cid:40) (cid:88) (cid:34) 0 λS i (t) (i,j)∈E 0 i∈U (cid:88) (cid:90) T (cid:88) (cid:88) (cid:90) T (cid:88) i∈U i∈V 0 i∈V L = + + = + + S(t) dt λθ i→j(t) S(t) − P i P i S(t) dt (cid:20)  θi→j(t) + αijθi→j(t) − αijP i −νi(t)t (cid:89) θk→i(t) − P i S(0)e S(t) k∈∂i S(0) (cid:48) e dt  θk→i(t) −νi(t(cid:48))t(cid:48)(cid:19) (cid:89) (cid:35)(cid:41) k∈∂i\j θk→i(t) θk→i(t) dt (cid:18)(cid:90) t (cid:88) 0 k∈∂i (cid:21) (cid:88) k∈∂i where we can use the normalized representation where βi(t) = −∞,∀i /∈ W,∀t, (cid:80) e−βi(t) j∈V e−βj (t) Bν (t) . νi(t) = 20 The Lagrangian to be extremized takes the form (the budget constraint on accessible nodes (D19) is embedded in the corresponding ν variables through β, as remarked in Sec. D 1 Alternatively, the first term can be written as λθ i→j(t) θi→j(t) + αijθi→j(t) − αij P i S(t) θj→i(t) S(t) − P i P i S(0)e θk→i(t) − P i S(t) (cid:35)(cid:41) dt θk→i(t) θk→i(t) (D21) −νi(t)t (cid:89) (cid:90) T (cid:88) k∈∂i 0 i∈U S(t)Θ(ti − t) dt. P i Since the first term does not contribute to the Euler-Lagrange equation, varying (D21) with respect to δP i δνi(t) results in the same differential equations for λS i (t) (D8) and λij(t) (D9). Optimization with respect to βi(t) or νi(t) gives a similar expression for i ∈ W (D14) but νi(t) = 0,∀i /∈ W and ∀t. Additionally, one should enforce the boundary conditions in the two sets of equations (D15) and (D16). For j ∈ U (D15) and (D16) are the same as in the non-targeted case, but for j /∈ U there is no constant (of value 1) in (D15) leading to: S(t), δθi→j(t) and (cid:40)−1 ∀ i /∈ U (cid:40)0 ∀ i /∈ U 0 P j S (tj ) θj→i(tj ) ∀ i /∈ U ∀ j ∈ U . (D22) (D23) λS i (T ) = λθ i→j(tj) = The optimization process should be carried out as before. [1] Anderson, R. M., May, R. M. & Anderson, B. Infectious diseases of humans: dynamics and control, vol. 28 (Wiley Online Library, 1992). [2] Boccaletti, Stefano and Latora, Vito and Moreno, Yamir and Chavez, Martin and Hwang, D.-U. Complex net- works: Structure and dynamics. Physics reports 424, 175 -- 308 (2006). [3] Rogers, E. M. Diffusion of innovations (Simon and Schuster, 2010). [4] Pastor-Satorras, R., Castellano, C., Van Mieghem, P. & Vespignani, A. Epidemic processes in complex networks. Reviews of modern physics 87, 925 (2015). [5] Federal Energy Regulatory Commission and North American Electric Reliability Corporation Staff. Ari- zona - southern california outages on september 8, 2011: causes and recommendations. Tech. Rep. (2012). [6] Dawood, F. S. et al. Estimated global mortality associ- ated with the first 12 months of 2009 pandemic influenza a h1n1 virus circulation: a modelling study. The Lancet infectious diseases 12, 687 -- 695 (2012). [7] U.S. Government Accountability Office. Financial regula- tory reform: financial crisis losses and potential impacts of the dodd-frank act. Tech. Rep. (2012). [8] Lokhov, A. Y., Lemons, N., McAndrew, T. C., Hagberg, A. & Backhaus, S. Detection of cyber-physical faults and intrusions from physical correlations. In ACM SIGKDD Workshop on Outlier Definition, Detection and Descrip- tion on Demand (ODD 4.0) (2016). [9] Als association. http://www.alsa.org/fight-als/ ice-bucket-challenge.html. [10] Rutledge, P. How obama won the social media battle in the 2012 presidential campaign. The National Psycholo- gist (2013). [11] Epstein, R. & Robertson, R. E. The search engine manip- ulation effect (seme) and its possible impact on the out- comes of elections. Proceedings of the National Academy of Sciences 112, E4512 -- E4521 (2015). [12] Margetts, H., John, P., Hale, S. & Yasseri, T. Political Turbulence: How Social Media Shape Collective Action (Princeton University Press, 2015). [13] Domingos, P. & Richardson, M. Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discov- ery and data mining, 57 -- 66 (ACM, 2001). [14] Martin, K. R. et al. Computational model for autophagic vesicle dynamics in single cells. Autophagy 9, 74 -- 92 (2013). [15] Csermely, P., Korcsm´aros, T., Kiss, H. J., London, G. & Nussinov, R. Structure and dynamics of molecular net- works: a novel paradigm of drug discovery: a comprehen- sive review. Pharmacology & therapeutics 138, 333 -- 408 (2013). [16] Jones, S. Army revives chindits as 'facebook warriors' for smart battle. Financial Times (2015). [17] Pastor-Satorras, R. & Vespignani, A. Immunization of complex networks. Phys. Rev. E 65, 036104 (2002). [18] Cohen, R., Havlin, S. & Ben-Avraham, D. Efficient im- munization strategies for computer networks and popu- lations. Phys. Rev. Lett. 91, 247901 (2003). [19] Holme, P., Kim, B. J., Yoon, C. N. & Han, S. K. At- tack vulnerability of complex networks. Phys. Rev. E 65, 056109 (2002). [20] Holme, P. Efficient local strategies for vaccination and network attack. EPL (Europhysics Letters) 68, 908 (2004). [21] Chen, Y., Paul, G., Havlin, S., Liljeros, F. & Stanley, H. E. Finding a better immunization strategy. Phys. Rev. Lett. 101, 058701 (2008). [22] Kitsak, M. et al. Identification of influential spreaders in complex networks. Nature Physics 6, 888 -- 893 (2010). [23] Borge-Holthoefer, J. & Moreno, Y. Absence of influential spreaders in rumor dynamics. Phys. Rev. E 85, 026116 (2012). [24] H´ebert-Dufresne, L., Allard, A., Young, J.-G. & Dub´e, L. J. Global efficiency of local immunization on complex networks. Scientific reports 3 (2013). [25] Morone, F. & Makse, H. A. Influence maximization in complex networks through optimal percolation. Nature (2015). [26] Mugisha, S. & Zhou, H.-J. Identifying optimal targets of network attack by belief propagation. arXiv preprint arXiv:1603.05781 (2016). [27] Braunstein, A., Dall'Asta, L., Semerjian, G. & Zde- arXiv preprint Network dismantling. borov´a, L. arXiv:1603.08883 (2016). [28] Altarelli, F., Braunstein, A., DallAsta, L., Wakeling, J. R. & Zecchina, R. Containing epidemic outbreaks by message-passing techniques. Phys. Rev. X 4, 021024 21 (2014). [29] Altarelli, F., Braunstein, A., DallAsta, L. & Zecchina, R. Optimizing spread dynamics on graphs by message passing. Journal of Statistical Mechanics: Theory and Experiment 2013, P09011 (2013). [30] Guggiola, A. & Semerjian, G. Minimal contagious sets in random regular graphs. Journal of Statistical Physics 158, 300 -- 358 (2015). [31] Kempe, D., Kleinberg, J. & Tardos, ´E. Maximizing the spread of influence through a social network. In Proceed- ings of the ninth ACM SIGKDD international confer- ence on Knowledge discovery and data mining, 137 -- 146 (ACM, 2003). [32] Chen, W., Lakshmanan, L. V. & Castillo, C. Information and influence propagation in social networks. Synthesis Lectures on Data Management 5, 1 -- 177 (2013). [33] Du, N., Song, L., Gomez-Rodriguez, M. & Zha, H. Scal- able influence estimation in continuous-time diffusion networks. In Advances in Neural Information Process- ing Systems, 3147 -- 3155 (2013). [34] Nowzari, C., Preciado, V. M. & Pappas, G. J. Analysis and control of epidemics: A survey of spreading processes on complex networks. IEEE Control Systems 36, 26 -- 46 (2016). [35] Borgs, C., Chayes, J., Ganesh, A. & Saberi, A. How to distribute antidote to control epidemics. Random Struc- tures & Algorithms 37, 204 -- 222 (2010). [36] Nian, F. & Wang, X. Efficient immunization strategies on complex networks. Journal of theoretical biology 264, 77 -- 83 (2010). [37] Scaman, K., Kalogeratos, A. & Vayatis, N. A greedy approach for dynamic control of diffusion processes in networks. In Tools with Artificial Intelligence (ICTAI), 2015 IEEE 27th International Conference on, 652 -- 659 (IEEE, 2015). [38] Drakopoulos, K., Ozdaglar, A. & Tsitsiklis, J. N. An efficient curing policy for epidemics on graphs. IEEE Transactions on Network Science and Engineering 1, 67 -- 75 (2014). [39] Shapiro, M. & Delgado-Eckert, E. Finding the probabil- ity of infection in an sir network is np-hard. Mathematical biosciences 240, 77 -- 84 (2012). [40] Karrer, B. & Newman, M. E. J. Message passing ap- proach for general epidemic models. Phys. Rev. E 82, 016101 (2010). [41] Shrestha, M. & Moore, C. Message-passing approach for threshold models of behavior in networks. Phys. Rev. E 89, 022805 (2014). [42] Lokhov, A. Y., M´ezard, M. & Zdeborov´a, L. Dynamic message-passing equations for models with unidirectional dynamics. Phys. Rev. E 91, 012811 (2015). [43] Le Cun, Y., Touresky, D., Hinton, G. & Sejnowski, T. A theoretical framework for back-propagation. In The Con- nectionist Models Summer School, vol. 1, 21 -- 28 (1988). [44] Saad, D. & Rattray, M. Globally optimal parameters for on-line learning in multilayer neural networks. Phys. Rev. Lett. 79, 2578 (1997). [45] De Domenico, M., Porter, M. A. & Arenas, A. Muxviz: a tool for multilayer analysis and visualization of networks. Journal of Complex Networks cnu038 (2014). [46] Krebs, V. E. Mapping networks of terrorist cells. Con- nections 24, 43 -- 52 (2002). [47] Pinto, P. C., Thiran, P. & Vetterli, M. Locating the 22 source of diffusion in large-scale networks. Phys. Rev. Lett. 109, 068702 (2012). [48] Lokhov, A. Y., M´ezard, M., Ohta, H. & Zdeborov´a, L. In- ferring the origin of an epidemic with a dynamic message- passing algorithm. Phys. Rev. E 90, 012801 (2014). [49] Altarelli, F., Braunstein, A., Dall'Asta, L., Lage- Castellanos, A. & Zecchina, R. Bayesian inference of epidemics on networks via belief propagation. Phys. Rev. Lett. 112, 118701 (2014). [50] Doreian, P. & Mrvar, A. A partitioning approach to structural balance. Social networks 18, 149 -- 168 (1996). [51] Subelj, L. & Bajec, M. Robust network community detec- tion using balanced propagation. The European Physical Journal B 81, 353 -- 362 (2011). [52] Bu, D. et al. Topological structure analysis of the protein -- protein interaction network in budding yeast. Nucleic acids research 31, 2443 -- 2450 (2003). [53] Leskovec, J., Kleinberg, J. & Faloutsos, C. Graph evolu- tion: Densification and shrinking diameters. ACM Trans- actions on Knowledge Discovery from Data (TKDD) 1, 2 (2007). [54] Boldi, P., Codenotti, B., Santini, M. & Vigna, S. Ubi- Crawler: A scalable fully distributed web crawler. Soft- ware: Practice & Experience 34, 711 -- 726 (2004). [55] Bureau of transportation statistics. http://www.rita. dot.gov/bts/. [56] AJ, T., DJ, R. & SI, H. Global transport networks and infectious disease spread. Advances in Parasitology 62, 293 -- 343 (2006). [57] Lokhov, A. Y. & Misiakiewicz, T. Efficient reconstruction of transmission probabilities in a spreading process from partial observations. arXiv preprint arXiv:1509.06893 (2015). [58] Newman, M. E. Spread of epidemic disease on networks. Phys. Rev. E 66, 016128 (2002). [59] Granovetter, M. Threshold models of collective behavior. American journal of sociology 1420 -- 1443 (1978). [60] Hildebrand, F. B. Methods of applied mathematics prentice-hall. New Jersey. pp 36 -- 122 (1965).
1701.05352
1
1701
2017-01-19T10:05:55
Finding low-tension communities
[ "cs.SI", "physics.soc-ph" ]
Motivated by applications that arise in online social media and collaboration networks, there has been a lot of work on community-search and team-formation problems. In the former class of problems, the goal is to find a subgraph that satisfies a certain connectivity requirement and contains a given collection of seed nodes. In the latter class of problems, on the other hand, the goal is to find individuals who collectively have the skills required for a task and form a connected subgraph with certain properties. In this paper, we extend both the community-search and the team-formation problems by associating each individual with a profile. The profile is a numeric score that quantifies the position of an individual with respect to a topic. We adopt a model where each individual starts with a latent profile and arrives to a conformed profile through a dynamic conformation process, which takes into account the individual's social interaction and the tendency to conform with one's social environment. In this framework, social tension arises from the differences between the conformed profiles of neighboring individuals as well as from differences between individuals' conformed and latent profiles. Given a network of individuals, their latent profiles and this conformation process, we extend the community-search and the team-formation problems by requiring the output subgraphs to have low social tension. From the technical point of view, we study the complexity of these problems and propose algorithms for solving them effectively. Our experimental evaluation in a number of social networks reveals the efficacy and efficiency of our methods.
cs.SI
cs
Finding low-tension communities Esther Galbrun Behzad Golshan Inria Nancy -- Grand Est, France Recruit Institute of Technology, CA, USA [email protected] [email protected] Aristides Gionis Evimaria Terzi Aalto University, Finland Boston University, MA, USA [email protected] [email protected] Abstract Motivated by applications that arise in online social media and collaboration networks, there has been a lot of work on community-search and team-formation problems. In the former class of problems, the goal is to find a subgraph that satisfies a certain connectivity requirement and contains a given collection of seed nodes. In the latter class of problems, on the other hand, the goal is to find individuals who collectively have the skills required for a task and form a connected subgraph with certain properties. In this paper, we extend both the community-search and the team-formation problems by associating each individual with a profile. The profile is a numeric score that quantifies the position of an individual with respect to a topic. We adopt a model where each individual starts with a latent profile and arrives to a conformed profile through a dynamic conformation process, which takes into account the individual's social interaction and the tendency to conform with one's social environment. In this framework, social tension arises from the differences between the conformed profiles of neighboring individuals as well as from differences between individuals' conformed and latent profiles. Given a network of individuals, their latent profiles and this conformation process, we extend the community-search and the team-formation problems by requiring the output subgraphs to have low social tension. From the technical point of view, we study the complexity of these problems and propose algorithms for solving them effectively. Our experimental evaluation in a number of social networks reveals the efficacy and efficiency of our methods. 1 Introduction A large body of work in social and collaboration networks focuses on solving variants of two classes of problems: community-search and team-formation. The high-level goal of both classes is to discover a connected subgraph, but they differ in the input query. In the community-search problem [7, 18, 19, 20], the input query consists of individuals who should participate in the subgraph. In the team-formation problem [1, 2, 8, 15, 3, 11, 14, 16, 17], on the other hand, the input query consists of a set of skills that need to be covered by the solution. These two problem classes have applications primarily in online social media and collaboration networks. For example, solutions to the community-search problem can be used to identify a set of individuals who are the most appropriate group to organize a social gathering. Similarly, solutions to the team-formation problem can be used by project managers or human-resource (HR) departments of companies and universities in order to identify a well-functioning team of employees for a project or to make a competitive cluster hire. Such hiring and resource-allocation decisions can prove important for the well-functioning and the success of an organization. In all existing variants of the community-search and the team-formation problems the goal is to discover a connected subgraph; Different variants of the problem impose different requirements on the structure of the solution subgraph. For example, in some settings one asks to find high-density communities [19], while in others the objective is to find small-diameter communities [18]. From the computational point of view, different requirements lead to different problems that have different complexities and require the design of different algorithms. As usual, the choice of the appropriate problem formulation depends on the application domain. 1 In contrast to the static requirements imposed by existing work, in this paper we incorporate the dynamics of social interactions in the community-search problem. We do so by associating profiles to the individuals in the network. Regarding any subject of matter, individuals have their own opinion or preference. However, in a social context, such as a working group or team, the opinion that is publicly held or enacted by each individual is influenced by his peers. Diverging from the opinion of peers generates a social cost bearing on the individual. Simultaneously, expressing an opinion that does not match one's own beliefs creates an inner conflict and an associated internal cost. These constitute important factors impacting the operation of the community as a social group. Therefore, in this paper, we extend the community-search and the team-formation problems to take them into account, adding a new and realistic perspective. We consider a social network between individuals, each one of which is associated with a profile. The profiles of individuals model their interests, skills, preferences, opinions, and so on, with respect to different aspects or topics. For example, the profile may represent the interest of an individual in discussing about politics, or the working style of an individual -- e.g. whether he is a morning person or a night owl. Since profiles may cover a number of different aspects or topics, we assume that they are represented as multi-dimensional vectors. We further assume that the profiles of individuals change due to the social influence they receive from other individuals in the network. We model this change through what we call conformation process, which is a dynamic process. Motivated by existing work on models of opinion formation and social influence [5, 6, 9, 13, 10] we assume that the conformation process is a repeated-averaging process. In our work, we generalize this process from one-dimensional opinions to multi-dimensional profiles. The effect of this process is that the initial profiles of individuals, which we call latent profiles, get re-enforced or altered through synthesis and aggregation of different viewpoints of the network participants. Given this process, the latent profiles of individuals and a social network that represents their social interaction, social tension arises because of the differences between the conformed profiles of neighboring nodes and between the conformed and latent profiles of the nodes themselves. In this context, our goal is to identify communities and teams that are not only connected and qualified, but also exhibit low social tension. We refer to these problems as the T -Comm and the T -Team problems respectively. To the best of our knowledge we are the first to define and study these problems in the light of profile-conformation processes in a social network. In terms of technical results, we show that both the T -Comm and the T -Team problems are NP-hard and we design graph-theoretic algorithms for solving them. A key difficulty that we overcome while designing these algorithms is that we do not run the conformation process for every step of these algorithms; indeed, this would be computationally very demanding. Rather, we create effective proxies of this process that allow our algorithm to scale. Our experiments with real-world data demonstrate the efficiency and the efficacy of our algorithms for both problems. Applications. Both the T -Comm and T -Team problems have numerous potential applications. For example, when analyzing social networks or social media it is often useful to identify connected groups of users who have similar profiles with respect to a topic or an idea (i.e. they are in agreement). Note, however, that minimizing the social tension does not necessarily imply looking for highly homogeneous communities but, rather, favoring communities that are able to bridge opinion gaps at low social and communication costs. Groups with low social tension can be recommended as ideal in order to form a group to organize or to invite at a social event. Such problems also arise in human-resource management, when searching for groups of workers who can collaborate together in a conflict-free manner in order to successfully complete a project. Being able to identify a group of people who are not going to experience high social tension is particularly useful when considering cluster hires in universities or start-up companies, where the investment is high and the human factor risk needs to be minimized. Roadmap. The rest of the paper is organized as follows. In Section 2 we give a thorough overview of the related work and identify the connections to our own work. After describing our notation and modeling assumptions in Section 3, we proceed to Section 4, where we define the community-search variant of our low-tension mining problem, prove that it is NP-hard and present algorithms for solving it in practice. We discuss other problem variants in Section 5. Our experimental results are described in Section 6 and we conclude the paper in Section 7. A short version of this paper appeared in SDM'17. In this extended version, we discuss the team-formation problem variant, beside the original community-search problem, and include additional experimental results. 2 2 Related Work To the best of our knowledge, we are the first to combine the problem of identifying a group of nodes from an input graph with an underlying dynamic conformation process of opinion formation at play over the graph. However, while the T -Comm and T -Team problems as we define them are novel, our work is related to existing work on graph mining and opinion dynamics. We summarize the related literature below. 2.1 Community search Given a graph and a subset of its nodes as a seed, community-search problems ask for a set of nodes which is a superset of the seed nodes and induces a connected subgraph in the original graph. Since this class of problems was initially introduced [7, 20], different instances of the community-search problem appeared. Each one of them imposes a different requirement on the graph-theoretic properties of the reported subgraph. For example, Sozio and Gionis [19] focus on finding a subgraph that connects the chosen seed members and has maximum density, Ruchansky et al. [18] solve the same problem with the objective to minimize the sum of pairwise shortest path distances among the nodes participating in the subgraph. Faloutsos et al. [7] study the problem of finding a subgraph that links two seed nodes while maximizing the quality of connection of the subgraph, for a generic measure of quality. Tong et al. [20] later extended their work to an arbitrary number of seed nodes. Although these problems are related to the T -Comm problem we study here, the novelty of our problem comes from the fact that we associate nodes with profiles and that we assume a profile-conformation process that takes place over the network. Our objective function is directly related to this process as it aims to minimize the social tension in the reported community. As a result, the technical results we obtain for T -Comm are different from the other community-search problems. 2.2 Team formation Team-formation is another class of graph-mining problems where the goal is to find a set of individuals in a network, who together possess the required skills while minimizing the communication costs between the members of the team. Since the introduction of this problem in the domain of data mining by Lappas et al. [15], a number of variants have been studied, from varying the communication cost function [3, 11, 14, 16, 17], to considering the workload distribution [1], designing algorithms for online team formation [2], and maximizing the influence of the team over the network [8]. At a high level, the T -Team problem we define is a team-formation problem. However, all existing work on team-formation problems aims to identify teams that optimize some static measure (e.g. the density or the diameter) of the subgraph that the team induces. However, the existence of a dynamic conformation process over the network makes our problem definition and setting quite distinct. Our goal is to minimize the social tension, which is much more complicated as it is caused by the difference in the profiles which arise from the interplay between the conformation process and the network structure. Therefore, existing algorithms for team formation cannot be applied to our problem. 2.3 Opinion dynamics Starting in the 1970s, models have been built that try to capture the opinion-formation processes in groups and networks [5, 6, 9, 13, 22, 10]. For example, voter models, pioneered by Clifford and Sudbury [5] and Holley and Liggett [13] are stochastic models of opinion formation where at each step a node is selected at random and adopts the opinion of one of its neighbors, also selected at random. In DeGroot's averaging model [6], each node updates its opinion, by the weighted average of its own opinion and its neighbors' opinion at the previous time step. Friedkin and Johnsen [9, 10] introduced a model where every node has an immutable inner opinion and a changeable expressed opinion. Each node forms its expressed opinion in a repeated-averaging process involving its own inner opinion and the expressed opinions of its neighbors. Given the popularity of this model we also adopt it for modeling our profile-conformation process, and extend it to multiple dimensions. The Friedkin and Johnsen model has been used in recent works by Bindel et al. [4] and by Gionis et al. [12]. Bindel et al. focus on the price of anarchy in terms of the tension achieved through local repeated averaging and global opinion coordination. Gionis et al. aim at identifying the set of nodes whose opinions need to be changed 3 so that the overall positive opinion in the network is maximized. Although our work builds upon Friedkin and Johnsen's ideas to model the profiles and their conformation process, none of the above-mentioned works addresses the question of identifying a subgraph with low social tension as we do. Extending our work to other times of opinion-dynamics models, i.e. beyond the model of Friedkin and Johnsen, is a promising direction for future research. 3 Preliminaries Throughout the paper we consider a social network G = (V, E) where the nodes in V correspond to individuals and the edges in E represent the interactions between these individuals. For simplicity of exposition, we present the case of an unweighted and undirected graph, but the problems and algorithms we discuss can naturally be extended to weighted and directed graphs. The set of neighbors of node i in G is denoted by NG(i). Given a subset of vertices U ⊆ V , we let E(U ) denote the set of edges of G induced by U , i.e. E(U ) = {(i, j) ∈ E, i, j ∈ U}, and G(U ) denote the corresponding induced subgraph G(U ) = (U, E(U )). 3.1 Profiles Evidently, each individual has their own set of preferences (e.g. style, habits, biases, and opinions). We refer to this personal set of preferences as a profile. For now, let us assume that profiles only reflect preferences regarding a single aspect (e.g. working style), that is, profiles consist of a single attribute. We assume that profile attribute values are represented by a real number in the interval [0, 1]. For instance, a value between 0 and 1 may represent an individual's preference towards a certain software tool, or his preference to work in a team or in isolation respectively. The key characteristic of our model is that it captures the interaction between the user profiles and their social connections. This is done by assuming that each individual i has a latent profile and a conformed profile, denoted by xi and fi respectively. The latent profile of an individual represents the individual's own true preference. However, individuals may choose not to act in accordance with their latent profiles as they try to minimize peer pressure by conforming their preferences to those of their peers. The conformed profile represents these adjusted preferences. For simplicity, we first describe the model for single-attribute profiles, but later on we discuss how to extend it to multi-attribute profiles. We summarize the latent and conformed profiles of all n individuals with respect to a single attribute using vectors x and f respectively. 3.2 Measuring tension Due to the underlying social structures and mechanisms, the conformed profile fi of a node can differ from its latent profile xi. In such case, the node will bear an inner tension caused by the difference between its own latent and conformed profiles. On the other hand, the difference between the node's conformed profile and between the conformed profiles of its neighbors will cause cross tension. Hence, the total tension on node i is: Ti(G, x, f ) = (xi − fi)2 + (fi − fj)2. Then, the social tension of the network is simply the sum of the individual tensions, defined as (fi − fj)2(cid:1), (1) (cid:88) j∈NG(i) Ti(G, x, f ) (cid:88) (cid:88) (cid:0)(xi − fi)2 + (cid:88) (xi − fi)2 + i∈V i∈V (cid:88) (cid:88) j∈NG(i) i∈V (i,j)∈E 4 T (G, x, f ) = = T (G, x, f ) = which can alternatively be written as the sum of the overall inner and cross tensions 2 (fi − fj)2. 3.3 Conformation process But how do nodes arrive at their conformed profiles? Consider a repeated averaging process where at each step each node adjusts its conformed profile by setting it to the average of its latent profile and the conformed profile of its neighbors. Formally, denoting as fi(t) the conformed profile of node i at step t, we have: xi +(cid:80) j∈NG(i) fj(t) 1 + NG(i) fi(t + 1) = . (2) Computing the conformed profiles according to the repeated averaging model is equivalent to choosing fi to minimize Ti(G, x, f ). That is, if each node aims to minimize its tension, the repeated averaging model provides an optimal choice for the conformed profiles. In that sense, using the repeated averaging model yields a Nash equilibrium for the tension, not a social optimum [4]. A practical consideration is that in this model the latent profiles are assumed to be known, while the conformed profiles are the output of the conformation process. But, in practice, we have access to the conformed profiles while the latent profiles cannot be observed. This, however, does not constitute a problem for our model. One can swap the known and unknown variables of the system and solve for the latent profiles, given the conformed profiles and the original network. The model adopted here for how conformed profiles emerge is a well-studied opinion-formation and social- influence model that has been introduced by sociologists [6, 9, 10]. In particular, the work of Friedkin et al. [10] validates this model by conducting a set of controlled experiments in which they observe how interactions between individuals in small groups influence their expressed opinions. The study demonstrates that the repeated-averaging model can both predict the opinions that individuals converge to, as well as the rate of convergence. Others have studied the mathematical properties of this model. For instance, it has been shown [4, 12] that the process converges in polynomial time to a fixed-point solution. In fact, the final conformed profiles can be computed by a matrix inversion [12], but actually repeating the averaging process leads to much faster computation. 3.4 Multi-attribute profiles Our assumption so far has been that profiles reflect the preferences of individuals with respect to a single attribute. But our notion of latent and conformed profiles can be easily extended to the case of multiple attributes, leading to multi-attributes -- i.e. multi-dimensional -- profiles. Assume there are m aspects or topics of interest, each associated to an attribute. The latent and conformed profiles can be simply extended from a single real number to real-valued vectors of dimensionality m, where each entry corresponds to one of the attributes. We summarize the latent and conformed profiles of n individuals on m attributes using n × m matrices X and F respectively. Note that each column of these matrices, denoted by xa and fa for a = 1, . . . , m, corresponds to a single attribute. In the multi-attribute case, the conformed profiles can be computed as before by applying Equation (2) in a column-wise fashion. Similarly, the social tension T (G, X, F) is defined as the sum of the social tensions across all m attributes. 4 Finding low-tension communities with seed nodes In this section, we introduce the T -Comm problem, study its complexity and provide algorithms for solving it. 4.1 Definition of the T -Comm problem At a high level, the T -Comm problem aims to find a connected, low-tension community that involves a chosen subset of members. Formally, this intuitive statement is captured by the following problem definition: Problem 1 (T -Comm) Given a network G = (V, E), latent profiles X and a set of seed nodes Q ⊆ V , find V (cid:48) ⊆ V such that Q ⊆ V (cid:48), the graph G(cid:48) induced by V (cid:48) on G is connected and T (G(cid:48), X, F) is minimized, where F is computed by the repeated averaging model on G(cid:48). Note that when defining the T -Comm problem, we assume that the social tension is computed as in Equation (1), X is the matrix containing the latent profiles of the nodes in V (cid:48) and F contains the conformed profiles 5 Figure 1: Schema of the constructed graph for the reduction from X3C. The black and white nodes have latent profiles with values 1 and 0 respectively. of individuals, computed using the repeated averaging model described in the previous section (see Equation (2)) over the subgraph induced by V (cid:48). Given these assumptions, we can make the following observations with respect to the requirements imposed on the solution of T -Comm: as the number of edges in the resulting subgraph and the differences in the conformed profiles across these edges decrease, so does the social tension. In particular, the complete absence of edges results in no tension at all. However, the requirement that the output subgraph should be connected forbids such solutions. From the application point of view, connectivity is important as it guarantees communication among the community members. One can see that minimizing tension and guaranteeing connectivity leads to an interesting trade-off between the density of edges and the homogeneity of the profiles of nodes in the reported subgraph. Communities should consist of individuals who share similar profiles or individuals who have divergent profiles but are needed to guarantee connectivity, these latter ones being preferably very sparsely connected with the rest of the community members. with respect to the computational complexity of the T -Comm problem, we obtain the following result. Proposition 4.1 The T -Comm problem cannot be solved optimally in polynomial time even with a single attribute (i.e. m = 1) unless P = NP. Proof 1 (Sketch) We prove the hardness of T -Comm with a reduction from the problem of exact cover by 3-sets. The exact cover by 3-sets problem, X3C for short, asks the following question. Given a universe of elements B = {b1, . . . , bp}, where the number of elements p is a multiple of 3, and a collection S = {s1, . . . , sq} of 3-elements subsets of B, is there a collection S(cid:48) ⊆ S such that every element in B occurs in exactly one member of S(cid:48)? Given an instance of the X3C problem, we construct an instance of the T -Comm problem with one-attribute profiles (i.e. m = 1) as follows. To each element bi in B we associate a node, called an "element-node", with latent profile 0, and to each set sj in S we associate a node, called a "set-node", with latent profile 1. Each set-node is connected to the three nodes that represent the elements it contains. In addition, we make all the q set-nodes part of a larger clique D of o + q nodes with latent profiles equal to 1. Also, we make each element-node bi part of a larger clique Ai containing o nodes with latent profiles 0. Finally, we assume that all the nodes in our construction are seed nodes except for the q set-nodes. This construction is illustrated in Figure 1. We prove that if the given instance of X3C has an exact 3-set cover, then the minimum tension subgraph solution of T -Comm will contain the set-nodes of this exact cover. The main idea of the proof is based on the following observation. Selecting a large (yet polynomial in p) value for o, increases the size of all cliques in our construction (i.e. clique D and all Ai cliques). As a result, the conformed profile of all the nodes (including the set-nodes) in D will be very close to 1, and the conformed profiles of all nodes in the Ai cliques will be very close to 0. Thus, the only non-negligible source of tension will be the tension across the edges that connect element-nodes to set-nodes. Each such edge would increase the tension by almost a unit. Note that since each bi is a seed node, it has to be connected to the o seed nodes in D. This can be achieved only by going through a set-node. Thus, the solution to X3C has to pick a subset of set-nodes that cover all the element-nodes to ensure connectivity. Now, if x set-nodes are included in the subgraph then the tension would be roughly 3x. Obviously, the solution that minimizes the tension is the solution that picks the smallest number of set-nodes. This is achieved by selecting an exact cover, if such cover exists. 6 A1b1s1AibisjAnbnsmD Input: Network G = (V, E), latent profiles X, seed nodes Q ⊆ V , path length function len() Output: Community nodes V (cid:48) 1: H ← complete weighted graph over nodeset Q, such that the weight of edge (i, j) is λ(i, j) = minp∈Pij len(p) with Pij the set of paths in G between i and j 2: K ← minimum spanning tree of H 3: V (cid:48) ← expand K by replacing edges by 4: return V (cid:48) their corresponding shortest path in G Figure 2: The CTree algorithm for solving T -Comm. 4.2 Algorithms for the T -Comm problem While the objective of the T -Comm problem is to minimize the social tension in the solution graph, T (G(cid:48), X, F), obtaining the conformed profiles through the repeated-averaging process is costly; thus, it is not feasible to compute the social tension on a large number of candidate subgraphs. A possible alternative is to compute the conformed profiles by applying the repeated-averaging process on the whole graph once and use these profiles when evaluating the tension in the candidates later on. However, while designing our algorithms, we observed that this is a poor choice. Intuitively, the presence of a node with a latent profile that departs greatly from its neighbors' might significantly sway their conformed profiles. During the search, this node will likely be removed from the candidate set early on, but its effect would remain. In order to avoid such effects, but also avoid the repeated computations of social tension we use the following for a pair of neighboring nodes i and j we assign to edge (i, j) ∈ E weight trick in all our algorithms: wij = xi − xj. We then use this weight as a way of quantifying the contribution of this edge in the overall social tension. Although wij is just a proxy of the edge's contribution, the trick appears to perform well in practice and leads to significant speedups. Once our algorithms obtain the set of nodes to report, we apply the repeated-averaging process on the induced subgraph in order to evaluate the social tension of the solution. We propose two approaches for finding good candidate solutions for this problem. Spanning-tree approach. This approach connects the seed nodes by building a spanning tree between them and is based on the 2-approximation algorithm for the Steiner tree problem [21]. It works as follows: first, it computes the shortest path between every pair of seed nodes. Next, it constructs a complete graph over the seed nodes such that the weight of the edge between two nodes corresponds to their shortest path distance in the original graph. Then, it considers the minimum-spanning tree from this complete graph, e.g. obtained with Prim's algorithm, and replaces each edge of the spanning tree with the associated original shortest path. The resulting subgraph constitutes the output of our tree-based algorithm. A sketch of this algorithm, which we call CTree, is shown in Figure 2. Note that this approach, searching for the best spanning tree, lacks any control over the induced edges that will be included in the solution. In this sense, it is an optimistic strategy. We obtain different variants of this algorithm depending on the measure used to evaluate the length of a path. Having experimented with various options, we focus on two variants, where the length of the path is either (i) the number of edges involved, or (ii) the sum of weights of the edges along the path. In other words, if pij = (i, v1, v2, . . . , vk, j) is a path between i and j, we have len(pij) = k + 1 in the first variant, and len(pij) = wiv1 + wv1v2 + ··· + wvkj in the other. We denote these variants as CTree(e) and CTree(s) respectively. The main step in our algorithm is the computation of the shortest path between all pairs of seed nodes by running the Dijkstra algorithm from each seed node in turn. The running time of our algorithm is thus O(Q (V + E log E)). Top-down approach. The second algorithm is a top-down approach which starts with the full graph and iteratively removes nodes until it is no longer possible to continue without disconnecting the seed nodes. The pseudo-code for this algorithm, called CPeel, is given in Figure 3. 7 Input: Network G = (V, E), latent profiles X, seed nodes Q ⊆ V , node scoring function score() Output: Community nodes V (cid:48) 1: V (cid:48) ← ∅; K ← V 2: while K (cid:54)= ∅ do v ← arg maxi∈K score(i, V (cid:48) ∪ K) 3: K ← K \ {v} 4: if Q is not disconnected in G(V (cid:48) ∪ K) then 5: 6: 7: 8: 9: return V (cid:48) K ← {i ∈ K, NG(V (cid:48)∪K)(i) (cid:54)= ∅} V (cid:48) ← V (cid:48) ∪ {v} else Figure 3: The CPeel algorithm for solving T -Comm. Again, we obtain different variants, this time by varying the score() function for choosing the next node to remove. We selected the following three scores: (i) The score is a number assigned randomly to each node when initializing the algorithm, which determines the order in which the nodes are peeled. This random variant is denoted as CPeel(r). (ii) The score is the sum of the weights of the remaining edges adjacent to the node, i.e. (cid:88) score(i, U ) = wij. (iii) The score is the largest weight among the remaining edges adjacent to the node, i.e. j∈NG(U )(i) score(i, U ) = max j∈NG(U )(i) wij. The second and third scores are similar but the former uses a sum where the latter takes the maximum, resulting in variants CPeel(s) and CPeel(m), respectively. Nodes with larger scores are considered first (line 3 in Figure 3). Meanwhile, in all three variants, nodes that get isolated are pruned away (line 6). Rather than favoring good connections, this second approach removes nodes that might generate large costs, and thus follows a pessimistic strategy. In practice, we can find a minimum connecting tree using the strategy described previously. Then, when we are about to remove a node, we check whether it belongs to the current tree, in which case we need to look for an alternative tree that does not involve this node. Only if such a tree can be found can we safely remove the node. In the worst case, we would have to recompute the spanning tree for each node, resulting in a running time O(V (V + E log E)). 5 Problem Variants In this part, we discuss some variants of the T -Comm problem that make different assumptions with respect to the input, while the output is always a connected subgraph with low social tension. 5.1 Finding low-tension teams with chosen skills In many team-formation problems, there is a universe S of skills that individuals may possess and each individual i is associated with a set of skills Si ⊆ S. Note that the skills are different from the attributes of the profiles; skills are Boolean features associated with individuals (i.e. an individual has the skill or not) and do not change because of social interactions. In contrast, profiles are real-valued and the conformed profiles are subject to change due to social pressure. 8 Definition of the T -Team problem. Given a project requiring a subset P ⊆ S of skills, the problem is to find a subset of individuals V (cid:48) ⊆ V such that for every skill required by the project there is at least one individual in V (cid:48) who possesses it. When individuals are organized in a network, it is also required that the subgraph induced by V (cid:48) satisfies certain properties that capture the ease of communication within the team, e.g. small diameter, low weight spanning tree, small density, etc. [11, 2, 15]. In our setting, we consider a version of the team-formation problem where the goal for V (cid:48) is to be such that the required skills are covered, the graph G(cid:48) induced by V (cid:48) is connected and the social tension in G(cid:48) is minimized. This problem can be formally defined as follows. P ⊆(cid:83) Problem 2 (T -Team) Given a network G = (V, E) and latent profiles X, as well as a universe of skills S, a set of skills Si ⊆ S for every i ∈ V and a project requiring a subset of skills P ⊆ S, find V (cid:48) ⊆ V such that i∈V (cid:48) Si, the graph G(cid:48) induced by V (cid:48) is connected and T (G(cid:48), X, F), computed by the repeated averaging model on G(cid:48), is minimized. Algorithms for the T -Team problem. This problem is an NP-hard problem -- as a generalization of the Set Cover problem. However, we can adapt the algorithms we designed for T -Comm to solve this problem as well. If we denote by Alg an algorithm for solving T -Comm, then we can use Alg to solve T -Team by applying the following two-step procedure: First, we construct an extended graph H that contains G = (V, E) as well as one additional node s for every skill s ∈ S. Also, every skill node s is connected to every node i such that s ∈ Si. Alg is applied to solves the T -Comm problem on this extended graph, using the skill nodes that correspond to skills in P as the seed nodes. The result of this first step is a subgraph of H that contains all the skill nodes required by the project as well as individuals that cover all these skills. One could think that reporting the individuals in this subgraph would provide an adequate solution. However, this is not the case because removing the skill nodes from the subgraph might disconnect the subgraph induced by the individual nodes. For this reason, we need to apply Alg a second time, now on the original graph G and using as seed nodes the individuals participating in the solution reported by the first step. With this strategy, we can directly reuse the algorithms designed for the T -Comm problem to solve this variant. The running time of such a two-step procedure will depend on the running time of the algorithm used as a subroutine. 5.2 Finding low-tension communities with fixed size Another variant of the T -Comm problem is one where there are no seed nodes provided as input but the restriction is put on the size of the output community instead. Using a construction similar to the one we used for proving Proposition 4.1, we can prove that this cardinality variant of our problem is again NP-hard, i.e. the problem cannot be solved optimally in polynomial time unless P = NP. Although this cardinality version of the problem seems natural, our experiments demonstrated that it is rather useless in practice. When the value of k is rather small, the best strategy is to pick one of the many possible subsets of size k which are rather sparsely connected. Thus, in the absence of guidance provided in the form of seed members or skills there are a lot of candidate solutions that are practically equivalent and reporting one of them is not necessarily interesting. From the algorithmic point of view, the cardinality version of the problem cannot be solved using some adaptation of the algorithms discussed in Section 4.2. For this problem, we obtained the best performance, i.e. lowest tension solutions, using a greedy algorithm that constructs a connected subgraph of cardinality k by repeatedly adding a node that minimally increases the tension of the candidate. 6 Experiments We now turn to the evaluation of our proposed algorithms for the two problem variants, T -Comm and T -Team. 9 6.1 Experimental setup In our setting, each dataset consists of a network together with latent profiles for the nodes. Hence, we first introduce the networks, before explaining our approach for obtaining latent profiles. Then, we present the evaluation measures used throughout our experiments. Networks. Of our collections of networks, two consist of subgraphs extracted from the DBLP co-authorship database,1 where vertices represent researchers, and edges represent co-authorship relations. Specifically, we extracted the ego-nets of radius 2 for some selected high-profile computer scientists. The resulting ego-nets form the collection denoted as DBLP.E2. We also consider the subgraphs induced by researchers who have published in the ICDM and KDD conferences, respectively, constituting the DBLP.C collection. Our third collection of networks consists of subgraphs extracted from the Internet Movie Data Base2 where vertices represent actors and edges connect actors who played together in at least one movie. Specifically, we constructed actor networks from this database by considering some well-known directors and production companies, such as Francis F. Coppola or the Warner Bros. Entertainment Inc., and extracting the network induced by their movies. The resulting networks form the collection denoted as IMDB. In our problem, we are looking for connected subgraphs. If the seed nodes in T -Comm belong to different components, there is obviously no solution. Hence, in our experiments we consider only the largest component of each of the networks. The statistics of a sample of the networks from these three collections can be found in Table 2. Profiles. Besides links, the co-authorship and the co-acting networks contain additional information which we exploit to derive structured profiles, as follows. In the co-authorship networks, we associate nodes, i.e. researchers, to the title keywords of papers they authored. We then turn these keywords into profiles by considering the eigenvectors associated to the largest eigenvalues of the incidence matrix of keywords to nodes, scaled to the unit interval. Vice-versa, we also consider the incidence matrix of researchers to conferences, i.e. indications of which author published in which conference and derive another set of profiles by computing the eigenvectors of that matrix. Neighboring researchers in these networks are collaborators who have published papers together. Hence, they have keywords in common, published in some of the same conferences, and more generally share similar research interest. Intuitively, they will therefore be assigned similar profile values. In the co-acting networks, we consider the genres of the movies each actor played in and turn this information into profiles, once again by computing the eigenvectors associated to the largest eigenvalues of the obtained incidence matrices. The distributions of latent profiles values (xi) over nodes and of squared weights (w2 ij) over edges in the DBLP.C ICDM network for latent profiles derived from keywords and from conferences are shown in Figures 4a and 4b respectively. Evaluation measures. For a solution nodeset V (cid:48), our main evaluation measure is T (G(V (cid:48)), X, F) -- T (V (cid:48)) for short -- the social tension in the subgraph induced by V (cid:48) with conformed profiles obtained by applying the repeated averaging process over that subgraph. Two main properties contribute to a solution subgraph having a low social tension (see Equation (1)). On one hand, finding a subgraph with few edges results in fewer terms in the sum. On the other hand, finding a subgraph with low tension edges results in small values in the sum. Thus, we compute two auxiliary values that provide insight into the nature of the solutions obtained. Namely, for a solution V (cid:48) we compute the number of edges in the solution, E(V (cid:48)), and the average of the squared edge weights in the solution, w2(V (cid:48)) = 1 (i,j)∈E(V (cid:48)) w2 ij. Solutions obtained for different seed sets are hardly comparable. Thus, to make the evaluation possible, we standardize the measured values before aggregating them. Specifically, we use the number of edges in the minimum spanning tree connecting the seed nodes, eb, as a comparison basis (and lower bound) for the number of edges in the solution subgraphs, and divide w2(V (cid:48)) by the corresponding average over the whole graph. (cid:80) E(V (cid:48)) Given a solution V (cid:48), we take the following evaluation measures, for which lower values are more desirable: 1http://dblp.uni-trier.de/xml/ 2http://www.imdb.com 10 (a) (b) (c) (d) (e) Figure 4: Distribution of latent profile values, xi, over nodes (top) and of squared weights, w2 (bottom) for the DBLP.C ICDM network with various latent profiles. ij, over edges Figure 5: Results for the T -Comm problem on the C.Papadimitriou with single-attribute (left) and ten-attribute (right) latent profiles derived from conferences. (i) the standardized social tension (main measure) τ (V (cid:48)) = T (V (cid:48))/(2eb · w2(V )), (ii) the standardized solution size (auxiliary measure) ε(V (cid:48)) = E(V (cid:48)) /eb, and (iii) the standardized average edge weight (auxiliary measure) σ(V (cid:48)) = w2(V (cid:48))/w2(V ). 6.2 Community search with seed nodes We now compare the different variants of our proposed algorithms, CTree and CPeel, for solving the T -Comm problem (see Section 4). 11 00.51010002000#nodes00.5100.5100.5100.512−102−52−2100.511.5·104eigenv.keywords#edges2−102−52−21·104eigenv.conferences2−102−52−21·104randomuniform2−102−52−21·104randomexp.(λ=6)2−102−52−21·104randomthresh.(α=60%)CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktailτ(V0)ε(V0)σ(V0)τ(V0)ε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)CocktailD201234CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktail0246024681000.511.5202460246D3 Figure 6: Results for the T -Comm problem on the IMDB F.F.Coppola with single-attribute (left) and ten-attribute (right) latent profiles derived from movie genres. Generating sets of seed nodes. For each dataset, i.e. each pair of network and latent profiles, we run each algorithm with a number of different sets of seed nodes Q. Here we restrict ourselves to sets of seven and four seed nodes, i.e. Q = 7 and Q = 4, for the co-authorship networks and the co-acting networks respectively, as representative scenarios for the community-search problem. As we expect the distance between the nodes in the seed set to have an impact on the behavior of the algorithms, we want to sample seed sets across the range of possible distances and to group them based on this criterion. Thus, we generate a thousand seed sets and look at the maximum pairwise distance within each set. We then select at most 30 seed sets from the 10-33%, 33-66%, and 66-90% percentiles of the distance distribution. The resulting three groups of seed sets are denoted as D1, D2 and D3, from tight seed sets to more dispersed ones. Results in Figure 5 are presented aggregated according to these distance groups. Single-attribute and multi-attribute profiles. For each latent profile construction scheme, i.e. whether derived from keywords, conferences or movie genres (see Section 6.1), we can either consider the column vectors separately, thereby obtaining several single-attribute profiles, where each node is associated to a single profile value, or consider the entire matrix at once thereby obtaining one multi-attribute profile, where each node is associated to a multi-attribute profile vector. In our experiments, we take the first four columns of the matrix as four separate single-attribute profiles and the entire matrix as one multi-attribute profile (6 and 21 attributes for the DBLP and IMDB datasets, respectively). Results for the DBLP.E2 C.Papadimitriou for single-attribute (left) and multi-attribute (right) latent profiles derived from conferences are shown in Figure 5. Similarly, results for the IMDB F.F.Coppola network for single- attribute (left) and multi-attribute (right) latent profiles derived from movie genres are shown in Figure 6. We observe that the algorithms that exploit the profiles of individuals outperform the other two variants in (almost) all cases. Recall that neither CTree(e) nor CPeel(r) consider the profiles of individuals. All they can do is minimize the social tension by finding a small subgraph to connect the seed nodes. Our results show that they are indeed quite effective at minimizing the number of edges in the reported solutions, typically achieving the lowest values of ε(V (cid:48)) (middle column in each block of Figure 5 and 6). However, CTree(s), CPeel(m), and CPeel(s), the profile-aware variants, find solutions with lower edge weights, i.e. achieving lower values for σ(V (cid:48)) (right hand side column), at the cost of including extra edges. This gives them an advantage for minimizing social tension, obtaining lower values for τ (V (cid:48)) (left hand side column). This pattern clearly holds whether we consider single-attribute or multi-attribute profiles. 12 CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktailτ(V0)ε(V0)σ(V0)τ(V0)ε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)CocktailD200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktail024680123400.511.50246801234D3 Comparison to finding dense communities. In addition to our proposed algorithms, we also obtain communities by applying the GreedyFast algorithm of Sozio and Gionis [19], denoted here as Cocktail, on the networks with the same sets of seed individuals. The aim of this algorithm is to find a subgraph that connects the seeds while maximizing the minimum degree among selected nodes. This algorithm considers neither profiles nor social tension; Nevertheless, we can compute the tension of the community that consists of the nodes returned as a solution and compare it to the communities obtained with our algorithms. Furthermore, Cocktail requires the user to set a value for the upper bound on the size of the solution. We set this value to k = 200, as it seems to result in reasonable runtimes while allowing the algorithm to construct a solution in most cases. The cases where the algorithm fails to return a solution are left out from our statistics. On the DBLP.E2 C.Papadimitriou network the solutions returned by Cocktail are comparable in size to those of our CTree(s) algorithm (middle column in each block of Figure 5). The quality of edges selected in its solutions is on par with CTree(e) and CPeel(r) (right hand side column), which are also oblivious to the profiles of individuals. On the IMDB F.F.Coppola network, the solutions returned by Cocktail tend to be much larger than any of our algorithms (middle column in each block of Figure 6). Expectedly, Cocktail appears poorly suited for the task of finding low-tension communities. Impact of the profiles distribution. We observed that the CTree(s) variant appears to typically achieve the best performance, followed closely by CPeel(m). Yet, variations can be observed depending on the network structure and on the properties of the opinions distribution. Thus, we next investigate the impact of the distribution of profile values on the behavior of the algorithms. In order to do so, we construct random latent profiles under different sampling distributions. More specifically, beside the uniform distribution, we either sample from the exponential distribution with parameter λ, or we set the profile of a fraction α of the nodes to zero, while the rest is sampled uniformly at random, obtaining a thresholded distribution. For this experiment, we focus on the DBLP.C ICDM network and single-attribute latent profiles. The distributions of latent profiles values (xi) over nodes and of squared weights (w2 ij) over edges in this network for various latent profiles are shown in Figure 4. Latent profiles were sampled following each of the three random distributions, in addition to considering latent profiles derived from the keywords and from the conferences respectively. The narrow blue bars show the distributions for the first four single-attribute profiles considered separately, while the broader purple bars show the distributions for the ten-attribute profiles resulting from the combination of the respective single-attribute profiles. The results obtained for these different profile construction schemes, each time applying the algorithms to the first four single-attribute profiles considered separately are shown in Figure 7. Looking at random profiles (Figures 7c, 7d and 7e) versus eigenvector profiles (Figures 7a and 7b), the gap between the profile-oblivious variants (i.e. CTree(e) and CPeel(r)) and the profile-aware variants increases. Indeed while the profile-aware variants generally tend to pick edges with lower tension at the cost of involving more edges, as discussed earlier, this tendency is more pronounced when handling eigenvector profiles as compared to the random distributions. This shows that the profile-aware variants are clearly suited to exploit the structure present in eigenvector profiles. On the other hand, while variations can be observed between the different random distributions, these differences appear to be limited when contrasted with the gap that exists between random and eigenvector profiles. This indicates that the distribution of profile values has a limited impact compared to the presence of structure. Impact of the network structure. The profile-aware variants typically achieve the best performance. Yet, variations in their behavior can be observed depending for instance on the network structure. This is clearly evidenced by Figure 7f, showing results on the Fb.1684 network with single-attribute profiles sampled at random from the uniform distribution. Fb.1684 is an ego-net representing friend lists from Facebook,3 and has a high density, δ = 18.07. In such high density network, favoring low tension paths as done by CTree(s) can result in many more edges in the induced subgraph, yielding a significantly higher social tension and actually hurting the performance. 3http://snap.stanford.edu 13 Figure 7: Results for the T -Comm problem on the DBLP.C ICDM and Fb.1684 networks with single-attribute latent profiles. 14 CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)(a)DBLP.CICDMnetworkSingle-attributelatentprofilesderivedfromconferencesε(V0)σ(V0)τ(V0)(b)DBLP.CICDMnetworkSingle-attributelatentprofilesderivedfromkeywordsε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)D200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)024602400.511.50246024D3CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)(c)DBLP.CICDMnetworkSingle-attributelatentprofilessampledatrandomfromtheexponentialdistribution(λ=6)ε(V0)σ(V0)τ(V0)(d)DBLP.CICDMnetworkSingle-attributelatentprofilessampledatrandomfromthethresholdeddistribution(α=60%)ε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)D200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)024602400.511.50246024D3CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)(e)DBLP.CICDMnetworkSingle-attributelatentprofilessampledatrandomfromtheuniformdistributionε(V0)σ(V0)τ(V0)(f)Fb.1684networkSingle-attributelatentprofilessampledatrandomfromtheuniformdistributionε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)D200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)024602400.511.50246024D3 Table 1: Average running times (in seconds) of the algorithms on the DBLP.C ICDM network with latent profiles derived from conferences for solving the T -Comm problem and the T -Team problem using keywords as skills (± standard deviation). CTree(e) CTree(s) CPeel(s) CPeel(m) CPeel(r) 0.2 (±0.0) 0.2 (±0.0) 0.7 (±0.3) 0.9 (±0.1) 0.1 (±0.0) 0.1 (±0.0) Solving the T -Comm problem Single-attribute latent profiles 147 (±26.6) 107 (±24.9) 3.5 (±0.5) Multi-attribute latent profiles 3.3 (±0.3) 164 (±28.1) 134 (±29.7) 2.8 (±1.2) Solving the T -Team problem Single-attribute latent profiles 337 (±236) 261 (±204) Single-attribute latent profiles, P = 7 351 (±120) 423 (±156) 3.1 (±0.9) 2.9 (±1.1) Multi-attribute latent profiles 127.0 (±46.3) 108.5 (±35.6) Multi-attribute latent profiles, P = 7 116.9 (±26.9) 140.8 (±32.7) 3.3 (±0.6) 37.0 (±12.1) 38.9 (±11.2) 91.5 (±64.5) 108 (±40.9) 33.6 (±13.2) 35.5 (±11.7) Indicative running times of the different algorithms for the T -Comm problem on the DBLP.C Running times. ICDM network with single-attributes and multi-attributes latent profiles are shown in Table 1 (top). We observe that, also as expected, going from single-attribute to multi-attribute profiles hardly has any impact on the running times of our algorithms. Indicative running times of the algorithms on networks of varying sizes and densities, with multi-attribute profiles are listed in Table 2. As expected, the tree-based algorithms are significantly faster than the top-down algorithms, up to two orders of magnitude, and scale much better. 6.3 Team formation with chosen skills Next, we turn to the T -Team problem, the problem variant where we are given a project requiring a set of skills and asked to find a team which is connected, has low social tension and covers the chosen skills. Generating sets of skills. For the experiments with the T -Team problem we consider the co-authorship networks from the DBLP.C and DBLP.E2 collections. Here, we take the conferences to be the skills associated with individuals. Specifically, each conference represents a skill which a researcher is considered to possess if he has published at least four papers in that particular conference. A project then consists of a subset of conferences. Thus, forming a team to fulfill the project can be thought of as finding a group of researchers that span the sub-areas of computer science represented by these conferences. For each network in DBLP.C and DBLP.E2, we randomly sampled 80 projects (subsets of 3 to 13 conferences present in that network). Following the two-step procedure described in Section 5, we then used our five algorithm variants to solve the T -Team problem for each dataset (a network and its associated keyword-based latent profiles) and each project. Results are presented in Figure 8. Characteristics of the reported teams. We observe the same general trend as for T -Comm (Section 6.2). That is, profile-aware variants CPeel(s), CPeel(m), and CTree(s) outperform the other variants, although CPeel(r) and CTree(e) report subgraphs with fewer edges. In the DBLP.C networks, however, we see an increased variability in the behavior of the CTree(s) variant and a notable performance of CPeel(m). This latter algorithm now appears to return solutions that have both small size and low edge weights. Running times. Indicative running times of the different algorithms for this problem are shown in Table 1 (bot- tom). To allow comparison against the running times for T -Comm reported in the top half of the table, we include 15 Figure 8: Results for the T -Team problem on co-authorship networks from the DBLP.C and DBLP.E2 collections with single-attribute latent profiles derived from keywords using conferences as skills. times restricted to runs with projects requiring seven skills, i.e. P = 7. Note, that while this implies that the number of seed nodes in the first run equals seven, the number of seed nodes in the second run might vary. While the running times for the two-step procedure are expectedly larger than those of the basic algorithms, In particular, this is because while two runs are often necessary to find a the variance is also much greater. connected solution, it can happen that a single run suffices but such cases cannot be easily identified at the outset. 7 Conclusions Problems related to community search and team formation have multiple applications in online social media and collaboration networks. In this paper, we add a new modeling angle to these two classes of problems. The key characteristic of our model is that each node of the social network is not only characterized by its connections and its skills, but also by its profile. These profiles, which change dynamically through a conformation process, give rise to social tension in the network. Given this model, we define the T -Comm and T -Team problems, where the goal is to identify a set of connected individuals that define a low-tension subgraph. Such problems arise both in social network and social media mining as well as in human-resource management, where the goal is to find a set of workers who are not only connected, but also will have a potentially fluid collaboration. The contributions of our paper include the formal definition of these problems and the design of algorithms for solving them effectively in practice. Our experimental results with real data from social and collaboration networks highlight the characteristic behavior of the different algorithms variants and illustrate the effect of network structure and profile distribution on the algorithms' relative performance. Finally, our work enables future research combining subgraph mining with dynamic processes occurring among the nodes. Acknowledgements. Most of the work was done while Esther Galbrun and Behzad Golshan were at Boston University. Aristides Gionis is supported by the Finnish Funding Agency for Innovation TEKES (project "Re:Know"), the Academy of Finland (project "Nestor"), and the EU H2020 Program (project "SoBigData"). This research was funded by NSF grants: IIS 1320542, IIS 1421759 and CAREER 1253393 as well as a gift from Microsoft. 16 CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)ε(V0)σ(V0)ICDMCTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)KDDCTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)E.Demaine024CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)05101501234C.Papadimitriou Table 2: Average running times (in seconds) of the algorithms (± standard deviation) solving the T -Comm problem on networks of varying number of vertices (V ), edges (E) and average degree densities (δ). δ E V 2.73 262 96 3.23 8 98 278 7.11 1 599 225 4.15 1 638 395 5.14 2 307 449 9.30 6 306 678 7.05 7 279 1 032 3.45 7 701 2 234 7.72 8 469 1 097 3.62 9 472 2 613 3.68 10 280 2 795 4.05 11 072 2 737 13 250 2.88 4 596 28 992 14.85 1 952 2 111 32 166 15.24 5 758 178 741 31.04 Network IMDB Kassovitz IMDB J.Cameron IMDB WarnerBros 1970s IMDB Forman IMDB Eastwood 2000s IMDB F.F.Coppola IMDB WarnerBros 2000s DBLP.E2 E.Demaine IMDB Paramount 2000s DBLP.E2 C.Papadimitriou DBLP.C ICDM DBLP.C KDD DBLP.E2 P.Yu IMDB Paramount IMDB WarnerBros IMDB WB+Paramount+Fox References CTree(e) 0.0 (±0.0) 0.0 (±0.0) 0.0 (±0.0) 0.0 (±0.0) 0.0 (±0.0) 0.0 (±0.0) 0.1 (±0.0) 0.1 (±0.0) 0.1 (±0.0) 0.1 (±0.0) 0.2 (±0.0) 0.2 (±0.0) 0.2 (±0.0) 0.3 (±0.0) 0.3 (±0.1) 1.4 (±0.2) CPeel(r) CPeel(s) CTree(s) (±0.0) 0.0 (±0.0) 0.0 (±0.0) 0.1 (±0.0) 0.1 (±0.1) 0.1 (±0.0) 0.1 (±0.1) 0.2 (±0.0) 0.2 (±0.2) 0.2 (±0.0) 0.4 (±0.6) 0.7 (±0.1) 1.4 (±1.1) 0.7 (±0.0) 2.4 (±6.2) 2.8 (±0.3) 19.2 (±1.2) 0.8 (±0.1) 3.2 (±9.6) 3.2 (±0.3) 31.6 38.9 (±11.2) 3.3 (±0.3) 36.0 (±13.0) 3.5 (±0.2) 68.6 (±20.5) 4.4 (±0.3) 2.6 (±0.1) (±7.8) 17.7 (±9.1) 3.0 (±0.2) 22.8 15.4 (±1.0) 2192.3 (±346.6) 670.5 (±168.1) 281.6 (±101.6) CPeel(m) (±0.0) (±0.0) 0.1 0.1 (±0.1) (±0.1) 0.5 0.4 (±0.1) (±0.1) 0.9 0.7 (±0.2) (±0.2) 1.3 1.0 (±0.4) (±0.4) 2.2 1.8 (±1.6) (±1.2) 8.8 6.4 (±2.5) (±2.2) 14.4 10.1 60.9 (±13.0) 75.7 (±12.3) (±3.0) (±2.5) 17.8 12.1 114.6 (±20.0) 91.6 (±22.0) 163.9 (±28.1) 133.9 (±29.7) 166.8 (±27.8) 136.7 (±28.1) 291.3 (±56.3) 242.3 (±43.1) 116.2 (±17.3) 49.3 (±11.1) 139.1 (±19.7) 57.2 (±13.0) [1] A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. Power in unity: Forming teams in large-scale community systems. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10, pages 599 -- 608. ACM, 2010. [2] A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. Online team formation in social In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages networks. 839 -- 848. ACM, 2012. [3] A. Bhowmik, V. Borkar, D. Garg, and M. Pallan. Submodularity in team formation problem. In Proceedings of the 2014 SIAM International Conference on Data Mining, SDM '14, pages 893 -- 901. SIAM, 2014. [4] D. Bindel, J. Kleinberg, and S. Oren. How bad is forming your own opinion? In Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS '11, pages 57 -- 66. IEEE, Oct 2011. [5] P. Clifford and A. Sudbury. A Model for Spatial Conflict. Biometrika, 60(3):581 -- 588, 1973. [6] M. H. DeGroot. Reaching a Consensus. Journal of the American Statistical Association, 69(345):118 -- 121, 1974. [7] C. Faloutsos, K. S. McCurley, and A. Tomkins. Fast discovery of connection subgraphs. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '04, pages 118 -- 127. ACM, 2004. [8] K. Feng, G. Cong, S. S. Bhowmick, and S. Ma. In search of influential event organizers in online social In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, networks. SIGMOD '14, pages 63 -- 74. ACM, 2014. [9] N. E. Friedkin and E. C. Johnsen. Social influence and opinions. The Journal of Mathematical Sociology, 15(3-4):193 -- 206, 1990. [10] N. E. Friedkin and E. C. Johnsen. Social influence networks and opinion change. Advances in group processes, 16(1):1 -- 29, 1999. [11] A. Gajewar and A. D. Sarma. Multi-skill collaborative teams based on densest subgraphs. In Proceedings of the 2012 SIAM International Conference on Data Mining, SDM '12, pages 165 -- 176. SIAM, 2012. 17 [12] A. Gionis, E. Terzi, and P. Tsaparas. Opinion Maximization in Social Networks. In Proceedings of the 2013 SIAM International Conference on Data Mining, SDM '13, pages 387 -- 395. SIAM, 2013. [13] R. A. Holley and T. M. Liggett. Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter Model. The Annals of Probability, 3(4):643 -- 663, 1975. [14] M. Kargar and A. An. Discovering top-k teams of experts with/without a leader in social networks. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, CIKM'11, pages 985 -- 994. ACM, 2011. [15] T. Lappas, K. Liu, and E. Terzi. Finding a team of experts in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'09, pages 467 -- 476. ACM, 2009. [16] C.-T. Li and M.-K. Shan. Team formation for generalized tasks in expertise social networks. In Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom '10, pages 9 -- 16. IEEE, Aug 2010. [17] S. S. Rangapuram, T. Buhler, and M. Hein. Towards realistic team formation in social networks based on densest subgraphs. In Proceedings of the 22nd International Conference on World Wide Web, WWW '13, pages 1077 -- 1088. ACM, 2013. [18] N. Ruchansky, F. Bonchi, D. Garc´ıa-Soriano, F. Gullo, and N. Kourtellis. The minimum wiener connector In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, problem. SIGMOD'15, pages 1587 -- 1602. ACM, 2015. [19] M. Sozio and A. Gionis. The community-search problem and how to plan a successful cocktail party. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'10, pages 939 -- 948. ACM, 2010. [20] H. Tong and C. Faloutsos. Center-piece subgraphs: Problem definition and fast solutions. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '06, pages 404 -- 413. ACM, 2006. [21] V. Vazirani. Approximation Algorithms. Springer, 2003. [22] E. Yildiz, A. Ozdaglar, D. Acemoglu, A. Saberi, and A. Scaglione. Binary opinion dynamics with stubborn agents. ACM Transactions on Economics and Computation, 1(4):19:1 -- 19:30, Dec. 2013. 18
1906.12334
1
1906
2019-06-27T05:31:38
K-Core Maximization through Edge Additions
[ "cs.SI", "cs.DS" ]
A popular model to measure the stability of a network is k-core - the maximal induced subgraph in which every vertex has at least k neighbors. Many studies maximize the number of vertices in k-core to improve the stability of a network. In this paper, we study the edge k-core problem: Given a graph G, an integer k and a budget b, add b edges to non-adjacent vertex pairs in G such that the k-core is maximized. We prove the problem is NP-hard and APX-hard. A heuristic algorithm is proposed on general graphs with effective optimization techniques. Comprehensive experiments on 9 real-life datasets demonstrate the effectiveness and the efficiency of our proposed methods.
cs.SI
cs
K-Core Maximization through Edge Additions Zhongxin Zhou1,2,4 , Fan Zhang1 , Xuemin Lin2,3,4 , Wenjie Zhang3 and Chen Chen2 1Guangzhou University, Guangzhou, China 2East China Normal University, Shanghai, China 3University of New South Wales, Sydney, Australia {zzxecnu, fanzhang.cs}@gmail.com, {lxue, zhangw}@cse.unsw.edu.au, [email protected] 4Zhejiang Lab, Hangzhou, China 9 1 0 2 n u J 7 2 ] I S . s c [ 1 v 4 3 3 2 1 . 6 0 9 1 : v i X r a Abstract A popular model to measure the stability of a net- work is k-core - the maximal induced subgraph in which every vertex has at least k neighbors. Many studies maximize the number of vertices in k-core to improve the stability of a network. In this pa- per, we study the edge k-core problem: Given a graph G, an integer k and a budget b, add b edges to non-adjacent vertex pairs in G such that the k-core is maximized. We prove the problem is NP-hard and APX-hard. A heuristic algorithm is proposed on general graphs with effective optimization tech- niques. Comprehensive experiments on 9 real-life datasets demonstrate the effectiveness and the effi- ciency of our proposed methods. 1 Introduction Graphs are widely used to model networks, where each ver- tex represents a user and each edge represents a connec- tion between two users. The cohesive subgraph model of k-core, introduced by [Seidman, 1983], is defined as the max- imal induced subgraph in which every vertex has at least k neighbors (adjacent vertices) in the subgraph. The k- core of a network corresponds to the natural equilibrium of a user engagement model: each user incurs a cost (e.g., k) to remain engaged but receives a benefit proportional to (e.g., equal to) the number of engaged neighbors. Since the number of vertices (the size) of k-core reflects the stabil- ity of a network, it is widely adopted in the study of net- work engagement (stability), e.g., [Bhawalkar et al., 2015; Malliaros and Vazirgiannis, 2013; Wu et al., 2013]. To prevent network unraveling, Bhawalkar and Kleinberg et al. propose the anchored k-core problem which maximizes the k-core by anchoring b vertices [Bhawalkar et al., 2015], where the degree of an anchor is considered as infinitely large. There are a series of following work to maximize the k-core, e.g., [Zhang et al., 2018b; Zhang et al., 2017a; Chitnis et al., 2013]. In order to improve network stability, another basic graph operation is edge addition, which can also be applied Zhongxin Zhou and Fan Zhang are the joint first authors. Fan Zhang is the corresponding author. Figure 1: An Example of k-Core and Anchoring, k = 3 to k-core maximization. Thus, the edge k-core problem is proposed [Chitnis and Talmon, 2018]: Given a graph G, an integer k and a budget b, add b edges to non-adjacent vertex pairs in G such that the k-core is the largest. Example 1. Figure 1 depicts a social group G with 9 users and their connections. The willingness of a user to keep en- gaged is influenced by the number of her friends (neighbors) in this group. According to the k-core model, suppose k = 3, v4, v6, and v7 firstly drop out. Their departure leads to the leave of v5 and v8, as their degrees decrease to 1 which is less than k. To improve network stability, we can anchor v6 and v7 based on anchored k-core model, or add an edge be- tween v6 and v7 based on edge k-core model. Both solutions lead to a larger k-core induced by the vertices in G except v4. The edge k-core problem can find many applications on real-life networks: friend recommendation in social net- works, connection construction in telecom networks, etc. For instance, in a P2P network, any user benefiting from the net- work should be connected to at least k other users, to ex- change resources. The holder of a P2P network can use the edge k-core model to find which connections should be added between users so that a large number of users can successfully use the P2P network [Chitnis and Talmon, 2018]. Challenges and Contributions. In this paper, we propose a concise reduction to prove that the problem is NP-hard and APX-hard. The only existing solution is proposed for graphs with bounded tree-width [Chitnis and Talmon, 2018]. How- ever, this assumption usually does not hold in real-life graphs, and their techniques cannot be extended to handle general graphs. Due to the hardness of the problem, we propose a heuristic algorithm with effective pruning techniques. The experiments are conducted on 9 real networks to demonstrate the effectiveness and the efficiency of the proposed methods. v6v1v2v0v3v4v5v7v83-core 2 Related Work Graph processing on large data may require higher compu- tation efficiency than traditional queries [Luo et al., 2008; Cheema et al., 2010; Luo et al., 2011]. Cohesive subgraph mining is a fundamental graph problem, with various mod- els such as clique [Luce and Perry, 1949], k-core [Seidman, 1983], k-fami [Zhang et al., 2018a], etc. Among the mod- els, k-core is the only one known to have a linear time algo- rithm [Batagelj and Zaversnik, 2003]. The k-core has a wide range of applications such as social contagion [Ugander et al., 2012], influential spreader identification [Kitsak et al., 2010], collapse prediction [Morone et al., 2019], user engagement study [Malliaros and Vazirgiannis, 2013], etc. There is an efficient heuristic algorithm for the anchored k- core problem [Zhang et al., 2017a], while it cannot be simply applied to solve the edge k-core problem. One major reason is that the anchored k-core model does not change the topol- ogy of the graph while the edge k-core model needs to add new edges. Besides the k-core maximization work introduced in Section 1, there are some studies on k-core minimiza- tion under the view of against attack [Zhang et al., 2017b; Zhu et al., 2018; Medya et al., 2019]. The edge addition has been studied in different topics. [Natanzon et al., 2001] studies the hardness of edge modi- fication problems on some classes of graphs. [Suady and Na- jim, 2014] aims to reduce the diameter of a graph by adding edges. [Lai et al., 2005] aims to add a small number of edges in a graph to enlarge the bandwidth. [Kapron et al., 2011] aims to anonymize a given vertex set by adding fewest edges. 3 Preliminaries We consider a simple, undirected and unweighted graph G = (V, E), where V is a set of vertices and and E is a set of edges. We denote n = V , m = E and assume m > n. Let S = (V (cid:48), E(cid:48)) be an induced subgraph of G, where V (cid:48) ⊆ V and E(cid:48) ⊆ E. The notations are summarized in Table 1. Definition 1. k-core. Given a graph G, a subgraph S is the k-core of G, denoted by Ck(G), if (i) deg(u, S) ≥ k for every vertice u ∈ S; (ii) S is maximal, i.e., any subgraph S(cid:48) ⊃ S is not a k-core. The k-core of a graph G can be obtained by recursively removing every vertex u and its incident edges in G if deg(u, G) < k, with a time complexity of O(m). The k- cores of G with different inputs of k constitute a hierarchical structure of G, i.e., Ck+1(G) ⊆ Ck(G) for every value of k. The definition of k-shell is then derived. Definition 2. k-shell. Given a graph G, the k-shell of G, denoted by Hk(G), is the set of vertices in k-core but not in (k+1)-core, i.e., Hk(G) = V (Ck(G) − Ck+1(G)). If we add some new edges among the vertices which are not adjacent, the k-core of the graph may contain more ver- tices, which is named the edge k-core. The added new edges are called anchors or anchor edges. In this paper, we say an- chor, add, or insert an edge interchangeably, e.g., an inserted edge is also called an anchored edge. The edges, which may be inserted to the graph, are called candidate anchors or can- didate edges. Notation G u, v; e, (u, v) m; n N (u, G) deg(u, G) S V (S); E(S) G[X] Ck(G); Hk(G) k; b A GA; Ge F(A, G) L; Li l(u) d∗(u) Definition an unweighted and undirected graph a vertex in G; an edge in G the number of edges in G; the number of ver- tices in G the set of adjacent vertices (neighbors) of u in G the number of adjacent vertices of u in G a subgraph of G the vertex set of S; the edge set of S induced subgraph of the vertex set X in G the k-core of G; the k-shell of G the degree constraint; the anchor budget a set of anchor edges the graph G + A; the graph G + {e} the followers of the anchor set A in G the onion layers of G; the i-th layer of L layer index of u in L number of neighbors of u in its higher layers Table 1: Summary of Notations anchor edges A ⊆ ((cid:0)V Definition 3. edge k-core. Given a graph G and a set of Ck(G + A), is the k-core of the graph G(cid:48) = (V, E ∪ A). (cid:1) \ E), the edge k-core, denoted by 2 Due to the addition of anchor edges (A), more vertices might be retained in Ck(G + A), in addition to the vertices in Ck(G). Note that the vertices not incident to the anchor edges may also be retained, according to the contagious na- ture of k-core computation. The vertices following the anchor edges A to engage in k-core are named the followers of A, de- noted by F(A, G). Formally, F(A, G) is the set of vertices in Ck(G + A) \ Ck(G). The number of the followers reflects the importance of the corresponding anchor edges. Problem Statement. Given a graph G, a degree constraint k and a budget b, the edge k-core problem aims to find a set A is maximized, i.e., F(A, G) is maximized. (cid:1) \ E such that the number of followers of A of b edges in(cid:0)V 2 4 Complexity Theorem 1. Edge k-core problem is NP-hard when k ≥ 3. Proof. We reduce the edge k-core problem from the maxi- mum coverage (MC) problem [Karp, 1972] which is NP-hard. The MC problem is to find at most b sets to cover the largest number of elements, where b is a given budget. We consider an arbitrary instance of MC with c sets T1, .., Tc and d ele- ments {e1, .., ed} = ∪1≤i≤cTi. We suppose c > k, c > b, and each of the resulting b sets contains at least 2 elements, without loss of generality. Then we construct a correspond- ing instance of the edge k-core problem on a graph G. Fig- ure 2 shows a construction example from 3 sets and 4 ele- ments when k = 3. The set of vertices in G consists of three parts: M, N and Q. The part M contains c set of vertices where each set has d + 3 vertices, i.e., M = ∪1≤i≤cMi where Mi = ∪1≤j≤d+3ui j. The part N contains d vertices. The part Q is a (k+1)-clique where every two vertices of the k + 1 vertices for each e ∈(cid:0)V (cid:1) \ {E ∪ A ∪(cid:0)V (Ck) Algorithm 1 NaiveEKC Input: G: a graph, k: degree constraint, b: budget Output: a set A of anchor edges 1: A ← ∅; Ck ← Ck(G) 2: for i from 1 to b do 3: 4: 5: 6: 7: 8: end for 9: return A end for e∗ ← the edge with most followers; A ← A ∪ e∗; Ck ← Ck(G + A); compute F(e, G + A); (cid:1)} do 2 2 Proof. For two arbitrary collapsers sets A and B, if f is sub- modular, it must hold that f (A) + f (B) ≥ f (A ∪ B) + f (A ∩ B). Let Q1 be a (k+1)-clique where vertices u and v are contained. Let Q2 be another (k+1)-clique. We cre- ate a vertex w and connect it to the vertices in Q2 by k − 2 edges. If A = (u, w) and B = (v, w), f (A) + f (B) = 0 < f (A ∪ B) + f (A ∩ B) = 1. 5 Solution Due to the NP-hardness and inapproximability of the prob- lem, we resort to a greedy heuristic which iteratively finds the best anchor, i.e., the edge with the largest number of fol- lowers. The framework of the greedy algorithm is shown in Algorithm 1. At Line 4, we compute the followers for each candidate anchor edge in the complement graph of G, ex- cept the anchored edges in A and the edges between the k- core vertices. Note that adding an edge between two (non- adjacent) k-core vertices cannot enlarge the k-core, because all the non-k-core vertices will still be deleted in k-core com- putation. After the computation for every candidate anchor edge, the best anchor is chosen at Line 6, and the k-core is updated by inserting the anchor edge. The time complexity of Algorithm 1 is O(b× n2× m). As we do not explicitly record the candidate edges, the space complexity of Algorithm 1 is O(m). 5.1 Optimizations on Each Iteration In this section, we introduce optimization techniques for the first iteration of the greedy algorithm, i.e., the edge k-core problem with b = 1. They can be immediately applied to other iterations by replace the k-core of G by the edge k-core of G + A. Basic Candidate Pruning The following theorem locates the scope of valid candidate anchors where each edge has at least one follower. Theorem 4. Given a graph G, if a candidate edge e = (u, v) has at least one follower, we have that u ∈ Ck−1(G) and v ∈ Ck−1(G), where at least one of u and v is in Hk−1(G). Proof. Suppose u /∈ Ck−1(G). We have e ∈ Ck(Ge); other- wise, we have Ck(Ge) = Ck(G), i.e., there is no follower of e. If we remove e from Ck(Ge), then deg(u, Ck(Ge) \ {e}) and deg(v, Ck(Ge)\{e}) are at least k − 1, because (u, v) ∈ Figure 2: Complexity Reduction, k = 3 are adjacent. For every i and j, if ei ∈ Tj in the MC in- stance, we add an edge between vi and uj i . In Figure 2, these edges are marked in bold. For every Mi in M, we connect j+1 by an edge for every j ∈ [1, d + 2], and we also j and ui ui connect ui 1 and ui d+3. For every Mi, we add edges between every vertex in Mi and the vertices in Q so that every vertex d+3} has a degree of k and every vertex in in Mi \ {ui d+1, ui d+3} has a degree of k − 1. We add k − 1 edges {ui between vi and the vertices in Q for every i ∈ [1, d]. The construction of G is completed. d+1, ui d+1 and ui The k-core computation will delete all the vertices in M and N. Thus, the k-core of G is Q. To enlarge the k-core, the solution (A) is to add edges between ui d+3, which is most cost-effective. Another solution is to add edges between Mi and Mj where i (cid:54)= j may also enlarge the k-core, while this solution can always be replaced by solution (A) with at most the same number of followers. Adding an edge to a vertex in N is not worthwhile, since we suppose each of the resulting b sets contains at least 2 elements. Thus, the edge k-core problem always chooses b of the Mi in G which cor- responds to b sets in the MC problem. If there is a polynomial time solution for the edge k-core problem, the MC problem will be solved in polynomial time. Theorem 2. For k ≥ 3 and any  > 0, the edge k-core problem cannot be approximated in polynomial time within a ratio of (1 − 1/e + ), unless P = N P . Proof. We reduce from the MC problem using a reduction similar to that in the proof of Theorem 1. For any  > 0, the MC problem cannot be approximated in polynomial time within a ratio of (1 − 1/e + ), unless P = N P [Feige, 1998]. Let p be an arbitrarily large constant. There are two differences in the construction of G: (i) Q is a p-clique; and (ii) every vi is attached by a loop of p vertices where each vertex is connected to Q by k − 2 edges except vi. Let γ > 1−1/e, if there is a solution with γ-approximation on optimal follower number for the edge k-core problem, there will be a λ-approximate solution on optimal element number for MC, where λ = γ + (γ−1)×b(d+3) and f is the number of followers of edge k-core problem. Thus, the theorem is proved. The edge k-core problem is APX-hard. Theorem 3. Let f (A) = F(A). We have that f is not submodular for k ≥ 2. p×f 𝑇1:{𝑒1,𝑒3}𝑇2:{𝑒1,𝑒2,𝑒3}𝑇3:{𝑒3,𝑒4}𝑒1𝑒1𝑒1𝑒2𝑒1𝑒4𝑒1𝑒3𝑣1𝑀c=3𝑑=4𝑣2𝑣3(𝑘+1)-clique:𝑣4𝑢11𝑢21𝑢31𝑢41𝑢61𝑢71𝑢51𝑢12𝑢22𝑢32𝑢42𝑢62𝑢72𝑢52𝑢13𝑢23𝑢33𝑢43𝑢63𝑢73𝑢53𝑁𝑄 Ck(Ge) and their degrees decrease by 1. Thus, Ck(Ge) \ {e} ⊆ Ck−1(G) which contradicts with u /∈ Ck−1(G). Now we have proved that u ∈ Ck−1(G) and v ∈ Ck−1(G). Sup- pose that {u, v} ∈ Ck(G) and Ck(Ge)\Ck(G) = F (cid:54)= ∅, we have that Ck(Ge) \ {e} belongs to Ck(G), which contradicts with F /∈ Ck(G). Example 2. In Figure 3, when k = 3, the 3-core C3(G) is induced by {v0, v1, v5, v6}, and the 2-shell H2(G) = {v2, v3, v7, v8}. According to Theorem 4, we only need to consider every new edge (u, v) or (v, u) with u ∈ H2(G) and v ∈ V (C2(G)) = V (C3(G)) ∪ H2(G), as candidates. Onion Layer based Candidate Pruning Given the (k-1)-core of G, the computation of k-core on G recursively deletes some vertices in the (k-1)-core. The ver- tices are deleted in batch as their degrees are less than k at a same time, like peeling an onion [Zhang et al., 2017c; Zhang et al., 2017a]. The first layer of the onion, denoted by L1, consists of the vertices in (k-1)-core with degree less than k, i.e., L1 = {u deg(u, Ck−1(G)) < k}. The deletion of the first layer vertices may decrease the degrees of other vertices, and produces the second layer. Recur- sively, we have that Li = {u deg(u, Gi) < k} where Gi = Ck−1(G) − G[∪1≤j<iLj]. Let l(u) denote the layer index of u, i.e., u ∈ Ll(u). If l(u) < l(v), we say u is at a lower layer of v, or v is at a higher layer of u. We use L to denote the union of layers, i.e., L = ∪1≤i≤sLi where s = max({l(u) u ∈ Hk−1(G)}). Let d∗(u) denote the number of adjacent neighbors of u in higher layers and k-core, i.e., d∗(u) = deg(u, G(cid:48)) where G(cid:48) = Ck−1(G) − G[{∪1≤i≤l(u)Li} \ u]. Benefit from L, we propose an effective pruning technique. Theorem 5. Given a graph G, if a candidate edge e = (u, v) has at least one follower, we have that (i) d∗(u) = k−1 when l(u) < l(v), (ii) d∗(v) = k − 1 when l(v) < l(u), and (iii) d∗(u) = d∗(v) = k − 1 when l(u) = l(v); Proof. Let O be the vertex deletion order of computing the k-core on the (k-1)-core. We have d∗(u) ≤ k − 1 and d∗(v) ≤ k − 1, since u and v are deleted at their layers in O, respectively. When l(u) < l(v), we suppose d∗(u) < k − 1. The anchoring of (u, v) increases the degrees of u and v by 1, if we use the same order O to compute the k-core again, then d∗(u) ≤ k − 1 < k, i.e., every vertex will be deleted at the same position of the order O, including u and v. It contradicts with e = (u, v) has at least one follower. Thus, case (i) and (ii) are proved. When l(u) = l(v), we suppose d∗(u) < k−1 without loss of generality. If we use the same order O to compute the k-core again with the anchored edge e, u will be deleted at the same position since d∗(u) < k. So v can't survive after the next batch of deletions since d∗(v) < k. Fi- nally, every vertex will be deleted. Example 3. In Figure 3, when k = 3, layer 1 contains v3 and v8, and layer 2 contains v2 and v7. By theorem 5, (v2, v7) is not a promising candidate edge because d∗(v7) = 1, but (v3, v8) is a proper candidate edge. Figure 3: Candidate Seletion, k = 3 Note that if l(u) ≤ l(v), in the k-core computation with anchor e, the survive of u may preserve some vertices before visiting v. Thus, in Theorem 5, there is no degree requirement for v to ensure that e = (u, v) has at least one follower. Onion Layer based Follower Computation A naive follower computation is to directly apply the k-core computation on the graph with the existence of an anchor. An improved idea is to use the core maintenance algorithms, which update the k-core for every k with the addition of an edge [Zhang et al., 2017c]. For the edge k-core algorithm, we only need to update the k-core of a given k with an an- chor edge. Thus, we adopt and refine the follower computa- tion in the vertex-anchored k-core algorithm (OLAK) which is shown to be more efficient than core maintenance for k- core update with a fixed k [Zhang et al., 2017a]. In OLAK, anchoring a vertex means the degree of the ver- tex is infinitely large. There is an observation that a vertex u is the follower of the anchor vertex x if there is a path x (cid:32) u based on neighboring relations, and l(y) < l(z) for every two consecutive vertices y and z along the path. This in- dicates that we do not need to consider the vertices without such paths in the follower computation. Different from an- chored k-core problem, edge k-core problem requires us to add a new edge, where the vertex degree is increased by ex- actly 1, and we have to consider two vertices rather than one. In our algorithm, given an anchor edge (u, v) with l(u) < l(v), we generate candidate followers layer-by-layer through activating the neighbors at higher layers, starting from the layer of u. Here u is the first activated vertex and only the activated vertices can activate their neighbors at higher lay- ers. In this activation procedure, each activated vertex is as- signed an upper bound of its degree in the edge k-core. The degree upper bound of a vertex u is generated by counting its neighbors in higher layers and the activated neighbors of u at other layers. Once the degree upper bound of a vertex is less than k, it will be deleted immediately and the upper bounds of its neighbours will be decreased by 1. The follower com- putation is complete when the layer-by-layer activation is fin- ished. Note that the two vertices incident to the anchor edge may also be deleted in this procedure. Once one of them is deleted, there is no follower and the computation is returned. Follower based Candidate Pruning We can further prune some candidate edges by known results, when we retrieve the followers of some candidate edges. Theorem 6. Given a candidate anchor edge e1 = (u1, v1) and its follower set F(e1), we have F(e) ⊆ F(e1) for every candidate edge e ∈ {(u, v) u ∈ F(e1) and v ∈ F(e1) ∪ Ck(G) and u (cid:54)= v}. v0v1v2v3v7v6v5v8v4v9L1L23-core2-shell Algorithm 2 EKC Input: G: a graph, k: degree constraint, b: budget Output: A set A of anchor edges 1: A ← ∅; 2: for i from 1 to b do 3: N ← {(u, v) u ∈ Hk−1(G + A), v ∈ Ck−1(G + A)} \ E(Ck−1(G + A)) (Theorem 4); compute L and filter N based on Theorem 5; for each e ∈ N do F(e) ← FindFollower(e,L) (Section 5.1); update N based on Theorem 6; end for e∗ ← the edge with most followers; A ← A ∪ e∗; update N (Section 5.2); 4: 5: 6: 7: 8: 9: 10: 11: end for 12: return A Proof. Let e = (u, v). If F(e) is not empty, then Ck(Ge) contains Ck(G), u, v and F(e). Because Ck(Ge1) contains u and v, i.e., more vertices may be added to Ck(Ge) af- ter anchoring e1. So, V (Ck(Ge)) ⊆ V (Ck(Ge1)) and thus F(e) ⊆ F(e1). Example 4. In Figure 3, when k = 3, if we get that v2 and v7 are the followers of edge (v3, v8). According to Theorem 6, the followers of (v2, v7) are also the followers of (v3, v8), thus (v2, v7) is not a promising candidate in current iteration. 5.2 Reusing Intermediate Results across Iterations When one iteration of the greedy algorithm is completed, we get the best anchor edge A and the number of followers for every candidate edge in this iteration. These results can be reused since some connected components in the induced sub- graph of (k-1)-shell may keep the same topology after an- choring an edge. For each connected component S where none of the vertices are incident to the anchor A, we can record the largest number of followers of one candidate an- chor in S, for the later iterations. For the connected compo- nent(s) S where there is a vertex incident to the anchor A, it is hard to reuse the results because the addition of edges may largely change the vertex deletion order and the layer struc- ture in k-core computation. 5.3 EKC Algorithm We present the EKC algorithm in Algorithm 2, which op- timizes the greedy algorithm by adopting all the proposed techniques. At Line 3, the candidate edge set is restricted to N according to Theorem 4. In Line 4, we compute the onion layers of G and then exclude the candidates based on Theorem 5. The follower computation of a candidate edge is conducted by exploring L layer-by-layer, as introduced in Section 5.1. The set N is further filtered by Theorem 6 once a follower computation is completed. After each iteration, we get the anchor edge with the most followers. The algorithm terminates after b iterations. The resulting set of b anchors is same to that in Algo- rithm 2. The correctness is guaranteed by the correctness of randomly chooses b anchor edges (each with at least one follower) from N1 = {(u, v) u ∈ Hk−1(G), v ∈ Ck−1(G)} \ E(Ck−1(G)) chooses b anchors from N1 with largest degrees in L chooses b anchors from N1 at highest onion layers in L the anchored k-core algorithm in [Zhang et al., 2017a] identifies the optimal solution by exhaustively searching all possible combinations of b anchors, with all the proposed techniques computes a k-core on G for each candidate to find best anchor in each iteration (Algorithm 1) Degree Layer AKC Exact Naive Algorithm Description Rand Baseline Naive + filtering candidates with Theorem 4 BL+O1 BL+O2 BL+OF Baseline + filtering candidates with Theorem 5 BL+O1 + filtering candidates with Theorem 6 BL+O2 + L based follower computation (Sec- tion 5.1) BL+OF + intermediate result reuse (Section 5.2) Table 2: Summary of Algorithms EKC Dataset Facebook Enron Brightkite Gowalla DBLP Twitter Stanford YouTube Flickr Vertices 4,039 36,692 58,228 196,591 317,080 81,306 281,903 1,134,890 513,969 Edges 88,234 183,831 214,078 950,327 1,049,866 1,768,149 2,312,497 2,987,624 3,190,452 davg 43.69 10.02 7.35 9.67 6.62 33.02 14.14 5.27 12.41 kmax 115 43 52 51 113 96 71 51 309 Table 3: Statistics of Datasets optimization techniques. The worst-case time complexity and space complexity are same to Algorithm 1. 6 Evaluation Algorithms. As far as we know, there is no existing al- gorithm for the edge k-core problem on general graphs. In the experiment, we implement and evaluate 11 algorithms as shown in Table 2, where the bottom 6 algorithms produce the same result, because they use the same greedy heuristic and candidate visiting order. Datasets. Flickr is from http://networkrepository.com/, and the others are from https://snap.stanford.edu/data/. Ta- ble 3 shows the statistics of the datasets. Settings. All programs are implemented in C++. All exper- iments are performed on Intel Xeon 2.20GHz CPU and Linux System. We vary the parameters k and b. 6.1 Effectiveness Figure 4 reports the number of followers w.r.t. b anchors. For random approaches, we report the average number of fol- lowers for 100 independent tests. In Figure 4, Degree and Layer failed to get any followers in more than half of the datasets, because a large degree vertex or a vertex in higher Figure 4: Effectiveness of the Greedy Heuristic, k=20, b=5 Figure 7: Running time on Different Datasets (a) Gowalla, b=3 (b) Brightkite, k=3 Figure 5: Exact vs EKC (a) Gowalla, b=20 (b) Brightkite, b=5 Figure 8: Candidate Pruning onion layer does not necessarily have a follower. A totally random algorithm cannot get any followers in most settings. Thus, in Rand, we only choose the edges from the set where each edge has at least one follower. We observe that the ma- jority of the candidate edges does not have any followers, while our greedy heuristic always finds effective anchors in the experiments. In Figure 4, we notice that EKC preserves more than 100 followers in Flickr with only 5 anchors. We also compare the performance of EKC with the opti- mal solution from Exact. Due to extremely high cost, we run Exact on an induced subgraph by 50 random vertices. The results are from 100 independent settings. The values of k and b are small due to the small-scale of data. Figure 5 shows that the margins between EKC and Exact are not un- acceptable, considering the non-submodular property and the significantly better efficiency of EKC. Figure 6 shows that EKC produces similar and almost larger numbers of followers than AKC where the meaning of b is different: the former for edges and the latter for vertices. Although the anchoring of one vertex means the preserving of many edges, EKC can produce similar followers with one anchor edge. It shows that the edge k-core can enlarge the k-core with less graph manipulations. 6.2 Efficiency Figure 7 reports the performance of three algorithms on all the datasets with k = 20 and b = 5. The datasets are or- dered by the number of edges. We find the runtime among different datasets is largely influenced by the characteristics of datasets and the onion layer structures in k-core compu- tation. Baseline cannot finish computation on 4 datasets within one week. BL+OF significantly improve the perfor- mance by applying a series of techniques. EKC performs even better given all the optimizations. In Figure 8, we report the number of candidate edges of dif- ferent algorithms by incrementally adding techniques, where the details of each algorithms is given in Table 3. We can see the improvement brought by each proposed technique. Figure 9 studies the impact of k and r. Figure 9(a) shows that the runtime decreases with a larger input of k. This is because the number of candidate edges become fewer with a larger k. Figure 9(b) reports the runtime with an increas- ing b, which is proportional to the value of b. The margin between BL+OF and EKC becomes smaller with a larger k, because the number of connected components becomes less when k increases. It is reported that EKC largely outperforms the other algorithms under all the settings. 7 Conclusion In this paper, we investigate the problem of edge k-core, which aims to add a set b of edges in a network such that the size of the resulting k-core is maximized. We prove the problem is NP-hard and APX-hard. An efficient algorithm, named EKC, is proposed with novel optimizations. Extensive experiments on 9 real-life datasets are conducted to demon- strate our model is effective and our algorithm is efficient. Acknowledgments Xuemin Lin is supported by 2019DH0ZX01, 2018YFB10035 04, NSFC61232006, ARC DP180103096 and DP170101628. Wenjie Zhang is supported by ARC DP180103096. (a) Gowalla, k=20 (b) Brightkite, b=5 (a) Brightkite, b=5 (b) Brightkite, k=20 Figure 6: Anchor k-core vs Edge k-core Figure 9: Runtime with Different k and b 050100150200FacebookEnronBrightkiteGowallaDBLPTwitterStanfordYoutubeFlickrAvg. #FollowersLayerDegreeRandEKC024681234148.89s1815.7s16398s0.02s0.02s0.03sAvg. #FollowerskExactEKC0246812340.01s6.25s2204s531435s0.01s0.02s0.03s0.03sAvg. #FollowersbExactEKC0501001502002503001015202530#FollowersbAKCEKC0204060801001201015202530#FollowerskAKCEKC0100102104INFFacebookEnronBrightkiteGowallaDBLPTwitterStanfordYoutubeFlickrTime Cost (sec)BaselineBL+OFEKCNaiveBaselineBL+O1BL+O2EKC10310510710910111015202530#Candidate Edgesk10210410610810101015202530#Candidate EdgeskBaselineBL+O1BL+O2EKC10-310-11011031051015202530Time Cost (sec)k10010110210310451015202530Time Cost (sec)b [Morone et al., 2019] Flaviano Morone, Gino Del Ferraro, and Hern´an A Makse. The k-core as a predictor of struc- tural collapse in mutualistic ecosystems. Nature Physics, 15(1):95, 2019. [Natanzon et al., 2001] Assaf Natanzon, Ron Shamir, and Roded Sharan. Complexity classification of some edge modification problems. Discrete Applied Mathematics, 113(1):109 -- 128, 2001. [Seidman, 1983] Stephen B Seidman. Network structure and minimum degree. Social networks, 5(3):269 -- 287, 1983. [Suady and Najim, 2014] Suaad AA Suady and Alaa A Na- jim. On edge-addition problem. Journal of College of Education for Pure Science, 4(1):26 -- 36, 2014. [Ugander et al., 2012] Johan Ugander, Lars Backstrom, Cameron Marlow, and Jon Kleinberg. Structural diversity in social contagion. PNAS, 109(16):5962 -- 5966, 2012. [Wu et al., 2013] Shaomei Wu, Atish Das Sarma, Alex Fab- rikant, Silvio Lattanzi, and Andrew Tomkins. Arrival and departure dynamics in social networks. In WSDM, pages 233 -- 242, 2013. [Zhang et al., 2017a] Fan Zhang, Wenjie Zhang, Ying Zhang, Lu Qin, and Xuemin Lin. OLAK: an efficient al- gorithm to prevent unraveling in social networks. PVLDB, 10(6):649 -- 660, 2017. [Zhang et al., 2017b] Fan Zhang, Ying Zhang, Lu Qin, Wen- jie Zhang, and Xuemin Lin. Finding critical users for so- cial network engagement: The collapsed k-core problem. In AAAI, pages 245 -- 251, 2017. [Zhang et al., 2017c] Yikai Zhang, Jeffrey Xu Yu, Ying Zhang, and Lu Qin. A fast order-based approach for core maintenance. In ICDE, pages 337 -- 348, 2017. [Zhang et al., 2018a] Fan Zhang, Long Yuan, Ying Zhang, Lu Qin, Xuemin Lin, and Alexander Zhou. Discovering strong communities with user engagement and tie strength. In DASFAA, pages 425 -- 441, 2018. [Zhang et al., 2018b] Fan Zhang, Ying Zhang, Lu Qin, Wen- jie Zhang, and Xuemin Lin. Efficiently reinforcing social networks over user engagement and tie strength. In ICDE, pages 557 -- 568, 2018. [Zhu et al., 2018] Weijie Zhu, Chen Chen, Xiaoyang Wang, and Xuemin Lin. K-core minimization: An edge manipu- lation approach. In CIKM, pages 1667 -- 1670, 2018. References [Batagelj and Zaversnik, 2003] Vladimir Batagelj and Mat- jaz Zaversnik. An o(m) algorithm for cores decomposition of networks. CoRR, cs.DS/0310049, 2003. [Bhawalkar et al., 2015] Kshipra Bhawalkar, Jon M. Klein- berg, Kevin Lewi, Tim Roughgarden, and Aneesh Sharma. Preventing unraveling in social networks: The anchored k- core problem. SIAM J. Discrete Math., 29(3):1452 -- 1475, 2015. [Cheema et al., 2010] Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin Lin, Wenjie Zhang, and Wei Wang. Multi-guarded safe zone: An effective technique to mon- itor moving circular range queries. In ICDE, pages 189 -- 200, 2010. [Chitnis and Talmon, 2018] Rajesh Chitnis and Nimrod Tal- mon. Can we create large k-cores by adding few edges? In CSR, pages 78 -- 89, 2018. [Chitnis et al., 2013] Rajesh Hemant Chitnis, Fedor V. Fomin, and Petr A. Golovach. Preventing unraveling in social networks gets harder. In AAAI, 2013. [Feige, 1998] Uriel Feige. A threshold of ln n for approxi- mating set cover. J. ACM, 45(4):634 -- 652, 1998. [Kapron et al., 2011] Bruce M. Kapron, Gautam Srivastava, and S. Venkatesh. Social network anonymization via edge addition. In ASONAM, pages 155 -- 162, 2011. [Karp, 1972] Richard M. Karp. Reducibility among combi- natorial problems. In Complexity of Computer Computa- tions, pages 85 -- 103, 1972. [Kitsak et al., 2010] Maksim Kitsak, Lazaros K Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H Eu- gene Stanley, and Hern´an A Makse. Identification of in- fluential spreaders in complex networks. Nature physics, 6(11):888 -- 893, 2010. [Lai et al., 2005] Yung-Ling Lai, Chang-Sin Tian, and Ting- Chun Ko. Edge addition number of cartesian product of paths and cycles. Electronic Notes in Discrete Mathemat- ics, 22:439 -- 444, 2005. [Luce and Perry, 1949] R Duncan Luce and Albert D Perry. A method of matrix analysis of group structure. Psy- chometrika, 14(2):95 -- 116, 1949. [Luo et al., 2008] Yi Luo, Wei Wang, and Xuemin Lin. SPARK: A keyword search engine on relational databases. In ICDE, pages 1552 -- 1555, 2008. [Luo et al., 2011] Yi Luo, Wei Wang, Xuemin Lin, Xiaofang Zhou, Jianmin Wang, and Keqiu Li. SPARK2: top-k key- word query in relational databases. IEEE Trans. Knowl. Data Eng., 23(12):1763 -- 1780, 2011. [Malliaros and Vazirgiannis, 2013] Fragkiskos D. Malliaros and Michalis Vazirgiannis. To stay or not to stay: modeling engagement dynamics in social graphs. In CIKM, pages 469 -- 478, 2013. [Medya et al., 2019] Sourav Medya, Tiyani Ma, Arlei Silva, and Ambuj K. Singh. K-core minimization: A game theo- retic approach. CoRR, abs/1901.02166, 2019.
1212.0087
1
1212
2012-12-01T09:16:35
A scalable mining of frequent quadratic concepts in d-folksonomies
[ "cs.SI" ]
Folksonomy mining is grasping the interest of web 2.0 community since it represents the core data of social resource sharing systems. However, a scrutiny of the related works interested in mining folksonomies unveils that the time stamp dimension has not been considered. For example, the wealthy number of works dedicated to mining tri-concepts from folksonomies did not take into account time dimension. In this paper, we will consider a folksonomy commonly composed of triples <users, tags, resources> and we shall consider the time as a new dimension. We motivate our approach by highlighting the battery of potential applications. Then, we present the foundations for mining quadri-concepts, provide a formal definition of the problem and introduce a new efficient algorithm, called QUADRICONS for its solution to allow for mining folksonomies in time, i.e., d-folksonomies. We also introduce a new closure operator that splits the induced search space into equivalence classes whose smallest elements are the quadri-minimal generators. Carried out experiments on large-scale real-world datasets highlight good performances of our algorithm.
cs.SI
cs
A scalable mining of frequent quadratic concepts in d-folksonomies Mohamed Nader Jelassi and Sadok Ben Yahia and Engelbert Mephu Nguifo 2 1 0 2 c e D 1 ] I S . s c [ 1 v 7 8 0 0 . 2 1 2 1 : v i X r a Abstract-Folksonomy mining is grasping the interest of web 2.0 community since it represents the core data of social resource sharing systems. However, a scrutiny of the related works interested in mining folksonomies unveils that the time stamp dimension has not been considered. For example, the wealthy number of works dedicated to mining tri-concepts from folksonomies did not take into account time dimension. In this paper, we will consider a folksonomy commonly composed of triples <users, tags, resources> and we shall consider the time as a new dimension. We motivate our approach by highlighting the battery of potential applications. Then, we present the foundations for mining quadri-concepts, provide a formal definition of the problem and introduce a new efficient algorithm, called QUADRICONS for its solution to allow for mining folksonomies in time, i.e., d-folksonomies. We also introduce a new closure operator that splits the induced search space into equivalence classes whose smallest elements are the quadri-minimal generators. Carried out experiments on large- scale real-world datasets highlight good performances of our algorithm. Keywords-Quadratic Context; Formal Concept Analysis; Quadratic Concepts; Folksonomies; Algorithm; Social Net- works I. INTRODUCTION Folksonomy (from folk and taxonomy) is a neologism for a practice of collaborative categorization using freely chosen keywords [1]. Folksonomies (also called social tag- ging mechanisms) have been implemented in a number of online knowledge sharing environments since the idea was first adopted by the social bookmarking site DEL.ICIO.US in 2004. The idea of a folksonomy is to allow the users to describe a set of shared objects with a set of keywords, i.e., tags, of their own choice. The new data of folksonomy systems provides a rich resource for data analysis, infor- mation retrieval, and knowledge discovery applications. The rise of folksonomies, due to the success of the social resource sharing systems (e.g., FLICKR, BIBSONOMY, YOUTUBE, etc.) also called Web 2.0, has attracted interest of researchers to deal with the Folksonomy mining area. However, due to the huge size of folksonomies, many works focus on the extraction of lossless concise representations of interesting patterns, i.e., triadic concepts [2] [3] [4]. Recently, in [5], the new TRICONS algorithm outperforms its competitors thanks to a clever sweep of the search space. Nevertheless, a scrutiny of these related work unveils that the time stamp dimension has not been considered yet. Time is considered one of the most important factors in detecting emerging subjects. Agrawal and Srikant show in [6] the importance of sequential patterns which may be useful to discover rules integrating the notion of temporality and sequence of events. In our case, such rules shall be of the form : users which shared the movie "Alcatraz" using the tag prison will shared it later with the tag escape. With this paper, we initiate the confluence of threee lines of research, Formal Concept Analysis, Folksonomy mining and Mining Sequential Patterns. Formal Concept Analysis (FCA) [7] has been extended since fifteen years ago to deal with three-dimensional data [8]. However, Triadic Concept Analysis (TCA) has not garnered much attention for researchers until the coming of folksonomies as they represent the core data structure of social networks. Thus, we give a formal definition of the problem of mining all fre- quent quadri-concepts (the four-dimensional and sequential version of mining all frequents tri-concepts) and introduce our algorithm QUADRICONS for its solution, which is an extension of the TRICONS algorithm to the quadratic case. We also introduce a new closure operator that splits the in- duced search space into equivalence classes whose smallest elements are the quadri-minimal generators (QGs); QGs are helpful for a clever sweep of the search space [5] [9]. The remainder of the paper is organized as follows. In the next section, we motivate our conceptual and temporal clustering approach for solving the problem of mining all frequent quadri-concepts of a given dataset. We thoroughly study the related work in Section III. In Section IV, we pro- vide a formal definition of the problem of mining all frequent quadri-concepts. We introduce a new closure operator for the quadratic context as well as the QUADRICONS algorithm dedicated to the extraction of all frequent quadri-concepts, in Section V. In Section VI, carried out experiments about performances of our algorithm in terms of execution time, consumed memory and compacity of the quadri-concepts. Finally, we conclude the paper with a summary and we sketch some avenues for future works in Section VII. II. MOTIVATION : CONCEPTUAL AND TEMPORAL CLUSTERING OF FOLKSONOMIES The immediate success of social networks, i.e., social resource sharing systems is due to the fact that no specific skills are needed for participating [2]. Each individual user is able to share a web page1, a personal photo2, an artist he likes3 or a movie he watched4 without much effort. 1http://del.icio.us 2http://flickr.com 3http://last.fm 4http://movielens.org The core data structure of such systems is a folksonomy. It consists of three sets U, T , R of users assigning tags to resources as well as a ternary relation Y between them. To allow conceptual and temporal clustering from folksonomies, an additional dimension, i.e., D, is needed : time. Indeed, the special feature of folksonomies under study is their unceasing evolution [10]. Such systems follow trends and evolve according to the new user's taggings [11]. The increasing use of these systems shows that folksonomy-based works are then able to offer a better solution in the domain of Web Information Retrieval (WIR) [12] by considering time when dealing with a query or during the user's taggings, i.e., by suggesting the appropriate trendy tags. Thus, a user which tagged a film or a website with a given tag at a specific date may assign a whole new tag at a different period under completely different circumstances. For example, a user that associate the website whitehouse.gov with the tags Bush and Iraq in 2004 might assign it the tags Obama and crisis nowadays. A more real and sadly true example leads users today associating Islam with the tag terrorism instead of Quran; besides, one may see the incessant evolution of the tag Binladen in social networks since September 2001 [13]. Within the new introduced dimension, i.e., time, our goal is to detect hidden sequential conceptualizations in folk- sonomies. An exemple of such a concept is that users which tagged "Harry Potter" will tag "The Prisoner of Azkaban" and then tag "The Order of the Phoenix", probably with the same tags. Our algorithm solves the problem of frequent closed patterns mining for this kind of data. It will return a set of (frequent) quadruples, where each quadruple (U , T , R, D) consists of a set U of users, a set T of tags, a set R of resources and a set D of dates. These quadruples, called (frequent) quadri-concepts, have the property that each user in U has tagged each resource in R with all tags from T at different dates from D, and that none of these sets can be extended without shrinking one of the other three dimensions. Hence, they represent the four-dimensional and sequential extension of tri-concepts. Moreover, we can add minimum support constraints on each of the four dimensions in order to focus on the largest concepts of the folksonomy, i.e., by setting higher values of minimum supports. In the remainder, we will scrutinize the state-of-the-art propositions aiming to deal with the folksonomy mining area. III. RELATED WORK In this section, we discuss the different works that deal with folksonomy mining. Due to their triadic form, many researchers [2] [3] [4] focus on folksonomies in order to extract triadic concepts which are maximal sets of users, tags and resources. Tri-concepts are the first step to a various of applications : ontology building [1], association rule derivation [14], recommendation systems [15] to cite but a few. Other papers focus on analysing the structure of folksonomies [16] or structure the tripartite network of folksonomies [10]. Recent works analyse the folksonomy's evolution through time in order to discover the emergent subjects and follow trends [13] [17] [18]. Since we are going to mine quadri-concepts from d- folksonomies, which mimic the structure of quadratic con- texts, we look for works that deal with the four-dimensional data. In [19], inspired by work of Wille [8] extending Formal Concept Analysis to three dimensions, the author created a framework for analyzing n-dimensional formal concepts. He generalized the triadic concept analysis to n dimensions for arbitrary n, giving rise to Polyadic Concept Analysis. The n-adic contexts give rise, in a way analogous to the triadic case, to n-adic formal concepts. In [19], the author gives examples of quadratic concepts and their associated quadri-lattice. Despite robust theoretical study, no algorithm has been proposed by Voutsadakis for an efficient extraction of such n-adic concepts. Recently, Cerf et al. proposed the DATA-PEELER algorithm [4] in order to extract all closed concepts from n-ary relations. DATA-PEELER enumerates all the n-adic formal concepts in a depth first manner using a binary tree enumeration strategy. When setting n to 4, DATA-PEELER is able to extract quadri-concepts. In the following, we give a formal definition of the problem of mining all frequent quadri-concepts as well as the main notions used through the paper. IV. THE PROBLEM OF MINING ALL FREQUENT QUADRI-CONCEPTS In this section, we formalize the problem of mining all frequents quadri-concepts. We start with an adaptation of the notion of folksonomy [2] to the quadratic context. Definition 1: (D-FOLKSONOMY) A d-folksonomy is a set of tuples Fd = (U, T , R, D, Y) where U, T , R and D are finite sets which elements are called users, tags, resources and dates. Y ⊆ U × T × R × D represents a quaternary relation where each y ⊆ Y can be represented by a quadruple : y = {(u, t, r, d) u ∈ U, t ∈ T , r ∈ R, d ∈ D} which means that the user u has annotated the resource r using the tag t at the date d. Example 1: Table I depicts an example of a d-folksonomy Fd with U = {u1, u2, u3, u4}, T = {t1, t2, t3}, R = {r1, r2} and D = {d1, d2}. Each cross within the quaternary relation indicates a tagging operation by a user from U, a tag from T and a resource from R at a date from D, i.e., a user has tagged a particular resource with a particular tag at a date d. For example, the user u1 has tagged the resource r1 with the tags t1, t2 and t3 at the date d1. The following definition introduces a (frequent) quadri- set. Definition 2: (A (FREQUENT) QUADRI-SET) Let Fd = (U, T , R, D, Y) be a d-folksonomy. A quadri-set of Fd is a quadruple (A, B, C, E) with A ⊆ U, B ⊆ T , C ⊆ R and E ⊆ D such as A × B × C × E ⊆ Y. d1 d2 U/T u1 u2 u3 u4 u1 u2 u3 u4 Fd R D r1 t2 r2 t2 t1 t3 t1 t3 × × × × × × × × × × × × × × × × × × × × × × × × × × × × Table I A d-folksonomy. × × D-Folksonomies have four dimensions which are com- pletely symmetric. Thus, we can define minimum support thresholds on each dimension. Hence, the problem of mining frequent quadri-sets is then the following: Problem 1: (Mining all frequent quadri-sets) Let Fd = (U, T , R, D, Y) be a d-folksonomy and let minsuppu, minsuppt, minsuppr and minsuppd be (absolute) user- defined minimum thresholds. The task of mining all frequent quadri-sets consists in determining all quadri-sets (A, B, C, E) of Fd with A ≥ minsuppu, B ≥ minsuppt, C ≥ minsuppr and E ≥ minsuppd. Our thresholds are antimonotonic constraints : If (A1, B1, C1, E1) with A1 being maximal for A1 × B1 × C1 × E1 ⊆ Y is not u-frequent5 then all (A2, B2, C2, E2) with B1 ⊆ B2, C1 ⊆ C2 and E1 ⊆ E2 are not u-frequent either. The same holds symmetrically for the other three dimensions. In [8], the authors demonstrate that above the two-dimensional case, the direct symmetry between monotonicity and anti- monotonicity breaks. Thus, they introduced a lemma which results from the triadic Galois connection [20] induced by a triadic context. In the following, we adapt that lemma to our quadratic case. Lemma 1: (See also [19], Proposition 2) Let (A1, B1, C1, E1) and (A2, B2, C2, E2) be quadri-sets with Ai being maximal for Ai × Bi × Ci × Ei ⊆ Y, for i = 1,2. If B1 ⊆ B2, C1 ⊆ C2 and E1 ⊆ E2 then A2 ⊆ A1. The same holds symmetrically for the other three dimensions. In the sequel, the inclusion (A1, B1, C1, E1) ⊆ (A2, B2, C2, E2) holds if and only if B1 ⊆ B2, C1 ⊆ C2, E1 ⊆ E2 and A2 ⊆ A1. Example 2: Let Fd be the d-folksonomy of Table I and let S1 = {{u3, u4}, t3, {r1, r2}, {d1, d2}} and S2 = {{u1, u3, u4}, {t2, t3}, {r1, r2}, d1} be two quadri-sets of Fd. Then, we have S1 ⊆ S2 since {u3, u4} ⊆ {u1, u3, u4}, t3 ⊆ {t2, t3}, {r1, r2} ⊆ {r1, r2} and d1 ⊆ {d1, d2}. As the set of all frequent quadri-sets is highly redundant, we consider a specific condensed representation, i.e., a subset which contains the same information : the set of all frequent quadri-concepts. The latter's definition is given as follows : 5with regard to the dimension U. Definition 3: ((FREQUENT) QUADRATIC CONCEPT) A quadratic concept (or a quadri-concept for short) of a d- folksonomy Fd = (U, T , R, D, Y) is a quadruple (U , T , R, D) with U ⊆ U, T ⊆ T , R ⊆ R and D ⊆ D with U × T × R × D ⊆ Y such that the quadruple (U , T , R, D) is maximal, i.e., none of these sets can be extended without shrinking one of the other three dimensions. A quadri- concept is said to be frequent whenever it is a frequent quadri-set. Problem 2: (Mining all frequent quadri-concepts) Let Fd = (U, T , R, D, Y) be a d-folksonomy and let minsuppu, minsuppt, minsuppr and minsuppd be user-defined min- imum thresholds. The task of mining all frequent quadri- concepts consists in determing all quadri-concepts (U , T , R, D) of Fd with U ≥ minsuppu, T ≥ minsuppt, R ≥ minsuppr and D ≥ minsuppd. The set of all frequent quadri-concepts of Fd is equal to QC = {qc qc = (U , T , R, D) is a frequent quadri-concept}. Remark 1: It is important to note that the extracted repre- sentation of quadri-concepts is information lossless. Hence, after solving Problem 2, we can easily solve the Problem 1 by enumerating all quadri-sets (A, B, C, E) such as it exists a frequent quadri-concept (U , T , R, D) such as A ⊆ U , B ⊆ T , C ⊆ R, E ⊆ D and A ≥ minsuppu, B ≥ minsuppt, C ≥ minsuppr and E ≥ minsuppd. In the following, we introduce the QUADRICONS al- gorithm for mining all frequent quadri-Concepts before discussing its performances versus the DATA-PEELER al- gorithm for the quadratic case in the section after. V. THE QUADRICONS ALGORITHM FOR MINING ALL FREQUENT QUADRI-CONCEPTS In this section, we introduce new notions that would be of use throughout the QUADRICONS algorithm. Hence, we introduce a new closure operator for a d-folksonomy which splits the search space into equivalence classes as well as an extension of the notion of minimal generator [5]. Then, we provide an illustrative example of our algorithm. A. Main notions of QUADRICONS Before introducing our closure operator for a d- folksonomy/quadratic context, we define a general definition of a closure operator for a n-adic context. Definition 4: (CLOSURE OPERATOR OF A n-ADIC CON- TEXT) Let S = (S1, S2, . . ., Sn) be a n-set, with S1 being maximal for S1 × . . . × Sn ⊆ Y, of a n-adic context Kn with n dimensions, i.e., Kn = (D1, D2, . . ., Dn, Y). A mapping h is defined as follows : h(S) = h(S1, S2, . . ., Sn) = (C1, C2, . . ., Cn) such as : C1 = S1 ∧ C2 = {C i 3 ∈ S3, . . ., ∀ ci n) ∈ Y ∀ ci 2 ∈ D2 (ci 3, . . ., ci n ∈ Sn} 1, C i 2, ci 1 ∈ C1, ∀ ci ... ∧ Cn = {C i C1, . . . ∀ ci n ∈ Dn (ci n−1 ∈ Cn−1} 1, ci 2, . . ., ci n−1, C i n) ∈ Y ∀ ci 1 ∈ Proposition 1: h is a closure operator. Proof: To prove that h is a closure operator, we have to prove that this closure operator fulfils the three properties of extensivity, idempotency and isotony [21]. (1) Extensivity : Let S = (S1, S2, . . ., Sn) be a n-set . . ., Cn) such that : C1 = of Kn ⇒ h(S) = (C1, C2, n) ∈ Y ∀ ci 2, ci S1, C2 = {C i 2 ∈ D2 (ci n ∈ Sn} ⊇ S2 since C1 = ∈ C1, ∀ ci 2, . . ., ci n) ∈ S1 , . . ., Cn = {C i 1 ∈ C1, ∀ ci Y ∀ ci n−1 ∈ Cn−1} ⊇ Sn since C1 = S1, C2 ⊇ S2, . . ., Cn−1 ⊇ Sn−1. Then, C1 = S1 and Si ⊆ Ci for i = 2, . . . n ⇒ S ⊆ h(S) (cf., Lemma 1) n ∈ Dn (ci 1, ci 2 ∈ C2, . . . ∀ ci 3 ∈ S3, . . ., ∀ ci 3, . . ., ci n−1, C i 1, C i 1 1, C i′ 1, C′ 2 , ci 2, . . ., C′ 3, . . ., ci n) such that : C′ n) ∈ Y ∀ ci (2) Idempotency : Let S = (S1, S2, . . ., Sn) be a n-set of Kn ⇒ h(S) = (C1, C2, . . ., Cn) ⇒ h(C1, C2, . . ., Cn) 2 = {C i′ = (C′ 2 ∈ D2 3 ∈ S3, . . ., ∀ ci (ci n 1 , ci′ n ∈ Dn (ci′ ∈ Sn} = C2 since C1 = S1, . . ., C′ 2 , . . ., ci′ 2, . . . ∀ ci′ n−1 ∈ C′ n−1 i = Ci for i = 1, . . . n ⇒ h(h(S)) = h(S) = Cn−1. Then, C′ 1 ∈ C′ n−1} = Cn since we have C′ 1 = C1, C′ 1 ∈ C1, ∀ ci n = {C i′ 2 ∈ C′ 1, ∀ ci′ 1 = C1, C′ 2 = C2, . . ., C′ n ) ∈ Y ∀ ci′ n−1, C i′ n) be two n-sets of Kn with S ⊆ S′, i.e., S′ (3) Isotony : Let S = (S1, S2, . . ., Sn) and S′ = (S′ 1, S′ 2, 1 ⊆ S1 i for i = 2, . . . n (cf., Lemma 1). We have h(S) n) such that . . ., S′ and Si ⊆ S′ = (C1, C2, . . ., Cn) and h(S′) = (C′ : 2, . . ., C′ 1, C′ 1 ⊆ S1 ⇒ C′ 2, ci 1 and S′ 3, . . ., ci 1, C i n ∈ Sn} and C′ n) ∈ Y ∀ ci 1 ∈ C1, ∀ ci 2 since Si ⊆ S′ • C1 = S1, C′ • C2 = {C i 1 = S′ 3, . . ., ci 2 ∈ D2 (ci 3 ∈ S3, . . ., ∀ ci 2 , ci ∀ ci C i′ ∈ Sn} ⇒ C2 ⊆ C′ C′ ... 1 ⊆ C1. (cf., Lemma 1) 1 ⊆ C1 2 = {C i′ n) ∈ Y ∀ ci 1 ∈ C1, 1, 2 ∈ D2 (ci 3 ∈ S3, . . ., ∀ ci n i for i = 3, . . . n and • Cn = {C i n ∈ Dn (ci 1, ci 2 ∈ C2, . . . ∀ ci 2 , . . ., ci′ n−1 ∈ C′ 2, . . ., Cn−1 ⊆ C′ C1, ∀ ci ∈ Dn (ci′ ∈ C′ C1, C2 ⊆ C′ 1 , ci′ 2, . . . ∀ ci′ n−1, C i 2, . . ., ci n−1 ∈ Cn−1} and C′ n) ∈ Y ∀ ci n−1, C i′ n ) ∈ Y ∀ ci′ n−1} ⇒ Cn ⊆ C′ 1 ∈ C′ n since C′ n−1. (cf., Lemma 1) 1 ∈ n = {C i′ 1, ∀ ci′ 2 1 ⊆ n Then, C′ 1 ⊆ C1 and Ci ⊆ C′ i for i = 2, . . . n ⇒ h(S) ⊆ h(S′). According to (1), (2) and (3), h is a closure operator. For n = 4, we instantiate the closure operator of a quadratic context, i.e., a d-folksonomy as follows : Definition 5: (CLOSURE OPERATOR OF A d-folksonomy) Let S = (A, B, C, E) be a quadri-set of Fd with A being maximal for A × B × C × E ⊆ Y. The closure operator h of a d-folksonomy Fd is defined as follows: h(S) = h(A, B, C, E) = (U , T , R, D) U = A ∧ T = {ti ∈ T (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ri ∈ C, ∀ di ∈ E} ∧ R = {ri ∈ R (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈ T , ∀ di ∈ E} ∧ D = {di ∈ D (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈ T , ∀ ri ∈ R} Remark 2: Roughly speaking, h(S) computes the largest quadri-set in the d-folksonomy Fd which contains maximal sets of tags, resources and dates shared by a group of users. The application of the closure operator h on a quadri- set gives rise to a quadri-concept qc = (U , T , R, D). In the remainder of the paper, the U , R, T and D parts are respectively called Extent, Intent, Modus and Variable. Like the dyadic and triadic case, the closure operator splits the search space into equivalence classes, that we introduce in the following : Definition 6: (EQUIVALENCE CLASS) Let S1 = (A1, B1, C1, E1), S2 = (A2, B2, C2, E2) be two quadri-sets of Fd and qc be a frequent quadri-concept. S1 and S2 belong to the same equivalence class represented by the quadri-concept qc, i.e., S1 ≡qc S2 iff h(S1) = h(S2) = qc. Figure 1. Example of an equivalence class extracted from the d-folksonomy depicted by Table I Minimal Generators (MGs) have been shown to play an important role in many theoretical and practical problem settings involving closure systems. Such minimal generators can offer a complementary and simpler way to understand the concept, because they may contain far fewer attributes than closed concepts. Indeed, MGs represent the smallest elements within an equivalence class. Complementary to closures, minimal generators provide a way to characterize formal concepts [9]. In the following, we introduce an extension of the definition of a MG to the d-folksonomy. Definition 7: (QUADRI-MINIMAL GENERATOR) Let g = (A, B, C, E) be a quadri-set of Fd such as A ⊆ U, B ⊆ T , C ⊆ R and E ⊆ D and qc ∈ QC. The quadruple g is a quadri-minimal generator (quadri-generator for short) of qc iff h(g) = qc and ∄ g1 = (A1, B1, C1, E1) such as : 1) A = A1, 2) (B1 ⊆ B ∧ C1 ⊆ C ∧ E1 ⊂ E) ∨ (B1 ⊆ B ∧ C1 ⊂ C ∧ E1 ⊆ E), and 3) h(g) = h(g1) = qc. Example 3: Let us consider the d-folksonomy Fd shown in Table I. Figure 1 shows an example of an equivalence class. For example, we have h(g1={{u1, u2, u3}, t3, r1, d1}) = {{u1, u2, u3}, {t2, t3, t4}, r1, {d1, d2}} = qc such as g1 is a quadri-generator. Thus, qc is the quadri-concept of this equivalence class which is the largest unsubsumed quadri-set and it has two quadri-generators. However, g3 = {{u1, u2, u3}, {t3, t4}, r1, d1} is not a quadri-generator of qc since it exists g1 such as g1.extent=g3.extent, g1.intent = g3.intent ∧ g1.modus ⊂ g3.modus ∧ g1.variable = g3.variable. Based on those new introduced notions, we propose in the following our new QUADRICONS algorithm for a scalable mining of frequent quadri-concepts from a d-folksonomy. B. The QUADRICONS Algorithm In the following, we introduce a test-and-generate algo- rithm, called QUADRICONS, for mining frequent quadri- concepts from a d-folksonomy. Since quadri-generators are minimal keys of an equivalence class, their detection is largely eased. QUADRICONS operates in four steps as follows : the FINDMINIMALGENERATORS procedure as a first step for the extraction of quadri-generators. Then, the CLOSURECOMPUTE procedure is invoked for the three next steps in order to compute respectively the modus, intent and variable parts of quadri-concepts. The pseudo code of the QUADRICONS algorithm is sketched by Algorithm 1. QUADRICONS takes as input a d-folksonomy Fd = (U, T , R, D, Y) as well as four user-defined thresholds (one for each dimension) : minsuppu, minsuppt, minsuppr and minsuppd. The output of the QUADRICONS algorithm is the set of all frequent quadri-concepts that fulfil these thresholds. QUADRICONS works as follows : it starts by invoking the FINDMINIMALGENERATORS procedure (Step 1), which pseudo-code is given by Algorithm 2, in order to extract the quadri-generators stored in the set MG (Line 3). For such extraction, FINDMINIMALGENERATORS computes for each triple (t, r, d) the set Us representing the maximal set of users sharing both tag t and resource r at the date d (Algorithm 2, Line 3). If Us is frequent w.r.t minsuppu (Line 4), a quadri-generator is then created (if it does not already exist) with the appropriate fields (Line 5). Algorithm 2 invokes the ADDQUADRI function which adds the quadri- generator g to the set MG (Line 7). Hereafter, QUADRICONS invokes the CLOSURECOM- PUTE procedure (Step 2) for each quadri-generator of MG (Lines 5-7), which pseudo-code is given by Algorithm 3 : the aim is to compute the modus part of each quadri-concept. At this step, the two first cases of Algorithm 3 (Lines 3 and 6) have to be considered w.r.t the extent of each quadri- generator. The CLOSURECOMPUTE procedure returns the set QS formed by quadri-sets. The indicator flag (equal 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 11 12 ALGORITHM 1 : QUADRICONS Data : 1) Fd (U, T , R, D, Y) : A d-folksonomy. 2) minsuppu, minsuppt, minsuppr, minsuppd : User-defined thresholds. Results : QC : {Frequent quadri-concepts}. Begin /*Step 1 : The extraction of quadri-generators*/ FINDMINIMALGENERATORS(Fd, MG, minsuppu); /*Step 2 : The computation of the modus part*/ Foreach quadri-gen g ∈ MG do CLOSURECOMPUTE(MG, minsuppu, minsuppt, minsuppr, g, QS, 1); End PRUNEINFREQUENTSETS(QS,minsuppt); /*Step 3 : The computation of the intent part*/ Foreach quadri-set s ∈ QS do CLOSURECOMPUTE( QS, minsuppu, minsuppt, minsuppr, s, QS, 2); End PRUNEINFREQUENTSETS(QS,minsuppr); /*Step 4 : The computation of the variable part*/ Foreach quadri-set s ∈ QS do CLOSURECOMPUTE( QS, minsuppu, minsuppt, minsuppr, s, QC, 3); End PRUNEINFREQUENTSETS(QC,minsuppd); End return QC ; ALGORITHM 2 : FINDMINIMALGENERATORS Data : 1) MG : The set of frequent quadri-generators. 2) Fd (U, T , R, D, Y) : A d-folksonomy. 3) minsuppu : User-defined threshold of user's support. Results : MG : {The set of frequent quadri-generators}. Begin Foreach triple (t, r, d) of Fd do Us= {ui ∈ U (ui, t, r, d) ∈ Y} ; If Us ≥ minsuppu then g.extent = Us; g.intent = r; g.modus = t; g.variable = d If g 6∈ MG then ADDQUADRI(MG, g) End End End End return MG ; ALGORITHM 3 : CLOSURECOMPUTE Data : 1) SIN : The input set. 2) minu, mint, minr : User-defined thresholds. 3) q : A quadri-generator/quadri-set. 4) SOU T : The output set. 5) i : an indicator. Results : SOU T : The output set. Begin Foreach quadri-set q′ ∈ SIN do If i=1 and q.intent = q′.intent and q.extent ⊆ q′.extent then s.intent = q.intent;s.extent = q.extent;s.variable = q.variable;s.modus = q.modus ∪ q′.modus; ADDQUADRI(SOU T , s); End Else if i=1 and q.intent = q′.intent and q and q′ incomparable then g.extent = q.extent ∩ q′.extent; g.modus = q.modus ∪ q′.modus; g.intent = q.intent; g.variable = q.variable; If g u-frequent then ADDQUADRI(MG, g); End Else if i=2 and q.extent ⊆ q′.extent and q.modus ⊆ q′.modus and q.intent 6= q′.intent then qs.extent = q.extent; qs.modus = q.modus; qs.variable = q.variable; qs.intent = q.intent ∪ q′.intent; ADDQUADRI(SOU T , qs); End Else if i=2 and q and q′ incomparable then s.extent = q.extent ∩ q′.extent; s.modus = q.modus ∩ q′.modus; s.variable = q.variable; s.intent = q.intent ∪ q′.intent; If s is u-frequent and t-frequent then ADDQUADRI(SOU T , s); End Else if i=3 and q.extent ⊆ q′.extent and q.modus ⊆ q′.modus and q.intent ⊆ q′.intent and q.variable 6= q′.variable then qc.extent = q.extent; qc.modus = q.modus; qc.intent = q.intent; qc.variable = q.variable ∪ q′.variable; ADDQUADRI(SOU T , qc); End Else if i=3 and q and q′ incomparable then s.extent = q.extent ∩ q′.extent; s.modus = q.modus ∩ q′.modus; s.intent = q.intent ∩ q′.intent; s.variable = q.variable ∪ q′.variable; If s is u-frequent, t-frequent and r-frequent then ADDQUADRI(SOU T , s); End End End return SOU T ; 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 to 1 here) marked by QUADRICONS shows if the quadri- set considered by the CLOSURECOMPUTE procedure is a quadri-generator. In the third step, QUADRICONS invokes a second time the CLOSURECOMPUTE procedure for each quadri-set of QS (Lines 9-11), in order to compute the intent part. CLOSURECOMPUTE focuses on quadri-sets of QS having different intent parts (Algorithm 3, Line 10). The fourth and final step of QUADRICONS invokes a last time the CLOSURECOMPUTE procedure with an indicator equal to 3. This will allow to focus on quadri-sets having different variable parts (Algorithm 3, Line 18) before generating quadri-concepts. QUADRICONS comes to an end after this step and returns the set of the frequent quadri-concepts which fulfils the four thresholds minsuppu, minsuppt, minsuppr and minsuppd. The QUADRICONS algorithm invokes the PRUNEINFREQUENTSETS function (Lines 8, 13 and 18) in order to prune infrequent quadri-sets/concepts, i.e., whose the modus/intent/variable cardinality does not fulfil the aforementioned thresholds. C. Structural properties of QUADRICONS Proposition 2: The QUADRICONS algorithm is correct and complete. It retrieves accurately all the frequent quadri- concepts. Proof: The FINDMINIMALGENERATORS procedure al- lows to extract all quadri-generators from the d-folksonomy Fd since all the context's triples are enumerated in order to group maximal users w.r.t each triple (t,r,d) (Algo- rithm 2, Lines 2-10). This allows to extract accurately all the quadri-generators. From quadri-generators already extracted, QUADRICONS calls the CLOSURECOMPUTE pro- cedure three times in order to compute, respectively, the modus, intent and variable parts of each quadri-generator. At each call, i.e., i = 1, 2, 3, for each couple of candidates q and q′, two cases have to be considered : 1) (Algorithm 3, lines 3, 10, 18) q and q′ are comparable. Hence a quadri-set (quadri-concept when i = 3) is created from the union of different parts of both candidates. 2) (Algorithm 3, lines 6, 14, 22) q and q′ are incompara- ble. Hence, a new quadri-set (quadri-generator when i = 1) is created matching the different parts of q and q′. Thus, all cases of comparison between candidates are enumerated. Finally, the PRUNEINFREQUENTSETS proce- dure prune infrequent quadri-concepts w.r.t minimum thresh- olds (Algorithm 1, lines 8, 13 and 18). We conclude that QUADRICONS faithfully extracts all frequent quadri- concepts. So, it is correct. Proposition 3: The QUADRICONS algorithm terminates. Proof: The number of quadri-generators generated by QUADRICONS is finite. Indeed, the number of QGs can- didate generated from a context (U, T , R, D) is at most T × R × D. Since the set MG of quadri-generators is finite, the three loops of Algorithm 1 running this set are thus finite. Moreover, the total number of quadri-concepts generated by QUADRICONS is equal to 2T +R+D There- fore, the algorithm QUADRICONS terminates. Theoretical Complexity issues: As in the triadic case [2], the number of (frequent) quadri-concepts may grow expo- nentially in the worst case. Hence, the theoretical complexity of our algorithm is around O(2n) with n = T + R + D. Nevertheless, and as it will be shown in the section dedicated to experimental results, from a practical point of view, the actual performances are far from being exponential and QUADRICONS flags out the desired scalability feature. Therefore we focus on empirical evaluations on large-scale real-world datasets. D. Illustrative example Consider the d-folksonomy depicted by Table I, with minsuppu = 2, minsuppt = 2, minsuppr = 1 and minsuppd = 1. Figure 2 sketches the execution trace of QUADRICONS above this context. As described above, QUADRICONS operates in four steps : 1) (Step 1) The first step of QUADRICONS involves the extraction of quadri-generators (QGs) from the context (Algorithm 1, Line 3). QGs are maximal sets of users following a triple of tag, resource and date. Thus, eleven QGs (among twelve) fulfill the minimum threshold minsuppu (cf., Figure 2, Step 1). 2) (Step 2) Next, QUADRICONS invokes the CLOSURE- COMPUTE procedure a first time on the quadri- generators allowing the computation of the modus part (the set of tags) of such candidates (Algorithm 1, Lines 5-8). For example, since the extent part (the set of users) of {{u1, u2, u4}, t1, r1, d1} is included into that of {{u1, u2, u3, u4}, t2, r1, d1}, the modus part of the first QG will be equal to {t1, t2}. In addition, new QGs can be created from intersection of the first ones (Algorithm 3, Lines 6-9) : it is the case of the two QGs (a) and (b) (cf., Figure 2, Step 2). Finally, candidates that not fulfill the minimum threshold minsuppt are pruned (cf., the three last ones). 3) (Step 3) Then, QUADRICONS proceeds to the com- putation of the intent part (the set of resources) of each candidate within a second call to the CLOSURE- COMPUTE procedure (Algorithm 1, Lines 10-13). For example, the candidate {{u1, u2, u4}, {t1, t2}, r1, d1} has an extent, modus and variable included or equal into those of the candidate {{u1, u2, u4}, {t1, t2}, r2, d1}. Then, its intent will be equal to {r1, r2}. At this step, four candidates fulfill the minimum threshold minsuppr (cf., Figure 2, Step 3). By merging compa- rable candidates, this step allow reducing at the same time their number. 4) (Step 4) Via a last call to the CLOSURECOMPUTE procedure, QUADRICONS computes the variable part (the set of dates) of each candidate while pruning infrequent ones (Algorithm 1, Lines 15-18). For ex- ample, since the candidate {{u1, u2}, {t1, t2}, r1, d2} has an extent, modus and intent included into those of {{u1, u2, u4}, {t1, t2}, {r1, r2}, d1}6, its variable will be equal to {d1, d2} (cf., Figure 2, Step 4). After the Step 4, QUADRICONS terminates. The four frequent quadri-concepts given as output are : 1) {{u1, u2, u4}, {t1, t2}, {r1, r2}, d1} 2) {{u1, u3, u4}, {t2, t3}, {r1, r2}, d1} 3) {{u1, u4}, {t1, t2, t3}, {r1, r2}, d1} 4) {{u1, u2}, {t1, t2}, r1, {d1, d2}} Figure 2. depicted by Table I Execution trace of QUADRICONS above the d-folksonomy VI. EVALUATION AND DISCUSSION In this section, we show through extensive carried out experiments, the assessment of the QUADRICONS perfor- mances vs. the state-of-the-art DATA-PEELER algorithm in 6Concretely, it means that the users u1 and u2 who shared the resource r1 with the tags t1 and t2 at the date d2 also shared it at the date d1. terms of execution time7. We also put the focus on the dif- ferences between the consumed memory of both algorithms. Finally, we compare the number of frequent quadri-concepts versus the number of frequent quadri-sets in order to assess the compacity of the extracted representation. We have ap- plied our experiments on two real-world datasets described in the following. Both datasets [22] are freely downloadable8 and statistics about these snapshots are summarized into Table II. • MOVIELENS (http://movielens.org) is a movie recom- mendation website. Users are asked to annotate movies they like and dislike. Quadruples are sets of users sharing movies using tags at different dates. • LAST.FM (http://last.fm) is a music website, founded in 2002. It has claimed 30 million active users in March 2009. Quadruples are sets of users annotating artists through tags at different dates. Type # Quadruples # Users # Tags # Resources # Dates (timestamps) Periods Dataset 1 (MOVIELENS) Dense 95580 4010 15227 11272 (movies) 81601 12/01/2005 - 20/12/2008 Dataset 2 (LAST.FM) Sparse 186479 1892 9749 12523 (artists) 3549 10/01/2007 - 07/08/2011 CHARACTERISTICS OF THE CONSIDERED SNAPSHOTS. Table II Datasets MOVIE LENS LAST.FM Dates 03/12/05 16/07/06 21/02/08 07/05/10 02/06/11 Users krycek maria Tags kids fantasy darkness magic csmdavis franny rossanna pop concert dance Resources Harry Potter The Prisoner of Azkaban The Order of the Phoenix Britney Spears Madonna EXAMPLES OF FREQUENT QUADRI-CONCEPTS OF MOVIELENS AND Table III LAST.FM. A. Examples of quadri-concepts Table III shows two examples of frequent quadri-concepts extracted from the MOVIELENS and LAST.FM datasets. The first one depicts that the users krycek and maria used the tags kids, fantasy, darkness and magic to annotate the movie Harry Potter and its sequels successively in 03/12/2005, in 7All implemented algorithms are in C++ (compiled with GCC 4.1.2) and we used an Intel Core i7 CPU system with 4 GB RAM. Tests were carried out on the Linux operating system UBUNTU 10.10.1. 8http://movielens.org 16/07/2006 and then in 21/02/2008. Such concept may be exploited further for recommending tags for that movie or analyze the evolution of tags associated to "Harry Potter". The second quadri-concept shows that the users csmdavis, franny and rossanna shared the tags pop, concert and dance to describe the artists Britney Spears and Madonna in 07/05/10 and then in 02/06/11. We can use such quadri- concept to recommend the users franny and rossanna to the first one, i.e., csmdavis as they share the same interest for both artists using the same tags. It will be also useful to study the evolution of the artist's fans and the vocabulary they used to annotate them through time. In the following, in order to assess the performances of QUADRICONS vs. DATA-PEELER while extracting quadri- concepts, we ran both algorithms on both datasets and we vary the values of minimum thresholds as depicted by Tables IV and V. B. Execution Time Tables IV and V show the different runtimes of the QUADRICONS algorithm vs. those of DATA-PEELER for the different values of quadruples, which grows from 20000 to 95580 for the MOVIELENS dataset and from 40000 to 186479 for the LAST.FM dataset, and for different values of minimum thresholds. We can observe that for both datasets and for all values of the number of quadruples, DATA- PEELER algorithm is far away from QUADRICONS in terms of execution time. QUADRICONS ran until 332 times faster than DATA-PEELER on LAST.FM and until 124 times on MOVIELENS. Indeed, the poor performance flagged out by DATA-PEELER, is explained by the strategy adopted by this later which starts by storing the entire dataset into a binary tree structure, which should facilitate its run and then the extraction of quadri-concepts. However, such structure is absolutely not adequate to support a so highly sized data, which is the case of the real-world large-scale datasets considered in our evaluation. Contrariwise, The main thrust of the QUADRICONS algorithm stands in the localisation of the quadri-generators (QGs), that stand at the "antipodes" of the closures within their respective equivalence classes. Then, in an effort to improve the existing work, our strategy to locate these QGs have the advantage of making the extraction of quadri-concepts faster than its competitor. This is even more significant in the case of our real-world datasets where the number of data reaches thousands. C. Consumed Memory Tables IV and V show the memory consumed by both algorithms on both datasets for the different values of quadruples. We observe that QUADRICONS consumes mem- ory far below its competitor : less than 40000 KB and 20000 KB on both datasets versus millions of KB for DATA PEELER. Such difference is explained by the fact that QUADRICONS, unlike DATA PEELER, does not store in memory before proceeding the extraction the dataset of quadri-concepts. Furthermore, QUADRICONS generates fewer candidates thanks to the clever detection of quadri- generators that reduce the search space significantly. For example, to extract the 167 quadri-concepts from LAST.FM when minsuppu = 3, minsuppt = 2, minsuppr = 1 and minsuppd = 1, QUADRICONS requires only 1754 KB in memory while detecting the 939 quadri-generators of the dataset. However, despite the few number of extracted quadri-concepts, DATA PEELER requires 788021 KB in memory to store the entire dataset before generating candi- dates. Hence, detecting quadri-generators before extracting quadri-concepts allows QUADRICONS consuming until 54 and 115 times less memory than DATA PEELER on respec- tively MOVIELENS and LAST.FM datasets. Y 25000 50000 70000 95580 25000 50000 70000 95580 25000 50000 70000 95580 25000 50000 70000 95580 542 1361 1760 2087 Consumed Memory (kilobytes) DATA QUADRI PEELER CONS (sec) (sec) minsuppu = 3, minsuppt = 2, minsuppr = 1, minsuppd = 1 0. 86 43.10 2. 05 110.72 3. 08 198.33 4. 61 288.00 minsuppu = 2, minsuppt = 2, minsuppr = 2, minsuppd = 1 0. 36 39.98 0. 97 107.71 1 .96 227.65 3. 79 472.87 minsuppu = 2, minsuppt = 2, minsuppr = 1, minsuppd = 1 5.76 421.44 15.92 1269.70 29.22 2037.73 48.92 3478.98 minsuppu = 2, minsuppt = 1, minsuppr = 1, minsuppd = 1 97. 56 1022.12 188. 61 1987.06 263. 63 2876.02 528. 58 5965.94 2491 5246 9845 16556 10982 14671 19548 38762 198 431 567 1182 Consumed Memory (kilobytes) 209843 378907 509541 654761 399672 508943 667006 842551 769822 976200 1153401 1446242 1272988 1561992 1751258 2098452 PERFORMANCES OF QUADRICONS vs. DATA-PEELER ABOVE THE MOVIELENS DATASET. Table IV D. Compacity of Quadri-Concepts Figure 3 shows the number of frequent quadri-concepts versus the number of frequent quadri-sets on both MOVIE- LENS and LAST.FM datasets for the different values of quadruples. We observe that for both datasets, the number of frequent quadri-sets increase massively when the number of quadruples grows. Indeed, frequent quadri-concepts become more large, i.e., containing more users, tags, resources and Y 40000 80000 120000 150000 186479 40000 80000 120000 150000 186479 40000 80000 120000 150000 186479 40000 80000 120000 150000 186479 QUADRI CONS (sec) 177 421 782 1025 1672 114 342 656 1241 1754 Consumed Memory (kilobytes) DATA PEELER (sec) minsuppu = 3, minsuppt = 2, minsuppr = 1, minsuppd = 1 0. 05 7.13 0. 10 28.12 0. 22 61.60 0. 45 119.45 0. 77 255.71 minsuppu = 2, minsuppt = 2, minsuppr = 2, minsuppd = 1 0. 39 32.29 0. 53 57.06 1. 60 182.40 3. 39 354.71 5. 87 496.55 minsuppu = 2, minsuppt = 2, minsuppr = 1, minsuppd = 1 0. 84 51.88 2. 94 201.58 8. 71 487.92 17. 81 1049.34 29. 78 1949.14 minsuppu = 2, minsuppt = 1, minsuppr = 1, minsuppd = 1 2. 91 89.77 6. 87 221.93 21. 87 724.47 46. 52 1524.76 88. 16 3118.85 1876 3891 6789 11342 14562 6724 11562 14345 15623 18976 Consumed Memory (kilobytes) 309453 445431 550932 678542 788021 456323 590012 698672 826862 932871 498672 780762 1198451 1343572 1552789 1008273 1336451 1542006 1772919 2188452 PERFORMANCES OF QUADRICONS vs. DATA-PEELER ABOVE THE LAST.FM DATASET. Table V dates. Thus, such concepts cause the steep increase of frequent quadri-sets. For both datasets, the frequent quadri- concepts represent until 3. 68 % and 28. 99 % of the number of frequent quadri-sets. Hence, computing frequent quadri- sets is a harder task than computing frequent quadri-concepts while providing the same information. VII. CONCLUSION AND PERSPECTIVES In this paper, we considered the quadratic context formally described by a d-folksonomy with the introduction of a new dimension : time stamp. Indeed, we extend the notion of closure operator and tri-generator to the four-dimensional case and we thoroughly studied their theoretical properties. Then, we proposed the QUADRICONS algorithm in order to extract frequent quadri-concepts from d-folksonomies. Several experiments show that QUADRICONS provides an efficient method for mining quadri-concepts in large scale conceptual structures. It is important to highlight that mining quadri-concepts stands at the crossroads of the avenues for future work : (i) analyse evolution of users, tags and [8] F. Lehmann and R. Wille, "A triadic approach to formal Santa Cruz, concept analysis," in Proc. of the 3rd ICCS. California, USA: Springer-Verlag, 1995, pp. 32–43. [9] G. Dong, C. Jiang, J. Pei, J. Li, and L. Wong, "Mining succinct systems of minimal generators of formal concepts," in Proc. of Berlin, the 10th ICDSA, ser. DASFAA'05. Heidelberg: Springer-Verlag, 2005, pp. 175–187. [10] C. Cattuto, C. Schmitz, A. Baldassarri, A. Servedio, V. Loreto, A. Hotho, M. Grahl, and G. Stumme, "Network properties of folksonomies," In Proc. of AICSI on NANSE, Amsterdam, The Netherlands., pp. 245–262, 2007. [11] A. Hotho, R. Jaschke, C. Schmitz, and G. Stumme, "Folkrank : A ranking algorithm for folksonomies," in Proc. of FGIR, Hildesheim, Germany, 2006, pp. 111–114. [12] B. Krause, A. Hotho, and G. Stumme, "A comparison of social bookmarking with traditional search," in Proc. of the 30th ECIR, vol. 4956. Springer, 2008, pp. 101–113. [13] E. Amitay, D. Carmel, M. Herscovici, R. Lempel, and A. Sof- fer, "Trend detection through temporal link analysis," J. Am. Soc. Inf. Sci. Technol., vol. 55, no. 14, pp. 1270–1281, 2004. Schmitz, A. Stumme, Data [14] C. G. 2002, http://www.springerlink.com/index/gmv832553g0x3673.pdf and no. Available: Science and Classification, pp. 261–270, 2006. [Online]. Hotho, R. Jschke, [15] S. Siersdorfer and S. Sizov, "Social recommender systems for web 2.0 folksonomies," in Proc. of the 20th ACM conference on HT, New York, NY, USA, 2009, pp. 261–270. [16] S. Golder and B. A. Huberman, "The structure of collabo- rative tagging systems," Journal of Information Science, pp. 198–208, 2006. [17] A. Hotho, R. Jaschke., C. Schmitz, and G. Stumme, "Trend detection in folksonomies," in Proc. of the 1st SAMT, ser. LNCS, vol. 4306. Athens, Greece: Springer, 2006, pp. 56– 70. [18] M. Dubinko, R. Kumar, J. Magnani, J. Novak, P. Raghavan, and A. Tomkins, "Visualizing tags over time," ACM Trans. Web, vol. 1, no. 2, pp. 193–202, 2007. [19] G. Voutsadakis, "Polyadic concept analysis," Order, vol. 19, no. 3, pp. 295–304, 2002. Figure 3. Number of frequent quadri-concepts vs. number of frequent quadri-sets on both datasets. (Top) LAST.FM (Bottom) MOVIELENS resources through time, (ii) define the quadratic form of association rules according to quadri-concepts. REFERENCES [1] P. Mika, "Ontologies are us: A unified model of social networks and semantics," Web Semantics., vol. 5, no. 1, pp. 5–15, 2007. [2] R. Jaschke, A. Hotho, C. Schmitz, B. Ganter, and G. Stumme, "Discovering shared conceptualizations in folksonomies," Web Semantics., vol. 6, pp. 38–53, 2008. [3] L. Ji, K.-L. Tan, and A. K. H. Tung, "Mining frequent closed cubes in 3d datasets," in Proc. of VLDB 2006, Seoul, Korea, 2006, pp. 811–822. [4] L. Cerf, J. Besson, C. Robardet, and J.-F. Boulicaut, "Closed patterns meet n-ary relations," ACM TKDD, vol. 3, pp. 3:1– 3:36, March 2009. [20] K. Biedermann, "Triadic galois connections," in General algebra and applications in discrete mathematics, 1997, pp. 23–33. [5] C. Trabelsi, N. Jelassi, and S. Ben Yahia, "Scalable mining of frequent tri-concepts," in Proc. of The 15th PAKDD, 2012, pp. 231–242. [21] A. Couch and M. Chiarini, "A theory of closure operators," in Proc. of the 2nd AIMS. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 162–174. [6] R. Agrawal and R. Srikant, "Mining sequential patterns," in Proc. of the ICDE, ser. ICDE '95. Washington, DC, USA: IEEE Computer Society, 1995, pp. 3–14. [22] I. Cantador, P. Brusilovsky, and T. Kuflik, "2nd workshop on information heterogeneity and fusion in recommender systems," in Proc. of the 5th ACM RecSys, NY, USA, 2011. [7] B. Ganter and R. Wille, Formal Concept Analysis. Springer, Heidelberg, 1999. A scalable mining of frequent quadratic concepts in d-folksonomies Submitted for Blind Review 2 1 0 2 c e D 1 ] I S . s c [ 1 v 7 8 0 0 . 2 1 2 1 : v i X r a Abstract-Folksonomy mining is grasping the interest of web 2.0 community of as far user as freely tag resources. However, a scrutiny of the related work unveils that the time stamp dimension has not been considered. For example, the wealthy number of works dedicated to mining tri-concepts from folksonomies did not take into account time dimension. In this paper, we will consider a folksonomy commonly composed of triples <users, tags, resources> and we shall consider the time as a new dimension. We motivate our approach by highlighting the battery of potential applications and we introduce a new algorithm, called QUADRICONS, as an extension of TRICONS dedicated to the triadic contexts. QUADRICONS aims at getting out quadratic concepts, i.e., quadri-concepts from quadratic contexts. We also introduce a new closure operator that splits the induced search space into equivalence classes whose smallest elements are the quadri-minimal generators. Carried out experiments on large-scale real-world snapshots of social networks highlight very interesting results about analyzing trend detection in folksonomies starting from quadri-concepts. Keywords-Quadratic Context; Formal Concept Analysis; Quadratic Concepts; Folksonomies; algorithm I. INTRODUCTION -FCA extended depuis 95 au Triadic Concept Analysis : not much attention -¿ coming of folksonomies -Folksonomy (definition informelle, rise of folk) / web 2.0 [1] Folksonomy (from folk and taxonomy) is a neologism for a practice of collaborative categorization using freely chosen keywords. Folksonomies (also called social tagging mechanisms) have been implemented in a number of online knowledge sharing environments since the idea was first adopted by social book- marking site del.icio.us in 2004. The idea of a folksonomy is to allow the users to describe a set of shared objects with a set of keywords of their own choice. -folksonomy mining -¿ triconcepts : repre.condense des folk tricons les surpasse -timestamp forgot:importance du temps en 1 frase Time is considered one of the most important factors in detecting emerging subjects. -in this paper, confluence of both lines of research : FCA (cas 4-aire:QCA) + mining sequential patterns, donner exemple de harry potter The remainder of the paper is organized as follows. Section 2 recalls the key notions used throughout this paper. We thoroughly study the related work in Section 3. In Section 4, we introduce a new closure operator for the quadratic context as well as the QUADRICONS algorithm dedicated to the extraction of frequent quadri-concepts. In Section 5, carried out experiments about performances of our algorithm and analyzing trend detections. Finally, we conclude the paper with a summary and we sketch some avenues for future works in Section 6. II. MOTIVATION : CONCEPTUAL AND TEMPORAL CLUSTERING OF FOLKSONOMIES The immediate success of social networks, i.e., social resource sharing systems is due to the fact that no specific skills are needed for participating. Each individual user is able to share a web page1, a personal photo2, an artist he like3 or a movie he watched4 without much effort. The core data structure of such systems is a folkson- omy. It consists of three sets U, T, R of users assigning tags to resources as well as a ternary relation Y between them. To allow conceptual and temporal clustering from folksonomies, an additional dimension is needed : time. Within this new dimension, our goal is to detect hidden sequential conceptualizations in folksonomies. An exemple of such a concept is that users which tagged "Harry Potter" will tag "The Prisoner of Azkaban" and then tag "The Order of the Phoenix", probably with the same tags. Our algorithm solves the problem of frequent closed patterns mining for this kind of data. It will return a set of (frequent) quadruples, where each quadruple (U, T, R, D) consists of a set U of users, a set T of tags, a set R of resources and a set D of dates. These quadruples, called (frequent) quadri-concepts, have the property that each user in U has tagged each resource in R with all tags from T at the different dates from D, and that none of these sets can be extended without shrinking one of the other three dimensions. Hence, they represent the four- dimensional extension of tri-concepts. Moreover, we can add minimum support constraints on each of the four dimensions in order to focus on the largest concepts of the folksonomy, i.e., by setting higher values of minimum supports. III. THE PROBLEM OF MINING ALL FREQUENT QUADRI-CONCEPTS In this section, we formalize the problem of mining all frequents quadri-concepts. We start with an adaptation of the notion of folksonomy to the quadratic context. Definition 1: (D-FOLKSONOMY) A d-folksonomy is a set of tuples Fd = (U, T , R, D, Y) where U, T , R and D are 1http://del.icio.us 2http://flickr.com 3http://last.fm 4http://movielens.org finite sets which elements are called users, tags, resources and dates. Y ⊆ U × T × R × D represents a quaternary relation which each y ⊆ Y can be represented by a quadruple : y = {(u, t, r, d) u ∈ U, t ∈ T , r ∈ R, d ∈ D} which means that the user u has annoted the resource r using the tag t at the date d. Example 1: Table I depicts an example of a d-folksonomy Fd with U = {u1, u2, u3, u4}, T = {t1, t2, t3}, R = {r1, r2} and D = {d1, d2}. Each cross within the quaternary relation indicates a tagging operation by a user from U, a tag from T and a resource from R at a date from D, i.e., a user has tagged a particular resource with a particular tag at a date d. For example, the user u1 has tagged the resource r1 with the tags t1, t2 and t3 at the date d1. Fd R D d1 d2 U/T u1 u2 u3 u4 u1 u2 u3 u4 r1 t2 t3 t1 r2 t2 t1 t3 × × × × × × × × × × × × × × × × × × × × × × × × × × × × Table I A d-folksonomy. × × The following definition introduces a (frequent) quadri- set. Definition 2: (A (FREQUENT) QUADRI-SET) Let Fd = (U, T , R, D, Y) be a d-folksonomy. A quadri-set of Fd is a quadruple (A, B, C, E) with A ⊆ U, B ⊆ T , C ⊆ R and E ⊆ D such as A × B × C × E ⊆ Y. D-Folksonomies have four dimensions which are com- pletely symmetric. Thus, we can define minimum support thresholds on each dimension. Hence, the problem of mining frequent quadri-sets is then the following: Problem 1: (Mining all frequent quadri-sets) Let Fd = (U, T , R, D, Y) be a d-folksonomy and let minsuppu, minsuppt, minsuppr and minsuppd be user-defined mini- mum thresholds. The task of mining all frequent quadri-sets consists in determing all quadri-sets (A, B, C, E) of Fd with A ≥ minsuppu, B ≥ minsuppt, C ≥ minsuppr and E ≥ minsuppd. Our thresholds are antimonotonic constraints : If (A1, B1, C1, E1) with A1 being maximal for A1 × B1 × C1 × E1 ⊆ Y is not u-frequent5 then all (A2, B2, C2, E2) with B1 ⊆ B2 and C1 ⊆ C2 are not u-frequent either. The same holds symmetrically for the other two dimensions. In [2], the au- thors demonstrate that above the two-dimensional case, the direct symmetry between monotonicity and antimonotonicity breaks. Thus, they introduced a lemma which results from 5with regard to the users dimension. the triadic Galois connection [?] induced by a triadic context. In the following, we adapt that lemma to our quadratic case. Lemma 1: Let (A1, B1, C1, E1) and (A2, B2, C2, E2) be quadri-sets with Ai being maximal for Ai × Bi × Ci × Ei ⊆ Y, for i = 1, 2. If B1 ⊆ B2, C1 ⊆ C2 and E1 ⊆ E2 then A2 ⊆ A1. The same holds symmetrically for the other three directions. In the sequel, the inclusion (A1, B1, C1, E1) ⊆ (A2, B2, C2, E2) holds if and only if B1 ⊆ B2, C1 ⊆ C2, E1 ⊆ E2 and A2 ⊆ A1 . Example 2: Let Fd be the d-folksonomy of Table I and let S1 = {{u3, u4}, t3, {r1, r2}, {d1, d2}} and S2 = {{u1, u3, u4}, {t2, t3}, {r1, r2}, d1} be two quadri-sets of Fd. We have S1 ⊆ S2 since {u3, u4} ⊆ {u1, u3, u4}, t3 ⊆ {t2, t3}, {r1, r2} ⊆ {r1, r2} and d1 ⊆ {d1, d2}. As the set of all frequent quadri-sets is highly redundant, we consider a specific condensed representation, i.e., a subset which contains the same information : the set of all frequent quadri-concepts. The latter's definition is given as follows : Definition 3: ((FREQUENT) QUADRATIC CONCEPT) A quadratic concept (or a quadri-concept for short) of a d- folksonomy Fd = (U, T , R, D, Y) is a quadruple (U , T , R, D) with U ⊆ U, T ⊆ T , R ⊆ R and D ⊆ D with U × T × R × D ⊆ Y such that the quadruple (U , T , R, D) is maximal, i.e., none of these sets can be extended without shrinking one of the other three dimensions. A quadri- concept is said to be frequent whenever it is a frequent quadri-set. Problem 2: (Mining all frequent quadri-concepts) Let Fd = (U, T , R, D, Y) be a d-folksonomy and let minsuppu, minsuppt, minsuppr and minsuppd be user-defined min- imum thresholds. The task of mining all frequent quadri- concepts consists in determing all quadri-concepts (U , T , R, D) of Fd with U ≥ minsuppu, T ≥ minsuppt, R ≥ minsuppr and D ≥ minsuppd. The set of all frequent quadri-concepts of Fd is equal to QC = {QC QC = (U , T , R, D) is a frequent quadri-concept}. Remark 1: It is important to note that the extracted repre- sentation of quadri-concepts is information lossless. Hence, after solving Problem 2, we can easily solve the Problem 1 by enumerating all quadri-sets (A, B, C, E) such as it exists a frequent quadri-concept (U , T , R, D) such as A ⊆ U , B ⊆ T , C ⊆ R, E ⊆ D and A ≥ minsuppu, B ≥ minsuppt, C ≥ minsuppr and E ≥ minsuppd. In the remainder, we will scrutinize the state-of-the-art propositions aiming to mine quadratic concepts from d- folksonomies. IV. RELATED WORK -voutsadakis -datapeeler sans critiques!!!(laisser pr comparaison) In [3], Voutsadakis generalized the constructs and results of Wille [2] to the n-adic contexts. The author gives a definition of an n-adic concept as well as that of a complete n-lattice of a n-adic context. Moreover, it was shown that the n-adic concepts of an n-adic context K form a complete n- lattice with respect to component-wise defined quasi-orders. To illustrate those new definitions, Voutsadakis gives an example of quadratic concepts and their associated com- plete Boolean 4-lattice. Despite robust theoretical study, no algorithm has been proposed by Voutsadakis for an efficient extraction of quadratic concepts. In addition, despite that of a n-adic concept, no basic notion of data mining (minimal generator, equivalence class, etc.) was adapted to the n-adic context. Finally, no potential applications were proposed in order to illustrate the usefulness of such concepts. Recently, Cerf et al. proposed the DATA-PEELER algorithm [4] which is able to extract all closed concepts from n-ary relations. It enumerates all the n-dimensional closed patterns in a depth first manner using a binary tree enumeration strategy. When n = 4, the DATA-PEELER algorithm is able to extract quadratic concepts. However, DATA-PEELER is hampered by the large number of elements that may contain any of the dimensions and its strategy becomes ineffective and leads to a complex computation of n-adic concepts. In the following, we review some approaches dealing with trend detection in folksonomies which illustrates the usefulness of the quadratic concepts and the consideration of the time dimension in folksonomies. V. THE QUADRICONS ALGORITHM FOR MINING ALL FREQUENT QUADRI-CONCEPTS A. Main Notions of QUADRICONS Before introducing our closure operator for a d- folksonomy, we define a closure operator of a n-adic context. In [5], Voutsadakis define n-closure operators for a n-adic context. Each i-closure operator aims to compute the closed part related to the dimension i for a given n-set (1 ≤ i ≤ n). In what follows, we introduce a new closure operator h which is able to compute the closure of a given n-set. Contrariwise to [5], we use a single closure operator that computes a single time all closed parts of the resulting n- adic concept. Definition 4: (CLOSURE OPERATOR OF A n-ADIC CON- TEXT) Let S = (S1, S2, . . ., Sn) be a n-set, with S1 being maximal for S1 × . . . × Sn ⊆ Y, of a n-adic context Kn with n dimensions, i.e., Kn = (D1, D2, . . ., Dn, Y). A mapping h is defined as follows : h(S) = h(S1, S2, . . ., Sn) = (C1, C2, . . ., Cn) such as : C1 = S1 ∧ C2 = {C i 3 ∈ S3, . . ., ∀ ci n) ∈ Y ∀ ci 2 ∈ D2 (ci 3, . . ., ci n ∈ Sn} 1 ∈ C1, 1, C i 2, ci ∀ ci ... ∧ Cn = {C i C1, . . . ∀ ci n ∈ Dn (ci n−1 ∈ Cn−1} 1, ci 2, . . ., ci n−1, C i n) ∈ Y ∀ ci 1 ∈ Proposition 1: h is a closure operator. Proof: To prove that h is a closure operator, we have to prove that this closure operator fulfills the three properties of extensivity, idempotency and isotony [6]. 2 ∈ D2 (ci 3 ∈ S3, . . ., ∀ ci (1) Extensivity : Let S = (S1, S2, . . ., Sn) be a n-set of Kn ⇒ h(S) = (C1, C2, . . ., Cn) such that : C1 = S1, C2 = {C i 1, C i 1 ∈ C1, n ∈ Sn} ⊇ S2 since C1 ⊇ S1 since ∀ ci n−1, C i n) 1, ci C1 = S1 , . . ., Cn = {C i ∈ Y ∀ ci n−1 ∈ Cn−1} ⊇ Sn since C1 = S1, C2 ⊇ S2, . . ., Cn−1 ⊇ Sn−1. Then, C1 = S1 and Si ⊆ Ci for i = 2, . . . n ⇒ S ⊆ h(S) (cf., Lemma 1) n ∈ Dn (ci 2 ∈ C2, . . . ∀ ci n) ∈ Y ∀ ci 1 ∈ C1, ∀ ci 3, . . ., ci 2, . . ., ci 2, ci 1, C i′ 1, C′ 2 , ci 2, . . ., C′ 3, . . ., ci n) such that : C′ n) ∈ Y ∀ ci (2) Idempotency : Let S = (S1, S2, . . ., Sn) be a n-set of Kn ⇒ h(S) = (C1, C2, . . ., Cn) ⇒ h(C1, C2, . . ., Cn) 2 = {C i′ = (C′ 2 ∈ D2 3 ∈ S3, . . ., ∀ ci (ci n 1 , ci′ n ∈ Dn (ci′ ∈ Sn} = C2 since C1 = S1, . . ., C′ 2 , . . ., ci′ 2, . . . ∀ ci′ n−1 ∈ C′ n−1 i = Ci for i = 1, . . . n ⇒ h(h(S)) = h(S) = Cn−1. Then, C′ 1 ∈ C′ n−1} = Cn since we have C′ 1 = C1, C′ 1 ∈ C1, ∀ ci n = {C i′ 2 ∈ C′ 1, ∀ ci′ 1 = C1, C′ 2 = C2, . . ., C′ n ) ∈ Y ∀ ci′ n−1, C i′ n) be two n-sets of Kn with S ⊆ S′, i.e., S′ (3) Isotony : Let S = (S1, S2, . . ., Sn) and S′ = (S′ 2, 1, S′ 1 ⊆ S1 i for i = 2, . . . n (cf., Lemma 1). We have h(S) n) such that . . ., S′ and Si ⊆ S′ = (C1, C2, . . ., Cn) and h(S′) = (C′ : 2, . . ., C′ 1, C′ 1 ⊆ S1 ⇒ C′ 2, ci 1 and S′ 3, . . ., ci 1, C i n ∈ Sn} and C′ n) ∈ Y ∀ ci 1 ∈ C1, ∀ ci 2 since Si ⊆ S′ • C1 = S1, C′ • C2 = {C i 1 = S′ 3, . . ., ci 2 ∈ D2 (ci 3 ∈ S3, . . ., ∀ ci 2 , ci ∀ ci C i′ ∈ Sn} ⇒ C2 ⊆ C′ C′ ... 1 ⊆ C1. (cf., Lemma 1) 1 ⊆ C1 2 = {C i′ n) ∈ Y ∀ ci 1 ∈ C1, 2 ∈ D2 (ci 1, 3 ∈ S3, . . ., ∀ ci n i for i = 3, . . . n and • Cn = {C i 1, ci n ∈ Dn (ci 2 ∈ C2, . . . ∀ ci 2 , . . ., ci′ n−1 ∈ C′ 2, . . ., Cn−1 ⊆ C′ C1, ∀ ci ∈ Dn (ci′ ∈ C′ C1, C2 ⊆ C′ 1 , ci′ 2, . . . ∀ ci′ n−1, C i 2, . . ., ci n−1 ∈ Cn−1} and C′ n) ∈ Y ∀ ci n ) ∈ Y ∀ ci′ n−1, C i′ n−1} ⇒ Cn ⊆ C′ 1 ∈ C′ n since C′ n−1. (cf., Lemma 1) 1 ∈ n = {C i′ 1, ∀ ci′ 2 1 ⊆ n Then, C′ 1 ⊆ C1 and Ci ⊆ C′ i for i = 2, . . . n ⇒ h(S) ⊆ h(S′). According to (1), (2) and (3), h is a closure operator. For n=4, we instanciate the closure operator of a quadratic context, i.e., a d-folksonomy as follows : OPERATOR Definition 5: (CLOSURE D- FOLKSONOMY) Let S = (A, B, C, E) be a quadri-set of Fd with A being maximal for A × B × C × E ⊆ Y. The closure operator h of a d-folksonomy Fd is defined as follows: OF A h(S) = h(A, B, C, E) = (U , T , R, D) U = A ∧ T = {ti ∈ T (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ri ∈ C, ∀ di ∈ E} ∧ R = {ri ∈ R (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈ T , ∀ di ∈ E} ∧ D = {di ∈ D (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈ T , ∀ ri ∈ R} Remark 2: Roughly speaking, h(S) computes the largest quadri-set in the d-folksonomy Fd which contains maximal sets of tags, resources and dates shared by a group of users. The application of the closure operator h on a quadri-set gives rise to a quadri-concept QC = (U , T , R, D). In the remainder of the paper, the U , R, T and D parts are respec- tively called Extent, Intent, Modus and Variable. Like the dyadic and triadic case, the closure operator splits the search space into equivalence classes, that we introduce in the following : Definition 6: (EQUIVALENCE CLASS) Let S1 = (A1, B1, C1, E1), S2 = (A2, B2, C2, E2) be two quadri-sets of Fd and QC be a frequent quadri-concept. S1 and S2 belong to the same equivalence class represented by the quadri-concept QC, i.e., S1 ≡QC S2 iff h(S1) = h(S2) = QC. Figure 1. Example of an equivalence class extracted from the d-folksonomy depicted by Table I Minimal Generators (MGs) have been shown to play an important role in many theoretical and practical problem settings involving closure systems. Such minimal generators can offer a complementary and simpler way to understand the concept, because they may contain far fewer attributes than closed concepts. Indeed, MGs represent the smallest elements within an equivalence class. Complementary to closures, minimal generators provide a way to characterize formal concepts [7]. In the following, we introduce an extension of the definition of a MG to the d-folksonomy. Definition 7: (QUADRI-MINIMAL GENERATOR) Let g = (A, B, C, E) be a quadri-set of Fd such as A ⊆ U, B ⊆ T , C ⊆ R and E ⊆ D and QC ∈ QC. The quadruple g is a quadri-minimal generator (quadri-generator for short) of QC iff h(g) = QC and ∄ g1 = (A1, B1, C1, E1) such as : 1) A = A1, 2) (B1 ⊆ B ∧ C1 ⊆ C ∧ E1 ⊂ E) ∨ (B1 ⊆ B ∧ C1 ⊂ C ∧ E1 ⊆ E), and 3) h(g) = h(g1) = QC. Example 3: Let us consider the d-folksonomy Fd shown in Table I. Figure 1 shows an example of an equiva- lence class. For example, we have h(g1={{u1, u2, u3}, t3, r1, d1}) = {{u1, u2, u3}, {t2, t3, t4}, r1, {d1, d2}} = QC such as g1 is a quadri-generator. Thus, QC is the quadri-concept of this equivalence class. The largest unsubsumed quadri-set QC has two quadri-generators g1 and g2. However, g3 = {{u1, u2, u3}, {t3, t4}, r1, d1} is not a quadri-generator of QC since it exists g1 such as g1.extent=g3.extent, g1.intent = g3.intent ∧ g1.modus ⊂ g3.modus ∧ g1.variable = g3.variable. Based on those new introduced notions, we propose in the following our new QUADRICONS algorithm for a scalable mining of frequent quadri-concepts from a d-folksonomy. B. The QUADRICONS Algorithm In the following, we introduce a test-and-generate algo- rithm, called QUADRICONS, for mining frequent quadri- concepts from a d-folksonomy. Since quadri-generators are minimal keys of an equivalence class, their detection is largely eased. QUADRICONS operates in four steps as follows : the FINDMINIMALGENERATORS procedure as a first step for the extraction of quadri-generators. Then, the ClosureCompute procedure is invoked for the three next steps in order to compute respectively the modus, intent and variable parts of quadri-concepts. The pseudo code of the QUADRICONS algorithm is sketched by Algorithm 1. QUADRICONS takes as input a d-folksonomy Fd = (U, T , R, D, Y) as well as four user-defined thresholds (one for each dimension) : minsuppu, minsuppt, minsuppr and minsuppd. The output of the QUADRICONS algorithm is the set of all frequent quadri-concepts that fulfill these thresholds. QUADRICONS works as follows : it starts by invoking the FINDMINIMALGENERATORS procedure (Step 1), which pseudo-code is given by Algorithm 2, in order to extract the quadri-generators stored in the set MG (Line 3). For such extraction, FINDMINIMALGENERATORS computes for each triple (t, r, d) the set Us representing the maximal set of users sharing both tag t and resource r at the date d (Algorithm 2, Line 3). If Us is frequent w.r.t minsuppu (Line 4), a quadri-generator is then created (if it does not already exist) with the appropriate fields (Line 5). Algorithm 2 invokes the ADDQUADRI function which adds the quadri- generator g to the set MG (Line 7). Hereafter, QUADRICONS invokes the ClosureCompute procedure (Step 2) for each quadri-generator of MG (Lines 5-7), which pseudo-code is given by Algorithm 3 : the aim is to compute the modus part of each quadri-concept. At this point, the two first cases of Algorithm 3 (Lines 3 and 6) have to be considered w.r.t the extent of each quadri-generator. The ClosureCompute procedure returns the set QS formed by quadri-sets. The indicator flag (equal ALGORITHM 3 : ClosureCompute Data : 1) SIN : The set of frequent quadri-generators/quadri-sets. 2) minu, mint, minr : User-defined thresholds of extent, modus and intent support. 3) q : A quadri-generator/quadri-set. SOU T : {The set of frequent quadri-sets/quadri-concepts}. 4) i : an indicator. Results : SOU T : {The set of frequent quadri-sets/quadri-concepts}. Begin Foreach quadri-set q′ ∈ SIN do If i=1 and q.intent = q′.intent and q.extent ⊆ q′.extent then s.intent = q.intent;s.extent = q.extent;s.variable = q.variable;s.modus = q.modus ∪ q′.modus; ADDQUADRI(SOU T , s); End Else if i=1 and q.intent = q′.intent and q and q′ incomparable then g.extent = q.extent ∩ q′.extent; g.modus = q.modus ∪ q′.modus; g.intent = q.intent; g.variable = q.variable; If g.extent ≥ minu then ADDQUADRI(MG, g); End Else if i=2 and q.extent ⊆ q′.extent and q.modus ⊆ q′.modus and q.intent 6= q′.intent then QC.extent = q.extent; QC.modus = q.modus; QC.variable = q.variable; QC.intent = q.intent ∪ q′.intent; ADDQUADRI(SOU T , QC); End Else if i=2 and q and q′ incomparable then s.extent = q.extent ∩ q′.extent; s.modus = q.modus ∩ q′.modus; s.variable = q.variable; s.intent = q.intent ∪ q′.intent; If s.extent ≥ minu and s.modus ≥ mint then ADDQUADRI(SOU T , s); End Else if i=3 and q.extent ⊆ q′.extent and q.modus ⊆ q′.modus and q.intent ⊆ q′.intent and q.variable 6= q′.variable then QC.extent = q.extent; QC.modus = q.modus; QC.intent = q.intent; QC.variable = q.variable ∪ q′.variable; ADDQUADRI(SOU T , QC); End Else if i=3 and q and q′ incomparable then s.extent = q.extent ∩ q′.extent; s.modus = q.modus ∩ q′.modus; s.intent = q.intent ∩ q′.intent; s.variable = q.variable ∪ q′.variable; If s.extent ≥ minu and s.modus ≥ mint and s.intent ≥ minr then ADDQUADRI(SOU T , s); End end End return SOU T ; 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ALGORITHM 1 : QUADRICONS Data : 1) Fd (U, T , R, D, Y) : A d-folksonomy. 2) minsuppu, minsuppt, minsuppr, minsuppd : User-defined thresholds. Results : QC : {Frequent quadri-concepts}. Begin /*Step 1 : The extraction of quadri-generators*/ FINDMINIMALGENERATORS(Fd, MG, minsuppu); /*Step 2 : The computation of the modus part*/ Foreach quadri-gen g ∈ MG do ClosureCompute(MG, minsuppu, minsuppt, minsuppr, g, QS, 1); end PRUNEINFREQUENTSETS(QS,minsuppt); /*Step 3 : The computation of the intent part*/ Foreach quadri-set s ∈ QS do ClosureCompute( QS, minsuppu, minsuppt, minsuppr, s, QC, 2); end PRUNEINFREQUENTSETS(QC,minsuppr); /*Step 4 : The computation of the variable part*/ Foreach quadri-set s ∈ QS do ClosureCompute( QS, minsuppu, minsuppt, minsuppr, s, QC, 3); end PRUNEINFREQUENTSETS(T C,minsuppd); End return QC ; ALGORITHM 2 : FINDMINIMALGENERATORS Data : 1) MG : The set of frequent quadri-generators. 2) Fd (U, T , R, D, Y) : A d-folksonomy. 3) minsuppu : User-defined threshold of user's support. Results : MG : {The set of frequent quadri-generators}. Begin Foreach triple (t,r,d) of Fd do Us= {ui ∈ U (ui, t, r, d) ∈ Y} ; If Us ≥ minsuppu then g.extent = Us; g.intent = r; g.modus = t; g.variable = d If g 6∈ MG then ADDQUADRI(MG, g) End End end End return MG ; 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 11 12 to 1 here) marked by QUADRICONS shows if the quadri- set considered by the ClosureCompute procedure is a quadri-generator. In the third step, QUADRICONS invokes a second time the ClosureCompute procedure for each quadri-set of QS (Lines 9-11), in order to compute the intent part. ClosureCompute focuses on quadri-sets of QS having different intent parts (Algorithm 3, Line 9). The fourth and final step of QUADRICONS invokes a last time the ClosureCompute procedure with an in- dicator equal to 3. This will allow to focus on quadri- sets having different variable parts before generating quadri-concepts. QUADRICONS comes to an end after this step and returns the set of the frequent quadri-concepts which fulfills the four thresholds minsuppu, minsuppt, minsuppr and minsuppd. The QUADRICONS algorithm invokes the PRUNEINFREQUENTSETS function (Lines 8, 13 and 18) in order to prune infrequent quadri-sets/concepts, i.e., whose the modus/intent/variable cardinality does not fulfill the aforementioned thresholds. C. Structural properties of QUADRICONS Proposition 2: The QUADRICONS algorithm is correct and complete.It retrieves accurately all the frequent quadri- concepts. Proof: Proposition 3: The QUADRICONS algorithm terminates. Proof: Theoretical Complexity issues: D. Illustrative example Consider the d-folksonomy depicted by Table I, with minsuppu = 2, minsuppt = 2, minsuppr = 1 and minsuppd = 1. Figure 2 sketches the execution trace of QUADRICONS above this context. As described above, QUADRICONS operates in four steps : Step 1 The first step of QUADRICONS involves the extrac- tion of quadri-generators (QGs) from the context. QGs are maximal sets of users following a triple of tag, resource and date. Thus, the eleven QGs that fulfill the minimum threshold minsuppu are described by Figure 2 (Step 1). Step 2 Next, QUADRICONS invokes the CLOSURECOM- PUTE procedure a first time on the quadri- generators allowing the computation of the modus part of such candidates. For example, since the extent part of {{u1, u2, u4}, t1, r1, d1} is included into that of {{u1, u2, u3, u4}, t2, r1, d1}, the modus part of the first QG will be equal to {t1, t2}. Moreover, new QGs can be created from the intersection of the first ones (see Algorithm 3, Line xx) : it is the case of the two QGs (a) and (b) (cf., Figure 2, 2). Finally, candidates that not fulfill the minimum threshold minsuppt are pruned (cf., the three last ones). Step 3 Then, QUADRICONS proceeds at the computation of the intent part of each candidate within a second call to the CLOSURECOMPUTE procedure. For example, the candidate {{u1, u2, u4}, {t1, t2}, r1, d1} has an extent, modus and variable included or equal into those of the candidate {{u1, u2, u4}, {t1, t2}, r2, d1}. Then, its intent will be equal to {r1, r2}. At this step, four candidates fulfill the minimum thresholds over the intent part (Figure 2,Step 3). By merging comparable candidates, this step allow reducing at the same time their number. Step 4 Via a last call to the CLOSURECOMPUTE proce- dure, QUADRICONS computes the variable part of each candidate while pruning infrequent ones. Since the candidate {{u1, u2}, {t1, t2}, r1, d2} has an extent, modus and intent included into those of {{u1, u2, u4}, {t1, t2}, {r1, r2}, d1}6, its variable will be equal to {d1, d2}. After the Step 4, QUADRICONS terminates. The four frequent quadri-concepts given as output are : 1) {{u1, u2, u4}, {t1, t2}, {r1, r2}, d1} 2) {{u1, u3, u4}, {t2, t3}, {r1, r2}, d1} 3) {{u1, u4}, {t1, t2, t3}, {r1, r2}, d1} 4) {{u1, u2}, {t1, t2}, r1, {d1, d2}} VI. EVALUATION AND DISCUSSION In this section, we show through extensive carried out experiments, the assessment of the QUADRICONS perfor- mances vs. DATA-PEELER. We also put the focus on the differences between the consumed memory of both al- gorithms. Moreover, we compare the number of frequent quadri-concepts versus the number of frequent quadri-sets in order to assess the compacity of the extracted representation. We have applied our experiments on two real-world datasets described in the following. Statistics about these snapshots are summarized into Table II. MOVIELENSMOVIELENS (http://movielens.org) is a movie rec- ommendation website. Users are asked to note movies they like and dislike. The MOVIELENS dataset used for our experiments is freely down- loadable [8]. LAST.FMLast.fm (http://last.fm) is a music website, founded in 2002. It has claimed 30 million active users in March 2009. The LAST.FM dataset used for our experiments is freely downloadable [8]. Table III shows two examples of frequent quadri-concepts extracted from the MOVIELENS and LAST.FM datasets. The 6Concretely, it means that the users u1 and u2 which shared the resource r1 with the tags t1 and t2 at the date d2 also shared it at the date d1. # Type # Quadruples # Users # Tags # Resources # Dates (timestamps) Dataset 1 (MOVIELENS) Dense 95580 4010 15227 11272 (movies) 81601 Dataset 2 (LAST.FM) Sparse 186479 1892 9749 12523 (artists) 3549 CHARACTERISTICS OF THE CONSIDERED SNAPSHOTS. Table II Datasets MOVIELENS Dates 03/12/2005 16/07/2006 21/02/2008 Users Tags krycek maria kids fantasy darkness magic Resources Harry Potter The Prisoner of Azkaban The Order of the Phoenix LAST.FM 07/05/2010 02/06/2011 csmdavis franny rossanna pop concert dance Britney Spears Madonna EXAMPLES OF FREQUENT QUADRI-CONCEPTS OF MOVIELENS AND Table III LAST.FM. first one depicts that the users krycek and maria used the tags kids, fantasy, darkness and magic to annote the movie Harry Potter and its sequels successively in 03/12/2005, in 16/07/2006 and then in 21/02/2008. Such concept may be exploited further for recommanding tags for that movie or analyze the evolution of tags associated to "Harry Potter". The second quadri-concept shows that the users csmdavis, franny and rossanna shared the tags pop, concert and dance to describe the artists Britney Spears and Madonna at two different dates. We can use such quadri-concept to recommand the users franny and rossanna to the first one, i.e., csmdavis as they share the same interest for both artists using the same tags. A. Execution Time B. Consumed Memory C. Compacity of Quadri-Concepts VII. CONCLUSION AND PERSPECTIVES -ccl -persp REFERENCES [1] P. Mika, "Ontologies are us: A unified model of social net- works and semantics," Web Semantics., vol. 5, no. 1, pp. 5–15, 2007. Figure 2. Example of an equivalence class extracted from the d-folksonomy depicted by Table I [7] G. Dong, C. Jiang, J. Pei, J. Li, and L. Wong, "Mining succinct systems of minimal generators of formal concepts," in Proc. of the 10th ICDSA, ser. DASFAA'05. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 175–187. [8] I. Cantador, P. Brusilovsky, and T. Kuflik, "2nd workshop on information heterogeneity and fusion in recommender sys- tems," in Proc. of the 5th ACM RecSys, NY, USA, 2011. [2] F. Lehmann and R. Wille, "A triadic approach to formal Santa Cruz, concept analysis," in Proc. of the 3rd ICCS. California, USA: Springer-Verlag, 1995, pp. 32–43. [3] G. Voutsadakis, "Polyadic concept analysis," Order, vol. 19, no. 3, pp. 295–304, 2002. [4] L. Cerf, J. Besson, C. Robardet, and J.-F. Boulicaut, "Closed patterns meet n-ary relations," ACM TKDD, vol. 3, pp. 3:1– 3:36, March 2009. [5] G. Voutsadakis, "n-closure systems and n-closure operators," Algebra Universalis, vol. 55, no. 2, pp. 369–386, 2006. [6] A. Couch and M. Chiarini, "A theory of closure operators," in Proc. of the 2nd AIMS. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 162–174. # Quadruples # Quadruples Minimum QUADRICONS Thresholds QUADRICONS DATA PEELER Minimum QUADRICONS Thresholds QUADRICONS DATA PEELER Minimum QUADRICONS Thresholds QUADRICONS DATA PEELER PERFORMANCES OF QUADRICONS vs. DATA-PEELER ABOVE THE MOVIELENS AND LAST.FM DATASETS. Table IV
1511.01964
1
1511
2015-11-06T01:05:23
Network comparison using directed graphlets
[ "cs.SI", "physics.soc-ph", "q-bio.MN" ]
With recent advances in high-throughput cell biology the amount of cellular biological data has grown drastically. Such data is often modeled as graphs (also called networks) and studying them can lead to new insights into molecule-level organization. A possible way to understand their structure is by analysing the smaller components that constitute them, namely network motifs and graphlets. Graphlets are particularly well suited to compare networks and to assess their level of similarity but are almost always used as small undirected graphs of up to five nodes, thus limiting their applicability in directed networks. However, a large set of interesting biological networks such as metabolic, cell signaling or transcriptional regulatory networks are intrinsically directional, and using metrics that ignore edge direction may gravely hinder information extraction. The applicability of graphlets is extended to directed networks by considering the edge direction of the graphlets. We tested our approach on a set of directed biological networks and verified that they were correctly grouped by type using directed graphlets. However, enumerating all graphlets in a large network is a computationally demanding task. Our implementation addresses this concern by using a state-of-the-art data structure, the g-trie, which is able to greatly reduce the necessary computation. We compared our tool, gtrieScanner, to other state-of-the art methods and verified that it is the fastest general tool for graphlet counting.
cs.SI
cs
thus advances Abstract—With high- throughput cell biology the amount of cellular biological data has grown drastically. Such data is often modeled as graphs (also called networks) and studying them can lead to new insights into molecule-level organization. A possible way to understand their structure is by analysing the smaller components that constitute them, namely network motifs are particularly well suited to compare networks and to assess their level of similarity but are almost always used as small undirected graphs of up to five nodes, limiting their applicability in directed networks. However, a large set of interesting biological networks such as metabolic, cell signaling or transcriptional regulatory networks are intrinsically directional, and using metrics that ignore edge direction may gravely hinder information extraction. and graphlets. Graphlets The applicability of graphlets is extended to di- rected networks by considering the edge direction of the graphlets. We tested our approach on a set of directed biological networks and verified that they were correctly grouped by type using directed graphlets. However, enumerating all graphlets in a large network is a computationally demanding task. Our implementation addresses this concern by using a state-of-the-art data structure, the g-trie, which is able to greatly reduce the necessary computation. We compared our tool, gtrieScanner, to other state- of-the art methods and verified that it is the fastest general tool for graphlet counting. Network comparison using directed graphlets David Apar´ıcio, Pedro Ribeiro, Fernando Silva CRACS & INESC-TEC LA, R. Campo Alegre, 1021/1055, 4169-007 Porto, Portugal Faculdade de Ciencias, Universidade do Porto Email: {daparicio, pribeiro, fds}@dcc.fc.up.pt recent in proteins or genes, and the physical, chemical or functional interactions between them modeled as edges. Inspecting the graph’s topological features can yield valuable information about the network. If a network has topological features that are not ex- pected to occur in neither purely random nor purely regular graphs it is considered to be a complex network, and most real-world networks are found to be complex. Singular characteristics commonly associated with complex networks include having a small-world structure [2] or a degree distribution that follows a power-law (scale-free networks) [3]. Brain networks, for instance, have been identified as small-world networks [4], meaning that each node (representing a neuron) is only a few con- nections away from every other node. Furthermore, the distance of the average path length in the brain has been negatively correlated with a person’s IQ [5], which seems to indicate the importance of a small-world organization to networks’ efficiency. Other statistics such as the number of connected components and the clustering coefficient are also frequently used to characterize a network. Another approach to uncover the underlying structure of complex networks is to decompose them into their smaller components or subgraphs. Network motifs in particular are small overrepre- sented subgraphs described by [6] as the build- ing blocks of large complex networks. Studies such as the one by [7] support this view for biological networks and network motifs have been used to analyze a wide range of cellular biolog- ical networks such as protein-protein interaction networks [8], transcriptional regulatory networks [9], metabolism networks [10] or cell signaling networks [11]. It is often useful to compare networks against each other, particularly because if a given net- work’s properties are known it allows for knowl- edge transfer based on the similarity or difference I. INTRODUCTION The advent of high-throughput cell biology tech- nologies such as DNA microarrays [1] has in- creased the amount of data pertaining to molec- ular interactions exponentially. While this recent flood of information has greatly contributed to a more accurate understanding of molecule-level organization, it has also created the need to find ways to filter and model this data so that it is rendered intelligible to the practitioner. In the field of computational biology different types of cellular networks are modeled as graphs with nodes rep- resenting specific biological components such as between two networks. One way to perform this comparison is to evaluate the similarity between the subgraphs that each network contains. Network motif fingerprints [12] and graphlet-based metrics [13] are possible choices for this task. Both ap- proaches compute the frequency of a set of small non-isomorphic subgraphs but, in addition to that, graphlets also evaluate the contribution of each individual node from the network, producing a graphlet degree distribution that can be seen as an extension of the node degree concept. Further- more, enumerating graphlets is computationally less expensive than calculating network motifs since the subgraphs are only enumerated in the original network, as opposed to also having to compute their occurrences in a large set of random networks in order to assess motif significance [14]. Graphlet-based metrics have been used to analyze networks from various biological areas such as protein-protein interaction [15], disease genes [16], age-related genes [17] or brain networks [18] due to the great amount of topological information that they provide [19]. Graphlet usage is often restricted to analyzing only the set of 30 undirected graphs of up to five nodes originally presented by [13] due to com- putational limitations. However, a substantial gain in topological information might be attained by examining larger graphlets. For instance, two net- works may be almost indistinguishable by compar- ing their respective size k graphlets but certain dis- similarities become evident when contrasting their size k + 1 graphlets. Additionally, in directed net- works, edge direction should be taken into account since it can potentially reveal information about the network’s structure that undirected graphlets are not able to capture. In this work we propose a novel extension of the graphlet methodology to directed networks and show how this may retrieve relevant information from biological networks. Despite the fact that graphlets are a general model, to the best of the authors’ knowledge the only extensions to the original concept are relative to ordered [20] and dynamic graphs [21]. There are many cellular biological networks that are intrinsically directed such as metabolic, cell signaling and gene transcriptional regulation networks. Methods and metrics that ignore the edge direction of these networks might be los- ing important information. [22] proposed a new measure (ρ) to calculate the link reciprocity of a network that can be used to assess if its edge direction is important or not. Their measure is an absolute quantity ranging from −1 (no reciprocity) to 1 (completely reciprocal). Networks with a ρ- value of ≈ −1 are purely directional networks meaning that edge direction is an intrinsic aspect of these networks and removing it makes them meaningless. On the other hand, networks with ρ ≈ 1 can be safely transformed into topologi- cally equivalent undirected networks without los- ing much information since their edges are always reciprocally connected. Garlaschelli and Loffredo calculated that celular and food web networks rank closer to the middle of the scale (ρ ≈ 0) meaning that edge direction in these networks is significant. Additionally, some specific small directed graphs, such as feed-forward loops, have been shown to play a fundamental role in the organization of distinct networks [23]. Network motifs have been extensively used to study directed biological networks such as neural, transcriptional and signal networks [24]. Graphlets on the other hand are mostly restricted to undi- rected networks since they consist of a set of undi- rected graphs. [25] examined numerous directed biological networks using both directed motifs and undirected graphlets. Such a study could possibly benefit if a tool for enumerating directed graphlets was available. In this article we present an efficient general- purpose tool to enumerate and compare both di- rected and undirected graphlet degree distributions for again both directed and undirected networks. Previous approaches either restricted the applica- tion of graphlets to undirected networks or had to ignore edge direction in directed networks, in practice reducing them to undirected networks. To achieve this objective we extend both i) the original concept of graphlets to directed graphlets and ii) upgrade a tree data-structure specialized in efficiently storing graphs, the g-trie, to a graphlet- trie. Our tool, gtrieScanner, can thus be used to enumerate directed and undirected graphlets as well as network motifs. II. MATERIALS AND METHODS A. Graph and graphlet terminology A network or graph G is comprised of a set V (G) of vertices or nodes and a set E(G) of edges or connections. Nodes represent entities and edges correspond to the relationships between them. Edges are represented as pairs of vertices of the form (a, b), where a, b ∈ V (G). In directed graphs, edges (i, j) are ordered pairs (translated to ”i goes to j”) whereas in undirected graphs there is no order since the nodes are always reciprocally connected. A subgraph Gk of G is a graph of size k where V (Gk) ⊆ V (G) and E(Gk) ⊆ E(G). A subgraph is induced if ∀u, v ∈ V (Gk) : (u, v) ∈ E(Gk) iff (u, v) ∈ E(G). A match or occurrence of Gk happens when G has a set of nodes that induce Gk. Two matches are considered distinct if they have at least one different vertex. The f requency of Gk in G is the number of occurrences of Gk in G. Two graphs are said to be isomorphic if it is possible to obtain one from the other by changing the node labels without affecting their topology. All occurrences of a set G of non-isomorphic sub- graphs must be enumerated in the original network before graphlet or network motif metrics can be calculated. We call this task the general subgraph census problem and state it in Definition 2.1. Definition 2.1 (Subgraph Census Problem): Given a set G of non-isomorphic subgraphs and a graph G, determine the frequency of all induced occurrences of the subgraphs Gs ∈ G in G. Two occurrences are considered different if they have at least one node or edge that they do not share. Other nodes and edges can overlap. Graphlets were originally defined as the set of 30 non-isomorphic undirected graphs with at most 5 nodes [13]. They are structurally equivalent to network motifs [6] but also include information about the position or orbit that nodes occupy in the graphlet. The set of all orbits of G is refereed to as O. Another difference lies in the fact that network motifs require a null model to verify if the subgraph is overrepresented. Usually the null model is an artificial random network that main- tains the original network’s node degree sequence. On the other hand, graphlets do not require a null model and use the information of all subgraphs to perform a full-scale network comparison. To compute the graphlet degree distribution one has to count ∀u ∈ V (G) how many times u appears in some orbit j ∈ O and repeat this process for the total m orbits, resulting in a graphlet degree vector GDV (u) with m positions. A matrix F rG of n × m is obtained by joining the GDV s of all n nodes where each row of F rG is GDV (v), v ∈ V (G) and each position f ru,j is the number of times that node u appears in orbit j. This task is more formally defined in Definition 2.2.  f r0,0 f r1,0 ... f rn,0 F rG =  f r0,1 f r1,1 ... f rn,1 ··· ··· ... ··· f r0,m f r1,m ... f rn,m Fig. 1: GDV (v) obtained by enumerating v’s undirected graphlet orbits of sizes 2 and 3. Both directed and undirected graphlets are con- sidered in this work; dGk and dOk denote the set of all directed graphlets and directed orbits of size s ∈ {2, ..., k}, respectively, while uGk and uOk are used for the undirected counterparts. An illustration of how the GDV of a vertex v is computed for uO3 is presented in Figure 1. Definition 2.2 (Orbit Frequency Computation): Given a set Gs of non-isomorphic subgraphs of size s ∈ {2, ..., k} and a graph G, determine the number of times f ri,j that each node i ∈ V (G) appears in all the orbits j ∈ Os. Two occurrences are considered different if they have at least one node or edge that they do not share. Other nodes and edges can overlap. F rG is transformed into a graphlet degree dis- G(k) denotes how many tribution GDDG where d j nodes appear k times in orbit j. GDDG = d 0 d 0 G(2) G(1) d 1 d 1 G(2) G(1) ... ... d m G (1) d m G (2) G(+∞) d 0 G(+∞) d 1 ... ··· ··· ... ··· d m G (+∞)  Two networks G and H can then be compared by computing the differences between their respec- tive GDD matrices after their distributions are normalized - represented below as nj G(k). In our experiments the arithmetic mean GDD-agreement (GDA) introduced by [13] is used, defined as follows. GDA(G, H)j = 1− 1√ 2 G(k) − nj [nj H (k)]2  (cid:33) 1 2 (1) (2) (cid:32) +∞(cid:88) m(cid:88) k=1 j=0 1 m GDA(G, H) = GDA(G, H)j uGk Ok 1 4 15 73 480 4,786 77,275 k 2 3 4 5 6 7 8 9 Gk 1 3 9 30 142 965 12,082 273,162 1,540,421 882,011,563 1,793,355,966,869 2,188,288 13,027,955,038,433,121 Gk 2 15 214 9,578 dGk Ok 3 (1.5 × Gk) 33 (2.3 × Gk) 730 (3.5 × Gk) 45,637 (4.8 × Gk) 9,121,657 (5.9 × Gk) ≈ 7 × Gk ≈ 8 × Gk ≈ 9 × Gk TABLE I: Number of undirected and directed graphlets, as well as their respective orbits, depending on the size of the graphlets. For each case, all graphlets of sizes 2..k are counted. It is impractical to enumerate all possible orbits for dGk when k is larger than 6 due to the size of G. We modified the metric to only consider orbits that appear in at least one of the networks; the orig- inal metric is henceforth refereed to as GDA(cid:48) and our own as GDA. Modifying the metric was nec- essary since non-appearing orbits would contribute to unreasonably high GDA(cid:48)s when enumerating a large number of orbits or when small networks were used. This happens because the GDA(cid:48) of two networks is increased even if the orbit frequency is zero in both networks. This is not very problematic when a small number of orbits is enumerated, such as the original 73 undirected ones; however, as can be seen from Table I, bigger undirected graphlets and directed graphlets may require thousands or millions of orbits to be enumerated. For these cases it is likely that many of the possible orbits do not appear in either network, which may result in higher GDA(cid:48)s than expected. Tests performed on small food webs produced an average GDA(cid:48) of ≈ 0.5 when enumerating dG4 that increased to ≈ 0.85 for dG5. This does not translate to those foodwebs being much more similar when looking at their larger graphlets but rather that there are many orbits that do not appear in either network. Figure 2 illustrates this concept. Since both directed and undirected GDAs can be calcu- lated, uGDAk and dGDAk represent the GDAs when comparing undirected and directed graphlets, respectively, of size k. B. Networks There are numerous kinds of intra-cellular net- works, such as metabolic, transcriptional regu- latory and cell signaling networks, where edge directyion is intrinsically related to its function. Metabolic networks represent the set of bio- chemical reactions occurring within a cell that allow the organism to grow, reproduce, respond to the environment, and other biological functions es- sential for the organism’s survival. These reactions are catalyzed by enzymes that act upon substrates. Therefore, in metabolic networks a node can be an enzyme or a substrate and the connections are directed edges going from enzymes to substrates. Transcriptional regulatory networks model the process by which the information in the genes is transcribed into proteins or RNA, also called gene expression. In these networks nodes are either transcription factors or proteins that are connected by directed edges representing how the transcrip- tion factors influence the gene by stimulating or repressing its expression. A cellular signaling network is comprised of a sequence of biochemical reactions between cells of the same organism. A great number of tasks such as the development, repair and immunity of cells depend on the proper functioning of cell signaling networks. Nodes in these networks are proteins and edges exist between activator and receptor proteins that communicate through signals from the first to the latter. Fig. 2: Comparison of different GDA metrics. The original metric GDA(cid:48) was found to produce unreasonably high values for small networks (in the example) or when many graphlets are enumerated. This makes the metric inappropriate to compare directed graphlets since the number of orbits is very high. In our modified GDA metric only orbits appearing in either G, H or both are considered, discarding non-present orbits. Fig. 5: Common topology of three small graphs. G-Tries use common structures between the graphs of Gs to heavily constrain the search space. Fig. 3: A graphlet-trie containing all 2, 3, 4 and 5-node undirected graphlets G0, ..., G29 as they were presented in [13]. In a g-trie the common topologies between graph(let)s of different sizes become evident. Fig. 4: A graphlet-trie containing the 39 non-bidirectional directed graphlets of sizes 2, 3 and 4. The orbit numbers are generated automatically. While it is guaranteed that the g-trie only has non-isomorphic graphs on the leafs (bottom-level nodes), isomorphic graphs may appear in some of the top nodes (represented in grey). In these cases only one of the graphs is considered for orbit counting while the others are only used to efficiently traverse the search space, using symmetry breaking conditions to guarantee that each occurrence is only counted once. C. The G-Trie Data-structure A g-trie [26] is a tree-like data-structure created initially to calculate network motifs but it can be efficiently used to solve the general subgraph census problem. [27] presented a g-trie algorithm that was one or two orders of magnitude faster than previous approaches and g-tries are still state- of-the-art for network motif discovery efficiency- wise. The efficiency of the g-trie data-structure is mostly due to two main algorithmic ideas. First, the search space is heavily constrained by iden- tifying common subtopologies between the set of subgraphs Gs before enumerating them. Figure 5 illustrates this base concept by showing three small graphs that share a common subtopology. In practice this means that instead of searching each subgraph, GS1, GS2 and GS3, individually, a g-trie starts by looking for occurrences of a smaller common subgraph GS0 and then perform the necessary expansions for each larger subgraph. Secondly, symmetry breaking conditions are au- tomatically generated to eliminate automorphisms, thus avoiding redundancies and guaranteeing that each occurrence is found only once. For instance, without these conditions an n-clique (n nodes fully connected to each other) would be found n! times (once for each possible permutation of the n nodes) since all these permutations would be a match to a g-trie path from the root to the node representing that n-clique. A g-trie receives as input the list of graphs that the user wants to enumerate, which can be all undirected graphlets with up to five nodes, a set of directed graphs, specific interesting patterns (such as cliques or stars), or any other desired graphs. However, due to the nature of the g-trie which relies on common subtopologies between graphs to construct an efficient search tree, g-tries are better suited for tasks where one wants to count the occurrences of many small graphs inside a large network. G-Tries can be fully constructed before the enumeration and stored in a file or built on- the-fly to avoid having to store all possible graphs. Graphlet-tries are an extension of g-tries that also consider the nodes’ orbit. The broader term g-trie is used whenever a concept applies to both g- tries and graphlet-tries. A graphlet-trie containing all the original 30 graphlets is shown in Figure 3. The original orbit numbers are kept only for conve- nience since orbits are generated automatically in our implementation. An additional g-trie contain- ing all non-bidirectional dG4 is shown in Figure 4 (the bidirectional graphlets were removed for space G SIG_NCI SIG_NH SIG_SH SIG_SM MET_CE MET_BS MET_DR MET_TY TR_EC V (G) 15,533 E(G) 23,682 Source [28] 1,634 4,665 [29] 529 1,223 477 1,056 [30] 2,217 5,427 [31] 453 2,025 2,280 5,588 [3] 2,361 5,822 99 212 [23] TR_YST 688 1,078 [6] TABLE II: Set of ten directed biological networks of different types used for experimental evaluation. Fig. 6: Heatmap and dendogram of the dGDA4 between the tested networks. Cell signaling networks (SIG) and metabolic networks (MET) are clearly grouped together using directed graphlets information. concerns). Additionally, g-tries have already been extended to also support weighted [32] and colored [33] networks. The reader is refereed to [26] for more specific details on how a g-trie is created and used for subgraph enumeration. III. RESULTS AND DISCUSSION The experiments presented in this section can be divided into two categories: i) directed biological network comparison and ii) performance evalua- tion. The first illustrates how directed graphlets can be used to group a set of directed biological networks into different types according to their biological function, while the latter analyses the performance of our tool by comparing its execution time with state-of-the-art approaches on several biological networks. Information relative to the networks used for testing purposes is summarized in Table II; the network set contains networks of different organ- isms and of three distinct types: cell signaling (prefix SIG), metabolic (MET) and transcriptional regulatory networks (TR). Their sizes vary from a few hundred nodes/edges to tens of thousand of nodes/edges. A. Directed Biological Network Comparison Different types of biological networks such as metabolic, cell signaling and transcriptional regu- latory networks pertain to distinct biological func- tions. The computational networks used in these experiments are evidently a translation of real biological networks, thus potentially making the process of finding their similarities harder since their real structure may not be fully represented. Nevertheless, it is usually assumed that network structural similarity of computational networks may also indicate functional similarity [34]. In that case, networks belonging to the same type are expected to be more similar topologically than networks of different types. In order to verify if that is the case for these spe- cific networks we compare their directed graphlets so as to assess their topological similarity. This is done for each pair of networks (G, H) from Table II by first enumerating all graphlet orbits and then comparing their GDDs by computing the dGDAk(G, H). These tests were performed for uGk and dGk with k ∈ {3, 4, 5} but for space concerns only results for dG4 are presented. Fur- thermore, results from all experiments were found to be consistent with the results using dG4 for these particular networks but in general, different sets of (directed) graphlets can provide divergent information. The matrix obtained after computing the dGDA4(G, H) for each pair of networks is dis- played in Figure 6 along with the corresponding SIG_SMSIG_SHSIG_NCISIG_NHMET_CETR_ECTR_YSTMET_TYMET_DRMET_BSMET_BSMET_DRMET_TYTR_YSTTR_ECMET_CESIG_NHSIG_NCISIG_SHSIG_SM0.5180.5040.5660.5290.5980.5740.5120.8610.85110.5060.4930.5680.5280.5830.560.5010.87610.8510.5110.4960.5740.5320.5910.5670.50710.8760.8610.5420.5150.5220.5210.5820.59410.5070.5010.5120.540.5150.5230.5250.77110.5940.5670.560.5740.530.5110.5130.52710.7710.5820.5910.5830.5980.5480.5560.58710.5270.5250.5210.5320.5280.5290.5610.57110.5870.5130.5230.5220.5740.5680.5660.78310.5710.5560.5110.5150.5150.4960.4930.50410.7830.5610.5480.530.540.5420.5110.5060.518 No explicit dendogram and heatmap. It can be observed that networks of the same type are correctly grouped by their GDA. This is an indicator that directed graphlets can detect topological similarities be- tween directed biological networks of the same type and can likewise find structural differences between networks of different types. comparison with undirected graphlets is presented here since we do not claim that they are not capable of correctly grouping these specific networks respective classes. However, to find cases in which undirected graphlets will not be able to distinguish networks that are clearly distinct when taking edge direction is taken into account (see Figure 7). into their is trivial it Fig. 7: Two networks seen as identical using undirected graphlets that are different if edge direction is considered. When enumerating uG3 the uGDA3 is equal to 1.00. On the other hand, if one uses dG3, the dGDA3 is 0.57, substantially reducing their GDA. Directed graphlets are more appropriate to assess the level of similarity between directed networks since they capture more information about the networks’ topologies. B. Performance Evaluation 1) Experimental Setting: Our experimental re- sults were gathered on a 8-core machine consist- ing of two 4-core Intel Xeon Processor E5620 processors at 2.4GHz with a total of 12GB of memory. Code for gtrieScanner was devel- oped in C++11 and compiled using gcc 4.8.2. The other tools used for comparison were also developed in C++ and are available as open-source. The execution times of each tool are relative only to the graphlet enumeration phase, not taking into account the time taken to load the graph into mem- ory and perform other initialization and finalization tasks. 2) Performance Comparison: The most used and well-known tool for graphlet discovery is GraphCrunch [35]. Until recently it performed a full enumeration of all graphlets of up to size 5 in order to calculate their orbit frequency. Another tool, ORCA [36], was shown to perform one or two orders of magnitude faster that the original GraphCrunch and has recently been integrated into it. Henceforth, when GraphCrunch is ref- erenced we are alluding to its version before adopting ORCA to perform the enumeration. ORCA achieves its performance by observing that, given a limited set of graphs of size k, it is possible to build a system of equations to calculate their frequencies by using the frequencies of the size k − 1 graphs and the frequency of a single graph of size k. This greatly reduces execution time since the size k graphlet enumeration is much more computationally expensive than the size k−1 enumeration followed by solving the system of equations. While this approach brings substantial gains in terms of speed, is quite limited in scope because a new set of equations needs to be manually derived in order to find the k + 1 graphlets, k+2, and so on. These two tools also do not support edge direction, being only applicable for undirected graphlets. it in concept Network motifs are similar to graphlets and numerous tools for network motif discovery exist. Since tools for network motif discovery do not have to the calculate orbit fre- quencies specific to each node they perform less computational work than graphlet tools. Two well- known methods are Kavosh [37] and FANMOD [38], the latter being an implementation of the ESU algorithm; in our work a more efficient implemen- tation of ESU [39] is used. Because i) GraphCrunch, ii) ORCA, and iii) ESU and Kavosh methodologies are not compa- rable, three distinct versions of gtrieScanner were used: i) a version that enumerates all graphlets and orbits, ii) a version that enumerates size k − 1 graphlets and orbits and then computes a set of equations to calculate the frequencies of the size k graphlets and iii) a version that only enumerates the graphlets/network motifs and not the orbits, to be used respectively. The version that only enumerates motifs/graphlets was devel- oped previous to this work and is available at http://www.dcc.fc.up.pt/gtries/. Results showing the average (mean) speedup obtained in all 10 networks for different sets of graphlets (G) are presented in Table III. Neither GraphCrunch nor ORCA are able to enumerate undirected graphlets with more than 5 nodes or directed graphlets. Our tool performs faster when compared to those two systems and, in addition to that, it can enumerate undirected graphlets of more than 5 nodes as well as directed graphlets. When compared to other tools for network motif discovery our tool is almost two orders of magni- tude faster on average for undirected graphs and about 20 times faster for directed graphs. The speedups are lower for directed graphs because the search space is harder to constrain due to G uG5 uG6 dG4 dG5 G 30 142 214 9,578 (a) O 73 480 730 45,637 GraphCrunch 6.59 ± 2.60 n/a n/a n/a (b) ORCA 2.08 ± 1.15 n/a n/a n/a (c) Kavosh 87.66 ± 35.11 87.28 ± 40.43 19.17 ± 6.42 31.33 ± 13.37 ESU 73.00 ± 30.81 70.91 ± 31.98 17.33 ± 5.99 28.60 ± 11.79 (d) TABLE III: Performance comparison between gtrieScanner and other algorithms. (a) shows a description of the set of subgraphs being enumerated, as well as the total number of graphlets (G) and orbits (O). For a fair comparison we developed different versions of gtrieScanner that perform similar but distinct tasks. The speedups between our methods and other algorithms are shown in (b), (c) and (d). In (b) the graphlet frequencies are obtained by enumerating all size k graphlets. On the other hand, the variation in (c) only enumerates the graphlets of up to size k− 1 and then solves a set of equations to compute the frequencies of size k graphlets. GraphCrunch and ORCA are only able to calculate undirected graphlets of up to size 5, so we can not compare their execution times with our own for uG6, dG4 or dG5. Finally, in (d) we compare our approach to algorithms for network motif discovery, discarding orbit frequency computation. It is the speedups noticeable a higher number of graphlets and less common subtopologies between them. that of gtrieScanner are much higher when compared to network motif tools than to graphlet tools. This happens because tools for network motifs are general, meaning that they can be used for any subgraph/motif size, while tools to find graphlets are built to enumerate undirected graphlets of up to 5 nodes only. This allows them to have specialized optimizations that motif tools can not match. From these experiments we can conclude that gtrieScanner can both perform faster than state-of-the-art graphlet tools and also provide a more general approach which supports any di- rected or undirected motif/graphlet size, as long as the full set of graphlets fits into memory. IV. CONCLUSIONS Recent advances in high-throughput cell biology caused huge amounts of cellular biological data to be continuously produced. Studying the large com- putational networks resulting from this information can lead to new insight into cellular organization. Due to the size of these networks it is necessary to resort to studying their smaller components such as Graphlets or like network motifs. Graphlets in particular have been extensively applied to protein-protein interactions and other kinds of undirected networks but their applicability in directed biological networks, such as cell signal- ing, transcriptional regulatory and metabolic net- works, is limited since they do not consider edge direction. In this paper we highlight the importance of adapting graphlets to take into account edge direction by showing that networks of different types can be accurately grouped using directed graphlets. We present an efficient tool, gtrieScanner, that is able to compute directed and undirected graphlets of arbitrary size, as well as network motifs, as long as they fit into memory. Our tool also allows for the user to customize the set of graphs that he/she wants to query in the network, further demonstrating the flexibility of our tool. We assess our tool’s performance on a set of directed biological networks and compare it to other tools for graphlet and network motif discovery. We ob- serve that it is the fastest available tool for either task while also being a very general approach. Therefore, we believe that we have broadened the applicability of graphlets by extending them to directed graphlets and by providing a efficient tool for that task. Acknowledgements This work is partially funded by FCT (Por- tuguese Foundation for Science and Technol- ogy) within project UID/EEA/50014/2013. David Apar´ıcio is supported by a FCT/MAP-i PhD re- search grant (PD/BD/105801/2014). REFERENCES [1] M. Schena, D. Shalon, R. W. Davis, and P. O. Brown, “Quantitative monitoring of gene expression patterns with a complementary dna microarray,” Science, vol. 270, no. 5235, pp. 467–470, 1995. [2] A. Wagner and D. A. Fell, “The small world inside large metabolic networks,” Proceedings of the Royal Society of London. Series B: Biological Sciences, vol. 268, no. 1478, pp. 1803–1810, 2001. [3] H. Jeong, B. Tombor, R. Albert, Z. N. Oltvai, and A.- L. Barab´asi, “The large-scale organization of metabolic networks,” Nature, vol. 407, no. 6804, pp. 651–654, 2000. [4] O. Sporns, D. R. Chialvo, M. Kaiser, and C. C. Hilge- tag, “Organization, development and function of complex brain networks,” Trends in cognitive sciences, vol. 8, no. 9, pp. 418–425, 2004. [5] M. P. van den Heuvel, C. J. Stam, R. S. Kahn, and H. E. H. Pol, “Efficiency of functional brain networks and intellectual performance,” The Journal of neuroscience, vol. 29, no. 23, pp. 7619–7624, 2009. [25] C. Y. Park, D. C. Hess, C. Huttenhower, and O. G. Troyan- skaya, “Simultaneous genome-wide inference of physical, genetic, regulatory, and functional pathway components,” PLoS computational biology, vol. 6, no. 11, p. e1001009, 2010. [26] P. Ribeiro and F. Silva, “G-Tries: A data structure for stor- ing and finding subgraphs,” Data Mining and Knowledge Discovery, vol. 28, no. 2, pp. 337–377, 2014. [27] P. Ribeiro and F. Silva, “G-tries: an efficient data structure for discovering network motifs,” in Proceedings of the 2010 ACM Symposium on Applied Computing. ACM, 2010, pp. 1559–1566. [28] C. F. Schaefer, K. Anthony, S. Krupa, J. Buchoff, M. Day, T. Hannay, and K. H. Buetow, “Pid: the pathway interac- tion database,” Nucleic acids research, vol. 37, no. suppl 1, pp. D674–D679, 2009. [29] Q. Cui, Y. Ma, M. Jaramillo, H. Bari, A. Awan, S. Yang, S. Zhang, L. Liu, M. Lu, M. O’Connor-McCourt et al., “A map of human cancer signaling,” Molecular systems biology, vol. 3, no. 1, p. 152, 2007. [30] A. Ma’ayan, S. L. Jenkins, R. L. Webb, S. I. Berger, S. P. Purushothaman, N. S. Abul-Husn, J. M. Posner, T. Flores, and R. Iyengar, “Snavi: Desktop application for analysis and visualization of large-scale signaling networks,” BMC systems biology, vol. 3, no. 1, p. 10, 2009. [31] J. Duch and A. Arenas, “Community detection in complex networks using extremal optimization,” Physical review E, vol. 72, no. 2, p. 027104, 2005. [32] S. Choobdar, P. Ribeiro, and F. Silva, “Motif min- ing in weighted networks,” in Data Mining Workshops (ICDMW), 2012 IEEE 12th International Conference on. IEEE, 2012, pp. 210–217. [33] P. Ribeiro and F. Silva, “Discovering Colored Network Springer, 2014, pp. Motifs,” in Complex Networks V. 107–118. [34] C. J. Honey, J.-P. Thivierge, and O. Sporns, “Can struc- ture predict function in the human brain?” Neuroimage, vol. 52, no. 3, pp. 766–776, 2010. [35] T. Milenkovi´c, J. Lai, and N. Przulj, “Graphcrunch: a tool for large network analyses,” BMC bioinformatics, vol. 9, no. 1, p. 70, 2008. [36] T. Hocevar and J. Demsar, “A combinatorial approach to graphlet counting,” Bioinformatics, vol. 30, no. 4, pp. 559–565, 2014. [37] Z. R. Kashani, H. Ahrabian, E. Elahi, A. Nowzari-Dalini, E. S. Ansari, S. Asadi, S. Mohammadi, F. Schreiber, and A. Masoudi-Nejad, “Kavosh: a new algorithm for finding network motifs,” BMC bioinformatics, vol. 10, no. 1, p. 318, 2009. [38] S. Wernicke and F. Rasche, “Fanmod: a tool for fast network motif detection,” Bioinformatics, vol. 22, no. 9, pp. 1152–1153, 2006. [39] P. Ribeiro, “Efficient and scalable algorithms for network motifs discovery,” Ph.D. dissertation, Faculty of Science of the University of Porto, June 2011. [7] R. J. Prill, P. A. Iglesias, and A. Levchenko, “Dynamic properties of network motifs contribute to biological net- work organization,” PLoS biology, vol. 3, no. 11, p. e343, 2005. [8] I. Albert and R. Albert, “Conserved network motifs al- low protein–protein interaction prediction,” Bioinformat- ics, vol. 20, no. 18, pp. 3346–3352, 2004. [9] S. S. Shen-Orr, R. Milo, S. Mangan, and U. Alon, “Network motifs in the transcriptional regulation network of Escherichia coli,” Nature genetics, vol. 31, no. 1, pp. 64–68, 2002. [6] R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon, “Network motifs: simple building blocks of complex networks.” Science (New York, N.Y.), vol. 298, no. 5594, pp. 824–827, 2002. [10] E. R. Shellman, C. F. Burant, and S. Schnell, “Network motifs provide signatures that characterize metabolism,” Molecular BioSystems, vol. 9, no. 3, pp. 352–360, 2013. [11] W. Li, L. Chen, X. Li, X. Jia, C. Feng, L. Zhang, W. He, J. Lv, Y. He, W. Li, and Others, “Cancer-related marketing centrality motifs acting as pivot units in the human signal- ing network and mediating cross-talk between biological pathways,” Molecular BioSystems, vol. 9, no. 12, pp. 3026–3035, 2013. [12] R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. Shen-Orr, I. Ayzenshtat, M. Sheffer, and U. Alon, “Superfamilies of evolved and designed networks.” Science, vol. 303, no. 5663, pp. 1538–1542, March 2004. [13] N. Przulj, “Biological network comparison using graphlet degree distribution,” Bioinformatics, vol. 23, pp. 177–183, 2007. [14] P. Ribeiro, F. Silva, and M. Kaiser, “Strategies for Net- work Motifs Discovery,” in 5th IEEE International Con- ference on e-Science (e-Science 2009), Oxford, UK. IEEE Press, December 2009, pp. 80–87. [15] O. Kuchaiev and N. Przulj, “Learning the structure of protein-protein interaction networks.” in Pacific Sympo- sium on Biocomputing, vol. 14, 2009, pp. 39–50. [16] K. Sun, J. P. Gonc¸alves, C. Larminie, and Others, “Pre- dicting disease associations via biological network analy- sis,” BMC bioinformatics, vol. 15, no. 1, p. 304, 2014. [17] B. Yoo, H. Chen, F. E. Faisal, and T. Milenkovi´c, “Im- proving identification of key players in aging via network de-noising,” in Proceedings of the 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. ACM, 2014, pp. 164–173. [18] O. Kuchaiev, P. T. Wang, Z. Nenadic, and N. Przulj, “Structure of brain functional networks,” in Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE. IEEE, 2009, pp. 4166–4170. [19] O. N. Yaveroglu, T. Milenkovi´c, and N. Przulj, “Proper evaluation of alignment-free network comparison meth- ods,” Bioinformatics, p. btv170, 2015. [20] N. Malod-Dognin and N. Prulj, “GR-Align: Fast and flexible alignment of protein 3D structures using graphlet degree similarity,” Bioinformatics, vol. 30, no. 9, pp. 1259–1265, 2014. [21] Y. Hulovatyy, H. Chen, and T. Milenkovic, “Exploring the structure and function of temporal networks with dynamic graphlets,” arXiv preprint arXiv:1412.3885, 2014. [22] D. Garlaschelli and M. I. Loffredo, “Patterns of link reciprocity in directed networks,” Physical Review Letters, vol. 93, no. 26 I, pp. 1–4, 2004. [23] S. Mangan and U. Alon, “Structure and function of the feed-forward loop network motif,” Proceedings of the National Academy of Sciences, vol. 100, no. 21, pp. 11 980–11 985, 2003. [24] P. Wang, J. Lu, and X. Yu, “Identification of important nodes in directed biological networks: A network motif approach,” PloS one, vol. 9, no. 8, p. e106132, 2014.
1202.3473
1
1202
2012-02-15T23:38:06
Are we there yet? When to stop a Markov chain while generating random graphs
[ "cs.SI", "physics.data-an", "physics.soc-ph" ]
Markov chains are a convenient means of generating realizations of networks, since they require little more than a procedure for rewiring edges. If a rewiring procedure exists for generating new graphs with specified statistical properties, then a Markov chain sampler can generate an ensemble of graphs with prescribed characteristics. However, successive graphs in a Markov chain cannot be used when one desires independent draws from the distribution of graphs; the realizations are correlated. Consequently, one runs a Markov chain for N iterations before accepting the realization as an independent sample. In this work, we devise two methods for calculating N. They are both based on the binary "time-series" denoting the occurrence/non-occurrence of edge (u, v) between vertices u and v in the Markov chain of graphs generated by the sampler. They differ in their underlying assumptions. We test them on the generation of graphs with a prescribed joint degree distribution. We find the N proportional |E|, where |E| is the number of edges in the graph. The two methods are compared by sampling on real, sparse graphs with 10^3 - 10^4 vertices.
cs.SI
cs
Are we there yet? When to stop a Markov chain while generating random graphs(cid:63) Jaideep Ray, Ali Pinar, and C. Seshadhri Sandia National Laboratories, Livermore, CA 94550 {jairay,apinar,scomand}@sandia.gov Abstract. Markov chains are a convenient means of generating real- izations of networks, since they require little more than a procedure for rewiring edges. If a rewiring procedure exists for generating new graphs with specified statistical properties, then a Markov chain sampler can generate an ensemble of graphs with prescribed characteristics. However, successive graphs in a Markov chain cannot be used when one desires in- dependent draws from the distribution of graphs; the realizations are correlated. Consequently, one runs a Markov chain for N iterations be- fore accepting the realization as an independent sample. In this work, we devise two methods for calculating N . They are both based on the binary "time-series" denoting the occurrence/non-occurrence of edge (u, v) be- tween vertices u and v in the Markov chain of graphs generated by the sampler. They differ in their underlying assumptions. We test them on the generation of graphs with a prescribed joint degree distribution. We find the N ∝ E, where E is the number of edges in the graph. The two methods are compared by sampling on real, sparse graphs with 103− 104 vertices. Keywords: graph generation, Markov chain Monte Carlo, independent samples 1 Introduction Markov chain Monte Carlo (MCMC) methods are a common means of generat- ing realizations of graphs which share similar characteristics since they require nothing more than a procedure that can generate a new graph by "rewiring" the edges of an existing graph. Much of their use to date has been in gener- ating graphs with a prescribed degree distribution [1,2,3,4]. Other efforts have (cid:63) This work was funded by the Applied Mathematics Program at the U.S. Depart- ment of Energy and performed at Sandia National Laboratories, a multiprogram laboratory operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Submitted to the 9th Workshop on Algorithms and Models for the Web Graph, WAW-2012, June 22-23, 2012, Dalhousie University, Halifax, Nova Scotia, Canada. SAND2012-1169C 2 used MCMC to generate graphs with a prescribed joint degree distribution [5]. MCMC methods require a graph to start the chain; thereafter, the "rewiring" procedure generates new, realizations which preserve certain graph character- istics. The specific characteristic(s) that are preserved depend entirely on the "rewiring" procedure. MCMC methods for generating graphs has two drawbacks. Initialization bias arises from the fact that the starting graph may not even lie in the population of graphs that we seek to sample, or may be an outlier in that population. The second issue, autocorrelation in equilibrium, arises from the fact that successive samples drawn by the MCMC sampler are correlated and an empirical distribu- tion constructed from them would result in the statistical error (variance) to be 2τintlarger than the distribution constructed using independent samples. Here τint, the integrated autocorrelation time, is a measure of how slowly correlation in graphical metrics, calculated from an MCMC series, decays; see Sections 2 and 3 in Sokal's lecture notes [6]. Sokal's method [6] for deciding the "sufficiency" of samples obtained from MCMC revolve around autocorrelation. The method is general, and was adapted for use with graphs in [5]. Consider an edge (u, v) between labeled vertices u and v in the ensemble of graphs generated by the MCMC chain. Denoting its occurrence/non-occurrence in the chain of graphs by 1/0 gives us a binary time- series {Zt}, t = 1 . . . T , with an empirical mean µ. The auto-correlation, with lag l, is given by C(l) = ({Zt} − µ)({Zt+l} − µ), t = 1 . . . T − l and the normalized version of it, ρ(l) = C(l)/C(0) can be used to gauge whether the autocorrelation in the time-series is observed to be decreasing. In [5], the authors used this metric, applied to all edges in the graphs that were sampled, to ensure that their MCMC chain was mixed. One can also set, loosely speaking (for details, consult [6]), a minimum threshold ρmin, identify the corresponding lag lmin, and retain every lth min entry in the MCMC chain to serve as independent samples. However, this method has two practical drawbacks. First the autocorrelation analysis has to be performed for all the edges (potentially, V 2 in number) that might appear in the MCMC chain, which quickly becomes prohibitively expensive for large graphs. Secondly, it requires a user input, ρmin, which may have an arbitrary effect on graphical properties of the ensemble. These shortcomings motivate our work. In this paper, we propose two different methods for generating independent graphs using an MCMC method. The first, which we call Method A or "multiple short runs", determines the number of iterations N an MCMC method has to be run to "forget" the initial graph and minimize the initialization bias. The second approach, Method B or "one long run", requires K MCMC iterations. This long run is thinned by a factor k (i.e., every kth MCMC iteration is preserved) to gen- erate K/k independent samples. Both methods are intended to be approximate, but simple to evaluate, so that they can be employed in practice to gauge the "sufficiency" of MCMC iterations. The two methods for extracting independent graphs are tested on an MCMC chain with the setup described in [5]. We explore 3 the practical impact of approximations in our methods. We restrict ourselves to undirected graphs with labeled nodes. In the next section (Sec. 2) we describe the procedure used to "rewire" a graph to create a new graph realization with the same joint degree distribution. In Sec. 3 we describe the two methods for generating independent samples. In Sec. 4, we test the methods on real sparse graphs. We conclude in Sec. 5. 2 A Markov chain algorithm for sampling graphs with a given joint degree distribution Consider an undirected graph G = (V, E), where V = n and E = m. The degree distribution of the graph is given by the vector f , where f (d) is the number of vertices of degree d. The joint degree distribution list the number of edges incident between vertices of specified degrees. Formally, the n × n matrix J denotes the joint degree distribution, where the entry J(i, j) is the number of edges between vertices of degree i and degree j. Stanton and Pinar [5] studied the problem of generating and random sampling a graph with a given joint degree distribution. They proposed a greedy algorithm to construct an instance of a graph with a specified (feasible) degree distribution, as well as a Markov chain algorithm to generate random samples of graphs with the same degree distribution. For the purposes of this paper, we will only focus on the Markov chain algo- rithm. The rewiring operation that moves us between the nodes of the Markov chain is depicted in Fig. 1. At the first step, one picks an edge (u1, v) at ran- dom and thereafter, one of the end vertices, e.g., u1. We wish to break (u1, v) and connect u1 and v to others without violating the prescribed joint degree distribution. We, therefore, search for another edge (u2, w) where du2 = du1 or dw = du1, where dp denotes the degree of node p. WLOG, let du2 = du1. Swap- ping the edges i.e. creating edges (u1, w) and (u2, v) while destroying (u1, v) and (u2, w) leaves the joint degree distribution unchanged while changing the connectivity pattern of the graph. If the resulting graph is simple, the graph is retained by the MCMC chain. The procedure results in inter-edge correlation. A particular edge is chosen for swapping, on average, once every E Markov chain iterations. In [5], this proce- dure was used to generate graphs (of moderate sizes, with V ≤ 23, 000), using an MCMC sampler. Autocorrelation analysis showed that the Markov chain mixes and the autocorrelation decays with edge-dependent rates. Empirically it was observed that an edge (u, v) de-correlated slowly if J(du, dv)/(f duf dv) ≈ 0.5. Empirically, it was observed that the autocorrelations of the edges decreased very sharply. 3 Methods for calculating independence The algorithm in Sec. 2 has two variants - one where the resulting graph may not be simple, and another where the graph was always simple (A graph is 4 Fig. 1. The swapping operation for the Markov chain algorithm. simple if it does not have self-loops or parallel edges). For the first variant, earlier work [1] implies that this chain has a polynomial mixing time. The second variant is not even known to have any bounds on the mixing time. As discussed in Sec. 1, one would like to provide a length to run the MCMC that, although not guaranteeing complete mixing, at least gives some confidence that the sampled graph is fairly "random." To that end, we will we will approximate the behavior of a single edge by a Markov chain. We stress that we do not give a proof, but only a mathematical argument justifying this. Below we present two methods for generating independent graph samples. 3.1 Method A - "multiple short runs" We refer to this method as Method A or the "multiple short runs" method. We generate M graph samples by running M independent Markov chain for N iterations before accepting the resulting graph. All the chains are run from the same initial graph; however, the state in the random number generator in each of the M MCMC chains are distinct. Consider a fixed pair of labeled vertices {u, v}. We will approximate the occurrence of an edge between (u, v) as a two state Markov chain. Note that this is an approximation, since these transitions depend on the remaining graph if J is to be preserved. Nonetheless, these dependencies appear to be weak. The first coordinate of the matrix is state 0 (no edge) and the second coordinate is 1, indicating the existence of an edge. The transition matrix T for this chain is (cid:18) 1 − αi,j αi,j (cid:19) Ti,j = βi,j 1 − βi,j , (1) where i = du and j = dv are the degrees of vertices u and v. αi,j and βi,j are positive fractions and (αi,j + βi,j) ≤ 1. The eigenvalues of the transition matrix are 1 and 1 − (αi,j + βi,j). Below, we construct a model for αi,j and βi,j. Suppose the state is currently 0. The state will become 1 if the edge (u, v) is swapped in. Let the two edges chosen by the algorithm be e and e(cid:48), in that order. 5 The edge (u, v) is swapped in if e contains u and e(cid:48) contains v (or vice versa). Furthermore, the endpoint u must be chosen, and the other end of e(cid:48) must have degree du. The probability that e contains u and u is chosen as an endpoint is exactly du/2m. The probability we choose the edge e(cid:48) that is incident to v depends on the number of neighbors of v whose degree is du. Clearly, this depends on the graph structure (leading in a non-Markov probability of this transition). We heuristically guess this number based on the joint degree distribution. The number of edges from degree du to degree dv vertices is J(du, dv). Of these, the average number of edges incident to a fixed vertex of degree dv is J(du, dv)/fv. We shall approximate the number of edges incident to v with the other endpoint of degree du by this quantity. The total probability is du 2m × J(du, dv) mf (dv) = duJ(du, dv) 2m2f (dv) The edge (u, v) is also swapped in when the reverse happens (so we choose v as an endpoint, and an edge incident to u with the other endpoint of degree dv). The total transition probability from 0 to 1 is approximated by (cid:18) du (cid:19) αi,j = duJ(du, dv) 2m2f (dv) + dvJ(du, dv) 2m2f (du) = J(du, dv) 2m2 f (dv) + dv f (du) (2) We now address the transition from 1 to 0. Suppose (u, v) is currently an edge. If the first edge e is chosen to be (u, v), then (u, v) will definitely be swapped out. The probability of this is 1/m. If the random endpoint chosen has degree du (and is not u), then we might choose e(cid:48) to be (u, v). The total probability of this is (f (du) − 1)du 2m × 1 m = (f (du) − 1)du 2m2 The roles of u and v can also be reversed, so the total transition probability from 1 to 0 is f (du)du + f (dv)dv − du − dv and so 2m2 βi,j = 1 m + f (du)du + f (dv)dv − du − dv 2m2 (3) We proceed to determining the number of iterations N to run the Markov chain. We start the Markov chain M with an initial distribution v (which is either (0, 1) or (1, 0)). M, which is represented by Ti,j (Eq. 1), is run for N = ln(1/)/(α + β) iterations,  > 0. We have dropped the subscripts i and j, since it is implied that this model is being derived for an edge (u, v) with vertices of degrees i and j. After N steps, we realize a 2-state distribution p = (p0, p1), which is different from the stationary distribution be u = (u0, u1). Denote the unit 2-norm eigenvectors of T, corresponding to the eigenvalues 1 and 1−(α+β), as e1 and e2. The initial state can be expressed as v = c1e1+c2e2. After N applications of the transition matrix we get p = TN v = c1TN e1 + c2TN e2 = c1e1 + c2 (1 − (α + β))N e2. 6 Since (1−{α+β}) < 1, the second term decays with N and c1e1 is the stationary distribution. We can bound the decaying term as (cid:107)(1 − (α + β))N c2e2(cid:107)2 = (1 − (α + β))ln(1/)/(α+β)c2(cid:107)e2(cid:107)2 ≤ exp(− ln(1/)) =  Hence, (cid:107)p − u(cid:107)2 ≤ , and so each pi − ui is at most . Further, from Eq. 2 and 3, we see that α + β ≥ 1/m (to leading order) and consequently (cid:18) 1 (cid:19)  . (4) N = ln(1/) α + β ≤ m ln(1/) = E ln 3.2 Method B - "one long run" We propose a second method, which we refer to as Method B or "one long run", for generating independent graphs. The procedure involves running a Markov chain for a large number of steps K and thinning it by a factor k i.e., preserving every kth instance of the chain. Comparing with the development in Sec. 3.1, we expect k ∼ N . Similar to Method A (Sec. 3.1), this method too begins with the binary time-series of edge occurrence {Zt}. As observed in [5], the autocorrelation in {Zt} decays for all edges. Consequently it is possible to successively thin the chain {Zt} (i.e., retain every kth element to obtain {Z k t }, the k−thinned chain) and compare the likelihoods that the chains were generated by (1) independent sampling or (2) by a first-order Markov process. When sufficiently thinned, the independent sampling model is expected to fit the data better. Using this as the stopping criterion removes an ambiguity (user-specified tolerances). We will employ a method based on comparison of log-likelihoods of model fit. We de- rive these expressions below. While this technique has been applied in other domains [7,8], but this paper is the first application of this technique to graphs. t }. We count the number, xij, of the (i, j), i, j ∈ (0, 1) transitions in it. xij are used to populate X, a 2× 2 contingency table. Dividing t }. Let (cid:99)pij and (cid:99)xij = each entry by the length of thinned chain K/k− 1 provides us with the empirical (K/k − 1)(cid:99)pij be the predictions of the probabilities and expected values of the probabilities pij of observing an (i, j) transition in {Z k Consider the chain {Z k table entries provided by a model. In such a case, the goodness-of-fit of the model is provided by a likelihood ratio statistic (called the G2-statistic; Chapter 4.2 in [9]) and a Bayesian Information Criterion (BIC) score xij log , BIC = G2 + n log − 1, (5) i=1(cid:88) i=1(cid:88) i=0 i=0 G2 = −2 (cid:19) (cid:18)(cid:99)xij xij (cid:19) (cid:18) K k where n is the number of parameters in the model used to fit the table data. Typically log-linear models are used for the purpose (Chapter 2.2.3 in [9]); the log-linear models for table entries generated by independent sampling and a first-order Markov process are 1,(i) + u(I) 2,(j) and log(p(M ) ij ) = u(I) + u(I) ) = u(M ) + u(M ) 1,(i) + u(M ) 2,(j) + u(M ) log(p(I) ij 12,(ij), (6) where superscripts I, M indicate an independent and Markov process respec- tively. The maximum likelihood estimates (MLE) of the model parameters (u(W ) b,(c)) are available in closed form (Chapter 3.1.1 in [9]). They lead to the model pre- dictions below (cid:99)xI ij = (xi+)(x+j) x++ and (cid:100)xM ij = xij, 7 (7) where xi+ and x+j are the sums of the table entries in row i and column j respectively. x++ is the sum of all entries (i.e., K/k−1, the number of transitions observed in {Z k t }, or the total number of data points). We compare the fits of the two models thus: i=1(cid:88) i=1(cid:88) i=0 i=0 xij log (cid:100)x(I) ij xij  − log (cid:18) K k (cid:19) − 1 . (8) ∆BIC = BIC (I) − BIC (M ) = −2 Above, we have substituted (cid:100)x(M ) ij = xij and the fact that the log-linear model for a Markov process has one more parameter than the independent sampler model. Large BIC values indicate a bad fit. A negative ∆BIC indicates that an independent model fits better than a Markov model. The procedure for identifying a suitable thinning factor k then reduces to t } till ∆BIC in Eq. 8 becomes negative. We search progressively thinning {Z k for k in powers of 2. The value of k so obtained varies between edges and con- servatively, we take the largest k, k∗. However, this may be too conservative, i.e, k∗ (cid:29) N , if a few edges are seen to display a slow autocorrelation decay. If we are interested in certain global metrics for graph e.g., maximum eigenvalue etc, a few correlated edges are unlikely to have any substantial effect. Thus, one may be able to thin with a k ∼ N (cid:28) k∗. We will test this empirically in Sec. 4. 4 Tests with real graphs In this section we first explore the impact of  (as defined in Sec. 3.1) on the ensemble of graphs generated by a Markov chain, and choose a  for further use. Thereafter we compare the graphs generated by the Methods A and B (Sec. 3.1 and Sec. 3.2) and gauge the impact of choosing a thinning factor k < k∗. All tests are done with four real networks - the neural network of C. Elegans [10] (referred to as "C. Elegans"), the power grid of the Western states of US [10] (called "Power"), co-authorship graph of network science researchers [11] (re- ferred to as "Netscience") and a 75,000 vertex graph of the social network at Epinions.com [12] ("Epinions"). Their details are in Table 1. The first three were obtained from [13] while the fourth was downloaded from [14]. All the graphs were converted to undirected graphs by symmetrizing the edges. We start the Markov chain using the real networks listed in Table 1. When comparing ensembles of graphs, we will use the (distributions of) global cluster- ing coefficient, number of triangles in the graphs, the graph diameter and the maximum eigenvalue as metrics. 8 Table 1. Characteristics of the graphs used in this paper. (V ,E) are the numbers of vertices and edges in the graph, N are the number of Markov chain steps used for generating graphs in Sec. 3.1 and k is its equivalent obtained by the method in Sec. 3.2. K/k∗ are the number of graph samples, obtained by thinning a long run, that were used to generate distributions in the figures. Graph name (V ,E) C. Elegans Netscience Power Epinions (297, 4296) (1461, 5484) (4941, 13188) (75879, 405740) N/E 10 10 10 30 k∗/E 13 49 13 720 K/k∗ 3582 737 1214 various In Fig. 2 we investigate the impact of  in Method A ("many short runs"). We generate 1000 samples by running the Markov chain for 1E, 5E, 10E and 15E Markov chain iterations, corresponding to  = 0.37, 6.7 × 10−3, 4.5 × 10−5 and 3.06× 10−7. In Fig. 2, we plot the distributions for the first three graphs (in Table 1) and find that for all three,  < 5.0 × 10−3 lead to distributions which are very close. We will proceed with  = 4.5× 10−5 i.e., when we use Method A, we will mix the Markov chain 10E times before extracting a sample. In Table 1 we see that Method B ("one long run") method often prescribes a thinning factor that is larger than the one obtained using Method A ("multiple short runs"). This large number is often due to the lack of autocorrelation decay in a few edges. We investigate whether such a lack has a significant impact on the graphical metrics that we have chosen. In Fig. 3 we plot distributions of the same metrics for the three graphs. The thinning factors are in Table 1. We see that the distributions are close, i.e., the existence of a few edges whose time- series are still correlated do not impact the metrics of choice. We have repeated these tests with other metrics and the same result holds true. We now address a large graph (Epinions). Since potentially V 2 distinct edges might be realized during a Markov chain, it is infeasible to calculate a thinning factor for all the edges. Consequently, we perform the thinning analysis for only 0.1E (40,574) edges, chosen randomly from all the distinct edges that are realized by the Markov chain. In Fig. 4 we plot the distribution of k obtained from the 40,574 sampled edges. We see that most of the k lie between 10E and 100E; edges with thinning factors outside that range are about two orders of magnitude less abundant. It is quite conceivable that there are edges (which were not captured by the sample) that would prescribe an even higher thinning factor. In order to check whether these edges have a significant impact on the distribution of graph metrics, we check their convergence as a function of the thinning factor. We generate separate ensembles of graphs. The reference ensemble is gener- ated using Method A, with N = 30E. As seen in Table 1, certain edges will 9 Fig. 2. Plots of the distributions of the global clustering coefficient, the number of triangles in the graphs, the graph diameter and the max eigenvalue of the graph Lapla- cian for "Netscience" (left) and "Power" (right), evaluated after 1E, 5E, 10E and 15E iterations of the Markov chain (green, blue, black and red lines respectively). The corresponding values of  are in the legend. We see that the distributions converge at  < 1.0−5. still be correlated (N = 720E would make them independent). We then use Method B to generate graph ensembles with thinning factors k/E < 720 which are also multiples of N . In Fig. 4 (right), the diameter distribution obtained with Method A is compared to that obtained with Method B. While the distributions are very similar, they do display some small differences. This is surprising since N = 30E indicates a minuscule . In addition, distributions obtained with k = 5N, 9N, and 13N show some differences between themselves, indicating that the edges that have not become independent have a small, but measurable impact on the graph diameter. Further, the distributions using smaller values of k are marginally wider (have a larger variance), indicating that they were con- structed using samples which were not completely independent. However, the differences are minute, and for practical purposes the graph ensemble generated using Method A with N = 30E is identical to the one generated using Method B, per our chosen metrics. Consequently, despite its approximations, the results 0.120.140.160.180.20200400Global clustering coefficientDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−780090010001100120000.05Number of trianglesDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−702040608000.10.2DiameterDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−716.51717.501020Max. EigenvalueDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−70.0050.010.0150.0205001000Global clustering coefficientDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−702040608010000.10.2Number of trianglesDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−710203040506000.10.2DiameterDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−74.555.560510Max. EigenvalueDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−7 10 Fig. 3. Comparison of the distributions of the global clustering coefficient, the number of triangles in the graphs, the graph diameter and the max eigenvalue of the graph Laplacian for "C. Elegans" (left), "Netscience" (middle) and "Power" (right), evalu- ated using Methods A ("many short runs") and B ("one long run"). We see that the distributions are very similar. The kernel density estimation used to generate the dis- tributions sometimes causes nonsensical artifacts e.g., a small, but negative clustering coefficient. For Method A, the Markov chain was run for 10E iterations. Thinning factors for Method B are in Table 1. in Sec. 3.1 furnish a workable estimate of N , if one uses  < 10−5. Further, k∗ is generally too conservative if our aim is to obtain "converged" distributions of certain graph metrics. This arises from a few edges that de-correlate slowly, but have little effect on global graphical metrics due to their rarity. 5 Conclusions We have developed a method that allows one to generate a set of independent realizations of graphs with a prescribed joint degree distribution. The graphs are generated using an MCMC approach, employing the algorithm described in [5] as the "rewiring" mechanism. The graphs so generated are tightly correlated; our two methods address the question of how one can decorrelate the chain. 0.090.10.110.120100200300Global clustering coefficientDensity Method AMethod B170018001900200000.0050.010.015Number of trianglesDensity Method AMethod B246800.51DiameterFraction Method AMethod B23.323.423.523.623.7051015Max. eigenvalueDensity Method AMethod B0.130.140.150.160.170100200Global clustering coefficientDensity Method AMethod B700800900100000.010.020.03Number of trianglesDensity Method AMethod B020406000.10.2DiameterFraction Method AMethod B16.616.716.816.91701020Max. eigenvalueDensity Method AMethod B0123x 10−305001000Global clustering coefficientDensity Method AMethod B−100102000.10.2Number of trianglesDensity Method AMethod B102030405000.10.2DiameterFraction Method AMethod B4.555.50510Max. eigenvalueDensity Method AMethod B 11 Fig. 4. Left: The normalized thinning factor k/E for the Epinions graph, as calcu- lated for the 40,574 sampled edges. We see that the most thinning factors are lie in (10E, 100E). Right: Plot of the graph diameter and distribution generated using Method A (with N = 30E) and Method B (with k equal to various multiples of N ). We see that the distributions are very similar. The first method, variously called Method A or "multiple short chains", involves running the Markov chain for N steps before extracting a graph real- ization; the Markov chain is run repeatedly to generate samples. We developed a model (and a closed-form expression) to estimate N that allows the Markov chain to converge to its stationary distribution before a graph realization is ex- tracted from it. This model assumes that edges are independent. In reality, their behavior is correlated, which leads us to incur small errors. The second method, variously called Method B or "one long chain", is a data driven method. It uses the time-series of the occurence/non-occurence of edges in an MCMC run. It does not assume a constant joint degree distribution. It progressively thins the time-series (by retaining every kth element) and fits a first-order Markov and an independent sampling model to the data. The thinning process stops when the independent model has a higher likelihood (strictly, a lower BIC score) than the Markov process. Since this method is data-driven and does not require any user-defined tolerances, we use it to validate Method A. The method is not new, but does not seem to have been used in the generation of independent graphs. Comparing the two methods, we find that for practical purposes, the ensem- bles generated using Method A are statistically similar to those obtained with Method B, as gauged by a set of graph metrics. Even at tight tolerance values, a small number of edges in the graphs generated by Method A remain corre- lated, and the metrics' distributions are slightly wider. This problem is very small (nearly unmeasureable) in small graphs, but becomes measureable, but still small, for large graphs. While this work enables the generation of independent graphs, including large ones, it poses a number of questions for further investigation. For example, 0100200300400500600700800100101102103104105Normalized thinning factor k/EFrequency5101520253000.020.040.060.080.10.120.140.160.180.2DiameterDensity Method A; N = 30EMethod B; k = 5NMethod B; k = 9NMethod B; k = 13N 12 being able to estimate or bound the difference in the distributions generated by Methods A and B would be helpful. Further, an intelligent way of identifying hard-to-decorrelate edges would reduce the computational burden of checking for the stopping criterion using Method B; currently, we simply use a random set of edges. Finally, it would be interesting if Method A could be extended to the generation of independent graphs when some graph property, other than the joint degree distribution, is held constant. This is currently being studied. References 1. Kannan, R., Tetali, P., Vempala, S.: Simple Markov-chain algorithms for generating bipartite graphs and tournaments. Random Struct. Algorithms 14(4) (1999) 293 -- 308 2. Jerrum, M., Sinclair, A.: Fast uniform generation of regular graphs. Theor. Com- put. Sci. 73(1) (1990) 91 -- 100 3. Jerrum, M., Sinclair, A., Vigoda, E.: A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries. J. ACM 51(4) (2004) 671 -- 697 4. Gkantsidis, C., Mihail, M., Zegura, E.W.: The Markov chain simulation method for generating connected power law random graphs. ALENEX (2003) 16 -- 25 5. Stanton, I., Pinar, A.: Constructing and sampling graphs with a prescribed joint degree distribution using markov chains. ACM Journal of Experimental Algorith- mics to appear. 6. Sokal, A.: Monte Carlo methods in statistical mechanics: Foundations and new algorithms (1996) 7. Raftery, A., Lewis, S.M.: Implementing MCMC. In Gilks, W.R., Richardson, S., Spiegelhalter, D.J., eds.: Markov Chain Monte Carlo in Practice. Chapman and Hall (1996) 115 -- 130 8. Raftery, A.E., Lewis, S.M.: How many iterations in the Gibbs sampler? In Bernardo, J.M., Berger, J.O., Dawid, A.P., Smith, A.F.M., eds.: Bayesian Statis- tics. Volume 4., Oxford University Press (1992) 765 -- 766 9. Bishop, Y.M., Fienberg, S.E., Holland, P.W.: Discrete multivariate analysis: The- ory and practice. Springer-Verlag, New York, NY (2007) 10. Watts, D.J., Strogatz, S.H.: Collective dynamics of 'small-world' networks. Nature 393 (1998) 440 -- 442 11. Newman, M.E.J.: Finding community structure in networks using the eigenvectors of matrices, 036104. Phys. Rev. E 74 (2006) 12. Richardson, M., Agrawal, R., Domingos, P.: Trust management for the seman- tic Web. In Fensel, D., Sycara, K., Mylopoulos, J., eds.: The Semantic Web - ISWC 2003. Volume 2870 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg (2003) 351 -- 368 10.1007/978-3-540-39718-2 23. 13. Newman, M.E.J.: Prof. M. E. J. Newman's collection of graphs at University of Michigan http://www-personal.umich.edu/ mejn/netdata/. 14. Stanford Network Analysis Platform Collection of Graphs: The Epin- ions social network from the Stanford Network Analysis Platform collection http://snap.stanford.edu/data/soc-Epinions1.html.
1606.05209
1
1606
2016-06-16T14:45:51
Cost Effective Campaigning in Social Networks
[ "cs.SI", "physics.soc-ph" ]
Campaigners are increasingly using online social networking platforms for promoting products, ideas and information. A popular method of promoting a product or even an idea is incentivizing individuals to evangelize the idea vigorously by providing them with referral rewards in the form of discounts, cash backs, or social recognition. Due to budget constraints on scarce resources such as money and manpower, it may not be possible to provide incentives for the entire population, and hence incentives need to be allocated judiciously to appropriate individuals for ensuring the highest possible outreach size. We aim to do the same by formulating and solving an optimization problem using percolation theory. In particular, we compute the set of individuals that are provided incentives for minimizing the expected cost while ensuring a given outreach size. We also solve the problem of computing the set of individuals to be incentivized for maximizing the outreach size for given cost budget. The optimization problem turns out to be non trivial; it involves quantities that need to be computed by numerically solving a fixed point equation. Our primary contribution is, that for a fairly general cost structure, we show that the optimization problems can be solved by solving a simple linear program. We believe that our approach of using percolation theory to formulate an optimization problem is the first of its kind.
cs.SI
cs
Cost Effective Campaigning in Social Networks Bhushan Kotnis∗and Joy Kuri† September 12, 2018 Abstract Campaigners are increasingly using online social networking platforms for promoting products, ideas and information. A popular method of pro- moting a product or even an idea is incentivizing individuals to evangelize the idea vigorously by providing them with referral rewards in the form of discounts, cash backs, or social recognition. Due to budget constraints on scarce resources such as money and manpower, it may not be possible to provide incentives for the entire population, and hence incentives need to be allocated judiciously to appropriate individuals for ensuring the high- est possible outreach size. We aim to do the same by formulating and solving an optimization problem using percolation theory. In particular, we compute the set of individuals that are provided incentives for mini- mizing the expected cost while ensuring a given outreach size. We also solve the problem of computing the set of individuals to be incentivized for maximizing the outreach size for given cost budget. The optimization problem turns out to be non trivial; it involves quantities that need to be computed by numerically solving a fixed point equation. Our primary contribution is, that for a fairly general cost structure, we show that the optimization problems can be solved by solving a simple linear program. We believe that our approach of using percolation theory to formulate an optimization problem is the first of its kind. 1 Introduction Online social networking platforms are being increasingly used by campaigners, activists and marketing managers for promoting ideas, brands and products. In particular, the ability to recommend news articles [1], videos, and even products [2] by friends and acquaintances through online social networking platforms is being increasingly recognized by marketing gurus as well as political campaign- ers and activists. Influencing the spread of content through social media enables campaigners to mold the opinions of a large group of individuals. In most cases, campaigners and advertisers aim to spread their message to as many individ- uals as possible while respecting budget constraints. This calls for a judicious ∗Indian Institute of Science, [email protected] †Indian Institute of Science 1 allocation of limited resources, like money and manpower, for ensuring highest possible outreach, i.e., the proportion of individuals who receive the message. Individuals share information with other individuals in their social network using Twitter tweets, Facebook posts or simply face to face meetings. These individuals may in turn pass the same to their friends and so on, leading to an information epidemic. However, individuals may also become bored or dis- illusioned with the message over time and decide to stop spreading it. Past research suggests that such social effects may lead to opinion polarization in so- cial systems [3]. This can be exploited by a campaigner who desires to influence such spreading or opinion formation by incentivizing individuals to evangelize more vigorously by providing them with referral rewards in the form of dis- counts, cash back or other attractive offers. Due to budget constraints, it may not be feasible to incentivize all, or even a majority of the population. Indi- viduals have varying amount of influence over others, e.g., ordinary individuals may have social connections extending to only close family and friends, while others may have a large number of social connections which can enable them to influence large groups [4]. Thus, it would seem that incentivizing highly influ- ential individuals would be the obvious strategy. However, recruiting influential people can be very costly, which may result in the campaigner running out of funds after recruiting just a handful of celebrities, which in turn may result in suboptimal outreach size. A resource constrained campaigner, for a given cost budget, may want to maximize the proportion of informed individuals, while other campaigners who care more about campaign outreach than resource costs, may desire to minimize costs for achieving a given number of informed individuals. We address both the resource allocation challenges by formulating and solving two optimization problems with the help of bond percolation theory. A similar problem of preventing epidemics through vaccinations has received a lot of attention [5 -- 9]. However, in these problems the cost of vaccination is uniform for all individuals, and hence it is sufficient to calculate the minimum number of vaccinations. Information diffusion can also be maximized by select- ing an optimal set of seeds, i.e., individuals best suited to start an epidemic [10 -- 12]. This is different from our strategy which involves incentivizing individ- uals to spread the message. It is possible to address the problem posed here using optimal control theory, which involves computing the optimal resource allocation in real time for ensuring maximum possible outreach size by a give deadline [13 -- 17]. However, the optimal control solution is not only difficult to compute, but also very hard to implement as it requires a centralized real time controller. Furthermore, recent work, [13 -- 17], on optimal campaigning in social networks does not address the problem of minimizing the cost while gurantering an outreach size. Our formulation allows us to solve both the problems. Our model assumes two types of individuals viz. the 'ordinary' and the 'selected', and they are connected to one another through a social network. Be- fore the campaign starts, the selected individuals are incentivized to spread the message more vigorously than the ordinary. We use the Susceptible Infected Recovered (SIR) model for modeling the information epidemic. For a given set 2 of selected individuals, we first calculate the size of the information outbreak us- ing network percolation theory, and then find the set of selected nodes which, 1. minimizes the cost for achieving a given proportion of informed individuals, and 2. maximize the fraction of informed individual for a given cost budget. We be- lieve that our approach of using percolation theory to formulate an optimization problem is the first of its kind. The detailed model description can be found in Sec. 2, percolation analysis in Sec. 3, the problem formulation in Sec. 4, numerical results in Sec. 5, and finally conclusions are discussed in Sec. 6. 2 Model We divide the total population of N individuals in two types: the ordinary (type 1) and the selected (type 2). Before the campaign starts selected individ- uals are provided incentives to spread the information more vigorously. These individuals are connected with one another through a social network, which is represented by an undirected graph (network). Nodes represent individuals while a link embodies the communication pathways between individuals. Let P (k) be the degree distribution of the social network. For analytical tractability, we assume that the network is uncorrelated [18]. We generate an uncorrelated network using the configuration model [19]. A sequence of N inte- gers, called the degree sequence, is obtained by sampling the degree distribution. Thus each node is associated with an integer which is assumed to be the num- ber of half edges or stubs associated with the node. Assuming that the total number of stubs is even, each stub is chosen at random and joined with another randomly selected stub. The process continues until all stubs are exhausted. Self loops and multiple edges are possible, but the number of such self loops and multiple edges goes to zero as N → ∞ with high probability. We assume that N is large but finite. Let φ(k) be the proportion of individuals with k degrees that are provided incentives for vigorously spreading the message, i.e., proportion of nodes with degree k that are type 2 nodes. The goal is to find the optimum φ(k) for maximizing the epidemic size (or minimizing the cost). The actual individuals can be identified by sampling from a population of individuals with degree k with probability φ(k). We assume that the information campaign starts with a randomly chosen individual, who may pass the information to her neighbors, who in turn may pass the same to their neighbors and so on. However, as the initial enthusi- asm wanes, individuals may start loosing interest in spreading the information message. This is similar to the diffusion of infectious diseases in a population of susceptible individuals. Since, we account for individuals loosing interest in spreading the message, we use a continuous time SIR process to model the in- formation diffusion. The entire population can be divided into three classes, those who haven't heard the message (susceptible class), those who have heard it and are actively spreading it (infected class) and those who have heard the message but have stopped spreading it (recovered class). 3 Let β1 be the rate of information spread for an ordinary node (Type 1), while β2 for a selected node (Type 2). In other words, the probability that a type i individual 'infects' her susceptible neighbors in small time dt is βidt + o(dt). Note that this is independent of the type of the susceptible node. Let µi be the rate at which type i infected individuals move to the recovered state. The larger the µi the lesser the time an individual spends in spreading the message. Since type 2 individuals are incentivized to spread information more vigorously, β2 > β1 and µ2 < µ1. Let Ti be the probability that a type i infected node infects its susceptible neighbors (any type) before it recovers (i ∈ {0, 1}). It can be easily shown that Ti = βi , see [20]. Therefore, T2 > T1. Ti can be interpreted as the probability that a link connecting type i infected node to any susceptible node is occupied. We refer to such links as type i links and Ti the occupation probability for link of type i. This mapping allows us to apply bond percolation theory for obtaining the size of the information epidemic [21]. βi+µi 3 Analysis We first aim to calculate the proportion of individuals who have received the message, or in other words, the proportion of recovered individuals at t → ∞. Let P (k(cid:48) k) be the probability of encountering a node of degree k(cid:48) by traversing a randomly chosen link from a node of degree k. In other words, P (k(cid:48) k) is the probability that a node with degree k has a neighbor with degree k(cid:48). For a network generated by configuration model, P (k(cid:48) k) = k(cid:48)P (k(cid:48)) [21], where (cid:104)ki(cid:105) (cid:104)k(cid:105) is the ith moment of P (k). Let q be the probability of encountering a type 2 node by traversing a ran- domly chosen link from a node of degree k. Therefore, q = P r(Neighboring node is type 2 neighboring node has degree k(cid:48)) · P r(Neighboring node has degree k(cid:48) original node has degree k). k(cid:48)=1 ∞(cid:80) ∞(cid:88) k=1 q = 1 (cid:104)k(cid:105) ∞(cid:80) kφ(k)P (k) The probability that a randomly chosen node has k1 type 1 and k2 type 2 neighbors = P (k1, k2) = P r(k1, k2 node has degree k)P (k). k:k=k1+k2 For a large N , the event that a given node has degree k, can be approximated to be independent of the event that another node, having a common neighbor with the given node, has degree k(cid:48). This is true since the degree sequence is generated by independent samples from the distribution, and for a large N the effect of sampling without replacement is negligible. The probability that a node is selected (type 2), is a function of its degree, hence the event that a node is type 1 (or 2) is independent of the event that any other node is type 1 (or 2). 4 Generating function Distribution G(u1, u2) F (u1, u2) G(u1, u2) F (u1, u2) Hi(u1, u2) P (k1, k2) Q(k1, k2) P (k1, k2) Q(k1, k2) Proportion of type 1 and type 2 nodes, who have received the message, in a component reached from a type i link. No. of type 1 and type 2 nodes who have received the message, in a component reached from a node i. No. of type 1 and type 2 nodes who have received the message, in a component reached from a randomly chosen node. Ji(u1, u2) J(u1, u2) Table 1: List of probability generating functions. This allows us to write: P (k1, k2) = (cid:18)k1 + k2 k2 (cid:19) qk2 (1 − q)k1P (k1 + k2) Let Q(k) be the excess degree distribution, i.e., the degree distribution of a node arrived at by following a randomly chosen link without counting that link. For the configuration model Q(k) = (k + 1)P (k + 1)/ < k >. Let Q(k1, k2) be the excess degree distribution for connections to type 1 and type 2 nodes. (cid:18)k1 + k2 (cid:19) k2 Q(k1, k2) = qk2 (1 − q)k1Q(k1 + k2) Let P (k1, k2) and Q(k1, k2) be the distribution and the excess distribution of the number of type 1 and type 2 neighbors that have received the information message. In other words the distribution and the excess distribution of type i occupied links. ∞(cid:88) ∞(cid:88) ∞(cid:88) ∞(cid:88) k1=k1 k2=k2 P (k1, k2) Q(k1, k2) k1=k1 k2=k2 i=1 (cid:32) (cid:32) 2(cid:89) 2(cid:89) i=1 (cid:33) (cid:33) ki ki ki ki ki i (1 − Ti)ki−ki T ki i (1 − Ti)ki−ki T P (k1, k2) = Q(k1, k2) = The probability generating functions for the distributions used in the analysis above are listed in Table 1. For example G(u1, u2) is given by : G(u1, u2) = uk1 1 uk2 2 P (k1, k2) ∞(cid:88) k1,k2=0 5 Figure 1: (Color Online) Illustration of components. The red boxes represent the components reached by type 1 link while green boxes represent components reached by a type 2 link. A type 2 node is represented by a green circle while a red circle represents a type 1 node. Now, G(u1, u2) is given by ∞(cid:88) ∞(cid:88) k1,k2 = k1 u 1 u k2 2 (cid:88) (cid:88) P (k1, k2) k1=k1 k2=k2 (cid:18)ki ki 2(cid:89) i=1 (cid:19) ki i (1 − Ti)ki−ki T (1 + (u1 − 1)T1)k1 (1 + (u2 − 1)T2)k2P (k1, k2) k1,k2 = G (1 + (u1 − 1)T1, 1 + (u2 − 1)T2) Similarly, F (u1, u2) = F (1 + (u1 − 1)T1, 1 + (u2 − 1)T2) A component is a small cluster of nodes that have received the information message. By small we mean that the cluster is finite and does not scale with the network size. However, at the phase transition, the average size of the cluster diverges (as N → ∞). An information epidemic outbreak is possible only when the average size of the cluster diverges. In this regime the component is termed as a giant connected component (GCC) and it grows with the network size. Let Hi(u1, u2) be the generating function of the distribution of the number of type 1 and type 2 nodes in a component arrived at from a type i link. Let Ji(u1, u2) and J(u1, u2) be the generating functions of the distribution of the number of type 1 and type 2 nodes in a component arrived at from node i and a randomly chosen node, respectively. Let random variable Yi be the number of type 1 and 2 nodes, that have received the message, in a component arrived at from a type i link. The proba- bility of encountering closed loops in finite cluster is O(N−1) [20] which can be neglected for large N . The tree like structure of the cluster allows us to write the size of the component encountered by traversing the link, as the sum of the size of components encountered after traversing the links emanating from the node at the end of the initial link. This is illustrated in Fig. 1. Hence, Yi can 6 be written as: Yi = 1 + K1Y1 + K2Y2 where random variable Ki is the number of type i neighbors of the end node of type i link that have received the message; the arrival link is not counted (excess degree). Since, the size of the components along different links are mutually independent (absence of loops) we can write the above equation in terms of probability generating functions. Hi(u1, u2) = ui H1(u1, u2) K1 H2(u1, u2) K2 = ui H k1 1 (u1, u2) H k2 2 (u1, u2) Q(k1, k2) k1,k2 = ui F ( H1(u1, u2), H2(u1, u2)) ∞(cid:88) ∞(cid:88) Which can also be written as (cid:16) Hi(u1, u2) = uiF 1 + ( H1(u1, u2) − 1)T1, 1 + ( H2(u1, u2) − 1)T2 (cid:17) (1) Similarly, J(u1, u2) can be expressed as : Ji(u1, u2) = ui H k1 1 (u1, u2) H k2 2 (u1, u2) P (k1, k2) k1,k2 = ui G( H1(u1, u2), H2(u1, u2)) J(u1, u2) = (1 − p) J1(u1, u2) + p J2(u1, u2) where p is the probability of choosing a type 2 node, p = ∞(cid:80) P (k)φ(k). The following theorem describes the phase transition conditions required for an out- break and the size of the such an outbreak. The proof can be found in A. k=1 Theorem 1. The condition required for a small cluster to become a giant con- nected component is given by: ν ≥ 1, where ∞(cid:88) ∞(cid:88) ν = T1 k1Q(k1, k2) + T2 k2Q(k1, k2) k1,k2 k1,k2 and the proportion of nodes in the giant connected component (size of GCC) is given by 1 − ψ, ψ = (1 + (u∗ − 1)T1)k1(1 + (u∗ − 1)T2)k2 P (k1, k2) ∞(cid:88) k1,k2 7 where u∗ is the solution of the fixed point equation ∞(cid:88) u = (1 + (u − 1)T1)k1 (1 + (u − 1)T2)k2 Q(k1, k2) k1,k2 The size of the information epidemic outbreak can now be used for formu- lating the optimization problem. 4 Problem Formulation Providing incentives in the form of referral rewards for low degree nodes, or sponsorship offers for celebrities (high degree nodes) is costly. Since, the cost is a function of the degree let c(k) be the cost of providing incentivizing a node with c(k)P r(node is selected node degree k. The average cost, ¯c(φ), is given by ∞(cid:80) has degree k)P (k) = c(k)φ(k)P (k). The proportion of type 2 individuals is k=1 ∞(cid:80) ∞(cid:80) given by k=1 φ(k)P (k). k=1 We formulate two optimization problems, viz., one which minimizes cost while enforcing a lower bound on the epidemic size, and the other which max- imizes the epidemic size for a given cost budget. For both the problems, the evaluation of the size of the epidemic requires one to numerically solve a fixed point equation. Thus, there is no straightforward method to solve the opti- mization problem such as the Karush Kuhn Tucker (KKT) conditions, because evaluating the objective function requires one to solve a fixed point equation. We show that this problem can be reduced to a linear program, which can then be solved easily using any off the shelf LP solver. 4.1 Cost minimization problem Providing guarantees on the minimum number of individuals who will be in- formed about the campaign is appropriate for campaigns with large funding, such as election campaigns where message penetration is more important than the cost. The guarantee on epidemic size is written as a constraint to the op- timization problem. The cost ¯c(φ) is minimized subject to 1 − ψ ≥ γ where γ ∈ [0, 1] and φ is the control variable. If γ = 0, the constraint becomes ν ≤ 1, as γ = 0 implies ψ = 1 which is the same as ν ≤ 1. A finite amount of money, may put a constraint on the number of type 2 individuals. The propor- k=1 φ(k)P (k). This translates in to the tion of type 2 individuals is given by(cid:80)∞ constraint : (cid:80)∞ k=1 φ(k)P (k) ≤ B, where budget B ∈ [0, 1]. The following theorem which is our principle contribution allows us to solve a possible non convex problem by solving a linear program. The key insight is that the probability of outbreak is monotonically decreasing in q, which then allows one to write the optimization problem as a linear program. The intuition 8 behind this claim is that since q is the probability of finding a type 2 node on a randomly chosen link, increase in q is equivalent to the increase in number of type 2 individuals resulting in a higher epidemic size. Theorem 2. If T2 > T1, then ψ ∈ (0, 1), is strictly decreasing with respect to q, dq < 0 for all q ∈ [0, 1]. For the ψ = 0 case (ν ≥ 1), ν is strictly increasing i.e, dψ with respect to q, i.e, dν dq > 0, ∀ q ∈ [0, 1], where q = 1(cid:104)k(cid:105) kφ(k)P (k). ∞(cid:80) k=1 Proof. The proof follows from Lemmas 4 and 5 detailed in Appendix B. Since, dψ dq < 0, the epidemic size constraint can be written as 1(cid:104)k(cid:105) q∗, where ψ(q) q=q∗ = 1 − γ. The optimization problem can now be written as follows: k=1 ∞(cid:80) kφ(k)P (k) ≥ c(k)φ(k)P (k) ∞(cid:88) k=1 minimize φ subject to: ∞(cid:88) 1 (cid:104)k(cid:105) ∞(cid:88) k=1 φ(k)P (k) ≤ B kφ(k)P (k) ≥ q∗ (2) k=1 0 ≤ φ ≤ 1 The above problem is a linear program which can be solved by any off-the-shelf LP solver. The optimization problem described above may not be feasible for all values of T1 and for all possible degree distributions. Assume, B = 1, the problem becomes infeasible if 1 − ψ ≤ γ when T2 is at the maximum possible value, i.e., all individuals are incentivized and yet 1 − ψ ≤ γ. 4.2 Epidemic Size Maximization Problem We now look at the problem of maximizing the information epidemic size (out- reach) in a resource constrained scenario. More, specifically we study a scenario where the cost budget is finite. Thus the outbreak size 1 − ψ must be maxi- mized subject to a cost constraint. Since dψ dq < 0, maximizing q is equivalent to maximizing 1 − ψ. Thus the problem is equivalent to the following linear 9 program. maximize φ ∞(cid:88) k=1 kφ(k)P (k) subject to: ∞(cid:88) ∞(cid:88) k=1 c(k)φ(k)P (k) ≤ C φ(k)P (k) ≤ B (3) k=1 0 ≤ φ ≤ 1 The linear program can now be solved using any standard linear programing solver. Note that constants T1, T2 do not play any role in problem (3), while they do play a role in problem (2) because q∗ is a function of T1 and T2. 5 Numerical Results As an illustration, we study the solution of the optimization problem for a linear cost, i.e., c(k) = k. The higher the degree, the higher the cost. Note that even if cost is non linear in k, the optimization problem remains a linear program. In the real world, the cost may be different, but whatever the cost function, the solution can be obtained by simply solving a linear program. model technique with power law degree distribution (P (k) ∝ k−α), α = 2.5. We used an uncorrelated random graph generated using the configuration 5.1 Cost Minimization Problem We solved the cost minimization linear program using the 'linprog' MATLAB solver; q∗ was computed numerically using the bisection method. In Fig. 2a, we plot the solution φ for different values of T1. The solution shows that only about 50% of high degree nodes need to be incetivized for T1 values ranging from 0.3 to 0.43. As T1 decreases from 0.47 to 0.3 , the proportion of high degree nodes that are incentivized remain fairly constant (50%), while the proportion of incentivized low degree nodes increase. In Fig. 2b, we plot the optimal proportion of individuals that need to be incentivized for achieving the given outreach size. 5.2 Epidemic Size Maximization Problem The solution, φ, is very similar to the one in problem (2), and hence we do not show it here. In Fig. 3a, we plot the size of the epidemic for varying cost budget C. As expected, the epidemic size increases with C because higher the budget, the higher the proportion of incentivized individuals. However, at some 10 (a) (b) Figure 2: (Color Online) (a) Solution φ, for different values of T1; (b) Optimal proportion of type 2 nodes required to meet outreach constraint. Parameters: T2 = 0.6, B = 0.7, γ = 0.2. (a) (b) Figure 3: (Color Online) (a) Size of the information epidemic for varying cost budget (C). (b) Optimal proportion of type 2 nodes required to meet outreach constraint as a function of cost budget (C). Parameters: T2 = 0.6, B = 0.7. 11 0510152000.10.20.30.40.50.60.7Degree (k)φ(k) T1 = 0.3T1 = 0.4T1 = 0.43T1 = 0.470.30.40.50.60.700.10.20.30.40.50.6T1Proportion of type 2 individuals.012345600.050.10.150.20.250.30.35Epidemic Size (1 − ψ)Cost Budget (C) units T1 = 0.1T1 = 0.25T1 = 0.4012345600.10.20.30.40.50.60.70.8Cost Budget (C) unitsProportion of type 2 individuals. point epidemic size saturates, this is because all nodes have been incentivized and therefore nothing more can be done to increase the outreach size. This is verified by Fig. 3b, the fraction of type 2 nodes hit 1, when C = 3. 6 Conclusion and Future Work To summarize, we studied the problem of maximizing information spreading in a social networks. More specifically, we considered a scenario where individuals are incentivized to vigorously spread the campaign message to their neighbors, and we proposed a mechanism to identify the individuals who should be ince- tivized. Using bond percolation theory we calculated the size of the information epidemic outbreak and the conditions for the occurrence of such outbreaks. We then formulated an optimization problem for minimizing the expected cost of in- centivizing individuals while providing guarantees on the information epidemic size. Although the optimization problem could not be addressed using standard analytical tools, Theorem 2 enabled us to compute the global optimum by solv- ing a linear program. We believe that our approach of using percolation theory to formulate an optimization problem is the first of its kind. For the sake of analytical tractability we assumed an uncorrelated network, however in reality real world social networks have positive degree-degree cor- relations [22]. Such networks with positive degree associativity percolate more easily compared to uncorrelated networks [23, 24]. Therefore, for the problem of minimizing cost the given campaign size could be achieved with a slightly lesser cost, while in the second problem, the theoretical optimal size would be a lower bound and the actual campaign size would be slightly larger than the theoretical. Apart from positive degree associativity, social networks are also found to contain community structures [22]. The presence of communities may slow down information spreading leading to a reduction in the campaign size. This may happen as most links point inside the community rather than out- side it, thus localizing the information spread [25]. However, if the network contains high degree nodes that bridge different communities, then incetivizing such nodes may substantially increase the campaign size. A similar finding was reported in [26], where authors investigated usefulness of targeted vaccinations on nodes that bridge communities. Although SIR models are widely used to model epidemics, they have some limitations. They fail to capture the fact that individuals may stop spreading when they perceive that most of their neighbors already known the information. This is captured by the Maki-Thompson model [27] which forces the recovery rate to be an increasing function of the number of informed individuals she contacts. Thus the recovery rate for an infected node is a function of her degree. An SIR process has a fixed recovery rate and hence the current results would approximately hold for an Maki Thompson process on Erdos-Renyi networks, where every node on average has the same degree. However, our results for SIR may not generalize for the Maki Thompson spread model on scale free networks. High degree nodes may have a higher chance of being connected to informed 12 individuals which may lead them to stop spreading to other uninformed nodes. An interesting extension to this problem, which was suggested by the anony- mous referee, is to compute a targeted incentivization strategy for two interact- ing campaigns. For example, the campaigner may want to maximize campaign A given that campaign B, which has either run its course or is simultaneously running along with A, either reinforces or hinders campaign A. This is an important problem since such interacting campaigns are often observed during parliamentary or presidential elections. Although the current results may not shed much light on such questions, we believe that they lay the foundation for investigating such problems which we hope to address in the future. A Proof of Theorem 3.1 Proof. Let (cid:104)s1(cid:105) and (cid:104)s2(cid:105) be the average number of type 1 and type 2 nodes in the component. The expected number of nodes in the component, < s >, is given by: (cid:104)s(cid:105) = (cid:104)s1(cid:105) + (cid:104)s2(cid:105) = ∂ ∂u1 J(u1, u2) + ∂ ∂u2 J(u1, u2) (cid:12)(cid:12)(cid:12)(cid:12)u=1 (cid:12)(cid:12)(cid:12)(cid:12)u=1 After differentiating and simplifying, (cid:104)s1(cid:105) can be written as: where (cid:104)ki(cid:105) = ∞(cid:80) k1,k2 (cid:104)s1(cid:105) = (1 − p) + (cid:104)k1(cid:105) H (cid:48) 1(1, 1) + (cid:104)k2(cid:105) H (cid:48) 2(1, 1) ki P (k1, k2) and H (cid:48) i (1, 1) = ∂ ∂u1 Hi(u1, u2) (cid:12)(cid:12)(cid:12)(cid:12)u=1 H (cid:48) i (1, 1) can be obtained by differentiating equation (1). (cid:48) 2(1, 1) H H (cid:48) 1(1, 1) = 1 + T1 (cid:48) ¯k1 H 2(1, 1) = T1 ¯k1 H (cid:48) 1(1, 1) + T2 (cid:48) 1(1, 1) + T2 ¯k2 H ¯k2 H (cid:48) 2(1, 1) ∞(cid:80) where ¯ki = kiQ(k1, k2). Solving the two simultaneous equations we ob- k1,k2 (cid:48) 1(1, 1) = 1−T2 ¯k2 tain H 1−T1 ¯k1−T2 ¯k2 expression for (cid:104)s1(cid:105) we get. and H (cid:48) 2(1, 1) = T1 ¯k1 1−T1 ¯k1−T2 ¯k2 . Substituting in the (cid:104)s1(cid:105) = (1 − p) + (cid:104)k1(cid:105)(1 − T2 1 − T1 ¯k2) + (cid:104)k2(cid:105)T1 ¯k1 − T2 ¯k2 ¯k1 13 One can similarly show that: (cid:104)s2(cid:105) = p + Therefore, (cid:104)k1(cid:105)T2 ¯k2 + (cid:104)k2(cid:105)(1 − T1 1 − T1 ¯k2 ¯k1 − T2 ¯k1) (cid:104)s(cid:105) = 1 + (cid:104)k1(cid:105) + (cid:104)k2(cid:105) ¯k1 − T2 1 − T1 ¯k2 ¯k1 + T2 ¯k2 ≥ 1, (cid:104)s(cid:105) is no longer finite, it morphs into a giant con- Thus, when T1 nected component, or in other words there is an information epidemic outbreak. Assume that a giant connected component of exists (ν ≥ 1). For any given node let zi be the probability that one of its type i links does not lead to the giant connected component. The probability that a randomly chosen node is not a part of the GCC is given by ∞(cid:88) k1,k2 ψ = zk1 1 zk2 2 P (k1, k2) Now, zi can be written as P r(link is not occupied ) + P r(link is occupied and the neighbor is not connected to the GCC). By occupied we mean that the node at the end of the link is a believer. Mathematically this can be written as: z1 = 1 − T1 + T1 z2 = 1 − T2 + T2 1 zk2 zk1 2 Q(k1, k2) zk1 1 zk2 2 Q(k1, k2) ∞(cid:88) ∞(cid:88) k1,k2 k1,k2 Simplifying we obtain, (z1 − 1)/T1 = (z2 − 1)/T2. Let u := (z1 − 1)/T1 + 1. Hence, zi = 1 + (u − 1)Ti. Note that zi is bounded from below by 1 − Ti and bounded from above by 1, and hence 0 ≤ u ≤ 1. Substituting this in above equations we obtain the desired result: ψ = (1 + (u − 1)T1)k1 (1 + (u − 1)T2)k2 P (k1, k2) where u must satisfy u = (1 + (u − 1)T1)k1 (1 + (u − 1)T2)k2 Q(k1, k2) ∞(cid:88) k1,k2 ∞(cid:88) k1,k2 14 B Lemmas required for Theorem 4.1 Lemma 3 is used in the proof of Lemma 4 and 5. Lemma 3. For all a, b ∈ [0, 1] and k1 + k2 ≤ n, n ∈ Z+ and any arbitrary f : Z → R the following is true: (cid:18)k1 + k2 (cid:18)k1 + k2 k2 (cid:19) (cid:19) k2 (cid:19) (cid:18)k1 + k2 (cid:18)k1 + k2 k2 (cid:19) k2 f (k1 + k2)k2 ak2−1bk1 f (k1 + k2)k1 ak2bk1−1 = 0 f (k1 + k2)k1 ak2 bk1−1 f (k1 + k2)k2 ak1 bk2−1 k1=0 k2=0 n−k1(cid:88) n−k1(cid:88) n(cid:88) − n(cid:88) n−k1(cid:88) n(cid:88) n−k1(cid:88) n(cid:88) k2=0 k1=0 k1=0 k2=0 = k1=0 k2=0 n−k1(cid:88) n(cid:88) n−k1(cid:88) n(cid:88) k2=0 k1=0 = k1=0 k2=0 Proof. We can switch the indices in the second term, i.e., Hence, LHS = (cid:18)k1 + k2 (cid:19)(cid:18) k2 (cid:19) ak2−1bk1 − ak1bk2−1 f (k1 + k2)k2 g(k1, k2) (4) We now count the number of terms in the above equation and show that they are even. An expression indexed by a specific k1 and k2 denotes a term, e.g, g(1, 1) i = (n+1)(n+2) is a term. The total number of terms in the summation = n+1(cid:80) . Out of those, n + 1 terms are 0 due to the k2 multiplier (k2 = 0 for k1 = 0 to n). Additionally, when k2 = k1 + 1 equation (4) is zero. The total number of terms when k2 = k1 + 1 is given by(cid:4) n+1 (cid:5). i=1 2 Since, these terms are zero, subtracting out these terms from the total num- 2 ber of terms results in (n + 1)(n + 2) 2 − (n + 1) − (cid:22) n + 1 (cid:23) 2 = = n2 for n even 2 (n − 1)(n + 1) 2 for n odd 15 Thus, the remaining terms are even for both n odd and even. This allows us to pair the terms. Consider one such pairing: the term with indices k1, k2 are paired with a term with indices k1, k2 where k2 = k1 + 1 and k1 = k2 − 1. If we sum these two terms we obtain g(k1, k2) + g(k1, k2) = f (k1 + k2)ak2−1bk1 + f (k1 + k2)ak1 bk2−1 = 0 (cid:19) (cid:18) k2(k1 + k2)! (cid:18) (k1 + 1)(k1 + k2)! k1!k2! (k2 − 1)!(k1 + 1)! − k2(k1 + k2)! k1!k2! − (k1 + 1)(k1 + k2)! (k2 − 1)!(k1 + 1)! (cid:19) Thus, the summation of the remaining terms is zero, which completes the proof. Lemma 4. If T2 > T1 then ν is strictly increasing with respect to q, i.e, dν 0, ∀ q ∈ [0, 1]. Proof. dq > a1 + a2 = (k1 + k2)Q(k1 + k2) Since N is large but finite, Q(k1 + k2) = 0 for k1 + k2 > kmax, where kmax is the maximum degree. From Lemma 3, a1 + a2 = 0. Now we prove that a2 > 0. Let k1 + k2 = m. kmax(cid:88) m=1 (cid:20) 1 m(cid:88) q k2=0 (cid:18)m (cid:19) k2 k2 2 a2 = Q(m) m(cid:88) k1=0 qk2rm−k2 − 1 r 16 (cid:18)m (cid:19) k1 (cid:21) k1(m − k1) qm−k1 rk1 dν dq =T1 k1Q(k1 + k2) + T2 k2Q(k1 + k2) where r = 1 − q. Let, a1 = a2 = k1Q(k1 + k2) k2Q(k1 + k2) Adding a1 and a2 we get ∞(cid:88) ∞(cid:88) k1,k2 k1,k2 ∞(cid:88) ∞(cid:88) k1,k2 k1,k2 ∞(cid:88) k1,k2 (cid:18)k1 + k2 (cid:18)k1 + k2 k2 (cid:18)k1 + k2 (cid:18)k1 + k2 k2 k2 k2 (cid:19)(cid:0)k2qk2−1rk1 − k1qk2 rk1−1(cid:1) (cid:19)(cid:0)k2qk2−1rk1 − k1qk2rk1−1(cid:1) (cid:19)(cid:0)k2qk2−1rk1 − k1qk2 rk1−1(cid:1) (cid:19)(cid:0)k2qk2−1rk1 − k1qk2 rk1−1(cid:1) (cid:18)k1 + k2 (cid:19)(cid:0)k2qk2−1rk1 − k1qk2rk1−1(cid:1) k2 The summations are the second moments of a binomial random variable. E(cid:2)X 2(cid:3) = V ar [X] + E [X]2, E[X] = mq, V ar[X] = mqr. Q(m) (mqr + m2q2) − 1 r (m2r − mqr − m2r2) q (cid:21) kmax(cid:88) kmax(cid:88) m=1 a2 = = (cid:20) 1 Q(m)m m=1 > 0 Since T2 > T1, T1a1 + T2a2 > 0, which completes the proof. dq < 0, ∀ q ∈ [0, 1]. Lemma 5. For ψ ∈ (0, 1), if T2 > T1 then ψ is strictly decreasing with respect to q, i.e, dψ Proof. Let, ψ = g(u∗, q) where u∗ is the solution of the fixed point equation u = f (u, q). g(u∗, q) = f (u, q) = ∞(cid:88) ∞(cid:88) k1,k2 k1,k2 (cid:18)k1 + k2 (cid:18)k1 + k2 k2 (cid:19) (cid:19) k2 qk2(1 − q)k1 qk2(1 − q)k1 αk1βk2 P (k1 + k2) αk1βk2 Q(k1 + k2) where α = 1+(u∗−1)T1 and β = 1+(u∗−1)T2. We first show that the solution to the fixed point equation is strictly decreasing with q . Let us consider the behavior of the R.H.S of the fixed point equation, f (u, q), w.r.t. q. Now ∂f (u, q) ∂q = αk1 βk2Q(k1 + k2) (cid:19)(cid:0)k2qk2−1rk1 − k1qk2rk1−1(cid:1) Q(k1 + k2) k2(βq)k2−1(αr)k1 Q(k1 + k2) k1(βq)k2(αr)k1−1 Q(k1 + k2) k2(βq)k2−1(αr)k1 Q(k1 + k2) k1(βq)k2(αr)k1−1 k2 k2 (cid:18)k1 + k2 (cid:18)k1 + k2 (cid:19) (cid:19) (cid:18)k1 + k2 (cid:18)k1 + k2 (cid:19) (cid:18)k1 + k2 (cid:19) k2 k2 k2 17 ∞(cid:88) k1,k2 = β − α k1,k2 ∞(cid:88) ∞(cid:88) ∞(cid:88) ∞(cid:88) k1,k2 k1,k2 − k1,k2 = 0 From Lemma 3, Now α > β because T2 > T1, which implies ∂f (u,q) ∂q < 0. We use the Implicit Function Theorem for computing the sign of ∂u∗ ∂q . Let h(u, q) = f (u, q) − u. According to the Implicit Function Theorem when h(u, q) = 0 du dq = − ∂ ∂q h(u, q) ∂ ∂u h(u, q) ∂q = ∂f (u,q) Claim: ∂f (u,q) We now show that the derivative exists and is greater than zero. The numerator ∂h(u,q) ∂q < 0. The denominator is given by ∂h(u,q) ∂u = ∂f (u,q) ∂u − 1 ∂u > 0 and ∂2f (u,q) Assume the contrary, i.e., ∂f (u,q) ∂u ≥ 1. It can be easily shown that ∂f (u,q) ∂u < 1 when h(u, q) = 0. We prove this by contradiction. ∂u2 > 0 for all u, q ∈ [0, 1]. Thus f is a convex function in u for any fixed q. Also f (0, q) > 0 for all q ∈ [0, 1]. Now h(u, q) = 0 implies that u = f (u, q), or in other words the curve f (u, q) intersects the line passing through the origin with slope 1. Since we assumed ∂f (u,q) at the intersection, and since f (u, q) is monotone increasing in u, the curve f (u, q) will never again intersect the line passing through the origin with slope 1. Therefore the equation u = f (u, q) has a unique fixed point. However, this is a contradiction since u = 1 is always a fixed point and since ψ > 0 there is another fixed point less than 1. Hence, ∂f (u,q) ∂f (u,q) ∂u ≥ 1, i.e., the derivative of f (u, q) is greater than equal to 1 ∂u ≥ 1 is impossible, and therefore ∂u < 1. Thus, the derivative exists and is less than 0 as ∂h(u,q) ∂u h(u, q) < 0. Since we assumed h(u, q) = 0, the derivative du dq is the derivative of the fixed point w.r.t q, i.e., it can be represented as du∗ dq , where u∗ is the fixed point The function g(u∗, q) has the same structure as the function f (u, q), and hence using the same procedure it can be shown that ∂g(u,q) ∂q < 0. The total derivative dψ is given by: ∂q < 0 and ∂ dq dψ dq = ∂g ∂q + ∂g ∂u du∗ dq Since all the terms on the right hand side of the above equation are negative (g is a non decreasing function of u), dψ dq < 0. References [1] J. Leskovec, L. Backstrom, J. Kleinberg, Meme-tracking and the dynamics of the news cycle, in: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp. 497 -- 506. [2] J. Leskovec, A. Singh, J. Kleinberg, Patterns of influence in a recommen- in: Advances in Knowledge Discovery and Data Mining, dation network, Springer, 2006, pp. 380 -- 389. 18 [3] S. Sinha, S. Raghavendra, Market polarization in presence of individual choice volatility, in: C. Bruun (Ed.), Advances in Artificial Economics, volume 584 of Lecture Notes in Economics and Mathematical Systems, Springer Berlin Heidelberg, 2006, pp. 177 -- 190. [4] J. Goldenberg, S. Han, D. R. Lehmann, J. W. Hong, The role of hubs in the adoption process, Journal of Marketing 73 (2009) 1 -- 13. [5] R. Cohen, S. Havlin, D. Ben-Avraham, Efficient immunization strategies for computer networks and populations, Physical review letters 91 (2003) 247901. [6] L. B. Shaw, I. B. Schwartz, Enhanced vaccine control of epidemics in adaptive networks, Physical Review E 81 (2010) 046120. [7] Z. Ruan, M. Tang, Z. Liu, Epidemic spreading with information-driven vaccination, Phys. Rev. E 86 (2012) 036117. [8] M. Starnini, A. Machens, C. Cattuto, A. Barrat, R. Pastor-Satorras, Immu- nization strategies for epidemic processes in time-varying contact networks, Journal of theoretical biology 337 (2013) 89 -- 100. [9] X.-L. Peng, X.-J. Xu, X. Fu, T. Zhou, Vaccination intervention on epidemic dynamics in networks, Phys. Rev. E 87 (2013) 022813. [10] D. Kempe, J. Kleinberg, E. Tardos, Maximizing the spread of influence through a social network, in: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp. 137 -- 146. [11] W. Chen, Y. Wang, S. Yang, Efficient influence maximization in social net- works, in: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp. 199 -- 208. [12] W. Chen, C. Wang, Y. Wang, Scalable influence maximization for prevalent viral marketing in large-scale social networks, in: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp. 1029 -- 1038. [13] A. Karnik, P. Dayama, Optimal control of information epidemics, in: Communication Systems and Networks (COMSNETS), 2012 Fourth Inter- national Conference on, IEEE, pp. 1 -- 7. [14] P. Dayama, A. Karnik, Y. Narahari, Optimal incentive timing strategies for product marketing on social networks, in: Proceedings of the 11th Interna- tional Conference on Autonomous Agents and Multiagent Systems-Volume 2, International Foundation for Autonomous Agents and Multiagent Sys- tems, pp. 703 -- 710. 19 [15] K. Kandhway, J. Kuri, Optimal control of information epidemics mod- eled as maki thompson rumors, Communications in Nonlinear Science and Numerical Simulation 19 (2014) 4135 -- 4147. [16] K. Kandhway, J. Kuri, How to run a campaign: Optimal control of sis and sir information epidemics, Applied Mathematics and Computation 231 (2014) 79 -- 92. [17] K. Kandhway, J. Kuri, Campaigning in heterogeneous social networks: Op- timal control of si information epidemics, Networking, IEEE/ACM Trans- actions on PP (2014) 1 -- 1. [18] A. Barrat, M. Barthelemy, A. Vespignani, Dynamical processes on complex networks, Cambridge University Press, 2008. [19] M. Molloy, B. Reed, A critical point for random graphs with a given degree sequence, Random Structures & Algorithms 6 (1995) 161 -- 180. [20] M. E. Newman, Spread of epidemic disease on networks, Physical review E 66 (2002) 016128. [21] M. Newman, Networks: An Introduction, Oxford University Press, 2010. [22] M. E. J. Newman, J. Park, Why social networks are different from other types of networks, Phys. Rev. E 68 (2003) 036122. [23] M. E. J. Newman, Assortative mixing in networks, Phys. Rev. Lett. 89 (2002) 208701. [24] J. D. Noh, Percolation transition in networks with degree-degree correla- tion, Phys. Rev. E 76 (2007) 026116. [25] X. Wu, Z. Liu, How community structure influences epidemic spread in social networks, Physica A: Statistical Mechanics and its Applications 387 (2008) 623 -- 630. [26] M. Salathe, J. H. Jones, Dynamics and control of diseases in networks with community structure, PLoS Comput Biol 6 (2010) e1000736. [27] M. Nekovee, Y. Moreno, G. Bianconi, M. Marsili, Theory of rumour spread- ing in complex social networks, Physica A: Statistical Mechanics and its Applications 374 (2007) 457 -- 470. 20
1711.11122
1
1711
2017-10-30T03:46:08
"TenisRank": A new ranking of tennis players based on PageRank
[ "cs.SI" ]
In the light of the need to achieve a ranking which is understood by all tennis supporters, the ATP ranking is exposed to constant complaints from players and at the same time exposes new players to be benefited with a good tournament to be able to start progressing in their careers. Moreover, the ATP ranking is not powerful enough to predict with certainty who will be the winner of a match if we are based solely on the positions. In order to combat these problems, the idea of creating a new ranking that can indicate what are the real chances of victory of a player before the start of a new tournament arises. Based on the PageRank method, generated by Larry Page and Sergey Brin, we created a new ranking that specifically uses the characteristics of the tournament to generate data. Based on a history of 40,000 matches, we intend to evaluate how the new method is performed as compared to other existing rankings in order to analyze if we really achieved an improved and real reflection. Once we have obtained the ranking, we intend to evaluate, taking a sample game, the ranking of the players that dispute it and the characteristics of such game to be able to indicate the precise probability for the player with better ranking to win the game.
cs.SI
cs
UNIVERSITY OF BUENOS AIRES SCHOOL OF EXACT AND NATURAL SCIENCES DEPARTMENT OF COMPUTING "TenisRank": A new ranking of tennis players based on PageRank Thesis presented to qualify for the title of Bachelor of Computer Science Alex Aronson Director: Bachelor Ernesto Mislej Co-Director: Dr. Flavia Bonomo Buenos Aires, 2015 "TENISRANK": A NEW RANKING OF TENNIS PLAYERS BASED ON PAGERANK In the light of the need to achieve a ranking which is understood by all tennis supporters, the ATP ranking is exposed to constant complaints from players and at the same time exposes new players to be benefited with a good tournament to be able to start progressing in their careers. Moreover, the ATP ranking is not powerful enough to predict with certainty who will be the winner of a match if we are based solely on the positions. In order to combat these problems, the idea of creating a new ranking that can indicate what are the real chances of victory of a player before the start of a new tournament arises. Based on the PageRank method, generated by Larry Page and Sergey Brin, we created a new ranking that specifically uses the characteristics of the tournament to generate data. Based on a history of 40,000 matches, we intend to evaluate how the new method is performed as compared to other existing rankings in order to analyze if we really achieved an improved and real reflection. Once we have obtained the ranking, we intend to evaluate, taking a sample game, the ranking of the players that dispute it and the characteristics of such game to be able to indicate the precise probability for the player with better ranking to win the game. Keywords: Sports Ranking, Tennis Ranking, PageRank, Ranking Methods i ACKNOWLEDGMENTS To Ernesto for having guided me, for his patience, his good predisposition and encouragement at each stage of this whole process. To Flavia for the trust and for having helped me to find an idea that allows me to bring my two passions together: Sports and computing. To my parents for each advice provided since primary school to this moment. For always worrying about my career evolution and insisting for me not to give up. For supporting me in each one of my decisions. I was given everything I needed to get here in the best way and I am infinitely grateful. To Melu for accompanying me throughout my career unconditionally. For understanding my craziness attacks, my nerves before exams and helping me overcome them. For never letting me fall. To my sisters for their every day support. To my grandparents for always being around and happier for this moment than me. To my friends for the thousand-cancelled hanging-outs, for the words of encouragement at all times. To my fellow students for having helped me make the University a pleasant place. To my co-workers for helping me reach the goal without putting obstacles in the way. To Marcelo Albamonte for helping me visualize the number of things that can be done in sports based on what I learned at the University. To Jorge for being my support in rough times and for accompanying me in good times. To my University teachers, for all they thought me during these years. Ii To my zeide Ernesto and my uncle Héctor. To my family and to Melu. General index 1.. RANKINGS IN GENERAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1. Introduction to the Rankings . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2. Sports Rankings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3. Predictive Rankings v. Qualifying Rankings. . . . . . . . . . . . . . . . 2.. ATP RANKING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1. Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2. ATP Ranking System. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.3. Critics to the ATP Ranking. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.4. ATP as a predictive model. . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.. PAGERANK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2. PageRank History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3. Definition and Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.4. PageRank Uses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5. PageRank as a tennis ranking . . . . . . . . . . . . . . . . . . . . . . . . 3.6. PageRank v. ATP Ranking. . . . . . . . . . . . . . . . . . . . . . . . . . . 4.. PARAMETRIC PAGERANK . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2. Data Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3. Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.1. 4.3.2. 4.3.3. 4.3.4. Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Type of tournament and instance reached . . . . . . . . . . . . . . . . . . Surface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv 1 1 1 2 3 3 6 6 6 9 9 11 14 14 14 15 16 16 19 20 22 25 30 30 30 32 33 34 36 39 43 43 44 44 45 48 4.3.5. 4.3.6. Parameter combination . . . . . . . . . . . . . . . . . . . . . . . Results of itemized parameters . . . . . . . . . . . . . . . . . 5.. ESTIMATION OF THE PROBABILITY OF VICTORY . . . . . . . . . . . . . 5.1. What is the probability of victory? . . . . . . . . . . . . . . . . . . . . . . 5.2. How do we calculate it? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3. Comparative of P(Victory) . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.1. Specification based on specified parameters . . . . . . . . . . . 5.4. Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.. Future work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.1. Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2. Implementation of the new PageRank model . . . . . . . . . . . . . . . . 7.2.1. 7.2.2. 7.2.3. Parametric PageRank . . . . . . . . . . . . . . . . . . . . . . . . . . Best parameters calculation . . . . . . . . . . . . . . . . . . . . . Probability of victory and AUROC . . . . . . . . . . . . . . . . . . . 1. RANKINGS IN GENERAL 1.1. Introduction to the Rankings In our merit-based society, the concept of ranking is radical. In general, society consumes the best product, search engines show the most relevant document and people follow the statistics of their favorite team. The massive consumption of rankings in various contexts made it necessary to develop many algorithms to achieve more efficient and reliable rankings. As defined, a ranking is a classification from highest to lowest to set valuation criteria. In general, a ranking is materialized as a list that will set a relation between a set of elements joined in such list due to one feature in common. Rankings are generally used in several areas to set some levels or determine them. This can appear in the musical environment as well as in the world of finance and business, for example, where we usually encounter different rankings of either most successful companies or best-selling products in the span of a month; richest men in the world, and the like. Regarding fashion and beauty, these industries have rankings as well, which are prepared by specialized magazines in subjects such as, for example, best and worst dressed people. Finally, and the focus of our study, this also happens in sports, where it is possible to meet with countless rankings such as the ranking of top scorers in soccer, best tennis players or the FIFA ranking that indicates which soccer teams are the best, among others. 1.2. Sports Rankings Sports rankings are designed for several purposes. Some of them are commercial, for example, to ensure the presence of teams or players in some tournaments. Perhaps equally important, both news media and economically interested observers in the game use rankings as a way of receiving advice and assessing who are the best players or teams today. Moreover, players often mention as one of their biggest motivations the position in the ranking in which they and their team are qualified. It can be argued that no ranking system accurately reflects 1. RANKINGS EN GENERAL 2 the performance of each player, but it is rather a simplistic method to determine who is playing in the best way at any given time of the season. Sports rankings also have a social function. In order to capture the largest number of people for them to consume professional tournaments, there may appear rankings that are simple to understand, so that all spectators can be attracted to the different matches of the tournaments. However, in times when it is possible to have so much statistical information thanks to digital means which reflect data that were previously impossible to calculate easily, an opportunity appears to generate more accurate rankings to indicate who are the best players, but difficult for society to understand. Another important use of the rankings is their predictive nature, where it can be determined who will be the winner of a match by looking at the positioning of the pertinent players. Many betting houses take these factors to place payment value for each play. 1.3. Predictive Rankings v. Qualifying Rankings In general, most ranking systems fail in one of two categories, either they are predictive, or they are qualifying. The objective of the qualifying rankings is to indicate teams based on their participation in a certain competition throughout the season. Rankings allow to choose a champion or to use a reference team to indicate a set of teams that has ranked for its position in the ranking to participate in a particular tournament. The goal of a predictive ranking, however, is to provide the best prediction about the outcome of a match in which two players or teams will face each other. An objective qualifying ranking should take as determining factors who was the winner or the score difference between players, or a combination of both. The use of a well- defined criterion allows teams or players to know exactly the consequences of winning, drawing, or losing a game. This is generally used in leaderboards for sports where each team or player receives a position, the lowest being the best ranked. On the other hand, for the creation of predictive rankings as accurately as possible, it is allowed to include any useful additional information, such as: goals in favor of a team, matches won, scorers in the case of soccer or special features of certain tournaments and the backgrounds of each team at those tournaments or versus those rivals, among other aspects. 2. ATP RANKING 2.1. Background It is a universal goal of the players: to become the World's No. 1. Children dream of doing it, the effort is put into it. However, this is still one of the most elusive achievements in sports. In the 40 years of life of tennis rankings, only 25 players have reached the top of the (now) Emirates ATP Ranking, and only 16 finished the season as No. 1. As stated in [1], since the beginning of the tennis Open Era in 1968, rankings were largely a subjective calculation generated by national associations, different circuits and specialized journalists who created their own lists. Some players were on a roster of tennis players who could help sell tickets for the event, placing them as a priority over others on the tournament acceptance list. This caused great concern in those who did not have a big name and were at the verge of being excluded from events. In August 1972, it became apparent that the newly created Association of Tennis Professionals would be necessary to establish a single classification system, without personal judgements or biases. This would determine the form of entrance to the tournaments and would mark an objective sample on the performance of the players. Twelve months after the creation of the ATP, Ilie Nastase became the first No. 1. The tournaments were initially divided into categories –A, B, C, etc.–, which allowed the event organizers to select the players according to their ATP classification and determine the seeds. The results of the tournaments were sent to the ATP where they were processed, then, the ranking was generated in huge perforated sheets and once a month they published the new ranking of players. In the following years, after 11 publications in 1973, the ATP Ranking began to be published more frequently –1974 (11), '75 (13), '76 (23), '77 (34), 78 (40)– until 1979, when it was published once a week, 43 in the season. The international ATP Rankings of August 23, 1973 was an average system, points earned over a period of 52 weeks were accumulated and then divided by the total number of tournaments played (with a minimum divisor of 12). The tournaments awarded points according to the prizes (minimum 25 thousand Dollars), the size of the table and its difficulty. The merit-based system was supported by the players. Following several changes to the points counting system, in the year 2000 and in order to encourage greater participation in Grand Slams and in the series of nine most important tournaments, 3 2. ATP RANKING 4 of the ATP (now known as the ATP World Tour Masters 1000), the qualifying or classification system began counting 18 events for most players. The 13 results of the Grand Slams and ATP World Tour Masters 1000 tournaments would count, as well as the top five performances of one player in the events of the International Series (now ATP World Tour 250 and 500). 2.2. ATP Ranking System The Emirates ATP Rankings are the unbiased historical method based on merits to determine acceptance and seedling in all tournaments for singles and doubles. As explained in [2, 3], the period that the Emirates ATP Rankings take is the last 52 weeks, however they do not take all the tournaments in which a player participates during that period. The ATP Ranking is based on the total points scored by one player in the four (4) Grand Slams, eight (8) of the nine (9) ATP Masters 1000, and their best six (6) results from the rest of the ATP tournaments in which he participated. For non-Top 30 players who do not directly qualify for the ATP Masters 1000 and Grand Slam tournaments, if they do not play one of them, a seventh tournament is taken into account for the rest of the tournaments played during the year. At the end of the season, the London-based ATP World Tour Final is played, where the top seven (7) players are automatically ranked as well as the winner of one of the Grand Slam tournaments (if he is already qualified, the eighth player as per the ATP Ranking also qualifies). Scoring system per round achieved in each tournament type. 2.3. Critics to the ATP Ranking According to [4], there are many critics of players to the scoring system of the ATP Ranking, many of them made by the most important players like Rafael Nadal. The current ATP Ranking holds measurements over 52 weeks, which can make the ranking somewhat inconsistent week by week. For example, in the hypothetical case where a player wins an ATP Masters 1000, he would accumulate those 1000 points for 51 weeks from the end, but if he does not repeat the title, 53 weeks after 5 2. ATP RANKING receiving the trophy, he will no longer have those 1000 points. The potential oscillation between two positions in the ranking with such close dates does not really reflect the true ranking of the players. On the other hand, all tournaments of the same level add the same amount of points, regardless of the players who participate in it. When counting only 6 of the tournaments not considered "big", a player can participate in as many tournaments as he can, aimed at increasing his score and obtaining the possibility of being pre-qualified in "big" tournaments and obtaining a more favorable classification. Finally, the current ranking system penalizes those who get an unfortunate draw in big tournaments. If a player always has to play against a Top 10 in the first round, his chances of moving up his ranking are small. 2.4. ATP as a predictive model If we look at the ATP Ranking not only as a qualifying ranking but also as a predictive ranking, we could try to predict who may be the winner before each match based on the players' rank. Considering the player with the lowest number in the ranking as the player with the best present at that time, we evaluated in games from 2005 to 2013 how this predictive model worked. Therefore, we obtain: ATP YEAR 2005 2006 2007 2008 2009 2010 2011 2012 2013 66.430% 66.494% 65.455% 66.990% 68.072% 66.641% 67.758% 67.908% 65.892% TOTAL AVG. 66.849% Efficiency of the ATP Ranking as a predictive system We can argue that the ATP Ranking matches in approximately 2/3 of the matches as established. It can also be interpreted that in about 2/3 of the cases the best positioned player is the winner of the match. The way it is being evaluated is by counting the number of matches where the best placed player won, i.e. a HIT, over the total number of games played during the period under evaluation. 3. PAGERANK 3.1. Introduction PageRank is an algorithm used by Google Search to rank websites in order to valuate and differentiate them according to their importance. PageRank measures the "authority" of a page on several specific topics. The more authority, the more chances this website will have to appear in the top positions of related searches. It is measured by knowing the number of links that point to that page, along with the authority of the page that links it and the way it does it. Each link counts as a vote or a recommendation. And the recommendation is as important as the one who recommends it and how he does it. That is to say, that if the adviser has greater weight, his recommendation will be of greater importance as compared to the recommendation of another site. 3.2. PageRank History Faced with the immense growth of the Internet and the large number of heterogeneous pages on the web, search engines were forced to improve their rankings to provide inexperienced users with the best answers. In their beginnings, search engines functioned as websites crawlers in which the terms found on the pages were listed. When a word was searched in the search engine, it was searched in the term listings and pages where they appeared. The sorting method was based on the number of times a word was mentioned, which could lead to spam cases where everyone on their site regardless of topic repeated the most searched words to be able to bring traffic to their website. Analyzing this and considering that although the number of sites had increased, they were still hypertexts that provided additional information, a ranking called PageRank was created as a method to compute each existing page as a node of a great graph that formed the web. Each node had a degree of importance that corresponded to whether it was an important page. This was determined based on how many links reached each node. The algorithm was patented by Google founders Larry Page and Sergey Brin when they were doctoral students at Stanford University in 1999 [6, 8]. Page was a PhD student of Terry Winograd, who seems to have encouraged him to work on PageRank, and Brin was a Ph.D. student of Jeffrey D. Ullman, the 6 3. PAGERANK 7 famous author of the compiler book with Aho, although he soon joined Page to work on "more interesting" topics than his director offered. This algorithm was used to power a new search engine called BackRub, which later became known as Google. The Internet is today what it is thanks to the great effort they had to order the information in a relevant way in an environment in which the big portals had sold the results of the searches to the highest bidder. Out of the 24 million web pages that its first version managed to index, the Internet has grown today to surpass, according to estimates, the 4,000 million different addresses. Since the algorithm has to find not only the first-order links that a page receives, but also those of higher orders, the real problem is not found in the original idea of how to measure relevance on the Internet, but in how to index the highest percentage of existing Internet sites and to evaluate the links that enter and leave each site. 3.3. Definition and Algorithm Based on the concept of centrality of a graph, in which a value is given to a node based on its location, it is possible to determine which node is the most influential of the graph in its adjacency matrix. A node with a high value indicates that such node is connected to other nodes with considerable value as well; the higher the value of the node, the more to the center its location. Using these concepts comes the creation of PageRank which, precisely, is a function that gives a value to each node corresponding to a web page. The web is considered as a directed graph connected by the hyperlinks of the pages that are pointed, i.e., each edge represents a link between the outgoing node to the incoming node. Any random site is taken as a starting point to click on the different links, navigating this way from page to page. The PageRank value of a page corresponds to the frequency with which any browser visits a page. The more time a user spends on a page, the more important the PageRank on that page. Due to the current size of the web, Google search engine uses an approximate iterative value of PageRank. This means that each page is assigned an initial PageRank value, and then the PageRank of all pages is calculated with cyclic calculations based on the formula of the PageRank algorithm. On a more formal note, as stated in [18], the general value of the PageRank of any page can be represented as: Where u is a website, Fu is the set of pages pointed by u and Bu is the set of pages pointing at u. Nu = Fu is the number of links of u and c the factor used for normalization. 3. PAGERANK 8 We started by defining a simple R ranking as a simplified version of PageRank: The most popular pages are those that receive more edges from other pages or nodes of the graph. An important feature of the PageRank algorithm is that it assigns weights to the edges. These are taken into account as the main tool for the final calculation of the ranking. In the algorithm of PageRank each site counts as a link, however the weights of the edges accumulate as the nodes of the graph are connected. The weight of the page is calculated by adding the weights of the links it receives, while the weight of the edges has the value of the division of the weight of the page for each link to which it refers. This causes the most important pages to have a greater influence on the value of the PageRank than the less popular pages. Calculation of PageRank with weight in the edges Once the weight of each edge is calculated, an adjacency matrix is generated to calculate the positions that each page will take in the ranking. 3.4. PageRank Uses The PageRank algorithm is very useful as a popularity indicator. Given any directed graph, it is able to indicate which node is the most important and thus be able to build a ranking on each of them. 3. PAGERANK 9 As stated in [7], the PageRank algorithm is not only used as one of the main factors for Google site positioning. Considering its rankings ability, it is also used by large companies to build particular rankings, regardless of search engines. For example: Twitter tweets ranking: It is done by relating the mentions from one user to another, thus forming a graph where the nodes are the users and each mention indicates an edge directed from one user to the other. Recommendation systems: It can be used in recommendation systems based on products consumed by a user. For example, Netflix can recommend movies based on cases of similar users. Social networking friends suggestion: Considering that each user feeds and is fed from other users, a PageRank system can be generated to suggest new friends based on those already connected. 3.5. PageRank as a tennis ranking Based on [9, 12, 13], there are different alternatives to the ATP Ranking in which the main objective is to get to a better reflection of who the best players are today, and in which position each one is located. One of the algorithms that can be taken as a model to generate a new ranking is PageRank. Based on the paper On the (Page)Ranking of Professional Tennis Players, written by Dingle, Knottenbelt and Spanias [11], a new tennis ranking is generated, where each node is a player and a directed edge of connection is traced between nodes given the result of a match. When one player wins another, an edge of weight 1 (one) is added from the losing node to the winning node. Once all the games have been evaluated, the PageRank algorithm is applied on that graph and thus a ranking is obtained based exclusively on the history of the results of the matches, unlike the ATP Ranking where the tournament instance is evaluated. We generate a graph based on the results of the matches of a tournament. 3. PAGERANK 10 From this graph, the PageRank manages to generate a ranking for the participating players. Position Player 1 2 3 4 5 6 7 8 9 10 Djokovic N. Nadal R. Federer, R. Murray A. Ferrer D. Del Potro J. M. Rodick A. Tsonga J. W. Soderling R. Berdych T. Finally, this method, unlike the ATP Ranking, also allows us to build a ranking with players from different times. Graph generated by the results of ATP matches taken from [10] 3. PAGERANK 11 3.6. PageRank v. ATP Ranking Comparing the ATP Rankings versus the ranking generated through a PageRank algorithm we can observe that they can have many variations between the positioning assigned to some players by one system and by the other. Comparative ranking ATP vs. PAGERANK extracted from the paper by Dingle, Knottenbelt and Spanias. [11] 3. PAGERANK 12 Comparison ATP Ranking vs. PAGERANK prior to US OPEN 2013 In the case of the chart we can see that when starting the US OPEN 2013 (Grand Slam Tournament) they have variations except in the first two places in the ranking. For this tournament, once finished, the ATP rankings hit the results by 70.25% while the rankings put up by PageRank had a greater efficiency when achieving a positive 72.72% of the results. Finally, we evaluated year-on-year performance of the PageRank in comparison to the ATP Ranking. 3. PAGERANK 13 Comparison ATP Ranking vs. PAGERANK As it can be seen, this new ranking system achieves greater precision if we evaluate it as a qualifying ranking. That is to say, taking the results between the players as a reference and connecting them to be able to generate a ranking is much more effective at the time of predicting the result than evaluating only the instance of the tournament to which they arrive as does the ATP Ranking. 4.1. Motivation 4. PARAMETRIC PAGERANK Given the good results that were obtained using the PageRank method above the ATP Ranking, we came up with the idea of looking for a better alternative that would improve both existing methods. This new method had to be able to counter the criticism of the players to the ranking used today and at the same time be more efficient and able to reflect the true position of tennis players in a ranking, as compared to the methods already evaluated. As we have seen, the difference of the ATP Ranking in comparison with the PageRank ranking is that the first evaluates the players according to the instance they reached in the tournaments played, while the other evaluates the match-by-match results they have had in the last period. That is why we ask ourselves: Is it correct to evaluate only the instance of the tournament to which the players get? Is it correct to evaluate only 52 weeks back to know the present of a player? Do all matches won by a player over another have the same value? Is the context in which each victory is developed not relevant? Given these questions that the idea of combining both models arises. Considering PageRank as a more effective model than the current ATP Ranking, we use it as a base scheme to design a new ranking. In this new system, not only will the results between players be taken into account, but also other important attributes, such as the instance of the tournament in which the encounter took place (as in the ATP Ranking), the surface in which each match was played and the age of each one of those encounters. We will look for the parameter that best represents each of these attributes and a weight will be assigned corresponding to each edge of the graph. Then the different parameters will be combined to achieve a ranking generated by the evaluation of all the abovementioned factors. 4.2. Data Set As retrieved from www.tennis-data.co.uk, there is a set of data from each of the 923 tournaments played between 2000 and 2013. By analyzing each of these tournaments, results can be taken from almost 40,000 matches with a detail of the type of surface of each game (hard, clay, grass), the date of each match, the importance of the tournament (ATP250, ATP500, MASTERS1000, Grand Slam, Master Cup). 14 4. PARAMETRIC PAGERANK 15 The result of match set to set is also indicated, the original ATP Ranking of each player at the time of the game, and the amount of bets paid for the victory of each player. All of this data was cured, tournament names, players and tournament type were unified and rolled into 3 tables of a MySql database for better reading. The tables are standardized by Players, Tournaments and Matches. (More info in the Appendix). On the other hand, information was captured on the ATP website (www.atpworldtour.com) in which the top 100 ATP Rankings are processed since 1973. 4.3. Model Similar to [11], a directed graph will be generated for each tournament corresponding to its matches. Each edge will be strictly linked to the result of the match, and, by scrolling the list of matches, there will appear a number of assigned years, prior to the tournament to be evaluated, which in turn are added to a directed multigraph, from which we will finally calculate the PageRank. Our proposal consists, unlike the aforementioned PageRank, of including a value as a weight of each edge, where each match will have a different value in our multigraph. For such purpose, we will take into account 3 attributes that will help to calculate the corresponding weight for that match: Aging: It considers how old is the game under evaluation with respect to the tournament from which the ranking will be taken. Surface: It evaluates the difference of surface in the match under evaluation with respect to the tournament from which the ranking will be taken. Type of tournament and instance reached: It evaluates the type of tournament and the instance of that tournament in which the game was played just like ATP does. As a development from this model, we will first analyze aging in years and tournaments that we will look back to be able then to evaluate each parameter individually and find the best value to generate a combination of them. In this way we will create a parametric PageRank more effective than the ATP ranking and the existing PageRank. Finally, the weight of each bow will be indicated under the following formula [where PESO is weight, Arco is edge, Envejecimiento is aging, Superficie is surface and Instancia is instance]: WEIGHTEdge = WEIGHTAging ∗ WEIGHTSurface ∗ WEIGHTInstance 4. PARAMETRIC PAGERANK 16 4.3.1. Age Is it correct to take only 52 weeks as a reference to generate the ranking? As it was already mentioned, the ATP Ranking is generated based on the sum of points obtained in the tournaments that took place in the last 52 weeks. In order to study if this was correct or if better results could be obtained if we looked at older matches, we evaluated different age parameters to know how many years backwards it is advisable to consider in order to obtain better results. For this, each calculation of the different parameters that will be taken into account in the weight of the edge will be evaluated taking into account multiple years of age and choosing the one with better efficiency. 4.3.2. Aging Is it correct to evaluate all matches in the history with the same weight? Unlike the ATP Ranking or the PageRank generated in the previous chapter, we will be evaluating many years back to be able to achieve a ranking more effective than the previous ones. However, we believe it is not correct to weigh equally matches that were played long ago compared to more recent matches. That is why we will take the aging factor as one of our parameters. For such purpose, we will evaluate how a ranking will be calculated to give less weight to matches which are more distant in time and give a higher weight to those which have been played lately. Exponential Decay To represent the aging factor in the best way, we find in the Exponential Decay process a way of expressing the weight, in which the older matches had less weight than the new ones. The Exponential Decay formula is represented as follows: Where N(t) is the weight to be assigned to the match represented in time t, which indicates the time difference between the tournament for which the ranking is being generated compared to the tournament under evaluation. The Exponential Decay model is characterized by its rapid decrease, thus achieving very low values for those older matches. 4. PARAMETRIC PAGERANK 17 By modifying the corresponding λ the drop speed can be adjusted. Considering this, we evaluate the best value of λ and evaluate it with the new ranking system generated. For this we will take as age of the tournaments 3 and 5 years, that is to say, the graph will be composed by nodes and edges corresponding to matches as old as these. Comparison of the ATP Ranking and generated PageRank, as compared to the new model taking 3 years of age. 4. PARAMETRIC PAGERANK 18 Comparison of the ATP Ranking and generated PageRank, as compared to the new model taking 5 years of age. As it can be seen, if we set an age of 3 years with a value of λ in the Exponential Decay of -5, we obtain an improvement as a predictive ranking of 1.3% with respect to the ATP Ranking and of 0.8% with respect to the PageRank in which all its edges have equal weights. 4.3.3. Type of tournament and instance reached Is it the same to win a match of a first round than a final? And to play an ATP 250 than a Grand Slam? As we all know, tennis is a sport of high individual rivalry. Each match is loaded with pressure and the state of mind is different according to the importance of the match. That is why we consider it is not correct to assign the same weight to matches of different tournaments and matches in different rounds. In the same way ATP does, we will try to generate the weight of the graph's edge according to the round of the tournament in which the match evaluated is taking place in order to generate the PageRank. For that we will use a formula that has a quantity of points assigned similar to the one delivered by the ATP. The formula is: Where the value of the round reached in that tournament is the numeric value that represents the number of round reached depending on the type of tournament. We will look then for the λ between 1 and 2 that behaves better as a predictive ranking and at the same time comes close to the ATP ranking. 4. PARAMETRIC PAGERANK 19 Evaluation of the corresponding λ to score the round of the tournament reached. It can be observed how the λ in 1.3 it is barely above than what the existent PageRank manages to predict although it has a much less variance. By comparison we did achieved a difference of at least 1 point in respect of the ATP ranking. 4.3.4. Surface How much is the influence in the matches history to play in the same surfaces opposite to different surfaces? There are three types of surfaces in the ATP circuit: Hard, Clay, Grass. Each one of those surfaces has different characteristics. In clay, for example, the ball has a much slower speed and it is easier to slide through the court. In cement, the ball goes at a higher speed and with more pronounced bounces, while in grass, besides having a great speed, the ball does not usually gain height. Given these characteristics, there are players that know how to better develop their game in some surfaces, while in others they do not achieve a good performance. And because of this characteristic, it came up the idea of differentiating the weight of an edge that represents each match of the history, based on the surface of that game regarding the surface of the tournament we are trying to predict. We generated a matrix in which the edges corresponding to matches played in the same surface than the tournament to be predicted the highest value that is 1 (one) is assigned as weight, while the edges corresponding to matches played in a surface different than the one of the tournament to be predicted are assigned a weight that we will calculate. 4. PARAMETRIC PAGERANK 20 Evaluation of surfaces under different parameter values in different surfaces As it can be observed, by evaluating the rest of the surfaces with a parameter of 0.5 an efficiency of 1.7% greater with respect to the ATP ranking while we surpassed the static PageRank for almost 1%. Knowing these results, we evaluated the results differentiating the surface. It is worth to note that most of the matches of the season take place in the hard court, followed by clay, while only a few of the weeks of the season are played in grass. We can observe that even though each surface behaves better before a different parameter, in each one of them with the best choice our model behaves better than the ATP ranking in any of the surfaces. Evaluation of clay surfaces under different parameter values in different surfaces 4. PARAMETRIC PAGERANK 21 Evaluation of hard surfaces under different parameter values in different surfaces Evaluation of grass surfaces under different parameter values in different surfaces 4.3.5. Parameter combination With the certainty that our model behaves better than the previously mentioned, we look for the best combination of parameters in order to obtain a more efficient result than when we observe the attributes in particular. For that we will combine the parameters and we will use the multiplication of them like weight of the edge within the formed directed multigraph from which the PageRank will be calculated. 4. PARAMETRIC PAGERANK 22 As a first intuition we tried the combination of the best parameters that we got particularly. Meaning that we took a 5-year aging with an Exponential Decay of -5 as λ, we will use 1.3, and as surface 0.5 to calculate the tournament round reached. As a result of this combination we have: Evaluation with the best parameter calculated individually In spite of obtaining a better result, we chose to look in every parameter the best combination possible to obtain an even better result. For that we put together an algorithm that will make a greedy search in which within a vector three of the four values will be fixated that we are repeating and the other we will repeat it until we find the best result, then we will go changing the vector fixing different values. We will do this until after several runs, we will manage to obtain the best result, meaning that after trying with all the parameters again, none of them were modified, for which our vector is a local optimum for the problem. We evaluated the best parameters by generating a testing set composed of the matches of 90 tournaments, 10 by year, and as a result, the combination: Age: 4 years Aging: -5 as value of Exponential Decay Surface: 0.3 as value for different surfaces Tournament and round: 1.7 as value of λ to assign a score to the played round of the tournament Combining these values we obtained: 4. PARAMETRIC PAGERANK 23 Evaluation with the best parameter calculated after obtaining the best results evaluated with the algorithm As it can be seen, an approximation to 70% of hits in the evaluated tournaments, achieving 3 points of improvement with respect of the hits of the ATP in its weekly ranking and 2.2 with respect to the existent PageRank model. Boxplot of predictive rankings compared, ATP, PageRank and Parametric PageRank In the boxplot type graph we can notice that regarding the median of the Parametric Pagerank is above of the rest of the rankings studied. It can be noticed that the minimum result obtained with the suggested model, reaches the mean of the Pagerank existent and surpasses the ATP ranking. 4. PARAMETRIC PAGERANK 24 It can also be observed that the suggested model as the table shows, has around 70% of hits, counting with results that even surpass this calculation. By using the statistic test ANOVA (Analysis of Variance) we could confirm that there is not a considerable difference in the effectiveness shown comparing the ATP with the existent Pagerank (p = 0.14). Meanwhile we see a great difference between the results obtained by the ATP ranking and the Parametric Pagerank (p = 0.000024) and also an important difference regarding the existent Pagerank (p = 0.00079) 4.3.6. Results of itemized parameters Before the finding that the presented model achieved a predicting character better than the rest of the existent models, we started to investigate if it behaved in a similar way in different laid out existent situations in the tennis tournaments and matches frame. That is why we itemized the matches based on the surface, ranking of players and type of tournament in order to find in which frames our model had better predictions and in which had worse. Surface: In these cases we trained with all the surfaces but only tested on one particular surface Comparison by hard court Comparison by clay 4. PARAMETRIC PAGERANK 25 Comparison by grass As it can be observed, our model achieves better results in every surface, achieving a greater possibility of prediction in those matches played in grass where it comes closer to the general average of the model and achieving 2% more than in the ATP ranking. It can be also observed that both on hard court and in clay, our model is the one with the most hits even though the difference with other models is smaller. Ranking: In these cases we will evaluate the matches between similar ranking players and that only belong to that delimited ranking group. Comparison matches between top ten Comparison matches of the ranking 11 to 50 4. PARAMETRIC PAGERANK 26 Comparison matches of the ranking 50 and on In this comparison we can observe that in the three cases our model surpasses the ATP ranking while it has an amount of hits similar with respect to the original Pagerank model. In case of the matches between top ten players we achieved a difference greater than 3 points with respect of the ATP ranking. Which indicates that for matches between the great players, where the difference is much lower since the players involved are from the world top ten, our model accomplishes, as in the original Pagerank, to behave in a manner similar than what it does the ATP ranking. For the rest of the cases, the model created achieves an improvement for two of the existent models, even though the difference is not substantial, our created ranking manages to achieve with a greater certainty who will be the winner of a match or a tournament if players in those positions play. Type of tournament: In this case we will evaluate the results according to the importance of the tournament that is being played. It is worth to note that the most important tournaments have a greater number of participants and a greater number of matches to be analyzed. Comparison tournaments ATP 250 4. PARAMETRIC PAGERANK 27 Comparison tournaments ATP 500 Comparison tournaments Masters 1000 Comparison tournaments Grand Slam Comparison tournaments Masters Cup As it can be observed, it is important to highlight that in the five types of tournament analyzed, our model accomplishes a better prediction than the rest of the analyzed models. 4. PARAMETRIC PAGERANK 28 Excellent results can be observed of hits in the Grand Slam and Masters Cup tournaments, reaching almost 74% within the first ones and achieving a 72,6% in the second ones. However, it is not in these tournaments where a greater difference is achieved in terms of the existent rankings. In the ATP 500 and Masters 1000 tournaments a difference is achieved with respect of the ATP of approximately 2.5%, what makes our model much more reliable. 5. ESTIMATION OF THE PROBABILITY OF VICTORY 5.1. What is the probability of victory? As we have seen, we created a model capable of predicting the results of a given tournament with more effectiveness than what does today the ATP ranking, and the existent Pagerank model. Before this scenario, the idea comes up of not only to be able to predict the result of a match based on the ranking, but also to determine with which odds the result of the player that is ranked better will be victorious in front of one ranked worse. It is here where the odds of victory come up, that determines, given r1 and r2 (the rankings of the players that will play) and considering its difference, how firm are the odds that the better ranked triumphs. 5.2. How do we calculate it? In order to find this chance of victory, we will first determine the efficiency that we had in our ranking if we grouped by the ranking difference. Meaning that for every game, we analyze not only the result, but also considering the ranking difference delivered by our model, how it behaved for that delta. Evaluation of efficiency of victories based on ranking difference provided by our model 30 5. ESTIMATION OF THE PROBABILITY OF VICTORY 30 By analyzing the graphic obtained, we want to find the function that comes closer in the best possible way to every point of the graphic, for that we will use the regression model that will allow us to reach the objective in the best way. Based on the paper [15] in which a similar scheme is used for soccer teams and considering that our graphic is similar to an exponential curve, we will look for the exponential that covers all the indicated points. We will first define a model function that we consider more appropriate in base to the obtained. For that we will use a logistic that is characterized for representing the growth of organs from a small initial state, during which the growth is proportional to the size until the last stage where the size is similar to an asymptote. Considering that our graphic starts in the initial point where the ranking difference between the players is minimal and then starts to grow up to the point where as the ranking difference grows the number of hits is considered permanent we can indicate that it has a behavior similar to an asymptote. That is why we can use the logistic function suggested in our case. The function is of the type: Then we must take the following steps: 1. Estimate the parameters of the regression model. This process is called adjustment of the model to the data. 2. Test how good is the adjusted model. The result of this test may indicate if the model is reasonable or if the original adjustment must be modified. By taking these steps, we can determine through the regression model that a = 45,321. In base of this parameter we get 5. ESTIMATION OF THE PROBABILITY OF VICTORY 31 Evaluation of efficiency of victories based on ranking difference and regression curve We can indicate that being this a reasonable curve we may continue to evaluate how it behaves based in our model. 5.3. Comparative of P(Victory) Already knowing the function that represents our probability of victory, and reaffirming that the curve obtained manages a coherent form in front of the scored points, we focus on comparing how optimistic is our chance of victory in front of the probability of victory that may be obtained of the curve based in the ATP ranking or in the existent Pagerank model. For that, we calculated for the top 100 of the players of each model which is the probability of victory of each difference. 5. ESTIMATION OF THE PROBABILITY OF VICTORY 32 Comparison of victory probability of the existent models It can be observed that the suggested model achieves a more optimistic character regarding the victory probability than the existent PageRank and much more even than the ATP ranking. As the graphic shows, from the 20 positions of difference of ranking our suggested model already starts to differentiate itself from the ATP ranking, achieving a victory probability greater than 60% for that with a better ranking. 5.3.1. Specification based on specified parameters As we have seen, in the general framework our generated ranking achieves a probability of victory more optimistic than the rest of the rankings. We can then look for the probability taking into consideration the attributed that were evaluated at the moment of generating the ranking. Based on this a decision tree can be made, which edges can answer to the questions: In which surface it was played? What kind of tournament is the one being evaluated?. By using the same comparison used in the generalized probability, we get to the pages of the combination Surface - Type of tournament, where our suggested ranking achieves to be more optimistic than the rest of the rankings. Putting as an example some of the graphics of the pages obtained, it can be observed that unlike the generalized ranking, the optimism and the probability of victory of the different rankings manage to be more or less pronounced depending on the parameters with which they are calculated. Then, given a match in which we know the positioning of each player in every one of the evaluated rankings, we can determine the odds that the players have of winning in that match by knowing also the type of tournament and the surface of that particular match. 5. ESTIMATION OF THE PROBABILITY OF VICTORY 33 With that in mind, taking into account the numbers seen, if the ranking of the suggested model is taken as a reference, with a lesser difference of the ranking we can obtain a more important bet in which we can determine who will be the winner of the match, since it has proven to be more optimistic than the two other rankings seen. 5.4. Evaluation Since we obtained the victory probabilities and since our model is more optimistic than the existent models, we focused on evaluating the performance on each one of them. For that we used the method of AUROC (Area under ROC). As it is indicated in [16, 17] the analysis of ROC curves is a statistic method to determine the diagnostic accuracy of the tests performed, being used with three specific purposes: To determine the cut-off point of a continue scale in which the highest sensitivity and specificity is reached. To evaluate the discriminative capacity of the diagnose test, meaning, its capacity of differentiating with which odds a player will win a match with a given ranking difference. To compare the discriminative capacity of the diagnostic tests that express results in continuous scales. 5. ESTIMATION OF THE PROBABILITY OF VICTORY 34 The area under the ROC curve is an excellent performance global indicator of a diagnostic test since it makes possible to express it in a simple number. Evaluating P(victory) for the 3 models we get: AUROC comparison As it can be observed, our model is the one with best performance, however, unlike the efficiency shown in the previous chapter, the difference with the ATP ranking is smaller, while the difference with the Pagerank is considerable. If we calculate the AUROC making each game to go in their corresponding edge in the decision tree, we found an improvement, even though it is not too big. AUROC comparison The usage of the P(victory) allow us to widen the usage spectrum of our ranking. In this way it is possible to fix a satisfaction threshold according to our expectations of usage. In the "Future Work" we will expand this aspect. 6. FUTURE WORK As we have seen, the rankings surround us in each of our everyday activities. With this work we have accomplished to introduce a new raking system in a sport environment like tennis, however, the fact that we created a new system and took the chance also to try to predict tennis results opens the door to many works to be made in the future. Application of other known rankings to the tennis environment. As it can be read in the book Who's the #1 [5], through history several ranking generating models had been developed [14], they are used today to classify teams in several sports. These methods, such as the Massey, the Keener, the Elo, among others, are mostly used to generate NFL or chess statistics, but not for tennis. And even though in our model different techniques were used that included their methods, since PageRank already has them, we believe that these methods can be applied purely to achieve different tennis rankings in order to discover which ranking best classifies the players today. Application of our parametric PageRank method in different sports. The generated method proved to behave better than the ATP ranking with which tennis players are classified nowadays. With these favorable results, a door opens to apply this ranking system in other sports where the results are zero sum and allow us to generate a PageRank in which the edges can be directed with different weights evaluating the characteristics of the played match. That is why the ranking can be applied in any racket sport and also in particular leagues, such as NFL or NBA. Regarding sports such as soccer, it can be applied as long as it is used for a national league, not international. The way in which this ranking is created, does not allow to know in these sports which one will be the best team in the world, since the matches between interleague teams are very few to contemplate that result. Application of our parametric PageRank method in different environments. Outside of the sport environment, it can also be applied in different environments such as fashion or culinary, or in any other field in which tournaments or contests are held throughout the year in which the participants can be ranked. For example, in the culinary contests that take place, a graph is generated exactly like if it was a tennis tournament, and then throughout the year the tournaments are gathered in order to indicate who is the best chef, applying the weight of the topic of the contest 36 36 6. Future work held in the edges. The same application can be made with designers or even with videogame players. Tool for help in bets. With the results obtained, a great question comes up, can the generated ranking be used to gamble? Even though at first sight it appears that the numbers obtained are good and even with the P(victory) we can indicate in a given match which are the odds of a player or the other winning, this thesis opens the door to a more concrete analysis on the subject. We believe that the creation of a gambling assistant that can indicate which bets are the most reliable to make and which ones will deliver more money. Having the probability of victory in each game, we can indicate the minimum value of probability for which is advisable to make a bet. We can also try to indicate in the long term, the winners of the tournaments so that we can get a greater winning in a bet in case we win it. Other functions of this tool may be the simulation of how much money we can get by putting an initial amount and always betting to the winner that our ranking indicates based on the classification. We can make this by using our database since we have the bet values in the match history. Season planification for players. Using the victory probability and the generated model, we can work on the planning of the season of a player, finding what tournaments are best to play and arrive better prepared, prioritizing the ones that will potentially provide an improvement on the ranking. The same can be done by match, even by going to play knowing what the concrete chances of victory are. Seizing also the fact that our ranking can be easily differentiated by surface, type of tournament, and round, the strengths and weaknesses of the players can be known and see how they behave in a match with these attributes, which allows the trainers to customize the training routine in order to grow in those aspects and achieve substantial improvements in the performance of their players. 37 6. Future work Streaks A factor that can be added to the model we use to generate the ranking is the consideration of players' streaks. It happens in all seasons that there are moments of the year where the players that start a series of victories o defeats in a row that will make them either to escalate or to fall considerably in the ranking. This is something that does not behave well in the long run since many times they are isolated moments in the players' careers and do not reflect their level truly. Therefore, if the strikes are evaluated when generating the ranking, the matches in which these players were either victorious or defeated due to a strike can be given a different weight that allow our model not to be confused and to deliver a ranking that truly reflects in the classifying level, who is the best player for that moment, in a way that the results of the matches reflect the given classification. 38 7. CONCLUSIONS Facing the idea of achieving a social ranking understood by all the tennis followers, the ATP ranking is exposed to constant complains of players and at the same time exposes new players to be benefitted with a good tournament in order to begin to progress in their careers. At the same time, analyzing the results obtained, it can be observed that the ATP ranking is not capable enough to manage to predict with certainty who will be the winner of a match in case we based only in the positions. With the objective of overcoming these obstacles, the idea comes up to create a new ranking that indicates which are the real victory odds of a player in the beginning of a new tournament. We tried to generate a new ranking that stands out because of the usage of the tournament characteristics for its generation. At the beginning we implemented a ranking that uses Google's ordering algorithm, called PageRank, in order to achieve a player's ordering of positions in which the matches played by the players facing each other are more important than the round of a tournament reached by a player. This type of ranking also, by the characteristic of the algorithm used, allows us to give more points to those players that won against the best players of the tournament and the circuit. However, when comparing the prediction capability, it was only a little better than the current one, but not sufficient as to affirm that it is a best predictor. It was then that we came up with the idea of implementing a ranking similar to the last one but where not only we will look at the result of the matches but we could also evaluate other attributes that these showed. Being one of those that took into account the ATP ranking. We thus created the Parametric Pagerank model, where we made a combination of the rankings already existent and also, we looked at other factors to evaluate it. This new model behaves like the PageRank algorithm, but we add to each edge a different weight, based on the surface, round of the tournament, type of tournament, and age of the matches history evaluated. As it can be observed, we have obtained great improvements in comparison with the existent models. Our model predicts the results of the matches and tournaments with respect to the ATP with roughly a 3% of improvement. Our model also achieved a better capacity to predict any itemization we had made, by either matches between similar ranked players, type of tournament, or type of surface. 7. Conclusions Once the improvement in the algorithm used was achieved, we delivered more information regarding the possibility of predicting a result. That is why we integrated the probability of victory to our analysis. This probability indicates, given a match and evaluating the ranking difference between the players that intervene in it, with which percentage our model may predict that the best ranked player will win. For that, and based on a model of logistic regression, we have compared how our model behaved with respect to other existent models. This comparison proved our model more optimistic than the rest. We needed, then, a certainty calculation to see our optimism did not indicate something that was not accurate. By using the AUROC measure we could observe that our model, besides being optimistic, has a high certainty margin. Given all these results, we can affirm that, throughout this work, we have created a new robust tennis ranking, capable to predict with a high percentage the result of the matches, considering a greater detail, as the ranking difference, to be able to say with what certainty we are going to sense who will be the winner of the encounter. 39 40 Bibliography [1] James B. The ranking that change tennis. From http://www.atpworldtour. com/news [2] ATP World Tour Emirates ATP Rankings FAQ. From http://www. com/news [3] ATP World Tour About the ATP Challenger From http://www. atpworldtour.com/en/corporate/history [4] Bryant H. How to fix tennis' big problems 2013. From http://espn.go.com/ com/tennis [5] LLangville, Amy N., and Carl D. Meyer. Who is #1?: the science of rating and ranking. Princeton University Press, 2012. [6] Brin, Sergey, and Lawrence Page. Reprint of: The anatomy of a large-scale hypertextual web search engine. Computer networks 56.18 (2012): 3825-3833. [7] Ashish G. Applications of PageRank to Recommendation Systems. From http: //web.stanford.edu/class/msande233/handouts/lecture8.pdf [8] Page L., Brin S., Motwani R. and Winograd T The PageRank Citation Ranking: Bringing Order to the Web 7th International World Wide Web Conference, Brisbane, Australia, 1998. [9] Irons, David J., Stephen Buckley, and Tim Paulden. Developing an improved tennis ranking system. Journal of Quantitative Analysis in Sports 10.2 (2014): 109-118. [10] Radicchi, Filippo, and Matjaz Perc. Who is the best player ever? A complex network analysis of the history of professional tennis. PloS one 6.2 (2011): e17249. [11] Dingle, Nicholas, William Knottenbelt, and Demetris Spanias. On the (page) ranking of professional tennis players. Computer Performance Engineering. Springer Berlin Heidelberg, 2013. 237-247. [12] Spanias, A. Demetris, and B. William Knottenbelt. Tennis Player Ranking using Quantitative Models. Manuscript [13] Blackburn, McKinley L. Ranking the performance of tennis players: an application to womens professional tennis. Journal of Quantitative Analysis in Sports 9.4 (2013): 367- 378. [14] Barrow, Daniel, et al. Ranking rankings: an empirical comparison of the predictive power of sports ranking methods. Journal of Quantitative Analysis in Sports 9.2 (2013): 187- 202. [15] Dormagen, David. Development of a Simulator for the FIFA World Cup 2014. Bachelorarbeit FU Berlin 13 (2014). Manuscript Bibliography [16] Anagnostopoulos C., Hand D.J., Adams N.M Measuring classification performance: the hmeasure package Department of Mathematics, South Kensington Campus, Imperial College London 2012 [17] Fawcett, Tom. ROC graphs: Notes and practical considerations for researchers. Machine learning 31 (2004): 1-38. [18] Leskovec, Jure, Anand Rajaraman, and Jeffrey David Ullman. Mining of massive datasets. Princeton University Press, 2014. 41 42 7. APPENDIX 7.1. Database As we mentioned in the section we spoke about the data set, we have files that contained information of about 40,000 matches. Once these files where obtained, the task of interpreting the data of the .csv files was not easy. The files had different formats, for some years we had more information and for others we did not have all the required information. Firstly, we needed to standardize the names of the players, since there were matches where the player was Juan Martin Del Potro and others where the name of the player was J.M Del Potro. For that we built a script that took care of evaluating players who had one game and evaluate if there was a player with a similar name, or they were players with just one ATP match in those 10 years being evaluated. The same condition occurred with the types of tournaments and its names, since throughout all of these years the tournaments changed their names. For example, the ATP 250 and ATP 500 both were called International Series. All of this information was added in order to have a reliable data set. Other of the complications found is that the order of the information provided for every year was different. In some files we had the result in a column while in a different year the information was in other column, that it is why every file was reordered to, by using a script, interpret in a simple way each one of the files. Once the standardization of all the data was made we divided the information into 3 tables. In order to do that, by going through each file and obtaining a match per line, we generated three tables that contained all the necessary information. Players: Player ID - Name of the player Tournaments: Tournament ID - Name - Year - Week - Surface - Number of sets - Type of tournament - Place - Ceiling Matches: Player ID - Winner ID - Loser ID - Ranking ATP Winner - Ranking ATP Loser - WSet1 - LSet1 - WSet2 - LSet2 - WSet3 - LSet3 - WSet4 LSet4 - WSet5 - LSet5 - Winner Sets - Loser Sets - Full Match - Bet Payment Winner - Bet Payment Loser Appendix 43 It was important to evaluate each player to check it was not already on our database and to be able to associate each player of the tournaments to our base. At the same time, we had the exact date of the match in the gathered data, so the script that inserted the tournaments calculated, given a specific date, to what week and year it corresponded. An extra complication that we had to sort out was that not all the games had with the ATP ranking information, so we generated a script that crawled the official site of the ATP (www.atpworldtour.com) to obtain the corresponding ranking for the players of those matches. 7.2. Implementation of the new PageRank model 7.2.1. Parametric Pagerank In order to calculate the parametric PageRank, we have developed the corresponding scrips in Python that will allow us to calculate the PageRank given a specific set of tournaments. The calculation process was as it follows: Graph generation by match To generate a ranking for a particular tournament, our script looks at every tournament with a maximum of a certain age. For each one of these tournaments, we look at every match played and traced an edge directed from the loser to the winner. For each edge previously traced, the weight that will be given to that match will be calculated. To do that, as it was explained, it is calculated how much that match sums in terms of age, surface, type, and tournament round, compared to the original tournament for which the ranking will be generated. Once the tournament is evaluated, each edge is added to a directed multigraph. Obtaining of a PageRank per tournament and ranking generation Once the multigraph is obtained with all the games evaluated for the tournament, through the library, the pagerank spicy method is used that will give us a score for each vertex of the multigraph. This score is the one that, according to its results, a player will receive in the given raking. When those scores are achieved, each player is linked to a name and the data is ordered in a descending manner using the score. With such order we get an arrangement where the first element is the number one player of the ranking and so we generate a general ranking. Evaluation of results based on the obtained ranking By knowing how the PageRank is generated, we evaluate how this calculation behaves in each tournament in every year. And that is why that by going through each tournament, the ranking is generated and in each match it is evaluated if the ranking Appendix 44 indicated correctly that the winner of the match had a better positioning in the ranking than the loser. In case it is correct, we consider it a Hit; in case it is not, we consider it a Miss. It should be taken into consideration that we only evaluate the matches that resulted to be complete. Once the hit and miss of the entire year are obtained, we evaluated how our parametric PageRank model behaved for that year. The implementation for the PageRank calculation allows us, by using parameters, to indicate which attributes are intended to be evaluated for a run. That allow us to differentiate by surface, age, type of tournament, round, among other runs made to improve our model. For those new players in the ranking, it is assigned manually in our PageRank a very high ranking, since it has no history that reflects in the multigraph that is used to calculate the PageRank. 7.2.2. Best parameters calculation To find the best combination of parameters to be used to calculate the value of every edge we used the following algorithm Algorithm 1 Algorithm browser of new parameters. yearDone ← true surfaceDone ← true tournamentDone ← true exponentialDone ← true exponential ← [5,10] surfaces ← [00,1.,1] tournaments ← [11,1.,2] years ← [1.,6] 0 maxResult bestExponentialDecay ← 0 bestTournamentWeight ← 0 bestY 0 bestSurfaceWeight ← 0 earBefore ← ← while yearDone and surfaceDone and tournamentDone and exponentialDone do for y in years do (result,year) ← max(processYear(y)) end for if result == maxResult then yearDone ← false end if if result > maxResult bestYearBefore ← maxResult ← result end if then year Appendix 45 for e in exponential do (result,exponential) ← max(processExponential(e)) end for if result == maxResult then yearDone ← false end if if result > maxResult then bestExponentialDecay ← exponential maxResult ← result end if for s in surface do (result,surface) ← max(processSurface(s)) end for if result == maxResult then surfaceDone ← false end if if result > maxResult then bestSurfaceWeight ← surface maxResult ← result end if for t in tournaments do (result,tournament) ← max(processTournament(t)) end for if result == maxResult then tournamentDone ← false end if if result > maxResult then bestTournamentWeight ← tournament maxResult ← result end if end while Algorithm 2 Algorithm browser for best year. Procedure processYear (y) bestYearBefore ← y result ← evaluateTournamentWithBetterParameters() return result end procedure Algorithm 3 Algorithm browser for best exponential. procedure processExponential(e) Appendix 46 bestExponentialDecay ← e result ← evaluateTournamentWithBetterParameters() return result end procedure Algorithm 4 Algorithm browser of the best parameter for surface. procedure processSurface(s) bestSurfaceWeight ← s result ← evaluateTournamentWithBetterParameters() return result end procedure Algorithm 5 Algorithm browser of the best λ for tournament. procedure processTournament(t) bestTournamentWeight ← t result ← evaluateTournamentWithBetterParameters() return result end procedure Where evaluateTournamentWithBetterParameters is the function that calculates the efficiency of the Pagerank with the parameters in the flags as the best parameters of that run. 7.2.3. Probability of victory and AUROC For the calculation of victory and the posterior AUROC analysis, we have generated a table in the database that contains as information: winner ranking, loser ranking, and match number. In order to complete this table, we have evaluated each game stored and saved the ranking that delivered our model as a result for each player. Calculation of victory probability Evaluating each record in the generated table, we calculated the ranking difference for each game and also we crossed the information with the rest of the tables in order to know the surface and type of tournament being played. Then we group the ranking difference and calculated the prediction efficiency of our ranking for that difference. Appendix 47 That gives us place to generate two vectors. On one hand the xdata vector, where we have all the ranking differences, and on the other hand the ydata vector, that would have the efficiency of our ranking for those differences. It is here where we try to minimize the error and generate the curve that manages to draw each of those points closer as we indicated in the "Victory probability" section. For that we calculated the curve that brings the function closer using the curve fit method of the sklearn library. Once the best parameter for our function of the regression model used is obtained, we are able to evaluate given a difference of the ranking, how optimistic our model is when predicting the result. Considering that the search could be parametrized, since we had the information of those matches such as surface and type of tournament, we started to generate the same for each possible combination. That allowed us to generate a decision tree where with the characteristics of a match given, besides the ranking difference, we could provide a greater certainty of the results of the match. AUROC calculation For the calculation of the area under the ROC curve we re ran each game again, and we set the tuples where the first element represented if the match was a hit or a miss and the second element was the P(victory) of that game. In the same way the result was replicated in the opposite way; this allow us to generate a type S graphic necessary to calculate the ROC curve correctly and thus obtaining the area under the curve. For the ROC curve calculation, we generated two arrays: yTrue, that had the first elements of each tuple, and the yScore, that had the second element. Then, with the roc curve function, we generated the ROC curve that allow us to indicate the False Positive Rate and the True Negative Rate. In order to obtain the AUROC we used the roc auc score method, that with given the generated arrays, already delivered the result of the area.
1306.5268
1
1306
2013-06-21T22:31:47
Static and Dynamic Aspects of Scientific Collaboration Networks
[ "cs.SI", "cs.DL", "physics.soc-ph" ]
Collaboration networks arise when we map the connections between scientists which are formed through joint publications. These networks thus display the social structure of academia, and also allow conclusions about the structure of scientific knowledge. Using the computer science publication database DBLP, we compile relations between authors and publications as graphs and proceed with examining and quantifying collaborative relations with graph-based methods. We review standard properties of the network and rank authors and publications by centrality. Additionally, we detect communities with modularity-based clustering and compare the resulting clusters to a ground-truth based on conferences and thus topical similarity. In a second part, we are the first to combine DBLP network data with data from the Dagstuhl Seminars: We investigate whether seminars of this kind, as social and academic events designed to connect researchers, leave a visible track in the structure of the collaboration network. Our results suggest that such single events are not influential enough to change the network structure significantly. However, the network structure seems to influence a participant's decision to accept or decline an invitation.
cs.SI
cs
Static and Dynamic Aspects of Scientific Collaboration Networks Christian Staudt Andrea Schumm Henning Meyerhenke Robert Gorke Dorothea Wagner [email protected] [email protected] [email protected] [email protected] [email protected] Institute of Theoretical Informatics, Karlsruhe Institute of Technology (KIT), Am Fasanengarten 5, 76131 Karlsruhe, Germany 3 1 0 2 n u J 1 2 ] I S . s c [ 1 v 8 6 2 5 . 6 0 3 1 : v i X r a Abstract—Collaboration networks arise when we map the connections between scientists which are formed through joint publications. These networks thus display the social structure of academia, and also allow conclusions about the structure of scien- tific knowledge. Using the computer science publication database DBLP, we compile relations between authors and publications as graphs and proceed with examining and quantifying collabora- tive relations with graph-based methods. We review standard properties of the network and rank authors and publications by centrality. Additionally, we detect communities with modularity- based clustering and compare the resulting clusters to a ground- truth based on conferences and thus topical similarity. In a second part, we are the first to combine DBLP network data with data from the Dagstuhl Seminars: We investigate whether seminars of this kind, as social and academic events designed to connect researchers, leave a visible track in the structure of the collaboration network. Our results suggest that such single events are not influential enough to change the network structure significantly. However, the network structure seems to influence a participant’s decision to accept or decline an invitation. I. INTRODUCTION In scientometrics, the quantitative study of science, network analysis has become a prominent tool. Coauthorship networks have attracted interest both as social networks and as knowl- edge networks: They display the social structure of academia, while their bibliographic aspect allows conclusions about the structure of scientific knowledge. Accordingly, networks of this kind are the objects of ongoing research: Newman ([1], [2], [3], [4]), for example, studies properties of coauthorship networks in the realm of physics (Los Alamos e-Print Archive, SPIRES), mathematics (Mathematical Reviews), biomedical research (Medline) and computer science (NCSTRL), sum- marizing many statistical properties of coauthorship networks. Aspects like connectedness, distance, degree distribution, cen- trality and community structure are recurring themes in such studies. Where we follow up on these topics, we cite relevant related work in the respective sections of this paper. Based on the extensive publication database DBLP [5], we model relations between authors and publications as graphs, mapping almost the entire field of computer science. This allows us to examine and quantify the collaborative relations between researchers using graph-based methods. We compile a graph in which edges link coauthors, as well as a bipartite author-paper graph. In the first part, we review standard properties of the network, rank authors and publications by centrality, and detect communities with modularity-based clus- tering. In the second part, we combine the network with seminar data provided by the Schloss Dagstuhl [6] conference center: The Dagstuhl Seminars assemble researchers with the goal of fostering (collaborative) work in cutting-edge areas of computer science. We examine whether such events leave a track in the structure of the collaboration network. For this purpose, we apply appropriate measures to a time-resolved version of the authorship graph. We are the first to perform a joint analysis of the Dagstuhl and DBLP datasets, which allows us to study the impact of social/academic events on the time-evolution of the network structure. Our results suggest that a participant’s decision to accept or decline an invitation can be predicted from the net- work data to some extent. While our analysis of the DBLP data mostly confirms properties of similar networks, the distribution of the number of coauthors differs from data reported in [4]. We also describe an approach to finding central researchers based on eigenvector centrality in the bipartite authorship graph, a combination that to our knowledge has not been used before. Additionally, we apply modularity clustering and compare the detected communities to a ground-truth defined by conferences, from which we infer distinct areas of research. II. PRELIMINARIES A. Collaboration Network Model As of 2011, DBLP covers about 1.5 million publications by 0.8 million authors. The earliest work dates from 1936, and we include all works up to 2009 in our analysis. We describe briefly how a coauthorship network is extracted from the publication database and represented as different types of graphs. The database associates publications and authors and thus provides two main relations, authorship and coauthorship, formalized as follows: Def. 1. Given the sets of authors A and publications P, the authorship relation is defined as ∀{a, p} ∈ A × P : a (cid:94) p ⇐⇒ a is author of p The coauthorship relation between two authors from A is defined as ∀{a, b} ∈ A × A : a (cid:95) b ⇐⇒ ∃p ∈ P : a (cid:94) p ∧ b (cid:94) p From these, two graph representations of the network fol- low: A bipartite authorship graph (or author-paper graph) GPA, in which each publication is connected by edges to its authors; and a coauthorship graph GA, in which two authors are connected by an edge if they are coauthors of a joint publication. Def. 2. The authorship graph is a mapping from the sets of publications P and authors A to the node sets VP and VA, resulting in a bipartite graph GPA = (VA, VP, E), where {va, vp} ∈ E ⇐⇒ a (cid:94) p Def. 3. The coauthorship graph is a mapping from the set of authors A to the node set VA, resulting in the graph GA = (VA, E), where {va, vb} ∈ E ⇐⇒ a (cid:95) b While GA is sufficient when focusing only on the social network of coauthors, GPA preserves the publications as the cause of relations, as well as single-author publications. Table I shows the size of the graphs constructed from the full publication data set. graph GPA GA n 2 296 586 852 250 m 3 775 881 2 785 037 TABLE I SIZE OF RESULTING GRAPHS In order to determine whether events have effects detectable in terms of the network (Section IV), we also track groups of authors over the course of time, using a sequence of graphs in which each graph represents a current snapshot of the authorship relations. This time-resolved version of GPA enables us to study the dynamics of the network: Let t(p) denote the publication date of publication p. Then the publications from a time segment [y, z], z > y, are P[y,z] := {p ∈ P : y ≤ t(p) ≤ z} The respective authors of these publications are A[y,z] := {a ∈ A : ∃p ∈ P[y,z] : a (cid:94) p} The graph sequence is constructed on the basis of a sliding time segment, with parameters width w and increment s: Def. 4. The time-resolved authorship graph is a sequence of graphs Gw,s PA where each graph in the sequence is constructed from the publications in P[y,y+w] and the authors up to A[y,y+w] using a sliding time segment with width w and increment s. Author nodes are aggregated over time, while publications are deleted for each step in the sequence. A time segment and increment of 1 year was chosen for the study in Section IV, the finest time resolution possible with DBLP data. III. NETWORK PROPERTIES AND COMMUNITY STRUCTURE A. General Network Properties We briefly review some general properties of the collabo- ration network: a) Connectedness: GA features a giant connected com- ponent containing about 80% of all authors. (Giant compo- nents connecting up to 90% of all authors have previously been detected across scientific fields [3]). Aside from the 6% of the authors without collaborations, about 14 % of author nodes are distributed over a multitude of small components with few publications. We conclude that, in general, authors who have worked on several publications and were part of more than one collaborative team join the large connected component. In terms of average distances between researchers (6.58 for a sample), we confirm the previously reported small world property for the field of computer science [4] and DBLP in particular [7]. Fig. 1. Histogram of core numbers in GA (x-axis: core number, logarithmic y-axis: frequency) b) k-Core Structure: A k-core is a maximal subgraph in which each node is adjacent to at least k other nodes. k- cores refine the concept of connected components (which form the 1-core); k-core decomposition reveals nested, successively more cohesive layers of the graph. We assign each node a core number, the highest k for which there is a k-core containing the node. Figure 1 shows a histogram of the resulting core numbers in GA with two logarithmic axes. The rather uniform sequence indicates uniform density and cohesiveness of the graph, showing that the network does not have strongly cohesive groups of authors embedded in shells of weakly connected authors [8]. A more extensive k-core analysis of a DBLP-based coauthorship network is presented in [9]. c) Degree Distribution: Node degree in GA corresponds to the number of coauthors of each author. The degree dis- tribution is highly skewed. It indicates a scale-free network, in which the frequency P (k) of nodes with degree k follows a power law, i.e. P (k) ∼ k−γ, with coefficient γ = 2.889. Newman [3] reports a differing power-law degree distribution 2 125102050100101001000104105 centrality · 10−5 9.76232 9.45441 9.08697 8.30777 7.91401 7.82901 7.75409 7.69387 7.50894 7.47370 author Diane Crawford Robert L. Glass Chin-Chen Chang Edwin R. Hancock Grzegorz Rozenberg Joseph Y. Halpern Sudhakar M. Reddy Philip S. Yu Moshe Y. Vardi Ronald R. Yager Fig. 2. Degree distribution in GA (logarithmic x-axis: degree, logarithmic y-axis: frequency) TOP SEGMENT OF AUTHOR RANKING BY CENTRALITY TABLE II in the number of coauthors with γ = 3.41 for computer science, based on NCSTRL. d) Summary: General properties indicate that the net- work of collaborations in computer science is in many respects a typical social network: It shows participation inequality (visible as a power-law degree distribution), with a few highly prolific authors and many smaller contributions. It also features a high degree of connectedness, a giant component, and mostly short paths between arbitrary pairs of nodes. Our observations are in agreement with the results of related studies (except for the degree power-law exponent), these properties are universal features of scientific collaboration networks. indicating that B. Centrality Centrality measures were formulated to identify nodes which are structurally prominent or influential, due to their position in the center of a network. Betweenness and closeness centrality have previously been applied to coauthorship graphs with the goal of identifying influential scientists in their respective fields ([4], [10]). Elmacioglu et al. report a ranking of prominent scholars by closeness and betweenness central- ity [7]. As a rationale, it has been stated that authors with high betweenness are important intermediates for interactions or information flows, as it allows them to control such flows; high closeness is assumed to be an advantage for accessing or disseminating information [7]. However, it is not clear why academic influence should be understood mainly as the ability to mediate interactions. Furthermore, the network of information flow in academia and the network of coauthorship relations may be quite distinct. We therefore follow a different approach based on eigenvector centrality [11] in the bipartite authorship graph: It assumes that an author’s influence is first of all proportional to the amount of publications. Additionally, the contribution of a paper to an author’s centrality should be weighted depending on the centrality of the coauthors. Def. 5. Eigenvector centrality: Given a graph G with adja- cency matrix A, we require a centrality score xi of node vi to be proportional to the scores of its neighbors: n(cid:88) j=1 xi = c A(i, j) xj c (cid:54)= 0 By the Perron-Frobenius theorem, there exists a nonnegative eigenvector x of A (satisfying Ax = 1 c x = λx) which corresponds to the largest eigenvalue λ. An entry xi constitutes the desired centrality score for vertex vi. Modeling the collaboration network as the bipartite graph GPA has the benefit that it allows us to assign a centrality score to a publication as a node, rather than just account for a publication as an edge attribute or weight in GA [12]. Thus, our centrality scores express the concept that authors are central in the collaboration network to the extent that they have collaborated on central publications with other central authors. In this respect, the approach is similar to ranking webpages with the PageRank algorithm, where hyperlinks are treated as votes to the relevance of the target page and are weighted by the relevance of the source page. Figure 3 shows the distributions of centrality scores for authors and publications. Extreme values are less frequent, and the distribution does not exhibit a power law. Table II contains the top segment of an author ranking by our ap- proach to centrality. (See [13] for a comparison to a purely productivity-based ranking of DBLP authors.) The respective ranking of publications places papers with unusually high author counts at the top, e.g. work on large supercomputing and database projects, and further study would be needed to interpret publication centrality properly. With respect to the evaluation in Section IV, it should also be noted that Dagstuhl seminar invitees have a significantly higher median eigenvector centrality score than other authors (3.8 · 10−6 versus 2.4 · 10−7). We therefore propose that eigenvector centrality in bipartite author-paper networks is a promising approach for studying the role and impact of collaborating individuals in science, and might serve as an objective measure of influence in scientific publishing. 3 102050100200500101001000104105 (a) authors (b) publications Fig. 3. Centrality scores (logarithmic y-axis), sorted C. Modularity-driven Clustering Graph clustering comprises a variety of methods for detect- ing natural communities in networks. Formally, it is concerned with partitioning the node set into disjoint subsets (clusters), the result of which is called a clustering. The notion of a clus- ter is usually based on the intra-cluster density versus inter- cluster sparsity paradigm, according to which a clustering should identify groups of nodes which are internally densely connected, while only sparse connections exist between the groups. One of the primary measures of clustering quality based on this paradigm is modularity [14]. Def. 6. For a graph G = (V, E) and a clustering ζ = (cid:0)(cid:80) v∈C deg(v)(cid:1)2 {C1, . . . , Ck} of G, modularity is defined as (cid:88) (cid:88) mod (G, ζ) := E(C) E − C∈ζ C∈ζ (2 · E)2 The measure considers the clustering’s coverage (the frac- tion of edges placed within a cluster) on the actual graph and subtracts the coverage it would achieve on a randomly connected version of the graph (preserving degree distribu- tion). Modularity-based clusterings often agree with human intuition, although criticism has emerged recently [15]. Since maximizing modularity is an NP-hard problem [16], we use a heuristic based on local greedy agglomeration. The base algorithm, commonly referred to as the Louvain Method [17], starts with a singleton clustering, considers nodes in turn, moves them to the best neighboring cluster and contracts the graph for the next iteration. This yields a hierarchy of graphs with increasing coarseness where the clustering in the coarsest level induces the resulting clustering in the original 4 Fig. 4. y-axis: frequency) Size distribution for the 300 largest clusters (x-axis: cluster size, graph. Rotta etal. [18] enhance this algorithm by a refinement phase that iteratively projects this clustering to lower levels of the hierarchy and further improves modularity by local node moves. We use this modified algorithm. It is a common approach to apply a clustering method to a real world network and then compare it to a ground- truth partition of the node set in order to interpret the result. For example, Rodriguez et al. [19] study sensor networks research groups and apply clustering techniques like leading eigenvector, but not modularity maximization; these network- structural communities are then compared to communities defined by socio-academic similarities. We therefore proceed as follows: Applying local greedy agglomeration to GPA yields a clustering with 86761 clusters, achieving a modularity of 0.896896. The majority of clusters contain only a handful of nodes, and likely correspond to the many tiny components of the graph, while the dominant connected component is divided into several large clusters (see Figure 4). With a clustering of the authorship graph at hand, we attempt to interpret such a modularity-driven clustering in the context of collaboration networks. The partition found by maximizing modularity locally identifies groups of authors who are densely connected through collaborative ties. Our hypothesis is that we can infer a topical similarity from these connections. More precisely, we conjecture that researchers form collaborative ties around distinct areas of research, which is reflected in the clustering structure of the graph. To put this hypothesis to the test, we compare the modularity clustering of GPA to a ground-truth subdivision of the author set based on conferences: Assuming that distinct areas of computer science generally have dedicated conferences, we assign all authors who have published at a particular conference to an author- cluster. (Unlike the modularity clustering, this does not yield a proper, complete and disjoint partition of the author set, but is nonetheless informative.) Thereby we arrive at topical clusters of authors, which are suited as a ground-truth to compare the modularity clustering to. In order to evaluate the similarity between the two com- munity structures, one being the modularity clustering, the other the topical clustering defined by conferences, we apply overlap measures to each pair of clusters: The Jaccard index 0501001502002503001000020000300004000050000 A∩B A∩B A∪B favors exact match of the two sets; the J(A, B) := overlap coefficient O(A, B) := min(A,B) treats containment of one set in the other set as a strong match, which is more equitable when dealing with clusters of uneven sizes. Applying these measures yields matrices of overlap values between modularity clusters and topical clusters. Additionally, we arrive at a baseline for the overlap values by calculating the overlap matrix of modularity clustering and a random clustering. The random clustering is constructed by copying the size distribution of the 250 largest modularity clusters, but randomly assigning authors to the clusters. In these overlap matrices, we are interested in the maximum entry for each row, pointing to pairs of clusters that are most similar. Table III shows the means of these maximum overlap values. It is evident that the maximum J and O overlap is significantly better for modularity clusters than for random clusters. This shows that a more than coincidental relation between modularity clusters and topical clusters exists. How- ever, the values are not close to 1.0 and indicate that the correspondence is not very strong. Thus, factors in addition to joint conferences are influential in shaping the community structure of the network. In the following section, we take an in-depth look at one possible factor of this kind, namely participation in research seminars. IV. IMPACT OF SEMINARS ON NETWORK EVOLUTION After describing static aspects of the network in the previous section, this section is concerned with its dynamics: We examine whether the Dagstuhl Seminars, as academic and social events, leave a track in the structure of the network, preferably in the form of increased collaboration between the participants. In the authors’ subjective experience, the seminars present valuable opportunities for networking. Our approach to this question can be summarized as follows: Track groups of researchers (seminar participants and others selected as reference groups) in the time-resolved graph G1,1 PA and observe their publication output as well as their collaborative links; take into account the date of a seminar in order to observe immediate or long-term effects. The preparations necessary for this approach are described in the following: A. Preparations a) Aligning Data Sets: Our data sets record a total of 11 625 seminar guests in the Dagstuhl database and 852 250 authors in DBLP. All seminars took place in the 2000s. We align the tests by author name, whereby some false (mis)matches cannot be avoided. Still, a matching author in the random O 0.04404 0.00372 J topical 0.22832 0.01390 MEAN MAXIMUM OVERLAP FOR MODULARITY CLUSTERING AND TABLE III RANDOM VS TOPICAL CLUSTERING Fig. 5. Illustrating collaboration measure cad: cad(A) = 2/3 publication database was found for 72 percent of the seminar invitees. it b) Area Launchers: In order to detect increased collabo- ration which can be clearly attributed to the seminars, we first try to identify area launchers. These are seminars intended to bring together a group of researchers who have not collab- orated much before. A stated goal of the Dagstuhl Seminars is that some of them are intended to launch new areas of research by fostering collaboration between previously unaffil- iated researchers, thereby contributing to emerging fields. Area launchers are relevant to us due to the following argument: If participants develop collaborative ties in the aftermath of an area launcher seminar, is possible to attribute this more clearly to the seminar rather than existing relationships, developed, for instance, in the course of a common conference. We classify a set of seminars as area launchers without special knowledge about the intent or content of the seminar, but solely from participation data: It is assumed that well- established areas of research generally spawn their own dedi- cated conference, and that the participants of such a conference represent the researchers active in this area. By this logic, a seminar corresponds to an established area of research if the invitees have a strong overlap with the participants of the respective conference. Furthermore, if researchers attend the same conference, it is likely that they are already familiar with each other as well as each other’s work. We therefore reason that a seminar is an area launcher if its invitees do not overlap strongly and clearly with the participants of any particular conference. From this calculated set of seminars, 10 seminars are selected by hand and classified as area launchers. c) Measures: We quantify the publication output and intensity of collaboration among researchers using several measures which map sets of authors to real numbers. For example, Figure 5 shows a small number of authors (light nodes) and their publications (dark nodes) in the authorship graph. Authors belonging to A are colored blue. Blue lines show existing (dashed line) and nonexisting (dotted line) coauthorship relations between pairs of authors in A. This illustrates the measure cad (A), which is the fraction of ac- tually existing coauthorship relations within an author set. Before introducing all measures, it is helpful to define sets of (co)publications, copublications internal to a group, and coauthors first: Given a set of authors A ⊆ A, the set of their 5 \x{FFFF}\x{FFFF}\x{FFFF} publications P (A) is equal to (cid:91) a∈A (cid:91) a∈A {p ∈ P : a (cid:94) p} P (A) := P (a) = The set of copublications for an author a consists of publications which were written as collaborations with another author: CP (a) := {p ∈ P (a) : ∃b ∈ A : b (cid:94) p} For an author set A ⊆ A, the aggregated copublications are CP (A) := CP (a) (cid:91) a∈A (cid:91) a∈A The set of intra-copublications of a set of authors is defined as CPintra(A) := {p ∈ CP (A) : ∃a, b ∈ A : a (cid:94) p, b (cid:94) p} The set of coauthors for a given author a ∈ A are those authors with whom a has authored a collaboration. CA(a) := {b ∈ A : b (cid:95) a} This can be generalized for a set of authors A: CA(A) := CA(a) Based on these sets, we formulate five measures, listed and defined in Table IV. These measures are intended to answer the following questions: • ap(A): What is the general productivity of an average • acp(A): What is the productivity of such an author in author from the group? terms of collaborations? • aca(A): With how many other authors does an average author from the group collaborate? • cpr intra(A): Do the authors collaborate more often within the group or outside of the group? • cad (A): How close is the group to a collaborative clique, i.e. a group in which all authors have collaborated with each other? measure ap(A) acp(A) aca(A) cprintra(A) cad(A) definition P (A) CP (A) CA(A) CPintra(A) CP (A) A A A {{a, b} ∈(cid:0)A (cid:1) : a (cid:95) b}/(cid:0)A (cid:1) 2 2 OVERVIEW OF COLLABORATION MEASURES AND THEIR DEFINITIONS TABLE IV 6 d) Author Classes: The classes of author groups which we track are the seminar participants on the one hand and several reference classes on the other: • seminar attendees (Ats): For each seminar s, the set of researchers who attended the seminar. • seminar absentees (Abs): For each seminar s, the set of researchers who were invited to the seminar but did not attend. (For some seminars, the set was empty or very small, so these are only included if they have a sufficient size.) • random samples (RSi) Contains randomly assembled sets of authors with the size of a typical seminar. • connected samples (CSi) Contains sets of authors found by collecting nodes from GPA in a breadth-first search from a random initial node until the typical size of a seminar is reached. • all authors (A) A single set containing all authors. B. Evaluation and Results We speculate that joint participation in a seminar leads to increased collaboration between the participants. This would be measurable as higher values for the collaboration measures (cad, cpr intra) on the respective subgraph. Additionally, we measure whether seminar participation leads to a higher pub- lication output for the participants (ap, acp, aca). In order to test this, seminar-related groups as well as reference groups are tracked within the graph G1,1 PA: For any author set A, a subset A(cid:48) ⊆ A has corresponding nodes VA(cid:48) in the graph Gy. For all measures M, we evaluate M (A(cid:48)), yielding a sequence of values for each group. The evaluation yields one value sequence per author group, and thus several data points per year. All seminar-related sequences are aligned according to the time of the seminar, in order to compare values before and after seminar participation. We present these data points in boxplot form (e.g. Figure 6), with the horizontal axis denoting time relative to the seminar date and the vertical axis values of the respective measure. By following the plotted median and quantiles along the time axis, one can identify trends for the author class as a whole. The point in time where a seminar occurs is marked by an arrow. In the following section, we describe a selection of notable observations: a) Average publication output remains rather constant: For the authors as a whole (A), average publication output and number of coauthors remain stable over time, even as the graph grows at an increasing rate and author nodes accumulate. b) Randomly grouped authors as a baseline for publica- tion output: As a reference class, we evaluate the randomly compiled author groups RS. Both ap and aca are, on average, in the range of 0.6-0.8, showing that there are typically inactive authors in any given time frame. As expected, there is no collaboration between authors in the random samples. c) Connected Sample Groups: Authors from the CS have a significantly higher productivity than randomly selected authors, since breadth-first search finds high-degree nodes with a higher probability. There is also an upward trend over time for all measures. A possible explanation for this is that nodes gain connections over time according to degree, if there is an underlying preferential-attachment process at work (as suggested by the power-law degree distribution). Overall cpr intra remains clearly below 0.5, showing that these sample groups are just sections from greater collaborative clusters. (a) cpr intra: At (a) aca: At (b) cpr intra: Ab Fig. 7. relative to seminar, arrow: seminar date) cpr intra (y-axis) for seminar attendees and absentees (x-axis: time after. This effect would be most clearly captured by the measures cpr intra (Figure 8) and cad. The plots in Figure 8 support our reasoning about area launchers, namely that the authors invited have a comparatively low probability of collab- oration in the time prior to the seminar: Values for cpr intra are generally in the lower range compared to all seminars. Still, a visible change after the time of the seminar is missing. The influence of an area launcher seminar does not seem to differ from the other seminars. g) Subdivision by career stage: Suspecting that seminar participation affects researchers in early stages of their career more strongly, we repeat a part of the evaluation with the authors classified by career length (≤ 5, ≤ 15, > 15 years of publication history). However, the results do not modify our conclusions: A seminar effect for academic newcomers is no more observable than for all other authors. h) Summary and Interpretation: Seminar invitees are more productive and more collaborative than randomly se- lected authors. Yet there is little difference between attendees and absentees in terms of their productivity. Invited researchers are already actively publishing, with an upward trend, prior to the time of the seminar. For cpr intra and cad, attendees are consistently better than absentees. This indicates that those who attend are already a tightly connected collaborative group before the seminar, possibly influencing their decision to participate. The general trend over time is an increase (b) aca: Ab Fig. 6. aca (y-axis) for seminar attendees and absentees (x-axis: time relative to seminar, arrow: seminar date) d) Attendees and absentees are equally productive: The effect of seminar participation is best judged by contrasting at- tendees with absentees. With respect to productivity, measured by the number of coauthors and the number of publications, attendees and absentees are quite similar, with some outliers among the absentees surpassing the attendees (see Figure 6). For the productivity measures, an upward trend before the seminar continues for a few years but then tends to reverse. e) Attendees form a more cohesive group: For seminar attendees, a larger fraction of their collaborations are internal to the seminar group, both before and after the seminar (Fig- ure 7). This indicates that attendees already come from a more cohesive group. Values for cad agree with this interpretation: Clearly, those who choose to attend the seminar form a denser subgraph in the collaboration network. There seems to be no lasting increase in collaboration after the seminar, but a downward trend for both attendees and absentees. f) Area launchers are not exceptional: For the subset of seminars classified as area launchers, we expect comparatively less collaboration before the seminar, and a stronger increase 7 051015051015200.00.10.20.30.40.50.60.70.00.20.40.60.81.0 social network, as observed before in similar studies: We encounter properties such as low average distances between researchers, a giant connected component, a power-law dis- tribution with regard to publications and coauthors (making it a scale-free network), and a regular k-core structure. We detect dense communities of researchers through modularity maximization, and compare the resulting clustering to ground- truth communities defined by conferences, from which topical similarity is inferred. The overlap between the two partitions is clearly not coincidental, although other factors seem to be at work in shaping the community structure. In order to identify influential researchers by their network centrality, we test a novel combination of bipartite author-paper graph and eigenvector centrality. We are the first to incorporate data on participants of the Schloss Dagstuhl research seminars and use it to evaluate the impact of such seminars on the evolution of collaborative ties. Since the seminars are designed to foster collaboration on cutting-edge research topics, and many participants experience the seminars as a valuable opportunity for networking, we investigate whether such effects can be observed as structural changes in the collaboration network. Seminar invitees are more productive, more collaborative and structurally prominent compared to the average researcher. However, our methods suggest that seminar participation does not directly affect the structure of the collaboration network. An interesting finding of this analysis was that researchers who choose to attend the seminar form a distinctly more cohesive subgraph than those who decline. ACKNOWLEDGMENT We thank Ulrik Brandes for helpful discussions during the preparation of this work. We also thank the Schloss Dagstuhl conference center for providing us with the necessary data on their seminars. REFERENCES [1] M. E. Newman, “The structure of scientific collaboration networks.” Proceedings of the National Academy of Sciences of the United States of America, vol. 98, no. 2, pp. 404–9, Jan. 2001. [Online]. Available: http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=14598 [2] M. E. J. Newman, “Coauthorship networks and patterns of scientific the National Academy of Sciences the United States of America, vol. 101 Suppl, pp. 5200–5, [Online]. Available: http://www.pubmedcentral.nih.gov/ collaboration.” Proceedings of of Apr. 2004. articlerender.fcgi?artid=387296 [3] M. Newman, “Scientific collaboration networks. I. Network construction and fundamental results,” Physical Review E, vol. 64, no. 1, pp. 1–8, Jun. 2001. [Online]. Available: http://link.aps.org/doi/10.1103/ PhysRevE.64.016131 [4] M. E. J. Newman, “Scientific collaboration networks. II. Shortest and centrality,” Physical Review E, [Online]. Available: http: Jun. 2001. paths, weighted networks, vol. 64, no. 1, pp. 1–7, //link.aps.org/doi/10.1103/PhysRevE.64.016132 [5] “DBLP - Digital Bibliography and Library Project,” 2007, http://dblp. [6] “Schloss Dagstuhl,” http://www.dagstuhl.de. [Online]. Available: http: uni-trier.de/. //www.dagstuhl.de [7] E. Elmacioglu, “On Six Degrees of Separation in DBLP-DB and More,” Distribution, vol. 34, no. 2, pp. 33–40, 2005. [8] J. Scott, Social Network Analysis - a Handbook, 2nd ed. SAGE Publications, 2000. (a) cpr intra: At (b) cpr intra: Ab Fig. 8. cpr intra (y-axis) for attendees and absentees of area launchers (x-axis: time relative to seminar, arrow: seminar date) up to the seminar and a slight decrease afterwards for both classes of researchers. A possible explanation for the increase and decrease over time is that invitations are biased towards researchers who are currently most active: Invitations to sem- inars occur at a period of peak activity. There is, however, no significant change of structure connected to seminars (either significant short-term increase in collaboration directly after the seminar or long-term increase). Most importantly, attendees and absentees do not differ in this respect. While the focus on area launcher seminars supports our assumption that the invited researchers had collaborated less, a significant structural change after the seminar is not visible. These results suggest that a single event like a seminar is not influential enough to alter the network structure of collaboration for the group of participants in ways observable with our measures. Clearly, other factors have additional and apparently more influence on the structure. Rather in the opposite direction, the network structure might be employed to predict who will attend the seminar and who will decline, since the participants evidently come from a more cohesive group. V. CONCLUSION This paper ties in with the existing work on scientific collaboration networks and explores several new variations of network analysis methods. The coauthorship graph in the field of computer science constitutes in many respects a typical 8 0.000.050.100.150.200.250.300.000.050.100.15 [9] C. Giatsidis, D. Thilikos, and M. Vazirgiannis, “Evaluating Cooperation in Communities with the k-Core Structure,” Social Networks. [Online]. Available: http://graphdegeneracy.org/k-cores.pdf [10] K. Boerner, L. Dall’Asta, W. Ke, and A. Vespignani, “Studying the emerging global brain: Analyzing and visualizing the impact of co-authorship teams,” Complexity, vol. 10, no. 4, pp. 57–67, Mar. 2005. [Online]. Available: http://doi.wiley.com/10.1002/cplx.20078 [11] P. Bonacich, “Factoring and Weighting Approaches to Status Scores and Clique Identification,” Journal of Mathematical Sociology, vol. 2, pp. 113–120, 1972. [12] P. Bonacich, A. Cody Holdren, and M. Johnston, “Hyper-edges and multidimensional centrality,” Social networks, vol. 26, no. 3, pp. 189–203, 2004. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S0378873304000024 [13] “Most Prolific DBLP Authors,” http://www.informatik.uni-trier.de/∼ley/ db/indices/a-tree/prolific/. [Online]. Available: http://www.informatik. uni-trier.de/∼ley/db/indices/a-tree/prolific/ [14] M. E. J. Newman and M. Girvan, “Finding and evaluating community structure in networks,” Physical Review E, vol. 69, no. 026113, pp. 1–16, 2004. [Online]. Available: http://link.aps.org/abstract/PRE/v69/e026113 [15] A. Lancichinetti and S. Fortunato, “Limits of modularity maximization in community detection,” Phys. Rev. E, vol. 84, p. 066122, Dec 2011. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevE.84. 066122 [16] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hofer, Z. Nikoloski, and D. Wagner, “On Modularity Clustering,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 2, pp. 172–188, February 2008. [Online]. Available: http://doi.ieeecomputersociety.org/ 10.1109/TKDE.2007.190689 [17] V. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, “Fast unfolding of communities in large networks,” Journal of Statistical Mechanics: Theory and Experiment, vol. 2008, no. 10, 2008. [Online]. Available: http://dx.doi.org/10.1088/1742-5468/2008/10/P10008 [18] R. Rotta and A. Noack, “Multilevel local search algorithms for modularity clustering,” ACM Journal of Experimental Algorithmics, vol. 16, pp. 2.3:2.1–2.3:2., July 2011. [Online]. Available: http: //doi.acm.org/10.1145/1963190.1970376 [19] M. a. Rodriguez and A. Pepe, “On the relationship between the structural and socioacademic communities of a coauthorship network,” Journal of Informetrics, vol. 2, no. 3, pp. 195–201, Jul. 2008. [Online]. Available: http://linkinghub.elsevier.com/retrieve/pii/S1751157708000230 9
1505.05663
1
1505
2015-05-21T10:04:42
Inferring Graphs from Cascades: A Sparse Recovery Framework
[ "cs.SI", "cs.LG", "stat.ML" ]
In the Network Inference problem, one seeks to recover the edges of an unknown graph from the observations of cascades propagating over this graph. In this paper, we approach this problem from the sparse recovery perspective. We introduce a general model of cascades, including the voter model and the independent cascade model, for which we provide the first algorithm which recovers the graph's edges with high probability and $O(s\log m)$ measurements where $s$ is the maximum degree of the graph and $m$ is the number of nodes. Furthermore, we show that our algorithm also recovers the edge weights (the parameters of the diffusion process) and is robust in the context of approximate sparsity. Finally we prove an almost matching lower bound of $\Omega(s\log\frac{m}{s})$ and validate our approach empirically on synthetic graphs.
cs.SI
cs
Inferring Graphs from Cascades: A Sparse Recovery Framework 5 1 0 2 y a M 1 2 ] I S . s c [ 1 v 3 6 6 5 0 . 5 0 5 1 : v i X r a Jean Pouget-Abadie Harvard University Thibaut Horel Harvard University Abstract In the Network Inference problem, one seeks to recover the edges of an unknown graph from the observations of cascades propagating over this graph. In this paper, we approach this prob- lem from the sparse recovery perspective. We introduce a general model of cascades, includ- ing the voter model and the independent cascade model, for which we provide the first algorithm which recovers the graph’s edges with high prob- ability and O(s log m) measurements where s is the maximum degree of the graph and m is the number of nodes. Furthermore, we show that our algorithm also recovers the edge weights (the parameters of the diffusion process) and is ro- bust in the context of approximate sparsity. Fi- nally we prove an almost matching lower bound of Ω(s log m s ) and validate our approach empiri- cally on synthetic graphs. 1. Introduction Graphs have been extensively studied for their propaga- tive abilities: connectivity, routing, gossip algorithms, etc. A diffusion process taking place over a graph provides valuable information about the presence and weights of its edges. Influence cascades are a specific type of diffusion processes in which a particular infectious behavior spreads over the nodes of the graph. By only observing the “in- fection times” of the nodes in the graph, one might hope to recover the underlying graph and the parameters of the cascade model. This problem is known in the literature as the Network Inference problem. More precisely, solving the Network Inference problem involves designing an algorithm taking as input a set of Proceedings of the 32 nd International Conference on Machine Learning, Lille, France, 2015. JMLR: W&CP volume 37. Copy- right 2015 by the author(s). [email protected] [email protected] observed cascades (realisations of the diffusion process) and recovers with high probability a large fraction of the graph’s edges. The goal is then to understand the relation- ship between the number of observations, the probability of success, and the accuracy of the reconstruction. The Network Inference problem can be decomposed and analyzed “node-by-node”. Thus, we will focus on a sin- gle node of degree s and discuss how to identify its par- ents among the m nodes of the graph. Prior work has shown that the required number of observed cascades is O(poly(s) log m) (Netrapalli & Sanghavi, 2012; Abrahao et al., 2013). A more recent line of research (Daneshmand et al., 2014) has focused on applying advances in sparse recovery to the network inference problem. Indeed, the graph can be in- terpreted as a “sparse signal” measured through influence cascades and then recovered. The challenge is that influ- ence cascade models typically lead to non-linear inverse problems and the measurements (the state of the nodes at different time steps) are usually correlated. The sparse re- covery literature suggests that Ω(s log m s ) cascade obser- vations should be sufficient to recover the graph (Donoho, 2006; Candes & Tao, 2006). However, the best known up- per bound to this day is O(s2 log m) (Netrapalli & Sang- havi, 2012; Daneshmand et al., 2014) The contributions of this paper are the following: • we formulate the Graph Inference problem in the con- text of discrete-time influence cascades as a sparse re- covery problem for a specific type of Generalized Lin- ear Model. This formulation notably encompasses the well-studied Independent Cascade Model and Voter Model. • we give an algorithm which recovers the graph’s edges using O(s log m) cascades. Furthermore, we show that our algorithm is also able to efficiently recover the edge weights (the parameters of the influence model) up to an additive error term, • we show that our algorithm is robust in cases where the signal to recover is approximately s-sparse by Inferring Graphs from Cascades: A Sparse Recovery Framework proving guarantees in the stable recovery setting. • we provide an almost tight lower bound of Ω(s log m s ) observations required for sparse recovery. The work of (Du et al., 2014) is slightly orthogonal to ours since they suggest learning the influence function, rather than the parameters of the network directly. The organization of the paper is as follows: we conclude the introduction by a survey of the related work. In Sec- tion 2 we present our model of Generalized Linear Cas- cades and the associated sparse recovery formulation. Its theoretical guarantees are presented for various recovery settings in Section 3. The lower bound is presented in Sec- tion 4. Finally, we conclude with experiments in Section 5. Related Work The study of edge prediction in graphs has been an active field of research for over a decade (Liben-Nowell & Kleinberg, 2008; Leskovec et al., 2007; Adar & Adamic, 2005). (Gomez Rodriguez et al., 2010) introduced the NETINF algorithm, which approx- imates the likelihood of cascades represented as a con- tinuous process. The algorithm was improved in later work (Gomez-Rodriguez et al., 2011), but is not known to have any theoretical guarantees beside empirical validation on synthetic networks. Netrapalli & Sanghavi (2012) stud- ied the discrete-time version of the independent cascade model and obtained the first O(s2 log m) recovery guaran- tee on general networks. The algorithm is based on a like- lihood function similar to the one we propose, without the (cid:96)1-norm penalty. Their analysis depends on a correlation decay assumption, which limits the number of new infec- tions at every step. In this setting, they show a lower bound of the number of cascades needed for support recovery with constant probability of the order Ω(s log(m/s)). They also suggest a GREEDY algorithm, which achieves a O(s log m) guarantee in the case of tree graphs. The work of (Abra- hao et al., 2013) studies the same continuous-model frame- work as (Gomez Rodriguez et al., 2010) and obtains an O(s9 log2 s log m) support recovery algorithm, without the correlation decay assumption. (Du et al., 2013) propose a similar algorithm to ours for recovering the weights of the graph under a continuous-time independent cascade model, without proving theoretical guarantees. Closest to this work is a recent paper by Daneshmand et al. (2014), wherein the authors consider a (cid:96)1-regularized ob- jective function. They adapt standard results from sparse recovery to obtain a recovery bound of O(s3 log m) under an irrepresentability condition (Zhao & Yu, 2006). Under stronger assumptions, they match the (Netrapalli & Sang- havi, 2012) bound of O(s2 log m), by exploiting similar properties of the convex program’s KKT conditions. In contrast, our work studies discrete-time diffusion processes including the Independent Cascade model under weaker as- sumptions. Furthermore, we analyze both the recovery of the graph’s edges and the estimation of the model’s param- eters, and achieve close to optimal bounds. 2. Model We consider a graph G = (V, E, Θ), where Θ is a V × V matrix of parameters describing the edge weights of G. Intuitively, Θi,j captures the “influence” of node i on node j. Let m ≡ V . For each node j, let θj be the jth column vector of Θ. A discrete-time Cascade model is a Markov process over a finite state space {0, 1, . . . , K − 1}V with the following properties: 1. Conditioned on the previous time step, the transition events between two states in {0, 1, . . . , K − 1} for each i ∈ V are mutually independent across i ∈ V . 2. Of the K possible states, there exists a contagious state such that all transition probabilities of the Markov process can be expressed as a function of the graph parameters Θ and the set of “contagious nodes” at the previous time step. 3. The initial probability over {0, 1, . . . , K − 1}V is such that all nodes can eventually reach a contagious state with non-zero probability. The “contagious” nodes at t = 0 are called source nodes. In other words, a cascade model describes a diffusion pro- cess where a set of contagious nodes “influence” other nodes in the graph to become contagious. An influence cas- cade is a realisation of this random process, i.e. the succes- sive states of the nodes in graph G. Note that both the “sin- gle source” assumption made in (Daneshmand et al., 2014) and (Abrahao et al., 2013) as well as the “uniformly chosen source set” assumption made in (Netrapalli & Sanghavi, 2012) verify condition 3. Also note that the multiple-source node assumption does not reduce to the single-source as- sumption, even under the assumption that cascades do not overlap. Imagining for example two cascades starting from two different nodes; since we do not observe which node propagated the contagion to which node, we cannot at- tribute an infected node to either cascade and treat the prob- lem as two independent cascades. In the context of Network Inference, (Netrapalli & Sang- havi, 2012) focus on the well-known discrete-time indepen- dent cascade model recalled below, which (Abrahao et al., 2013) and (Daneshmand et al., 2014) generalize to contin- uous time. We extend the independent cascade model in a different direction by considering a more general class of transition probabilities while staying in the discrete-time setting. We observe that despite their obvious differences, both the independent cascade and the voter models make Inferring Graphs from Cascades: A Sparse Recovery Framework the network inference problem similar to the standard gen- eralized linear model inference problem. In fact, we define a class of diffusion processes for which this is true: the Generalized Linear Cascade Models. The linear threshold model is a special case and is discussed in Section 6. 2.1. Generalized Linear Cascade Models Let susceptible denote any state which can become conta- gious at the next time step with a non-zero probability. We draw inspiration from generalized linear models to intro- duce Generalized Linear Cascades: Definition 1. Let X t be the indicator variable of “conta- gious nodes” at time step t. A generalized linear cascade model is a cascade model such that for each susceptible node j in state s at time step t, the probability of j becom- ing “contagious” at time step t + 1 conditioned on X t is a Bernoulli variable of parameter f (θj · X t): P(X t+1 j = 1X t) = f (θj · X t) (1) where f : R → [0, 1] ) In other words, each generalized linear cascade pro- vides, for each node j ∈ V a series of measurements (X t, X t+1 sampled from a generalized linear model. X t] = f (θi · X t). As such, f can Note also that E[X t+1 be interpreted as the inverse link function of our general- ized linear cascade model. t∈Tj j i 2.2. Examples 2.2.1. INDEPENDENT CASCADE MODEL In the independent cascade model, nodes can be either sus- ceptible, contagious or immune. At t = 0, all source nodes are “contagious” and all remaining nodes are “susceptible”. At each time step t, for each edge (i, j) where j is suscep- tible and i is contagious, i attempts to infect j with proba- bility pi,j ∈ [0, 1]; the infection attempts are mutually in- dependent. If i succeeds, j will become contagious at time step t +1. Regardless of i’s success, node i will be immune at time t + 1, such that nodes stay contagious for only one time step. The cascade process terminates when no conta- gious nodes remain. If we denote by X t the indicator variable of the set of con- tagious nodes at time step t, then if j is susceptible at time step t + 1, we have: j = 1 X t(cid:3) = 1 − m(cid:89) P(cid:2)X t+1 (1 − pi,j)X t i . i=1 Defining Θi,j ≡ log( 1 1−pi,j j = 1 X t(cid:3) = 1 − m(cid:89) P(cid:2)X t+1 ), this can be rewritten as: e−Θi,j X t i (IC) i=1 = 1 − e−Θj·X t Therefore, the independent cascade model is a Generalized Linear Cascade model with inverse link function f : z (cid:55)→ 1− e−z. Note that to write the Independent Cascade Model as a Generalized Linear Cascade Model, we had to intro- ). The re- duce the change of variable Θi,j = log( covery results in Section 3 pertain to the Θj parameters. Fortunately, the following lemma shows that the recovery error on Θj is an upper bound on the error on the original pj parameters. Lemma 1. (cid:107)θ − θ∗(cid:107)2 ≥ (cid:107)p − p∗(cid:107)2. 1−pi,j 1 2.2.2. THE LINEAR VOTER MODEL malized such that ∀i, (cid:80) In the Linear Voter Model, nodes can be either red or blue. Without loss of generality, we can suppose that the blue nodes are contagious. The parameters of the graph are nor- j Θi,j = 1. Each round, every node j independently chooses one of its neighbors with probability Θi,j and adopts their color. The cascades stops at a fixed horizon time T or if all nodes are of the same color. If we denote by X t the indicator variable of the set of blue nodes at time step t, then we have: j = 1X t(cid:3) = P(cid:2)X t+1 m(cid:88) Θi,jX t i = Θj · X t (V) i=1 Thus, the linear voter model is a Generalized Linear Cas- cade model with inverse link function f : z (cid:55)→ z. 2.2.3. DISCRETIZATION OF CONTINUOUS MODEL Another motivation for the Generalized Linear Cascade model is that it captures the time-discretized formula- tion of the well-studied continuous-time independent cas- cade model with exponential transmission function (CICE) of (Gomez Rodriguez et al., 2010; Abrahao et al., 2013; Daneshmand et al., 2014). Assume that the temporal reso- lution of the discretization is ε, i.e. all nodes whose (con- tinuous) infection time is within the interval [kε, (k + 1)ε) are considered infected at (discrete) time step k. Let X k be the indicator vector of the set of nodes ‘infected’ before or during the kth time interval. Note that contrary to the j = 1 =⇒ discrete-time independent cascade model, X k X k+1 = 1, that is, there is no immune state and nodes remain contagious forever. Let Exp(p) be an exponentially-distributed random vari- able of parameter p and let Θi,j be the rate of transmis- j Inferring Graphs from Cascades: A Sparse Recovery Framework Figure 1. Illustration of the sparse-recovery approach. Our objec- tive is to recover the unknown weight vector θj for each node j. We observe a Bernoulli realization whose parameters are given by applying f to the matrix-vector product, where the measurement matrix encodes which nodes are “contagious” at each time step. sion along directed edge (i, j) in the CICE model. By the memoryless property of the exponential, if X k j (cid:54)= 1: P(X k+1 j = 1X k) = P( min i∈N (j) Exp(Θi,j) ≤ ) = P(Exp( Θi,jX t i ) ≤ ) = 1 − e−Θj·X t m(cid:88) overfitting and controls the sparsity of the solution. The generalized linear cascade model is decomposable in the following sense: given Definition 1, the log-likelihood can be written as the sum of m terms, each term i ∈ {1, . . . , m} only depending on θi. Since this is equally true for (cid:107)Θ(cid:107)1, each column θi of Θ can be estimated by a separate optimization program: θi ∈ argmax θ Li(θi x1, . . . , xn) − λ(cid:107)θi(cid:107)1 (2) where we denote by Ti the time steps at which node i is susceptible and: Li(θi x1, . . . , xn) = 1 Ti t∈Ti + (1 − xt+1 i xt+1 i log f (θi · xt) ) log(cid:0)1 − f (θi · xt)(cid:1) (cid:88) i=1 Therefore, the -discretized CICE-induced process is a Generalized Linear Cascade model with inverse link func- tion f : z (cid:55)→ 1 − e−·z. 2.2.4. LOGISTIC CASCADES “Logistic cascades” is the specific case where the inverse link function is given by the logistic function f (z) = 1/(1 + e−z+t). Intuitively, this captures the idea that there is a threshold t such that when the sum of the parameters of the infected parents of a node is larger than the threshold, the probability of getting infected is close to one. This is a smooth approximation of the hard threshold rule of the Linear Threshold Model (Kempe et al., 2003). As we will see later in the analysis, for logistic cascades, the graph in- ference problem becomes a linear inverse problem. 2.3. Maximum Likelihood Estimation Inferring the model parameter Θ from observed influence cascades is the central question of the present work. Recov- ering the edges in E from observed influence cascades is a well-identified problem known as the Network Inference problem. However, recovering the influence parameters is no less important. In this work we focus on recovering Θ, noting that the set of edges E can then be recovered through the following equivalence: (i, j) ∈ E ⇔ Θi,j (cid:54)= 0 Given observations (x1, . . . , xn) of a cascade model, we can recover Θ via Maximum Likelihood Estimation (MLE). Denoting by L the log-likelihood function, we con- sider the following (cid:96)1-regularized MLE problem: L(Θ x1, . . . , xn) − λ(cid:107)Θ(cid:107)1 Θ ∈ argmax 1 n Θ where λ is the regularization factor which helps prevent In the case of the voter model, the measurements include all time steps until we reach the time horizon T or the graph coalesces to a single state. For the independent cascade model, the measurements include all time steps until node i becomes contagious, after which its behavior is determin- istic. Contrary to prior work, our results depend on the number of measurements and not the number of cascades. Regularity assumptions To solve program (2) effi- ciently, we would like it to be convex. A sufficient condi- tion is to assume that Li is concave, which is the case if f and (1 − f ) are both log-concave. Remember that a twice- differentiable function f is log-concave iff. f(cid:48)(cid:48)f ≤ f(cid:48)2. It is easy to verify this property for f and (1 − f ) in the Independent Cascade Model and Voter Model. Furthermore, the data-dependent bounds in Section 3.1 will require the following regularity assumption on the inverse link function f: there exists α ∈ (0, 1) such that max(cid:8)(log f )(cid:48)(zx),(log(1 − f ))(cid:48)(zx)(cid:9) ≤ 1 (LF) α z and f (z) = 1 f(cid:48)(z) (1−f )(z) = 1 for all zx ≡ θ∗ · x such that f (zx) /∈ {0, 1}. In the voter model, f(cid:48)(z) 1−z . Hence (LF) will hold as soon as α ≤ Θi,j ≤ 1 − α for all (i, j) ∈ E which is always satisfied for some α for non-isolated nodes. In the Independent Cascade Model, f(cid:48)(z) f (z) = 1 ez−1 f(cid:48)(z) (1−f )(z) = 1. Hence (LF) holds as soon as pi,j ≥ α for and all (i, j) ∈ E which is always satisfied for some α ∈ (0, 1). For the data-independent bound of Proposition 1, we will require the following additional regularity assumption: max(cid:8)(log f )(cid:48)(cid:48)(zx),(log(1 − f ))(cid:48)(cid:48)(zx)(cid:9) ≤ 1 (LF2) α Inferring Graphs from Cascades: A Sparse Recovery Framework for some α ∈ (0, 1) and for all zx ≡ θ∗·x such that f (zx) /∈ {0, 1}. It is again easy to see that this condition is verified for the Independent Cascade Model and the Voter model for the same α ∈ (0, 1). (cid:80) Convex constraints The voter model is only defined when Θi,j ∈ (0, 1) for all (i, j) ∈ E. Similarly the in- dependent cascade model is only defined when Θi,j > 0. Because the likelihood function Li is equal to −∞ when the parameters are outside of the domain of definition of the models, these contraints do not need to appear explic- itly in the optimization program. In the specific case of the voter model, the constraint j Θi,j = 1 will not necessarily be verified by the es- timator obtained in (2). In some applications, the exper- imenter might not need this constraint to be verified, in which case the results in Section 3 still give a bound on the recovery error. If this constraint needs to be satisfied, then by Lagrangian duality, there exists a λ ∈ R such that j θj − 1(cid:1) to the objective function of (2) en- adding λ(cid:0)(cid:80) forces the constraint. Then, it suffices to apply the results of Section 3 to the augmented objective to obtain the same recovery guarantees. Note that the added term is linear and will easily satisfy all the required regularity assumptions. restricted eigenvalue condition introduced by (Bickel et al., 2009a). Definition 2. Let Σ ∈ Sm(R) be a real symmetric matrix and S be a subset of {1, . . . , m}. Defining C(S) ≡ {X ∈ Rm : (cid:107)XSc(cid:107)1 ≤ 3(cid:107)XS(cid:107)1}. We say that Σ satisfies the (S, γ)-restricted eigenvalue condition iff: ∀X ∈ C(S), X T ΣX ≥ γ(cid:107)X(cid:107)2 2 (RE) A discussion of the (S, γ)-(RE) assumption in the context of generalized linear cascade models can be found in Sec- tion 3.3. In our setting we require that the (RE)-condition holds for the Hessian of the log-likelihood function L: it es- sentially captures the fact that the binary vectors of the set of active nodes (i.e the measurements) are not too collinear. Theorem 1. Assume the Hessian ∇2L(θ∗) satisfies the (S, γ)-(RE) for some γ > 0 and that (LF) holds for some α > 0. For any δ ∈ (0, 1), let θ be the solution of (2) with λ ≡ 2 (cid:113) log m αn1−δ , then: (cid:114) (cid:107)θ − θ∗(cid:107)2 ≤ 6 γ s log m αn1−δ w.p. 1 − 1 enδ log m (3) 3. Results In this section, we apply the sparse recovery framework to analyze under which assumptions our program (2) recovers the true parameter θi of the cascade model. Furthermore, if we can estimate θi to a sufficiently good accuracy, it is then possible to recover the support of θi by simple thresh- olding, which provides a solution to the standard Network Inference problem. We will first give results in the exactly sparse setting in which θi has a support of size exactly s. We will then relax this sparsity constraint and give results in the stable recov- ery setting where θi is approximately s-sparse. As mentioned in Section 2.3, the maximum likelihood es- timation program is decomposable. We will henceforth fo- cus on a single node i ∈ V and omit the subscript i in the notations when there is no ambiguity. The recovery prob- lem is now the one of estimating a single vector θ∗ from a set T of observations. We will write n ≡ T . 3.1. Main Theorem In this section, we analyze the case where θ∗ is exactly sparse. We write S ≡ supp(θ∗) and s = S. Recall, that θi is the vector of weights for all edges directed at the node we are solving for. In other words, S is the set of all nodes susceptible to influence node i, also referred to as its parents. Our main theorem will rely on the now standard Note that we have expressed the convergence rate in the number of measurements n, which is different from the number of cascades. For example, in the case of the voter model with horizon time T and for N cascades, we can expect a number of measurements proportional to N × T . Theorem 1 is a consequence of Theorem 1 in (Negahban et al., 2012) which gives a bound on the convergence rate of regularized estimators. We state their theorem in the context of (cid:96)1 regularization in Lemma 2. Lemma 2. Let C(S) ≡ {∆ ∈ Rm (cid:107)∆S(cid:107)1 ≤ 3(cid:107)∆Sc(cid:107)1}. Suppose that: ∀∆ ∈ C(S), L(θ∗ + ∆) − L(θ∗) − ∇L(θ∗) · ∆ ≥ κL(cid:107)∆(cid:107)2 2 − τ 2L(θ∗) (4) for some κL > 0 and function τL. Finally suppose that λ ≥ 2(cid:107)∇L(θ∗)(cid:107)∞, then if θλ is the solution of (2): (cid:107)θλ − θ∗(cid:107)2 2 ≤ 9 λ2s κL + λ κ2L 2τ 2L(θ∗) To prove Theorem 1, we apply Lemma 2 with τL = 0. Since L is twice differentiable and convex, assumption (4) with κL = γ 2 is implied by the (RE)-condition. For a good convergence rate, we must find the smallest possible value of λ such that λ ≥ 2(cid:107)∇Lθ∗(cid:107)∞. The upper bound on the (cid:96)∞ norm of ∇L(θ∗) is given by Lemma 3. Inferring Graphs from Cascades: A Sparse Recovery Framework Lemma 3. Assume (LF) holds for some α > 0. For any δ ∈ (0, 1): solving (2) for λ ≡ 2 αn1−δ we have: (cid:113) log m (cid:114) (cid:115) (cid:114) (cid:107)∇L(θ∗)(cid:107)∞ ≤ 2 log m αn1−δ w.p. 1 − 1 enδ log m (cid:107)θ − θ∗(cid:107)2 ≤ 3 γ s log m αn1−δ + 4 4 s log m γ4αn1−δ (cid:107)θ∗ − θ∗ (cid:98)s(cid:99)(cid:107)1 The proof of Lemma 3 relies crucially on Azuma- Hoeffding’s inequality, which allows us to handle corre- lated observations. This departs from the usual assump- tions made in sparse recovery settings, that the measure- ments are independent from one another. We now show how to use Theorem 1 to recover the support of θ∗, that is, to solve the Network Inference problem. Corollary 1. Under the same assumptions as Theorem 1, let Sη ≡ {j ∈ {1, . . . , m} : θj > η} for η > 0. For 0 <  < η, let S∗ i > η + } be the set of all true ‘strong’ parents. Suppose the number of measurements verifies: n > 9s log m αγ22 . Then with probability 1 − 1 η+ ⊆ Sη ⊆ S∗. In other words we recover all ‘strong’ parents and no ‘false’ parents. η+ ≡ {i ∈ {1, . . . , m} : θ∗ m , S∗ Assuming we know a lower bound α on Θi,j, Corollary 1 can be applied to the Network Inference problem in the fol- lowing manner: pick  = η η+ = S . That is, the support of θ∗ provided that n = Ω can be found by thresholding θ to the level η. (cid:16) s log m 3 , then S∗ 2 and η = α (cid:17) α3γ2 3.2. Approximate Sparsity In practice, exact sparsity is rarely verified. For social net- works in particular, it is more realistic to assume that each node has few “strong” parents’ and many “weak” parents. In other words, even if θ∗ is not exactly s-sparse, it can be well approximated by s-sparse vectors. Rather than obtaining an impossibility result, we show that the bounds obtained in Section 3.1 degrade gracefully in (cid:98)s(cid:99) ∈ argmin(cid:107)θ(cid:107)0≤s (cid:107)θ − θ∗(cid:107)1 this setting. Formally, let θ∗ be the best s-approximation to θ∗. Then we pay a cost pro- portional to (cid:107)θ∗−θ∗ (cid:98)s(cid:99)(cid:107)1 for recovering the weights of non- exactly sparse vectors. This cost is simply the “tail” of θ∗: the sum of the m − s smallest coordinates of θ∗. We re- cover the results of Section 3.1 in the limit of exact spar- sity. These results are formalized in the following theorem, which is also a consequence of Theorem 1 in (Negahban et al., 2012). Theorem 2. Suppose the (RE) assumption holds for the (cid:107)θ∗(cid:107)1 on the fol- Hessian ∇2f (θ∗) and τL(θ∗) = κ2 log m lowing set: C(cid:48) ≡{X ∈ Rp : (cid:107)XSc(cid:107)1 ≤ 3(cid:107)XS(cid:107)1 + 4(cid:107)θ∗ − θ∗ (cid:98)s(cid:99)(cid:107)1} n ∩ {(cid:107)X(cid:107)1 ≤ 1} If the number of measurements n ≥ 64κ2 γ s log m, then by As in Corollary 1, an edge recovery guarantee can be de- rived from Theorem 2 in the case of approximate sparsity. 3.3. Restricted Eigenvalue Condition There exists a large class of sufficient conditions under which sparse recovery is achievable in the context of regu- larized estimation (van de Geer & Bühlmann, 2009). The restricted eigenvalue condition, introduced in (Bickel et al., 2009b), is one of the weakest such assumption. It can be interpreted as a restricted form of non-degeneracy. Since we apply it to the Hessian of the log-likelihood function ∇2L(θ), it essentially reduces to a form of restricted strong convexity, that Lemma 2 ultimately relies on. Observe that the Hessian of L can be seen as a re-weighted Gram matrix of the observations: (cid:20) (cid:88) 1 T − (1 − xt+1 t∈T i ) xt(xt)T xt+1 i f(cid:48)(cid:48)f − f(cid:48)2 (θ∗ · xt) f 2 f(cid:48)(cid:48)(1 − f ) + f(cid:48)2 (1 − f )2 (θ∗ · xt) (cid:21) ∇2L(θ∗) = If f and (1 − f ) are c-strictly log-convex for c > 0, then min ((log f )(cid:48)(cid:48), (log(1 − f ))(cid:48)(cid:48)) ≥ c. This implies that the (S, γ)-(RE) condition in Theorem 1 and Theorem 2 re- duces to a condition on the Gram matrix of the observations X T X = 1T (cid:80) t∈T xt(xt)T for γ(cid:48) ≡ γ · c. (RE) with high probability The Generalized Linear Cascade model yields a probability distribution over the ob- served sets of infected nodes (xt)t∈T . It is then natural to ask whether the restricted eigenvalue condition is likely to occur under this probabilistic model. Several recent papers show that large classes of correlated designs obey the re- stricted eigenvalue property with high probability (Raskutti et al., 2010; Rudelson & Zhou, 2013). The (RE)-condition has the following concentration prop- erty: the expected Hessian matrix E[∇2L(θ∗)], then it holds for the finite sample Hessian ma- trix ∇2L(θ∗) with high probability. Therefore, under an assumption which only involves the probabilistic model and not the actual observations, we can obtain the same conclusion as in Theorem 1: Proposition 1. Suppose E[∇2L(θ∗)] verifies the (S, γ)- (RE) condition and assume (LF) and (LF2). For δ > 0, 28γα s2 log m, then ∇2L(θ∗) verifies the (S, γ if n1−δ ≥ 1 2 )- (RE) condition, w.p ≥ 1 − e−nδ log m. it holds for if Inferring Graphs from Cascades: A Sparse Recovery Framework Observe that the number of measurements required in Proposition 1 is now quadratic in s. If we only keep the first measurement from each cascade, which are in- dependent, we can apply Theorem 1.8 from (Rudelson & Zhou, 2013), lowering the number of required cascades to s log m log3(s log m). If f and (1 − f ) are strictly log-convex, then the previous observations show that the quantity E[∇2L(θ∗)] in Propo- sition 1 can be replaced by the expected Gram matrix: A ≡ E[X T X]. This matrix A has a natural interpretation: the entry ai,j is the probability that node i and node j are infected at the same time during a cascade. In particular, the diagonal term ai,i is simply the probability that node i is infected during a cascade. 4. A Lower Bound In (Netrapalli & Sanghavi, 2012), the authors explicitate s ) on the number of cascades a lower bound of Ω(s log m necessary to achieve good support recovery with constant probability under a correlation decay assumption. In this section, we will consider the stable sparse recovery set- ting of Section 3.2. Our goal is to obtain an information- theoretic lower bound on the number of measurements nec- essary to approximately recover the parameter θ∗ of a cas- cade model from observed cascades. Similar lower bounds were obtained for sparse linear inverse problems in (Price & Woodruff, 2011; 2012; Ba et al., 2011). Theorem 3. Let us consider a cascade model of the form (1) and a recovery algorithm A which takes as input n ran- dom cascade measurements and outputs θ such that with probability δ > 1 2 (over the measurements): (cid:107)θ − θ∗(cid:107)2 (cid:107)θ − θ∗(cid:107)2 ≤ C min (cid:107)θ(cid:107)0≤s (5) where θ∗ is the true parameter of the cascade model. Then n = Ω(s log m s / log C). This theorem should be contrasted with Theorem 2: up to an additive s log s factor, the number of measurements re- quired by our algorithm is tight. The proof of Theorem 3 follows an approach similar to (Price & Woodruff, 2012). We present a sketch of the proof in the Appendix and refer the reader to their paper for more details. 5. Experiments In this section, we validate empirically the results and as- sumptions of Section 3 for varying levels of sparsity and different initializations of parameters (n, m, λ, pinit), where pinit is the initial probability of a node being a source node. We compare our algorithm to two different state-of-the-art algorithms: GREEDY and MLE from (Netrapalli & Sang- havi, 2012). As an extra benchmark, we also introduce a new algorithm LASSO, which approximates our SPARSE MLE algorithm. Experimental setup We evaluate the performance of the algorithms on synthetic graphs, chosen for their similarity to real social networks. We therefore consider a Watts- Strogatz graph (300 nodes, 4500 edges) (Watts & Stro- gatz, 1998), a Barabasi-Albert graph (300 nodes, 16200 edges) (Albert & Barabási, 2001), a Holme-Kim power law graph (200 nodes, 9772 edges) (Holme & Kim, 2002), and the recently introduced Kronecker graph (256 nodes, 10000 edges) (Leskovec et al., 2010). Undirected graphs are con- verted to directed graphs by doubling the edges. For every reported data point, we sample edge weights and generate n cascades from the (IC) model for n ∈ {100, 500, 1000, 2000, 5000}. We compare for each algo- rithm the estimated graph G with G. The initial probability of a node being a source is fixed to 0.05, i.e. an average of 15 nodes source nodes per cascades for all experiments, ex- cept for Figure (f). All edge weights are chosen uniformly in the interval [0.2, 0.7], except when testing for approxi- mately sparse graphs (see paragraph on robustness). Ad- justing for the variance of our experiments, all data points are reported with at most a ±1 error margin. The param- eter λ is chosen to be of the order O((cid:112)log m/(αn)). We report our results as a function of the number of cascades and not the number of measurements: in practice, very few cascades have depth greater than 3. Benchmarks We compare our SPARSE MLE algorithm to 3 benchmarks: GREEDY and MLE from (Netrapalli & Sanghavi, 2012) and LASSO. The MLE algorithm is a maximum-likelihood estimator without (cid:96)1-norm penaliza- tion. GREEDY is an iterative algorithm. We introduced the LASSO algorithm in our experiments to achieve faster com- putation time: θi ∈ arg min θ f (θi · xt) − xt+1 i 2 + λ(cid:107)θi(cid:107)1 (cid:88) t∈T i LASSO has the merit of being both easier and faster to opti- mize numerically than the other convex-optimization based algorithms. It approximates the SPARSE MLE algorithm by making the assumption that the observations xt+1 are of the i = f (θi· xt) + , where  is random white noise. form: xt+1 This is not valid in theory since  depends on f (θi · xt), however the approximation is validated in practice. We did not benchmark against other known algorithms (NETRATE (Gomez-Rodriguez et al., 2011) and FIRST EDGE (Abrahao et al., 2013)) due to the discrete-time as- sumption. These algorithms also suppose a single-source model, whereas SPARSE MLE, MLE, and GREEDY do not. Learning the graph in the case of a multi-source cascade Inferring Graphs from Cascades: A Sparse Recovery Framework (a) Barabasi-Albert (F1 vs. n) (b) Watts-Strogatz (F1 vs. n) (c) Holme-Kim (Prec-Recall) (d) Sparse Kronecker ((cid:96)2-norm vs. n) (e) Non-sparse Kronecker ((cid:96)2-norm vs. n) (f) Watts-Strogatz (F1 vs. pinit) Figure 2. Figures (a) and (b) report the F1-score in log scale for 2 graphs as a function of the number of cascades n: (a) Barabasi-Albert graph, 300 nodes, 16200 edges. (b) Watts-Strogatz graph, 300 nodes, 4500 edges. Figure (c) plots the Precision-Recall curve for various values of λ for a Holme-Kim graph (200 nodes, 9772 edges). Figures (d) and (e) report the (cid:96)2-norm (cid:107) Θ − Θ(cid:107)2 for a Kronecker graph which is: (d) exactly sparse (e) non-exactly sparse, as a function of the number of cascades n. Figure (f) plots the F1-score for the Watts-Strogatz graph as a function of pinit. model is harder (see Figure 2 (f)) but more realistic, since we rarely have access to “patient 0” in practice. Graph Estimation In the case of the LASSO, MLE and SPARSE MLE algorithms, we construct the edges of G : ∪j∈V {(i, j) : Θij > 0.1}, i.e by thresholding. Finally, we report the F1-score= 2precision·recall/(precision+recall), which considers (1) the number of true edges recovered by the algorithm over the total number of edges returned by the algorithm (precision) and (2) the number of true edges recovered by the algorithm over the total number of edges it should have recovered (recall). Over all experiments, SPARSE MLE achieves higher rates of precision, recall, and F1-score. Interestingly, both MLE and SPARSE MLE per- form exceptionally well on the Watts-Strogatz graph. Quantifying robustness The previous experiments only considered graphs with strong edges. To test the algorithms in the approximately sparse case, we add sparse edges to the previous graphs according to a bernoulli variable of pa- rameter 1/3 for every non-edge, and drawing a weight uni- formly from [0, 0.1]. The non-sparse case is compared to the sparse case in Figure 2 (d)–(e) for the (cid:96)2 norm show- ing that both the LASSO, followed by SPARSE MLE are the most robust to noise. 6. Future Work Solving the Graph Inference problem with sparse recovery techniques opens new venues for future work. Firstly, the sparse recovery literature has already studied regulariza- tion patterns beyond the (cid:96)1-norm, notably the thresholded and adaptive lasso (van de Geer et al., 2011; Zou, 2006). Another goal would be to obtain confidence intervals for our estimator, similarly to what has been obtained for the Lasso in the recent series of papers (Javanmard & Monta- nari, 2014; Zhang & Zhang, 2014). Finally, the linear threshold model is a commonly stud- ied diffusion process and can also be cast as a general- ized linear cascade with inverse link function z (cid:55)→ 1z>0: = sign (θj · X t − tj). This model therefore falls X t+1 into the 1-bit compressed sensing framework (Boufounos & Baraniuk, 2008). Several recent papers study the the- oretical guarantees obtained for 1-bit compressed sensing with specific measurements (Gupta et al., 2010; Plan & Vershynin, 2014). Whilst they obtained bounds of the order O(s log m s ), no current theory exists for recovering positive bounded signals from binary measurememts. This research direction may provide the first clues to solve the “adaptive learning” problem: if we are allowed to adaptively choose the source nodes at the beginning of each cascade, how much can we improve the current results? j 50100500100020005000Number of Cascades0.00.20.40.60.81.0F1 scoreGreedyLassoMLEOur Method Inferring Graphs from Cascades: A Sparse Recovery Framework Acknowledgments We would like to thank Yaron Singer, David Parkes, Jelani Nelson, Edoardo Airoldi and Or Sheffet for helpful discus- sions. We are also grateful to the anonymous reviewers for their insightful feedback and suggestions. References Abrahao, Bruno D., Chierichetti, Flavio, Kleinberg, Robert, and Panconesi, Alessandro. Trace complexity of network inference. In The 19th ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, August 11-14, 2013, pp. 491–499, 2013. Adar, Eytan and Adamic, Lada A. Tracking information epidemics in blogspace. In 2005 IEEE / WIC / ACM In- ternational Conference on Web Intelligence (WI 2005), 19-22 September 2005, Compiegne, France, pp. 207– 214, 2005. Albert, Réka and Barabási, Albert-László. Statisti- cal mechanics of complex networks. CoRR, cond- mat/0106096, 2001. Ba, Khanh Do, Indyk, Piotr, Price, Eric, and Woodruff, David P. Lower bounds for sparse recovery. CoRR, abs/1106.0365, 2011. Du, Nan, Song, Le, Woo, Hyenkyun, and Zha, Hongyuan. Uncover topic-sensitive information diffusion networks. In Proceedings of the Sixteenth International Confer- ence on Artificial Intelligence and Statistics, pp. 229– 237, 2013. Du, Nan, Liang, Yingyu, Balcan, Maria, and Song, Le. In- fluence function learning in information diffusion net- works. In Proceedings of the 31st International Confer- ence on Machine Learning (ICML-14), pp. 2016–2024, 2014. Gomez Rodriguez, Manuel, Leskovec, Jure, and Krause, Andreas. Inferring networks of diffusion and influence. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’10, pp. 1019–1028, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0055-1. Gomez-Rodriguez, Manuel, Balduzzi, David, and Schölkopf, Bernhard. Uncovering the temporal dy- namics of diffusion networks. CoRR, abs/1105.0697, 2011. Gupta, Ankit, Nowak, Robert, and Recht, Benjamin. Sam- ple complexity for 1-bit compressed sensing and sparse classification. In IEEE International Symposium on In- formation Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings, pp. 1553–1557, 2010. Bickel, Peter J, Ritov, Ya’acov, and Tsybakov, Alexan- dre B. Simultaneous analysis of lasso and dantzig se- lector. The Annals of Statistics, pp. 1705–1732, 2009a. Holme, Petter and Kim, Beom Jun. Growing scale-free networks with tunable clustering. Physical review E, 65: 026–107, 2002. Bickel, Peter J., Ritov, Ya’acov, and Tsybakov, Alexan- dre B. Simultaneous analysis of lasso and dantzig se- lector. Ann. Statist., 37(4):1705–1732, 08 2009b. Boufounos, Petros and Baraniuk, Richard G. 1-bit com- pressive sensing. In 42nd Annual Conference on Infor- mation Sciences and Systems, CISS 2008, Princeton, NJ, USA, 19-21 March 2008, pp. 16–21, 2008. Candes, Emmanuel J and Tao, Terence. Near-optimal sig- nal recovery from random projections: Universal encod- ing strategies? Information Theory, IEEE Transactions on, 52(12):5406–5425, 2006. Daneshmand, Hadi, Gomez-Rodriguez, Manuel, Song, Le, and Schölkopf, Bernhard. Estimating diffusion network structures: Recovery conditions, sample complexity & soft-thresholding algorithm. In Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21-26 June 2014, pp. 793–801, 2014. Donoho, David L. Compressed sensing. Information The- ory, IEEE Transactions on, 52(4):1289–1306, 2006. Javanmard, Adel and Montanari, Andrea. Confidence in- tervals and hypothesis testing for high-dimensional re- gression. The Journal of Machine Learning Research, 15(1):2869–2909, 2014. Kempe, David, Kleinberg, Jon M., and Tardos, Éva. Maxi- mizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, 2003, pp. 137– 146, 2003. Leskovec, Jure, McGlohon, Mary, Faloutsos, Christos, Glance, Natalie S., and Hurst, Matthew. Patterns of cas- In Proceedings cading behavior in large blog graphs. of the Seventh SIAM International Conference on Data Mining, April 26-28, 2007, Minneapolis, Minnesota, USA, pp. 551–556, 2007. Leskovec, Jure, Chakrabarti, Deepayan, Kleinberg, Jon M., Faloutsos, Christos, and Ghahramani, Zoubin. Kro- necker graphs: An approach to modeling networks. Journal of Machine Learning Research, 11:985–1042, 2010. Inferring Graphs from Cascades: A Sparse Recovery Framework Society: Series B (Statistical Methodology), 76(1):217– 242, 2014. Zhao, Peng and Yu, Bin. On model selection consistency of lasso. J. Mach. Learn. Res., 7:2541–2563, December 2006. ISSN 1532-4435. Zou, Hui. The adaptive lasso and its oracle properties. Journal of the American Statistical Association, 101 (476):1418–1429, 2006. Liben-Nowell, David and Kleinberg, Jon. Tracing infor- mation flow on a global scale using Internet chain-letter data. Proceedings of the National Academy of Sciences, 105(12):4633–4638, 2008. Negahban, Sahand N., Ravikumar, Pradeep, Wrainwright, Martin J., and Yu, Bin. A unified framework for high- dimensional analysis of m-estimators with decompos- able regularizers. Statistical Science, 27(4):538–557, December 2012. Netrapalli, Praneeth and Sanghavi, Sujay. Learning the graph of epidemic cascades. SIGMETRICS Perform. Eval. Rev., 40(1), June 2012. ISSN 0163-5999. Plan, Yaniv and Vershynin, Roman. Dimension reduction by random hyperplane tessellations. Discrete & Compu- tational Geometry, 51(2):438–461, 2014. Price, Eric and Woodruff, David P. (1 + eps)-approximate sparse recovery. In Ostrovsky, Rafail (ed.), IEEE 52nd Annual Symposium on Foundations of Computer Sci- ence, FOCS 2011, Palm Springs, CA, USA, October 22- 25, 2011, pp. 295–304. IEEE Computer Society, 2011. ISBN 978-1-4577-1843-4. Price, Eric and Woodruff, David P. Applications of the shannon-hartley theorem to data streams and sparse re- covery. In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cam- bridge, MA, USA, July 1-6, 2012, pp. 2446–2450. IEEE, 2012. ISBN 978-1-4673-2580-6. Raskutti, Garvesh, Wainwright, Martin J., and Yu, Bin. Re- stricted eigenvalue properties for correlated gaussian de- signs. Journal of Machine Learning Research, 11:2241– 2259, 2010. Rudelson, Mark and Zhou, Shuheng. Reconstruction from anisotropic random measurements. IEEE Transactions on Information Theory, 59(6):3434–3447, 2013. van de Geer, Sara, Bühlmann, Peter, and Zhou, Shuheng. The adaptive and the thresholded lasso for potentially misspecified models (and a lower bound for the lasso). Electron. J. Statist., 5:688–749, 2011. van de Geer, Sara A. and Bühlmann, Peter. On the condi- tions used to prove oracle results for the lasso. Electron. J. Statist., 3:1360–1392, 2009. Watts, Duncan J. and Strogatz, Steven H. Collective dy- namics of ‘small-world’ networks. Nature, 393(6684): 440–442, 1998. Zhang, Cun-Hui and Zhang, Stephanie S. Confidence in- tervals for low dimensional parameters in high dimen- sional linear models. Journal of the Royal Statistical Inferring Graphs from Cascades: A Sparse Recovery Framework 7. Appendix In this appendix, we provide the missing proofs of Sec- tion 3 and Section 4. We also show additional experiments on the running time of our recovery algorithm which could not fit in the main part of the paper. 7.1. Proofs of Section 3 Proof of Lemma 1. Using the inequality ∀x > 0, log x ≥ 1−p(cid:48) ) ≥ max(1 − 1 − 1 1−p(cid:48) , 1 − 1−p(cid:48) 1−p 1−p ) − log( 1 1−p ) ≥ max(p − p(cid:48), p(cid:48) − p). x, we have log( 1 Proof of Lemma 3. The gradient of L is given by: ∇L(θ∗) = 1 T xt xt+1 i f(cid:48) f (θ∗ · xt) (cid:20) (cid:88) t∈T (cid:21) − (1 − xt+1 i ) f(cid:48) 1 − f (θ∗ · xt) (cid:80) Let ∂jL(θ) be the j-th coordinate of ∇L(θ∗). Writing ∂jL(θ∗) = 1T xt] = f (θ∗·xt), k=1 Yk is a we have that E[Yt+1Yt] = 0. Hence Zt = (cid:80)t t∈T Yt and since E[xt+1 martingale. Using assumption (LF), we have almost surely Zt+1 − Zt ≤ 1 α and we can apply Azuma’s inequality to Zt: i P(cid:2)ZT ≥ λ(cid:3) ≤ 2 exp (cid:18)−λ2α (cid:19) 2n Applying a union bound to have the previous inequality hold for all coordinates of ∇L(θ) implies: P(cid:2)(cid:107)∇L(θ∗)(cid:107)∞ ≥ λ(cid:3) ≤ 2m exp (cid:18)−λ2nα (cid:19) 2 Choosing λ ≡ 2 αn1−δ concludes the proof. (cid:113) log m Proof of Corollary 1. By choosing δ = 0, if n > 9s log m αγ22 , then (cid:107)θ − θ∗(cid:107)2 <  < η with probability 1 − 1 i = 0 and θ > η, then (cid:107)θ − θ∗(cid:107)2 ≥ θi − θ∗ i > η, which is If a contradiction. Therefore we get no false positives. i <  =⇒ θj > η and we get all i > η + , then θi − θ∗ θ∗ strong parents. m. If θ∗ (RE) with high probability We now prove Proposi- tion 1. The proof mostly relies on showing that the Hessian of likelihood function L is sufficiently well concentrated around its expectation. Proof. Writing H ≡ ∇2L(θ∗), if ∀∆ ∈ C(S), (cid:107) E[H] − H](cid:107)∞ ≤ λ and E[H] verifies the (S, γ)-(RE) condition then: √ i,jL(θ∗) = 1T ∀∆ ∈ C(S), ∆H∆ ≥ ∆ E[H]∆(1 − 32sλ/γ) inequality as in the proof of Lemma 3, this implies: Indeed, ∆(H − E[H])∆ ≤ 2λ(cid:107)∆(cid:107)2 Writing ∂2 (6) s(cid:107)∆s(cid:107)2)2. t∈T Yt and using (LF ) and α. Applying Azuma’s (cid:80) 1 ≤ 2λ(4 (LF 2) we have (cid:12)(cid:12)Yt − E[Yt](cid:12)(cid:12) ≤ 3 (cid:18) P(cid:2)(cid:107) E[H] − H(cid:107)∞ ≥ λ(cid:3) ≤ 2 exp (cid:113) 9logm αn1−δ , (cid:107)E[H] − H(cid:107)∞ ≤ λ w.p Thus, if we take λ = at least 1 − e−nδ log m. When n1−δ ≥ 1 28γα s2 log m, (6) implies ∀∆ ∈ C(S), ∆H∆ ≥ 1 2 ∆ E[H]∆, w.p. at least 1− e−nδ log m and the conclusion of Proposition 1 follows. − nαλ2 3 + 2 log m (cid:19) 7.2. Proof of Theorem 3 Let us consider an algorithm A which verifies the recovery guarantee of Theorem 3: there exists a probability distri- bution over measurements such that for all vectors θ∗, (5) holds w.p. δ. This implies by the probabilistic method that for all distribution D over vectors θ, there exists an n × m measurement matrix XD with such that (5) holds w.p. δ (θ is now the random variable). Consider the following distribution D: choose S uni- formly at random from a “well-chosen” set of s-sparse supports F and t uniformly at random from X ≡ (cid:8)t ∈ {−1, 0, 1}m supp(t) ∈ F(cid:9). Define θ = t + w where w ∼ N (0, α s Consider the following communication game between Al- (1) Alice sends y ∈ Rm drawn from a ice and Bob: Bernouilli distribution of parameter f (XDθ) to Bob. (2) Bob uses A to recover θ from y. It can be shown that at the end of the game Bob now has a quantity of information s ) about S. By the Shannon-Hartley theorem, this Ω(s log m information is also upper-bounded by O(n log C). These two bounds together imply the theorem. m Im) and α = Ω( 1 C ). 7.3. Running Time Analysis We include here a running time analysis of our algorithm. In Figure 3, we compared our algorithm to the benchmark algorithms for increasing values of the number of nodes. In Figure 4, we compared our algorithm to the benchmarks for a fixed graph but for increasing number of observed cascades. In both Figures, unsurprisingly, the simple greedy algo- rithm is the fastest. Even though both the MLE algorithm Inferring Graphs from Cascades: A Sparse Recovery Framework and the algorithm we introduced are based on convex op- timization, the MLE algorithm is faster. This is due to the overhead caused by the (cid:96)1-regularisation in (2). The dependency of the running time on the number of cas- cades increases is linear, as expected. The slope is largest for our algorithm, which is again caused by the overhead induced by the (cid:96)1-regularization. Figure 3. Running time analysis for estimating the parents of a single node on a Barabasi-Albert graph as a function of the num- ber of nodes in the graph. The parameter k (number of nodes each new node is attached to) was set to 30. pinit is chosen equal to .15, and the edge weights are chosen uniformly at random in [.2, .7]. The penalization parameter λ is chosen equal to .1. Figure 4. Running time analysis for estimating the parents of a single node on a Barabasi-Albert graph as a function of the num- ber of total observed cascades. The parameters defining the graph were set as in Figure 3. 100200500100015002000Number of Nodes04812162024CPU time (s)GreedyMLEOur Method100200500100015002000Number of Cascades04812162024CPU time (s)GreedyMLEOur Method
1802.09597
1
1802
2018-02-26T20:43:18
Mapping the Invocation Structure of Online Political Interaction
[ "cs.SI", "cs.CY", "cs.HC", "physics.soc-ph" ]
The surge in political information, discourse, and interaction has been one of the most important developments in social media over the past several years. There is rich structure in the interaction among different viewpoints on the ideological spectrum. However, we still have only a limited analytical vocabulary for expressing the ways in which these viewpoints interact. In this paper, we develop network-based methods that operate on the ways in which users share content; we construct \emph{invocation graphs} on Web domains showing the extent to which pages from one domain are invoked by users to reply to posts containing pages from other domains. When we locate the domains on a political spectrum induced from the data, we obtain an embedded graph showing how these interaction links span different distances on the spectrum. The structure of this embedded network, and its evolution over time, helps us derive macro-level insights about how political interaction unfolded through 2016, leading up to the US Presidential election. In particular, we find that the domains invoked in replies spanned increasing distances on the spectrum over the months approaching the election, and that there was clear asymmetry between the left-to-right and right-to-left patterns of linkage.
cs.SI
cs
Mapping the Invocation Structure of Online Political Interaction Manish Raghavan Cornell University Ashton Anderson University of Toronto Jon Kleinberg Cornell University 8 1 0 2 b e F 6 2 ] I S . s c [ 1 v 7 9 5 9 0 . 2 0 8 1 : v i X r a ABSTRACT The surge in political information, discourse, and interaction has been one of the most important developments in social media over the past several years. There is rich structure in the interaction among different viewpoints on the ideological spectrum. However, we still have only a limited analytical vocabulary for expressing the ways in which these viewpoints interact. In this paper, we develop network-based methods that operate on the ways in which users share content; we construct invocation graphs on Web domains showing the extent to which pages from one domain are invoked by users to reply to posts containing pages from other domains. When we locate the domains on a political spectrum induced from the data, we obtain an embedded graph showing how these interaction links span different distances on the spectrum. The structure of this embedded network, and its evolution over time, helps us derive macro-level insights about how political interaction unfolded through 2016, leading up to the US Presidential election. In particular, we find that the domains invoked in replies spanned increasing distances on the spectrum over the months approaching the election, and that there was clear asymmetry between the left-to-right and right-to-left patterns of linkage. ACM Reference Format: Manish Raghavan, Ashton Anderson, and Jon Kleinberg. 2018. Mapping the Invocation Structure of Online Political Interaction. In WWW 2018: The 2018 Web Conference, April 23–27, 2018, Lyon, France. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3178876.3186129 1 INTRODUCTION Political interaction has long constituted a key use of social media, and there is a correspondingly rich history of research into its structure - one that extends the much longer history of scholarship on the role of media in the political process [6, 14, 23, 25]. A crucial issue in this line of work is the extent to which political interaction on social media takes place primarily among users who are ideologically similar, or whether it reaches across the political spectrum. Early analysis of political blogging indicated a clustered structure, with a high density of linkage among ideologically similar blogs and a lower density of linkage between blogs with strongly differing views [1]. Subsequent work, looking at platforms that arose further into the evolution of social media, suggested that a more complex structure was developing, in which homophily in views remained a powerful force, but where the platforms were providing users with some level of cross-cutting exposure [3, 4]. This paper is published under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. Authors reserve their rights to disseminate the work on their personal and corporate Web sites with the appropriate attribution. WWW 2018, April 23–27, 2018, Lyon, France © 2018 IW3C2 (International World Wide Web Conference Committee), published under Creative Commons CC BY 4.0 License. ACM ISBN 978-1-4503-5639-8/18/04. https://doi.org/10.1145/3178876.3186129 These questions are important, as they ask whether online political interaction consists of opposing sides who engage with each other, or well-separated clusters who are isolated in "echo chambers" or "filter bubbles" [11, 27, 30]. The answers to such questions depend intrinsically on which types of interactions are being considered. Existing work in the online domain has implicitly focused on two standard forms of in- teraction: page-to-page interaction, expressed by hyperlinks among documents [1]; and user-to-user interaction, expressed by commu- nication among people on social platforms [3, 4, 9]. Each of these induces a network on a set of entities - sources and users respec- tively - which can then be analyzed relative to an underlying political spectrum. Networks of sources invoked by users. Here we consider a different type of political interaction network, defined as follows. When a user u shares a page A, and a user v replies by sharing a page B, there is not simply an interaction between users u and v; an interaction is also induced between pages A and B. As reshares develop into a widespread style of social media content production [8, 10, 17, 24], the ability of users to deploy page references as proxies in their discussion becomes an activity requiring very low effort, and we find through a large-scale analysis of Twitter data leading up to the 2016 U.S. Presidential election that such A-B interactions are widespread: users regularly invoke links in this back-and-forth fashion when they interact with each other. These invoked interactions between pages A and B are fundamen- tally different from both user-to-user and page-to-page interaction networks. Unlike free-form user-to-user interactions, they create logical relationships among the information sources, not just the consumers and sharers of these sources. But they are not like tradi- tional page-to-page interactions either, because they are not based on a hyperlink from A to B, and they are not in general determined by the authors of either A or B; it is the readers deciding how A and B should be used in discussion who are determining the logical link between them. In this sense, invoked interactions between A and B are not directly under the control of the authors of A and B; they form a kind of "revealed interpretation" of A and B once they are released into social media. The idea that replying to page A with page B can create a se- mantically meaningful connection between A and B formed the basis of an elegant technique due to Frigerri, Adamic, Eckles, and Cheng [12] for identifying pages to debunk widely circulated ru- mors. Drawing on the fact that snopes.com is a heavily-used site for evaluating Internet rumors, they demonstrated that many in- stances of a pair (B, A), where A is a page appearing in Facebook posts and B is a page on snopes.com, serves as strong evidence that B is providing a judgment on the credibility of A. In this way, scanning the replies to posts where A occurs for pages residing on snopes.com provides an automated method for identifying a page B that can help users evaluate the veracity of A. WWW 2018, April 23–27, 2018, Lyon, France Manish Raghavan, Ashton Anderson, and Jon Kleinberg Figure 1: A section from an example invocation graph containing instances from our data. In each case, an article from domain B in response to an article from domain A contributes to the link from B to A. The link from Breitbart to The New York Times comes from articles like the pair shown here, a Breitbart article on the Times' taxes in response to a Times article on Donald Trump's taxes. Other links demonstrate an interaction where one article supports another: for example, a New York Times article shared in response to a Guardian article on Russian information operations contributes to the link from The Times to The Guardian. Given that invoked interactions between pages A and B more generally are voluminous, transcending any one particular domain or use case, what do we learn if we consider the set of all such interactions as a network in its own right, latent in a social media platform? The present work: The structure of invocation graphs. We are interested in understanding the global structure of the network of invoked interactions, and developing methods that can probe this structure, particularly for questions related to political interaction. Because our primary focus in this work will be at the granularity of news and blogging sources rather than the individual pages they produce, we will consider this network at the level of domains: using a large Twitter dataset covering all of 2016 up to the U.S. Pres- idential election, we say that an invoked interaction from domain B to domain A occurs whenever a user replies to a tweet containing a page from domain A with a page from domain B. We define the invocation graph on a set of domains of interest as follows: for all pairs of domains A and B where there is at least one invoked interaction from B to A, we include a weighted directed edge (B, A) whose weight is equal to the number of such invoked interactions. Because we want to study how portions of the invo- cation graph reflect aspects of political interaction, we choose the node set (i.e. the domains of interest) using a preprocessing step that only includes domains that were extensively retweeted with the official Twitter accounts of Hillary Clinton and Donald Trump, and then apply some further filtering heuristics that we describe in the next section. After this filtering, we have an invocation graph that reflects the ways in which Twitter users interacted with one another by invoking content from different politically relevant domains over the course of 2016. Figure 1 shows a few domains of such an invo- cation graph with some sample interactions from our data. We can see these interactions can be supportive, like an in-depth New York Times report on Russian information operations shared in reply to an article from The Guardian on the same subject, or adversarial, like a Breitbart article on the New York Times' taxes shared in response to a Times article on Donald Trump's taxes. These replies exhibit rich structure and give a sense for how complex political interactions unfold on social media We can thus return to some of the initial motivating questions and ask how this interaction was structured relative to a political spectrum containing support for Clinton on the left and support for Trump on the right. We do this using a political spectrum induced from the data, rather than relying on external domain knowledge. There are a number of ways to do this [5, 11, 14] that yield broadly consistent results, and we employ a method of Benkler et al (de- scribed further in the next section) that bases the spectrum on the relative frequency of co-tweets with the Clinton and Trump Twitter accounts [5]. Embedding the Invocation Graph in a Political Spectrum. Having thus located the domains on a political spectrum, we now have an embedded version of the invocation graph: the nodes, repre- senting domains, are embedded in a one-dimensional spectrum, and the weighted directed edges span pairs of points in this spectrum. We can now ask how the edges are distributed across distances on the spectrum, ranging from short-range interactions that connect domains of similar political orientation to long-range interactions that reach across sides. In examining these questions, it is crucial to recall that these links among domains are not defined by hyperlinks in the content on these domains, but instead via the replies made by users when they invoke this content in discussions: it is not that the domains are replying to each other, but that they are being invoked in replies by users. The data thus reflects choices made by the consumers of the content, rather than by authors of the content. In Section 3, we propose a set of methods to analyze how the edges of the invocation graph span the underlying spectrum. A core component of these methods is, for a domain x, to consider its out-link distribution - the distribution of "landing points" on the political spectrum for all links out of x. As we move from left to right along the spectrum, tracking the out-link distributions of domains we encounter along the way, do the means of these distributions tend to move from left to right as well, or do they tend to move inversely from right to left? The former case would indicate a positive correlation in the locations of the source and target of an invoked interaction (B, A), suggesting links are used Mapping the Invocation Structure of Online Political Interaction WWW 2018, April 23–27, 2018, Lyon, France to connect to similar sides of the political spectrum; the latter case would correspond to a negative correlation and hence connections across the spectrum, with domains on the left being invoked to reply to domains on the right, and vice versa. It is not a priori obvious which type of correlation we should expect to see; and as a reinforcement of this fact, we find that the nature of the correlation actually inverts over the course of 2016 leading up to the U.S. Presidential election. In the early parts of 2016 we have a positive correlation, with politically similar domains being invoked to reply to each other; but by the time we reach the months directly preceding the election, this same correlation measure has become negative, indicating that most of the linking is now crossing the spectrum. We verify this effect using multiple measures, including one in which we compare the trends across the spectrum to what we'd observe in a randomly rewired version of the embedded graph. We also propose a set of methods to identify inherent asymme- tries in the patterns of linkage: do replies from left to right have the same structure as replies from right to left? Using our measures, we find strong asymmetries in the 2016 Twitter data, with domains on the right side of the spectrum having a disproportionately high rate of out-links in the invocation graph and domains on the left side of the spectrum having a disproportionately high rate of in-links. This right-to-left flow in the replies persists across the entire time range, and is a key characteristic of the structure. Since a recurring theme in our analyses is the way in which replies increasingly engaged opposite sides of the political spectrum as 2016 went on, it is interesting to ask whether we see a similar effect in a more traditional user-to-user interaction graph, with nodes corresponding to users and directed edges to replies from one user to another. To explore this, we adapt the techniques developed for the invocation graph to a user-to-user graph built from Reddit. Specifically, we analyze a snapshot of Reddit's politics subreddit, r/politics, for the same period of 2016 up to the election; we classify users by whether they had posted to the Clinton or Trump subreddits, and then look at the rate of replies among different types of users. We find that the trend on Reddit closely tracks the trend in the invocation graph built from Twitter, with increasing linkage between the two sides as the election approached. Overall, our methodology suggests that the invocation graph on domains, and its embedding into a one-dimensional spectrum, captures important aspects of political interaction on social media - the tendency of users to interact by invoking links to authored content, and the use of these interaction patterns to thus reveal relationships among the content based on usage in everyday dis- cussion. 2 BASIC DEFINITIONS We begin with a Twitter dataset containing aggregate-level infor- mation about tweet-reply pairs. For each month from January to November 2016 (the US Presidential election was held on Novem- ber 8, 2016), the dataset consists of pairs of domains x1 and x2 along with an accompanying count, the number of times a tweet containing a page from domain x1 was posted in reply to a tweet containing a page from domain x2. In addition, for each month, we have an auxiliary dataset of co-occurrences: for each domain x, the number of times a user posted a tweet containing a page from x on the same day that the user retweeted Hillary Clinton's or Donald Trump's personal Twitter account. Finally, we have the number of retweets of Clinton or Trump for each month. The invocation graph we construct from this data is a directed graph with domains as vertices, where each domain corresponds to a news source. We draw an edge x1 → x2 if a tweet containing a URL from domain x1 is posted in reply to a tweet containing a URL from domain x2. The weight of this edge is the number of such tweet-reply pairs. On first inspection, the most prominent feature of this graph is that self-loops (consisting of links from a domain x to itself) have much higher weight than other edges. Since our goal is to examine political interactions between domains, we remove all self-loops from the graph. Isolating Political Domains. The first issue we encounter is that Twitter contains a wide range of URLs, not just pages from politically relevant domains. We could select only known political domains by whitelisting them, i.e. only considering the subgraph over a predefined set of domains; however, this approach will in- evitably miss out on influential but less well-known news sources. On the other hand, there are challenges to a completely unsu- pervised approach. URLs on Twitter are dominated by social media sites (e.g. twitter.com, facebook.com) as well as content-hosting sites (e.g. imgur.com, bitly.com) which produce virtually no content of their own, but instead host user-uploaded content such as im- ages, links, and text. While the usage of these content-hosting sites would be interesting to study, this is outside the scope of our work. We begin by blacklisting several known social media and content- hosting domains and remove them from the graph. However, there are plenty of domains that appear on Twitter that are not politically relevant, and we cannot individually remove each such domain. To filter out such domains, we need some measure of political engagement for each domain. We can construct such a measure by using the observation that politically relevant domains should frequently co-occur with known political entities – in our case, the official Twitter accounts of Hillary Clinton and Donald Trump. Our measure of political engagement for a domain, then, is sim- ply the number of times a user posted a tweet with that domain on the same day that he or she retweeted either Clinton's or Trump's official Twitter account. Intuitively, the more politically engaging a domain is, the more it will co-occur with these political enti- ties. With this proxy, we can select domains with high political engagement, excluding social-media and content-hosting domains. As a final filter, we require that each domain have an edge of at weight least W to some other domain in the political subgraph. This restricts our attention to the most actively used political domains. Based on this, we can formally define the invocation graph. Every domain in the invocation graph • is not blacklisted (social media and content-hosting domains) • has political engagement above some threshold p • has at least one edge to another domain in the invocation graph with weight at least W We require the invocation graph be connected and contain some seed domain. Any choice of popular American news outlet would WWW 2018, April 23–27, 2018, Lyon, France Manish Raghavan, Ashton Anderson, and Jon Kleinberg yield exactly the same result, as they all belong to the same con- nected component. (We use nytimes.com, but the choice is immate- rial.) Based on this definition, the algorithm to construct the invoca- tion graph is as follows: begin with the full graph, remove all nodes that are either blacklisted or have political engagement below p, and run a breadth-first search beginning at nytimes.com following only edges of weight at least W . In practice, we find that the values we use for p and W don't affect our results much, and all of the results presented here use p = 10000 and W = 100. Because we study the change in this invocation graph over time, we build a new graph Gm for each month m from January to November 2016. A Political Spectrum. In order to characterize the political nature of this graph, we need some way of organizing the domains along a political spectrum. Drawing on techniques from [5] and our definition of political engagement, we define the quantities PT (xC) and PT (xT) for each domain x as the empirical probabilities that a user posted a tweet containing a URL from domain x given that, on the same day, he/she retweeted Clinton's or Trump's official account respectively. Intuitively, if a user has retweeted Clinton on a given day, the domains that he/she invokes are more likely to be on Clinton's end of the political spectrum, and the same is true for Trump. Figure 2 shows the resulting values, where the blue line is PT (xC) = PT (xT). Interestingly, most domains lie above this line, suggesting a difference in the populations of users retweeting Clinton and Trump respectively. Figure 2: PT (xC) vs. PT (xT) for September 2016 Furthermore, we can condense this information into a single political score for each domain: PT (xT) sT (x) = (1) Note that sT (x) ∈ [0, 1], and the larger sT (x) is, the closer x is to the Trump end of the spectrum. Throughout this section, we use the spectrum built on January-September 2016. PT (xC) + PT (xT) 3 METHODOLOGY With these definitions, we can analyze various properties of the invocation graph, and in particular, its interaction with the political spectrum. Do usage patterns of news articles and other political content differ across the political spectrum? How do these patterns change leading up to the election? Using the invocation graph in tandem with the political spectrum, we can shed light on these questions. Out-link Distributions. A key characteristic we study is the out-link distribution for a domain x: the distribution of positions on the political spectrum where edges originating from x land. A domain's out-links describe the way in which it is used to reply to other domains. For example, if a domain has many out-links to other domains near it on the political spectrum, one might expect that it is being used to reinforce a particular point of view; however, if it has many out-links to the opposite end of the spectrum, it may instead be used to disagree or argue with an opposing viewpoint. To draw upon this intuition, we ask how x's out-link distribution varies based on its political score sT (x). As a baseline for compari- son, we compute the global out-link distribution - the distribution over the political spectrum of where edges in G land. Comparing to this baseline will give us some insight as to how x's linking pattern differs from the "average" linking pattern. However, since G contains no self-loops, x doesn't link to itself, while the global out-link distribution contains links to x. To prevent this from biasing the comparison, we instead compare x's out-link distribution to the out-link distribution of G\x, that is, G with x and all edges into or out of x removed. Thus, x's out-link distribution distribution d(x, G) is a distribu- tion over [0, 1] assigning probability mass to y ∈ [0, 1] proportional to the weight of edges from x to x′ such that sT (x′) = y. The global out-link distribution D(G\x) can then be expressed as x′∈G\x d(x′, G\x) · vol(x′, G\x)  D(G\x) = x′∈G\x vol(x′, G\x) ,  where vol(x′, G\x) is the total weight of edges leaving x′ in G\x. In other words, D(G\x) is the weighted average of d(x′, G\x) for x′ ∈ G\x. We make the comparison between these distributions formal as follows: for each x, let µout(x) be the weighted average political score of the domains that x links to, so that µout(x) = E[d(x, G)]. This gives an estimate of what types of domains x is used to reply to - if µout(x) is close to 0, then x is used primarily to reply to Clinton-related domains, while if it is close to 1, then x is used primarily to reply to Trump-related domains. In a slight abuse of notation, let µout(G\x) be the weighted average political score of all endpoints of edges in G\x, so µout(G\x) = E[D(G\x)]. Then, (2) δout(x) = µout(x) − µout(G\x) is a measure of how much x deviates from other domains towards the Trump end of the political spectrum. From past work documenting homophily in online political ac- tivity [1], one might expect that a domain will be used primarily to engage with politically similar domains, implying that sT (x) is positively correlated with δout(x). Furthermore, it is not a priori obvious whether this trend should become more or less pronounced leading up to the election - do the opposing parties increasingly converse within themselves, or do they engage with one another? Mapping the Invocation Structure of Online Political Interaction WWW 2018, April 23–27, 2018, Lyon, France (a) January 2016 (b) October 2016 Figure 3: Correlation between sT (x) and δout(x) for January and October had length close to 0 in with respect to the political spectrum in January, by October, many longer edges were present. Figure 3 shows that in January, domains are more likely to have links in the graph to politically similar domains, so sT (x) and δout(x) are positively correlated. However, by October, this correlation has reversed: on average, domains are being used to reply across the political spectrum instead of to politically similar domains. Replies seem to be adversarial, as with the breitbart.com → nytimes.com edge in Figure 1. To understand this change in correlation over time, we define a(Gm) to be the slope of the correlation between sT (x) and δout(x) for month m. Figure 4 shows that a(Gm) decreases significantly from January to October 2016. This suggests that as the election drew nearer, the fraction of interaction between opposite ends of the spectrum increased, and domains from the two opposing sides were actually being invoked more often to reply to each other. Figure 5: Edge length distributions for January vs. October To enable us to visualize where on the spectrum edges lie, we make the following definitions. For a point y ∈ [0, 1], let f→(y, G) be the number of edges (x1, x2) such that sT (x1) < y < sT (x2). Similarly, let f←(y, G) be the number of edges such that sT (x1) > y > sT (x2). In other words, f→(y, G) is the number of edges crossing y from left to right on the political spectrum, and f←(y, G) is the number of edges crossing y from right to left. In order to interpret these functions, we need a baseline to com- pare against. A natural baseline in such scenarios is the randomly rewired graph G, the idea of which goes back to [26]. In G, ev- ery vertex has the same indegree and outdegree as in G, but each edge has a randomly chosen endpoint. Note that this can create self-loops, which G does not have by construction; however, the number of self-loops in G is small (often 0 for a given randomiza- tion) and therefore their effect on this analysis is negligible. Figure 6 shows f→ and f← for G and G, where the values shown for G are in expectation. In January, both f→ and f← are dominated by their rewired counterparts, while in October, the opposite is true. This suggests that at the beginning of the year, domains were used to Figure 4: a(G) for January-November Edge Lengths and Crossing Points. Another way of charac- terizing the political aspects of the invocation graph is to consider the lengths and locations of the edges on the political spectrum. As the interaction between opposing viewpoints increases, we expect to see longer edges in the invocation graph that cross the political spectrum instead of staying on one side. Figure 5 shows that this trend holds true between January and October - while most links WWW 2018, April 23–27, 2018, Lyon, France Manish Raghavan, Ashton Anderson, and Jon Kleinberg (a) January 2016 (b) October 2016 Figure 6: f→(y) and f←(y) for G and G reply to politically similar domains, resulting in shorter edges than a random baseline, while closer to the election, domains were used to reply across the political spectrum. This comparison allows us to get a sense for how actual behavior deviates from random behavior, and how this deviation changes over time. Asymmetry in Out-links. Another striking feature of Figure 6 is that f← dominates f→, showing that many more links crossed right-to-left than left-to-right. Intuitively, it seems that a dispro- portionate number of edges originate on the right and end on the left, corresponding to right-leaning domains being used to reply to left-leaning domains. We can make this precise by defining r(x) as the ratio of indegree(x)/(indegree(x) + outdegree(x)) and ana- lyzing how r(x) changes with sT (x). Figure 7 shows that r(x) is negatively correlated with sT (x), meaning that domains on the right end of the political spectrum produce a disproportionate number of out-links compared to domains on the left end. In other words, domains on the right are more often used to reply to other domains, while domains on the left are more often the recipients of replies. Figure 7: sT (x) vs. r(x) for October 4 COMPARING TO THE USER LEVEL Having established a set of results for the structure of invocation graphs on Twitter, we would like to verify that our findings are qualitatively consistent with what we see in more traditional user- to-user communication graphs on social media. Since our Twitter dataset doesn't contain information about individual users, we instead turn to a publicly available Reddit dataset1. Reddit is a com- munity discussion website organized into posts, or "submissions," and comments on those submissions. Comments are threaded, so that a comment is either in reply to a top-level post or to another comment. The data consists of every post and comment from Red- dit in 2016, along with its author's username. Reddit is subdivided into forums for particular topics called subreddits. We focus on three subreddits in particular: r/politics, r/hillaryclinton, and r/The_Donald, which are devoted to politics, Hillary Clinton, and Donald Trump respectively. All three subreddits were among the most active subreddits during 2016. Note that in addition to studying user-to-user dynamics on Reddit, in principle we could also use Reddit data to replicate our Twitter invocation-graph anal- ysis at the domain level; however, it turns out that Reddit contains too few comments with URLs for robust domain-level trends to emerge. Interactions at the User Level. In order to test for analogous trends at the user level to those we found at the domain level, we need to modify our methods. In particular, we now need some kind of political information about users. Whereas in Section 2 we anchored the political spectrum to the official Clinton and Trump Twitter accounts, here we anchor our notion of political affiliations to r/hillaryclinton and r/The_Donald. Since most users are active in at most one of the two subreddits, we have a simpler notion of a political score: we define a set UC of users who posted in r/hillaryclinton but not r/The_Donald, and we define a set UT of users who posted in r/The_Donald but not r/hillaryclinton. There are 22,164 users in UC and 281,334 users in UT (more than 1https://files.pushshift.io/reddit/ Mapping the Invocation Structure of Online Political Interaction WWW 2018, April 23–27, 2018, Lyon, France Twitter donaldjtrump.com thegatewaypundit.com Reddit thegatewaypundit.com zerohedge.com breitbart.com donaldjtrump.com dailycaller.com dailymail.co.uk foxnews.com nypost.com bbc.co.uk theguardian.com cbsnews.com cnn.com thehill.com nbcnews.com huffingtonpost.com washingtonpost.com nytimes.com politico.com newsweek.com politifact.com hillaryclinton.com breitbart.com dailycaller.com zerohedge.com foxnews.com nypost.com dailymail.co.uk thehill.com politico.com cbsnews.com nbcnews.com cnn.com washingtonpost.com bbc.co.uk theguardian.com nytimes.com huffingtonpost.com politifact.com newsweek.com hillaryclinton.com 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Table 1: Comparison of Twitter and Reddit political spectra ten times the size of UC). We assume that most users in UC are pro- Clinton, while most users in UT are pro-Trump (this is consistent with the explicit ground rules for participating in these subreddits). Validating Political Information from Subreddits. We ver- ify that r/hillaryclinton and r/The_Donald contain strong sig- nal about political orientation by adapting our methodology from Twitter to build a spectrum over the domains on Reddit, and then comparing this spectrum to the one built from Twitter. To do this, we define PR(xC) to be the empirical probability that a post or comment in r/hillaryclinton contains a URL from domain x (and analogously for PR(xT) and r/The_Donald). As in (1), we can define a political score from Reddit as sR(x) = PR(xT) PR(xC) + PR(xT) . (3) Table 1 shows the orderings of the Twitter and Reddit spectra for 21 domains. The Spearman rank correlation [28] (a measure of squared distance) between the two orderings is 0.871 (compared to a maximum of 0.757 over 10, 000 randomly shuffled orderings). Thus the two settings align well, demonstrating that our notion of political affiliation is adaptable to Reddit, and that it contains strong and consistent signal. Building a User-to-User Graph on Reddit. With this notion of political affiliation, we can now investigate some basic prop- erties of political discourse on Reddit. Just as we first restricted our attention to political domains on Twitter, here we restrict our attention to the main political subreddit r/politics. Since only a subset of the users in r/politics are in either UC or UT , we focus on comment-reply pairs in which both users involved are in one of UC or UT . There are 4 possible types of interaction: UC → UC, UC → UT , UT → UC, and UT → UT where p → q means that a user from p posts a reply to a comment from a user in q. Let np→q be the number of p → q interactions in a given time period. We organize the data into sliding windows of 30 days. In the following plots, the value at a particular date represents the 30-day window ending at that date. Figure 8a shows comment counts throughout 2016 averaged over the next 30 days, and Figure 8b shows what fraction of the comments were each type of interaction. Figure 8b shows that a steadily rising number of comments are cross-cutting (e.g., are of types UC → UT and UT → UC) from the beginning of 2016 up until the election in early November, followed by a return to a baseline rate. Figure 8c further reinforces this point, showing a strong negative slope in the ratio of edges between users of the same political leaning and users of different political leanings from January until the November 8 election. These results are consistent with our findings our Twitter, where an increasing fraction of political interactions reach across the political spectrum on Twitter up until the election. To interpret the significance of these results, we adapt our ran- dom rewiring technique to the user level by randomly reassign- ing users to comments, preserving the invariant that each user still posts the same number of comments as in the original data. Whether we randomize globally (a comment is randomly attrib- uted to any user from all of 2016) or each month (a comment is attributed to a randomly chosen user from the same month that comment was written), the results are the same – the observed slope is significantly more negative than the minimum over 100 random trials. Using our Reddit dataset, we've shown that our invocation graph methodology can be adapted to analyze traditional user-user com- munication graphs. In particular, we've used co-occurrences to determine political information about both users and domains. The month-to-month trend found at the user level mirrors our findings on Twitter - in the months leading up to the election, online polit- ical interaction increasingly reached across the political spectrum. 5 TWO-DIMENSIONAL ALIGNMENT Our formulation of the political spectrum in this work indicates that it has a natural two-dimensional structure, with one dimension corresponding to co-occurrence probabilities with content related to one candidate, and the other dimension corresponding to co- occurrence probabilities with content related to the other candidate. In Section 4, when we established that our invocation graph methodology extends naturally to the traditional user-level set- ting, part of our analysis involved measuring how well the one- dimensional spectra sT (·) and sR(·) shown in Table 1 align. Here we consider how to measure the alignment of the corresponding two-dimensional spectra. To make this comparison, we need to account for the fact that axes may have different scales (e.g. posts on Reddit contain URLs at a different rate than on Twitter). This means we need to scale PR(xC) and PR(xT) in order to find the "best match" between the two spectra. We formalize this as the following optimization problem, minimizing the squared ℓ2 distance of each pair of points: (PT (xC) − aPR(xC))2 + (PT (xT) − bPR(xT))2 (4)  min a,b:a,b≥0 x ∈D where D is the set of domains. Since all points lie in the first quad- rant, we can drop the constraint a, b ≥ 0. Note that (4) can be WWW 2018, April 23–27, 2018, Lyon, France Manish Raghavan, Ashton Anderson, and Jon Kleinberg (a) Comment counts (b) Interaction types (c) Ratio of replies across the political spectrum Figure 8: User-level trends from the Reddit dataset. In Figure 8c, a decrease in (nC→C + nT→T )/(nC→T + nT→C) shows more interaction reaching across the spectrum.  separated into 2 identical optimization problems of the form (ux − cvx)2. min c respectively, then this can be written as minc (5) If u and v are the vectors [ux : x ∈ D]⊤ and [vx : x ∈ D]⊤ 2. This is convex and has derivative x ∈D ∥u −cv∥2 x ∈D d dc ∥u − cv∥2 2 = d dc (u − cv)⊤(u − cv) = 2v ⊤ u − 2cv ⊤ v. Setting this equal to 0, we find that (5) has the solution c = v⊤u v⊤v . Using this, we can scale the Reddit spectrum to compare it to the Twitter spectrum, producing the plot shown in Figure 9. The spectra roughly align, with the domains in approximately the same positions for both Twitter and Reddit. Figure 9: Scaled spectrum comparison If instead we wish to minimize ℓ1 distance between pairs of points, we get the optimization problem PT (xC) − aPR(xC) + PT (xT) − bPR(xT)  x ∈D min a,b:a,b≥0 Again, this results in two separate optimizations of the form  x ∈D min c ux − cvx . The subgradient of each term is [−vx , vx] (cid:40){vx · sign(cvx − ux)} ux (cid:44) cvx   vxj and  vxj > vxj < otherwise j ≤i j >i j <i vxj . j ≥i We sort the x's by increasing ux/vx , so i < j =⇒ uxi/vxi ≤ uxj/vxj , and then choose i such that Essentially, i balances the vxj 's, splitting them into two sets such that adding vxi to either set gives that set the larger sum of the two. Thus, the subgradient of (7) contains 0 for c = uxi , making this the vxi solution to (6). We can also use this same alignment technique to compare spec- tra between months. Figures 10a and 10b show that in absolute terms, the spectra produced by January and February on Twitter look quite different. In fact, after scaling the axes, the spectra align very well (Figure 10c, using ℓ1-minimization). One way to see this is to compare the quality of alignment in our data the quality of alignment among shuffled versions of the spectra for January and February, where the domains labeling the points are randomly per- muted; we find that the alignment for the real data has much lower cost than the typical alignment for shuffled data. The disparity between the unscaled spectra seems to indicate an influx of users in February who retweeted Clinton but didn't necessarily engage in other sorts of political activity; this left the relative position of other domains in the two-dimensional spectrum unaffected. We also note this type of scaling doesn't affect the one-dimensional orderings in Table 1. We can rewrite the political score as sT (x) = , where θT is the angle of x from the PT (xC) axis. Since 1+tan θT scaling the axes preserves the ordering of these angles, it also pre- serves the one-dimensional rankings. 1 (6) (7) 6 FURTHER RELATED WORK Our work builds on rich literatures in online social media, online news, information diffusion, and the landscape of online political interaction, and it also draws on a long history of work studying the role of media in politics. Mapping the Invocation Structure of Online Political Interaction WWW 2018, April 23–27, 2018, Lyon, France (a) January 2016 (b) February 2016 (c) Scaled Comparison Figure 10: Spectrum Comparison for January and February 2016 on Twitter With access to information now abundant, a growing line of work has investigated how this impacts consumption of political information. As mentioned in the introduction, a key issue has been measuring the extent to which online political interaction crosses ideological divides, or whether it stays relatively confined in "filter bubbles" or "echo chambers" [3, 11, 13, 15, 27, 31]. Concerns about the Web potentially catalyzing balkanization, or fragmentation into isolated ideological divisions, date from the 1990s [32]. Early em- pirical work on the structure of online political interaction through blogging identified strong ideological partitions evident in large- scale analysis of linking patterns [1], whereas analyses of more recent social media platforms finds evidence for a more complex structure, in which both ideological entrenchment and exposure to more diverse content is promoted on the Web [3, 11]. More broadly, our paper relates to the extensive work on the structure of information sharing on the Web [4], as well as theoreti- cal work on how network structure affects information flow [18, 20]. This structure has been quantified in many ways, particularly by or- ganizing shares into information cascades [8, 17], where nodes are typically people and edges between people indicate if one person directly shared a piece of content with another person. In contrast, our work here introduces and studies invocation graphs, where nodes are information sources and edges indicate that a user shared content from one source in response to content from another source. The role of the media in politics is the subject of an active field of study [19, 29]. Particularly relevant to our work here is the study of how news and public opinion spread through social networks, including the early theory of two-step flow [21]. More recently, there has been a spirited debate about the impact that "influencers" have on these processes [2, 7, 16, 22, 33]. 7 CONCLUSION In this work we have introduced invocation graphs, together with a set of techniques for analyzing them, as a means of probing the structure of online political interaction. In combination with previous methods for inducing a political spectrum from data, we develop methods for measuring several important phenomena. In particular, we analyzed a natural embedding of the invocation graph in the political spectrum, and asked how its edges are distributed across this spectrum-whether they are sequestered in ideological pockets or whether they span larger ideological distances. Applying these techniques to political interaction on Twitter in the months leading up to the 2016 US Presidential election, we observed that political interaction via the invocation graph became increasingly cross-cutting as the election neared. We also developed methods to analyze whether there are inherent asymmetries between how the right and the left engage each other via replies. Applying our techniques to Twitter, we found that edges in in the invocation graph more consistently went from sources on the right to sources on the left than in the other direction. It is worth emphasizing a critical feature of invocation graphs, which is that they are composed of invoked interactions as opposed to direct interactions. Although on a surface level invocation graphs may resemble the hyperlink graphs that form a basic staple of Web analysis, they are actually quite different, as the links are generally not under the nodes' control. News sources publish content, and then it is up to the readership to determine how these sources connect to each other in the invocation graph. In this sense, relative positions and functions of news domains in invocation graphs are indicative of how the public actually uses them in online political discussion. Beyond the ideological territory news sources may try to explicitly claim for themselves, invocation graphs position these sources according to their roles in political interaction. There are a number of important directions that remain to be pursued. First, it is intriguing to see how interaction both in the invocation graph on Twitter and the user-to-user interaction graph on Reddit became more and more ideologically cross-cutting as the election approached, given that homophily would suggest that most links should link to nearby points on the spectrum. Is there a systematic way to relate this trend to an underlying level of polar- ization, so that changes in the structure of the embedded invocation graph might provide insight into polarization and how it evolves? Second, beyond the two large social media datasets we considered, it would be illuminating to apply our methods in other settings as well. In particular, does online debate increasingly cross ideological divides in the run-up to milestone events in general, or was this specific to the 2016 US Presidential election? In general, we believe that applying and extending our methods for online political inter- action using invocation graphs contains many promising directions for future work. WWW 2018, April 23–27, 2018, Lyon, France Manish Raghavan, Ashton Anderson, and Jon Kleinberg [26] Michael Molloy and Bruce Reed. 1995. A critical point for random graphs with a given degree sequence. Random structures & algorithms 6, 2-3 (1995), 161–180. [27] Eli Pariser. 2011. The Filter Bubble: What the Internet is Hiding from You. Viking. [28] Charles Spearman. 1904. The proof and measurement of association between two things. The American journal of psychology 15, 1 (1904), 72–101. [29] John Street. 2010. Mass media, politics and democracy. Palgrave Macmillan. [30] Cass Sunstein. 2007. Republic.com. Princeton University Press. [31] Cass R Sunstein. 2001. Echo chambers: Bush v. Gore, impeachment, and beyond. Princeton University Press Princeton, NJ. [32] Marshall Van Alstyne and Erik Brynjolfsson. 1996. Could the Internet balkanize science? Science 274, 5292 (1996), 1479. [33] Duncan J Watts and Peter Sheridan Dodds. 2007. Influentials, networks, and public opinion formation. Journal of consumer research 34, 4 (2007), 441–458. Acknowledgements. We thank Lada Adamic, Glenn Altschuler, Isabel Kloumann, and Michael Macy for valuable discussions about these topics. MR is supported by an NSF Graduate Research Fellow- ship (DGE-1650441). JK is supported in part by a Simons Investigator Award, an ARO MURI grant, and NSF grant 1741441. This work was performed in part while AA and MR were at Microsoft Research. REFERENCES [1] Lada A. Adamic and Natalie Glance. 2005. The Political Blogosphere and the 2004 U.S. Election: Divided They Blog. In Proceedings of the 3rd International Workshop on Link Discovery (LinkKDD '05). ACM, New York, NY, USA, 36–43. https://doi.org/10.1145/1134271.1134277 [2] Eytan Bakshy, Jake M Hofman, Winter A Mason, and Duncan J Watts. 2011. Everyone's an influencer: quantifying influence on twitter. In Proceedings of the fourth ACM international conference on Web search and data mining. ACM, 65–74. [3] Eytan Bakshy, Solomon Messing, and Lada A Adamic. 2015. Exposure to ideologi- cally diverse news and opinion on Facebook. Science 348, 6239 (2015), 1130–1132. [4] Eytan Bakshy, Itamar Rosenn, Cameron A. Marlow, and Lada A. Adamic. 2012. The Role of Social Networks in Information Diffusion. In Proc. World Wide Web Conference. [5] Yochai Benkler, Robert Faris, Hal Roberts, and Ethan Zuckerman. 2017. Study: Breitbart-led right-wing media ecosystem altered broader media agenda. Columbia Journalism Review 1, 4.1 (2017), 7. [6] W. Lance Bennett. 1996. News: The politics of illusion. Longman. [7] Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and P Krishna Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. ICWSM 10, 10-17 (2010), 30. [8] Justin Cheng, Lada A. Adamic, P. Alex Dow, Jon M. Kleinberg, and Jure Leskovec. 2014. Can cascades be predicted?. In 23rd International World Wide Web Conference, WWW '14, Seoul, Republic of Korea, April 7-11, 2014. 925–936. https://doi.org/10. 1145/2566486.2567997 [9] Michael Conover, Jacob Ratkiewicz, Matthew R. Francisco, Bruno Gonçalves, Filippo Menczer, and Alessandro Flammini. 2011. Political Polarization on Twitter. In Proceedings of the Fifth International Conference on Weblogs and Social Media, Barcelona, Catalonia, Spain, July 17-21, 2011. http://www.aaai.org/ocs/index.php/ ICWSM/ICWSM11/paper/view/2847 [10] P. Alex Dow, Lada A. Adamic, and Adrien Friggeri. 2013. The Anatomy of Large Facebook Cascades. In Proceedings of the Seventh International Conference on Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8-11, 2013. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/view/6123 [11] Seth Flaxman, Sharad Goel, and Justin Rao. 2016. Filter Bubbles, Echo Chambers, and Online News Consumption. Public Opinion Quarterly 80 (2016). [12] Adrien Friggeri, Lada A Adamic, Dean Eckles, and Justin Cheng. 2014. Rumor Cascades. In ICWSM. [13] R Kelly Garrett. 2009. Echo chambers online?: Politically motivated selective expo- sure among Internet news users. Journal of Computer-Mediated Communication 14, 2 (2009), 265–285. [14] Matthew Gentzkow and Jesse M Shapiro. 2010. What drives media slant? Evidence from US daily newspapers. Econometrica 78, 1 (2010), 35–71. [15] Eric Gilbert, Tony Bergstrom, and Karrie Karahalios. 2009. Blogs are echo cham- bers: Blogs are echo chambers. In HICSS'09. 42nd Hawaii International Conference on System Sciences. IEEE, 1–10. [16] Malcolm Gladwell. 2006. The tipping point: How little things can make a big difference. Little, Brown. [17] Sharad Goel, Ashton Anderson, Jake M. Hofman, and Duncan J. Watts. 2016. The Structural Virality of Online Diffusion. Management Science 62, 1 (2016), 180–196. https://doi.org/10.1287/mnsc.2015.2158 [18] Benjamin Golub and Matthew O Jackson. 2009. How homophily affects learning and diffusion in networks. (2009). [19] Doris A Graber and Johanna Dunaway. 2017. Mass media and American politics. Cq Press. [20] Matthew O Jackson and Leeat Yariv. 2006. Diffusion on social networks. Economie publique/Public economics 16 (2006). [21] Elihu Katz. 1957. The two-step flow of communication: An up-to-date report on an hypothesis. Public opinion quarterly 21, 1 (1957), 61–78. [22] Elihu Katz and Paul Felix Lazarsfeld. 1966. Personal Influence, The part played by people in the flow of mass communications. Transaction Publishers. [23] Bill Kovach and Tom Rosenstiel. 1999. Warp Speed: America in the Age of Mixed Media. Century Foundation Press. [24] Ravi Kumar, Mohammad Mahdian, and Mary McGlohon. 2010. Dynamics of Conversations. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 553–562. [25] Paul F. Lazarsfeld, Bernard Berelson, and Hazel Gaudet. 1944. The People's Choice: How the Voter Makes Up His Mind in a Presidential Campaign. Duell, Sloan, and Pearce.
1706.10223
1
1706
2017-06-30T14:42:01
Press F1 for help: participatory design for dealing with on-line and real life security of older adults
[ "cs.SI", "cs.HC" ]
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of the end user, not only improves the design and development of the application, but also provides an effective method for designing and applying solutions aimed at improving the security of older adults while using online and mobile tools.
cs.SI
cs
Press F1 for help: participatory design for dealing with on-line and real life security of older adults Bartłomiej Balcerzak, Wiesław Kopeć, Radosław Nielek, Sebastian Kruk, Kamil Warpechowski, Mateusz Wasik and Marek Węgrzyn Polish-Japanese Institute of Information Technology, ul. Koszykowa 86, 02-008 Warsaw, Poland Email: [email protected] Abstract-In this paper we present the report on the design and development of a platform for the inter- generational exchange of favors. This platform was designed using participatory design approach during a 24- hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of the end user, not only improves the design and development of the application, but also provides an effective method for designing and applying solutions aimed at improving the security of older adults while using online and mobile tools. Index Terms-on-line security, participatory design, co- design, user-center design, elderly, hackathons, intergenerational interaction and cooperation older adults, I. INTRODUCTION Paper presents a process of designing and implementing an on-line platform dedicated for matching people that need help with volunteers wiling do offer it. Platform is intended to be used mostly, but not exclusively, by older adults. Therefore, design process has to include both older adults and young volunteers, and the final product has to meet their, often contradictory, needs. Special focus was put on designing security measures for older adults, in order to cope with their needs in this regard. Platform described in this paper was developed during 24-hours long hackathon organized in Warsaw by the Polish-Japanese Academy of Information Technology. Team developing this platform was composed of four male students and two older adults. In this case study, we aim at describing how the use of participatory design, and intergenerational communication may improve the design process of security within applications created for social interaction. Aging is a gradual process, which is usually connected with deterioration in autonomy. House cleaning, shopping, maintenance or visiting family graves, those activities are often beyond the abilities of older adults. Some of them are done by social workers, but an opportunity to outsource part of them to volunteers might improve the coherence of society by fostering intergenerational interactions. Moreover, it might also limit the costs of social services and remove pressure from professional caregivers. Although the most obvious scenario is the one including young volunteers helping older adults, it is not the only possibility. Surprisingly, older adults often do some volunteering works e.g. helping young kids in homework or guiding tours in local museums. It is also quite common that older adults help other people their age. Therefore, it is important to design a system that will be taking into account a variety of scenarios and will not impose predefined roles associated with age. It is also important that such system addresses the issues of safety of both the parties involved. Demographic models indicate that in 2050 the population aged 65+ in the USA will almost double and reach 83.7 million (over 20% of the society) [11]. Report prepared by OCED [10] shows that Japan will be the oldest society in 2050. Spijker et al. argument that, although demographic data is true, in reality, the number of older adults requiring assistance in the UK and other countries has actually been falling in recent years [17]. The paper is organized as follows. Section II [Related works] describes the related works concerning volunteering of older adults, platforms for managing volunteers as well as the basics of participatory design approach. Section III [Project phases] relates to the process of the preparing and designing the platform's project. The next section, i.e. section IV [Design], describes in details the platform for exchanging favors. Final section contains conclusions and future work. II. RELATED WORKS A. Platforms for managing volunteers Platforms that manage voluntary work are abundant on the Internet, including large communities of contributors, such as the Wikipedia [21,22]. However, virtual online platforms lack the ability of organizing non-virtual voluntary work. Platforms for managing volunteers have been so far focused on organizing the work of a homogenous group of people interested in volunteering. Products available online are mostly allow volunteering organizations to improve their work when in comes to administration of human resources. Prime examples of such commercially include http://ivolunteer.com or http://www.volunteerhub.com. These platforms offer mostly methods the communication between the organization and the volunteers, mostly through volunteers tracking and providing methods of individual volunteer review. To the best of the authors commercial projects platforms for improving that available knowledge no platform system was designed with inter- generational communication in mind. B. Older adults and on-line security According to the studies done by [4] older adults are, on average, less knowledgeable and aware of on-line risks than younger adults. Also, as shown by [1], older adults show limited trust to on-line technology. This effect, however, diminishes with the usage of ICT. Another dimension crucial for on-line security is trust. Studies done by [7] as well as [4] show that trust among older adults is not affected by age, and relies more on experience that comes with the use of ICT. Therefore, the design of applications addressing the issue of trust is important. C. User participation and interaction Fundamental idea relevant to this case is connected with the concept of user-center design, as a part of general idea of human focused approach related to another important idea: participatory design, sometimes called co-design. While there are different origins for the two latter terms, they actually refer to the same idea of bottom-up approach, which is widely used besides software engineering, from architecture and landscape design to healthcare industry.[18] All those concepts put human in the center of designing process, there is, however, a small, but significant distinction between user-center design and participatory design: the former refers the process of designing FOR users, while the latter WITH users.[14], [16] Another case is the work done by [19], describing the cooperation between seniors and preschool children in a design task. An interesting observation made in this research was the fact that both groups needed the equal amount of time together and in separation in order to function properly. The broader context for these topics is covered by the contact theory, a widely recognized psychological concept coined by Allport [2] and developed for many years by others, e.g. Pettigrew.[12] According to the theory, the problem of intergroup stereotypes can be faced by intergroup contact. There are several conditions for optimal intergroup contact, but many studies proved is a worthwhile approach, since it typically reduces intergroup prejudice.[13] intergroup contact that D. Volunteering of older adults The effects that volunteering has on older adults is a developing field of study within various disciplines. The consensus that can be reached throughout various studies, is that participation in volunteer activity has many positive effects on the elderly. [6] claim that older adults who frequently volunteer in various activities, tend to have improved physical and mental health, compared to those who do not participate in volunteering. The work of [9] extends this correlation to wellbeing (with volunteering being correlated with higher levels of well-being), this is also reinforced by [3]and [5]. This is crucial since studies also show that in some regards, elders are more likely to be engaged in volunteer activity [8]. III. PROJECT PHASES According to Sanders [15] there is the distinction between main product design process and pre-design stage. The latter is an early stage usually related to idea development process. In case described in this paper the pattern was observed: the design process was preceded with pre-design phase with clearly visible idea development stage. A. Pre-design stage In pre-design stage there was a vivid and intense process of idea development between both parties: the younger programmers (four male undergraduate students of the Polish- Japanese Academy of Information Technology) and senior team members (a woman and a man – a pair of participants of the Living Laboratory PJAIT, distributed laboratory and platform devoted to IT solutions development in cooperation with the city of Warsaw, Poland). The developers team had their own idea of application, which was then discussed with elder team members. During team brainstorming process in pre-design stage final solution emerged: an on-line platform for matching older adults with younger volunteers in order to exchange services. B. Design stage During the design stage the insight provided by the seniors working with the team was applied to the construction of the platform. Upon discussion between members of the two generations, the name 'F1' was chosen for the application. The name, inspired by the F1 hotkey used in various kinds of software to open the help window, was proposed by one of the seniors, who knew of the hotkey's role from previous experience and computer courses he had participated in. Based on the discussion made during the pre-design stage and the topics raised by the older adults, focus was put by the programmers on designing solutions related to accessibility of the platform for all users, and issues of user safety and security of the exchange of favors. During the design stage the role of seniors was limited mostly due to the lack of technical expertise required in the process of designing a platform. This does not mean, however, that the older adults were passive. They tried to be active and engaged throughout the whole process e.g. via e-mail or phone. As it was mentioned above, participatory design approach can be applied at any stage of the process, but its influence is the most apparent and significant in pre-design stage. We observed a similar shift in time: from co-design at early stage of teamwork to more typical user-center approach towards the end of the hackathon. According to the workflow observed, the opinions that seniors voiced upon seeing the final product were implemented into the working prototype presented upon the conclusion of the hackathon. This mode of cooperation can be considered as a natural continuation of the model observed in the pre-design stage. A. Platform architecture IV. DESIGN The F1 platform was designed as a client-server model and requires access to the Internet for the proper functioning. It might be a serious limitation for less developed and less populated countries, but as the platform is intended to be deployed in Poland, we decided to sacrifice versatility for simplicity. Access to the system is possible either through a web site or a dedicated mobile application. Although both ways provide the same functionality, there are also substantial differences. Mobile application was designed to be most convenient for people offering support. Web site is more focused on posting requests for help. The reason for this differentiation is that mobile application will be more frequently used by younger volunteers and web browsers are better suited for older adults. In the case described in this paper senior participants were more familiar with traditional desktop or mobile computers than with smartphones. Moreover, computer web browsers can be more suitable for people with certain disabilities – e.g. visually impaired or with limited hand dexterity. On the other hand, mobile devices are becoming more and more widespread and the adoption of touch interface by the elderly can be faster and more effective than traditional computer interfaces (e.g. observed in our previous research studies). Thus, in the final product the application mode (web site or mobile app) is intended to be freely interchangeable at any time by the user. B. Functionality The web-based application contains all key information and functions important for the user searching for the help of a volunteer. The screen informs the user about his or her previous favor requests, as well as the location of other users in the area. There is also an S.O.S button, which can be used in the case of emergency. The mobile application view, used by the potential volunteer is shown in Figure1a. When using the mobile view, the user can view a map of the nearest area where favor requests are marked. When the user selects a favor, a brief description of the favor and the requesting user is provided. C. Security related features Another direct benefit from applying participatory design approach refers to security issues. During the pre-design phase, older adults voiced their concerns related to the user security, taking into account threats for both parties of the process. The main areas in which they stated older adults require aid when it comes to security, were related to minimizing the risks of coming in contact with fake profiles, or malicious users, as well as dealing with problems of potential identity theft. The older adults involved in the project also stressed that the platform should be able to aid the older users while dealing with emergencies, when swift help is needed. These the following solutions into the design of the platform. issues were addressed by applying 1) Trusted profiles: Sign up is free for all and requires only a valid email account. Lowering the barrier makes the system more user-friendly but also prone to malicious users. Discussions with prospect users during the design phase revealed that the elderly are afraid of letting unknown people visit their apartments. To address this problem a voluntary procedure for confirming profiles was implemented. User profile might be confirmed by external organizations that are trustworthy: e.g. schools or local NGOs. Confirmation of the verified status is visible for everyone next to profile picture – see fig. 2. (a) Detailed information about request for assist. Fig. 1: Mobile application dedicated to those who offer assistance. Fig. 2: Pop-up window displaying the confirmation details for selected volunteer 2) Challenge-response authentication: Next to the threat of fake or malicious profiles mentioned in previous section, yet another problem was identified by participatory approach. Even if identity of volunteer is confirmed on the platform, still we need a way to confirm it in real world, when a volunteer is knocking at the door of senior's apartment. This is the REFERENCES [1] N. Adams, D. Stubbs, and V. Woods. Psychological barriers to internet usage among older adults in the uk. Medical informatics and the Internet in medicine, 30(1):3–17, 2005. [2] G. W. Allport. The nature of prejudice. Basic books, 1979. [3] E. A. Greenfield and N. F. Marks. Formal volunteering as a protective factor for older adults' psychological well-being. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 59(5):S258–S264, 2004. [4] G. A. Grimes, M. G. Hough, E. Mazur, and M. L. Signorella. Older adults' knowledge of internet hazards. Educational Gerontology, 36(3):173–192, 2010. [5] Y. Hao. Productive activities and psychological well-being among older adults. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 63(2):S64–S72, 2008. [6] T. Y. Lum and E. Lightfoot. The effects of volunteering on the physical and mental health of older people. Research on aging, 27(1):31–55, 2005. [7] D. W. McCloskey. The importance of ease of use, usefulness, and trust to online consumers: An examination of the technology acceptance model with older consumers. Journal of Organizational and End User Computing, 18(3):47, 2006. [8] N. Morrow-Howell. Volunteering in later life: Research frontiers. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 65(4):461–469, 2010. [9] N. Morrow-Howell, J. Hinterlong, P. A. Rozario, and F. Tang. Effects of volunteering on the well-being of older adults. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 58(3):S137–S145, 2003. [10] U. Nations. World population ageing 2015. Department of Economic and Social Affairs, 2015. [11] J. M. Ortman, V. A. Velkoff, H. Hogan, et al. An aging nation: the older population in the united states. Washington, DC: US Census Bureau, pages 25–1140, 2014. [12] T. F. Pettigrew. Intergroup contact theory. Annual review of psychology, 49(1):65–85, 1998. [13] T. F. Pettigrew and L. R. Tropp. A meta-analytic test of intergroup contact theory. Journal of personality and social psychology, 90(5):751, 2006. [14] E. B.-N. Sanders. From user-centered to participatory design approaches. Design and the social sciences: Making connections, pages 1–8, 2002. [15] E. B.-N. Sanders. Perspectives on participation in design. Wer gestaltet die Gestaltung, pages 61–74, 2013. [16] E. B.-N. Sanders and P. J. Stappers. Co-creation and the new landscapes of design. Co-design, 4(1):5–18, 2008. [17] J. Spijker and J. MacInnes. Population ageing: the timebomb that isn't. BMJ, 347(6598):1–5, 2013. [18] D. Szebeko and L. Tan. Co-designing for society. Australasian Medical Journal, 3(9):580–590, 2010. [19] B. Xie, A. Druin, J. Fails, S. Massey, E. Golub, S. Franckel, and K. Schneider. Connecting generations: developing co-design methods for older adults and children. Behaviour & Information Technology, 31(4):413–423, 2012. [20] P. Turek et al. Wikiteams: How do they achieve success? IEEE Potentials 30.5 (2011): 15-20. [21] A. Wierzbicki, P. Turek, and R. Nielek. Learning about team collaboration from Wikipedia edit history. Proc. of the 6th International Symposium on Wikis and Open Collaboration. ACM, 2010. situation when digital system should face analogue world and a bottom-up approach proved to be helpful once again. Therefore, a standard challenge-response authentication has been adapted and implemented. The platform generates two keywords for both users. Elderly should ask about the right password before letting someone in. Passwords are randomly selected from a subset of Polish words to make them easy to remember and dictation by entry phone. 3) Reputation score: Limiting the amount of frauds is crucial for assuring the wide acceptance of the platform, but it is not enough. Next to deliberate and planed frauds, we can see poor quality service. Therefore, the platform contains a reputation management system. Every agreed and conducted service can be evaluated on Likert-type scale. To make the scale easier to understand for users, first two grades are red, neutral score is gray and the two positive levels are green. Sum of all evaluations for a given user are displayed next to the picture – see Fig. 2. 4) and emergency button has been added to the F1 platform. Emergency button: In real life exhaustive list of risks to complete. Therefore, an impossible threats is V. CONCLUSION AND FUTURE WORK In this paper we presented the report from the design and development of a platform for inter-generational exchange of favors, that was created by an inter-generational team during a 24-hour academic hackathon. The team working on the application consisted of younger programmers and older adults serving as representatives of the end users. Cooperation during pre-design and design stage helped to improve the quality of the final product, as well as helped to reduce the social distance between the members of the two generations. The platform was developed in a way that it addressed the issues raised by the end users represented here by two older adults. The younger programmers decided to follow the senior's idea of an application and implemented solutions that deal with the issues that older adults considered important while using an on-line platform. As a result, the programmers introduced a multistage system of security measures that foster the development of trust with a network of volunteers in social work. In our future work we plan to further describe the live testing and implementation of the platform in real-life volunteer communities in Poland and abroad. We will also describe in more details the hackathon during which the platform was developed, and focus more on analyzing the modes of intergenerational cooperation observed during this event. ACKNOWLEDGMENTS This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 690962. This project was partially supported by the infrastructure bought within the project „Heterogenous Computation Cloud" funded by the Regional Operational Programme of Mazovia Voivodeship.
1702.01586
1
1702
2017-02-06T12:15:22
Real-Time Influence Maximization on Dynamic Social Streams
[ "cs.SI", "cs.DS" ]
Influence maximization (IM), which selects a set of $k$ users (called seeds) to maximize the influence spread over a social network, is a fundamental problem in a wide range of applications such as viral marketing and network monitoring. Existing IM solutions fail to consider the highly dynamic nature of social influence, which results in either poor seed qualities or long processing time when the network evolves. To address this problem, we define a novel IM query named Stream Influence Maximization (SIM) on social streams. Technically, SIM adopts the sliding window model and maintains a set of $k$ seeds with the largest influence value over the most recent social actions. Next, we propose the Influential Checkpoints (IC) framework to facilitate continuous SIM query processing. The IC framework creates a checkpoint for each window slide and ensures an $\varepsilon$-approximate solution. To improve its efficiency, we further devise a Sparse Influential Checkpoints (SIC) framework which selectively keeps $O(\frac{\log{N}}{\beta})$ checkpoints for a sliding window of size $N$ and maintains an $\frac{\varepsilon(1-\beta)}{2}$-approximate solution. Experimental results on both real-world and synthetic datasets confirm the effectiveness and efficiency of our proposed frameworks against the state-of-the-art IM approaches.
cs.SI
cs
Real-Time Influence Maximization on Dynamic Social Streams Yanhao Wang, Qi Fan, Yuchen Li, Kian-Lee Tan School of Computing, National University of Singapore, Singapore {yanhao90, fanqi, liyuchen, tankl}@comp.nus.edu.sg 7 1 0 2 b e F 6 ] I S . s c [ 1 v 6 8 5 1 0 . 2 0 7 1 : v i X r a ABSTRACT Influence maximization (IM), which selects a set of k users (called seeds) to maximize the influence spread over a social network, is a fundamental problem in a wide range of ap- plications such as viral marketing and network monitoring. Existing IM solutions fail to consider the highly dynamic nature of social influence, which results in either poor seed qualities or long processing time when the network evolves. To address this problem, we define a novel IM query named Stream Influence Maximization (SIM) on social streams. Technically, SIM adopts the sliding window model and main- tains a set of k seeds with the largest influence value over the most recent social actions. Next, we propose the Influential Checkpoints (IC) framework to facilitate continuous SIM query processing. The IC framework creates a checkpoint for each window slide and ensures an ε-approximate solu- tion. To improve its efficiency, we further devise a Sparse Influential Checkpoints (SIC) framework which selectively keeps O( log N β ) checkpoints for a sliding window of size N and maintains an ε(1−β) -approximate solution. Experimen- tal results on both real-world and synthetic datasets confirm the effectiveness and efficiency of our proposed frameworks against the state-of-the-art IM approaches. 2 1. INTRODUCTION Social media advertising has become an indispensable tool for many companies to promote their business online. Such trends have generated over 17 billion dollars advertising rev- enue for Facebook in 2015 alone1. Influence Maximization (IM) is a key algorithmic problem behind social media viral marketing [12, 17]. Through the word-of-mouth propaga- tion among friends, IM aims to select a set of k users such that the source information (e.g., advertisement) is maxi- mally spread in the network, and it has been extensively researched [1, 6, 9, 10, 15–17, 21, 23–25, 28, 29, 35–37, 39] in the last decade. Besides viral marketing, IM is also the corner- stone in many other important applications such as network monitoring [20] and recommendation [33]. Most existing IM solutions rely on influence probabilities between users to acquire the seeds. The influence probabil- ities are usually derived from social actions in online social networks [14, 19, 31], e.g., "retweets" on Twitter. In reality, social influences are highly dynamic and the propagation tendencies between users can be altered drastically by break- ing news and trending topics. Consequently, the seeds se- lected by IM methods [6,17,28,35,36] that assume static so- cial influences can quickly become outdated. Recently, there are some research efforts on IM under dynamic social influ- ences. However, existing solutions for dynamic IM either do not offer theoretical guarantees for the qualities of the seeds selected (e.g., [1,39]) or provide guarantees at the expense of high processing overhead for updates (e.g., [10, 29]). In fact, the state-of-the-art dynamic IM solution [29] is only able to process several hundred updates per second, which is far lower than the update rates of real-world social networks. For example, over 7.4K tweets are generated on Twitter in one second2. To resolve the aforementioned drawbacks and make dy- namic IM both effective and efficient, we propose a novel Stream Influence Maximization (SIM) query to support real- time influential users tracking. SIM utilizes the widely avail- able social actions (e.g., "retweets" on Twitter, "replies" on Reddit and "comments" on Facebook) to estimate the social influence and maintain the seed set continuously. To capture the short-term memory effect of social influences [32], where past influences quickly fade as new influences emerge, SIM adopts the sliding window model [11] which always considers the most recent N actions and strives to find k users who collectively have the largest influence value in the current window. In addition, SIM supports general monotone sub- modular functions to compute the influence values as such functions are often used to represent the "diminishing re- turns" property of social influences in different types of IM problems [4, 9, 15, 17, 21, 23, 37]. Due to the NP-hardness of SIM, we focus on processing it approximately with theoretical bounds. Leveraging the monotonicity and submodularity of influence functions, a naıve greedy algorithm [27] can provide a (1 − 1/e) appro- ximate solution for SIM. However, the greedy algorithm re- quires O(k · U ) (U is the number of users in the network) influence function evaluations for each update. Empirically, it takes around 10 seconds to select 100 seeds from a net- work with 500, 000 users, which hardly matches the rates of real-world social streams. Another closely related technique to SIM is Streaming Submodular Optimization (SSO) [3,18]. Existing SSO approaches [3, 18] can provide solutions with theoretical guarantees for maximizing submodular functions with cardinality constraints over append-only streams. How- ever, to the best of our knowledge, none of the proposed SSO algorithms can support the sliding window model. In this paper, we propose a novel Influential Checkpoints (IC) framework to support efficient continuous SIM process- ing with theoretical guarantees. IC not only tracks the so- 1https://www.bamsec.com/companies/1326801/facebook-inc 2http://www.internetlivestats.com/one-second/ lution for the current window but also maintains partial so- lutions called Checkpoints for future windows that overlap with the current window. Therefore, for every subsequent window shift, the up-to-date solution can be retrieved effi- ciently. We further design a generic Set-Stream Mapping (SSM) interface which can adapt a wide range of existing SSO algorithms to SIM so that the solution retrieved for each sliding window has at least the same approximation ratio as those algorithms. However, maintaining all O(N ) checkpoints incurs significant update overhead (N is the number of actions in a window). To support efficient IC maintenance, we propose a Sparse Influential Checkpoints (SIC) framework to selectively maintain a subset of check- points by leveraging the monotonicity and subadditivity of the influence values returned by different checkpoints. Con- sequently, SIC only keeps O( log N β ) checkpoints and main- tains an ε(1−β) -approximate solution. 2 We hereby summarize our contributions as follows. • We address the limitations of existing IM solutions in supporting fast evolving social networks and propose a novel SIM query over sliding windows. (Section 3) • We develop a novel Influential Checkpoints (IC) frame- work for SIM query processing. It is integrated with a generic Set-Stream Mapping (SSM) interface to incor- porate existing ε-approximate SSO algorithms while retaining their approximation ratios. (Section 4) • We further propose the SIC framework to selectively maintain O( log N β ) checkpoints for a sliding window of size N . Leveraging the subadditivity and submodular- ity of the influence values returned by different check- points, an ε(1−β) -approximation ratio is always guar- anteed. (Section 5) 2 • We experimentally evaluate the effectiveness and effi- ciency of our proposed frameworks. First, the qualities of the seeds selected by IC and SIC are competitive with the state-of-the-art IM algorithms on both static and dynamic graphs. Second, SIC achieves speedups of up to 2 orders of magnitude over the static approaches. Third, SIC achieves up to 8 times speedups over IC with less than 5% quality losses. (Section 6) 2. RELATED WORK We summarize the most relevant literature from three influence maximization, streaming submodular op- areas: timization and function estimation on sliding windows. 2.1 Influence Maximization (IM) IM aims to extract a given number of users that maximize the influence spread over a network. Previous efforts on IM can be generally categorized into static methods and dynamic methods based on their abilities to handle changes in social influences. Here, we summarize them separately. IM in Static Networks: There has been a vast amount of literature on influence maximization (IM) in static networks over the last decade (see [6, 9, 17, 21, 23, 25, 28, 35–37]). The state-of-the-art static IM method on the classic influence models (i.e., independent cascade (IC) and linear threshold (LT)) is IMM [35]. It runs in nearly linear time wrt. the graph size with a (1 − 1/e − ε) approximation guarantee. Nevertheless, these static IM methods including IMM can- not efficiently support highly evolving networks since a com- plete rerun is required for every update on influence graphs. There are also many static methods considering different types of IM problems by extending classic influence models. For example, topic-aware IM [4, 9] considers the influence diffusion under topic models; location-aware IM [21, 37] fo- cuses on maximizing the influence spread in certain spatial areas; and conformity-aware IM [23] considers users' confor- mity tendencies in the influence estimation. IM in Dynamic Networks: Recently, there are emerg- ing studies about IM in dynamic networks. However, most of these methods cannot provide a theoretical guarantee of their seed quality and may return arbitrarily bad solu- tions [1, 39]. Chen et al. [10] proposed an Upper Bound Interchange (UBI) method with a 1/2-approximation ratio. Nevertheless, UBI is sensitive to the number of users se- lected. When the size of the seed set increases, both its per- formance and solution quality degrade dramatically. This prevents UBI from being practically useful. Very recently, a new dynamic IM method with a theoretical bound is pre- sented in [29]. It dynamically maintains a RIS-based [6] index against changes on graphs and achieves a (1 − 1/e − ε) approximation guarantee. However, due to the high mainte- nance cost, it can only process several hundred of influence graph updates per second. This is far from the requirement of real-world social streams. Therefore, existing dynamic IM methods cannot provide high-quality solutions efficiently. 2.2 Streaming Submodular Optimization Another closely related field to SIM is the Streaming Sub- modular Optimization (SSO) [2, 3, 18, 30, 38]. SSO adopts the append-only streaming model where elements arrive one by one and the objective is to dynamically maintain a set of at most k elements to maximize a submodular function wrt. all the observed elements at any time. Saha et al. [30] and Ausiello et al. [2] developed two swapping-based ap- proaches for a special case of SSO (i.e., the online Maximum k-Coverage problem) with the same 1/4 approximation ra- tio. Then, Yu and Yuan [38] proposed a greedy-based algo- rithm for the online Maximum k-Coverage problem with an approximation ratio around 0.3 based on computer-aided simulation. The state-of-the-art SSO solutions are Sieve- Streaming [3] and ThresholdStream [18]. They main- tain a sequence of candidate solutions by estimating the opti- mal value and each solution uses its own threshold to decide whether a new element is included. At any time, the candi- date solution with the largest function among all maintained solutions is returned as the result. Both of them can achieve a (1/2 − β) approximation ratio for any β > 0. Unfortunately, SSO algorithms cannot be directly applied to the sliding window model because they do not handle the continuous expiry of elements. Nevertheless, we will show in Section 4.2 that existing SSO algorithms can serve as checkpoint oracles in the IC and SIC frameworks. 2.3 Function Estimation on Sliding Windows Several works [7,11] studied how to continuously estimate a function in the sliding window model. They leverage spe- cial properties of target functions to achieve sublinear per- formance and reasonable quality. Let g be the target func- tion, and A,B,C be three sequences on streams such that B is a tail subsequence of A and C is contiguous to B. The exponential histogram [11] is proposed to approximate weakly additive functions, i.e., g(A) + g(C) ≤ g(A ∪ C) ≤ c(g(A) + g(C)) for some small constant c. The smooth histogram [7] requires that the target functions are (α, β)- smooth. Specifically, we say g is (α, β)-smooth if g(B) g(A) ≥ 1 − β, then g(B∪C) g(A∪C) ≥ 1 − α for some 0 < β ≤ α < 1. Follow- ing the analysis in [7], smooth histograms are applicable only when g can be computed with an approximation ratio of at least 0.8 in the append-only streaming setting. In this pa- per, we use monotone submodular influence functions [17] widely adopted in the social influence analysis. However, monotone submodular functions are not weakly additive and existing SSO algorithms [3, 18] can only achieves an appro- ximation of at most 1/2. This imply that these techniques cannot be directly applied to our scenario. 3. PROBLEM STATEMENT We consider a social stream over a social network with a user set U . The social stream comprises unbounded time- sequenced social actions which are generated by user activ- ities in the social network. Let at = hu, at′ it (t′ < t) be an action at time t representing the following social activity: user u performs at at time t responding to an earlier action at′ . Typical actions include "retweet" on Twitter, "reply" on Reddit, "comment" on Facebook, to name just a few. If an action at does not respond to any previous action, e.g., a user u posted an original tweet, we call it a root action and denote it by at = hu, nilit. Like many data streams, social streams are time-sensitive: recent actions are more valuable than those in the past. We adopt the well-recognized sequence-based sliding window [11] model to capture such essence. Let N be the window size, a sequence-based sliding window Wt maintains the latest N actions till at in the stream, i.e., Wt = {at−N+1, . . . , at}. For simplicity, we use Wt[i] to represent the i-th (i ≥ 1) action within Wt. Then, we use At ⊆ U to denote the set of active users who perform at least one action in Wt, i.e., At = {Wt[i].ui = 1, . . . , N }. Since social actions directly reflect the information diffu- sion in the social network [14, 15, 19, 34], we define the in- fluence between users according to their performed actions. We say user u influences user v in Wt, denoted by (u ❀ v)t, if there exists an action a performed by user v s.t. a ∈ Wt and a is directly or indirectly triggered by an action a′ of u. It is notable that such an a′ is not necessarily in Wt. We formally define the influence set of a user as follows: Definition 1. The influence set of a user u ∈ U at time t, denoted as It(u) ⊆ At, is the set of users who are in- fluenced by u wrt. the sliding window at time t (i.e., Wt). Equivalently, It(u) = {v(u ❀ v)t}. Intuitively, the influence set of u denotes the set of users who recently performed actions under the impact of u. The concept of the influence set can be naturally extended to a set of users. In particular, let S = {u1, . . . , uk} be a set of k users, the influence set of S wrt. Wt is a union of the influ- ence sets of all its members, i.e., It(S) = ∪u∈SIt(u). Then the influence value of S is measured by f (It(S)) : 2U → R≥0. We consider f (It(·)) as a nonnegative monotone3 sub- 3A set function g is monotone if for all A ⊆ B, g(A) ≤ g(B). (a) Social action stream (b) Influence sets at time 8 (c) Influence sets at time 10 User I8(u) User a1 <u1, nil>1 a2 <u2, a1>2 a3 <u3, nil>3 a4 <u3, a1>4 a5 <u4, a3>5 a6 <u1, a3>6 a7 <u5, a3>7 a8 <u4, a7>8 a9 <u2, nil>9 a10 <u6, a9>10 u1 u2 u3 u4 u5 u6 {u1,u2,u3} {u2} {u1,u3,u4,u5} {u4} {u4,u5} (cid:1486) (d) Diffusion I10(u) {u1,u3} {u2,u6} {u1,u3,u4,u5} {u4} {u4,u5} {u6} u1 u2 u3 u4 u5 u6 a1 a2 a4 a3 a5 a6 a7 a9 a10 a8 Figure 1: A social action stream and the influences of users over sliding windows. modular4 function [27] which is widely adopted by many IM problems for its natural representation of the "diminishing returns" property on the social influence [17]. For ease of presentation, we only consider the cardinality function, i.e., f (It(·)) = It(·), as the influence function in the main text of this paper. It should be noted that any other monotone submodular influence functions can also be used in our frameworks. In Appendix A, we will discuss how to extend our frameworks to different types of IM problems by filtering the streams or using different influence functions. Example 1 illustrates our definition of influence over the sliding windows on a social action stream. Example 1. Figure 1(a) gives an example of a social action stream. Given the window size N = 8, two windows, W8 and W10, are highlighted in blue and red boxes respectively. In Figure 1(b), I8(u1) = {u1, u2, u3} as a1,a6 are performed by u1 and a2,a4 performed by u2,u3 respectively are triggered by a1 in W8. When the window slides from W8 to W10, a1,a2 expire while a9,a10 arrive. Then, I10(u1) = {u1, u3} as Fig- ure 1(c). Due to the expiry of a2, u2 is deleted from I10(u1). However, since a4 has not expired yet, u1 still influences u3 in W10 regardless of the expiry of a1. As new actions arrive at high speed while old ones expire at the same rate, users with the largest influence values keep evolving. To track the influential users over social streams in real-time, we propose a Stream Influence Maximization (SIM) query which is formally defined as follows: Definition 2. Let Wt be the sliding window at time t, Stream Influence Maximization (SIM) is a continuous query on a social stream that returns a set of at most k users Sopt who collectively achieve the largest influence value wrt. Wt: t Sopt t = argmaxS∈U ∧S≤k f (It(S)) (1) We continue with the running example in Figure 1 to show how SIM keeps track of the most influential users over the sliding windows. Example 2. Given k = 2, SIM returns Sopt 8 = {u1, u3} as the most influential users at time 8 since I8(Sopt ) = I8(u1) ∪ I8(u3) contains all users in A8. We have f (I8(Sopt )) = 5 4A set function g is submodular if for all A ⊆ B, and any element x 6∈ B, g(A ∪ {x}) − g(A) ≥ g(B ∪ {x}) − g(B). 8 8 using the cardinality function. However, as a1,a2 expire while a9,a10 arrive at time 10, f (I10(Sopt )) = 4 as u2 is ). Thus, SIM returns Sopt deleted from I10(Sopt 10 = {u2, u3} in W10 because I10(Sopt 10 ) contains all users in A10. We have f (I10(Sopt 10 )) = 6 accordingly. 8 8 Note that the solutions proposed in this paper also sup- port the case where the sliding window shifts for more than one action. For simplicity, we focus on presenting solutions for handling sliding windows with single action shift at a time and leave the discussion on handling multiple action shifts at a time to Section 5.3. Then, we prove the NP-hardness of SIM by showing that a well-known NP-hard problem, i.e.,the Maximum k-Coverage problem [2, 13, 30], is polynomial-time reducible to SIM. Theorem 1. SIM is NP-hard. Proof. We prove the theorem by reducing a well-known NP-hard problem, i.e., Maximum k-Coverage [13], to SIM. A Maximum k-Coverage instance consists of an integer k and a collection of m non-empty sets S = {s1, s2, . . . , sm}. It aims to find a subset S ′ ⊆ S such that S ′ ≤ k and ∪si∈S ′ si is maximized. Any Maximum k-Coverage instance is reduced to a SIM instance as follows: Let t be the timestamp and G = ∪si∈S si be the ground set. For any set si ∈ S, we create an action at′ = hui, nilit′ where ui /∈ G. For each element e ∈ si, we create an action at = he, at′ it(t′ < t). Next, we stream all actions created to SIM in the ascending order of t. Since the total number of actions created is O(m · G), the reduction is performed in polynomial time. Let the window size N equal to the total number of actions created. Let Sopt N = {ui, · · · , uj} be the optimal solution of SIM wrt. WN using the cardinality function. {si, · · · , sj} will be optimal for the corresponding Maximum k-Coverage instance as well. Thus, the reduction naturally follows. Before moving on to the technical parts of this paper, we summarize the frequently used notations in Table 1. 4. INFLUENTIAL CHECKPOINTS Since SIM is NP-hard, it is infeasible to maintain the op- timal seed set for each sliding window in polynomial time. Therefore, our goal is to maintain an approximate solution achieving a bounded ratio to the optimal one efficiently. A naıve scheme is to run the greedy algorithm [27] for each window slide. The greedy algorithm starts with an empty user set S0 = ∅, and at each iteration i (1 ≤ i ≤ k), it in- crementally adds a user u to the partial user set Si−1 max- imizing f (I(Si−1 ∪ {u})) − f (I(Si−1)) wrt. Wt. Although the greedy algorithm obtains a (1−1/e)-approximation ratio which is the best achievable for submodular maximization with cardinality constraints [27], it takes O(k · U ) influence function evaluations for each update. Such an inefficient up- date scheme makes the greedy algorithm unable to handle a large window size with new actions arriving at high speed. A key challenge for efficiently supporting SIM over sliding windows is to handle the expiry of old actions and the arrival of new actions simultaneously. Such a compound update pattern brings about fluctuations on users' influence sets which potentially degrade the quality of previously main- tained seeds. In the remaining of this section, we present a novel Influential Checkpoints (IC) framework, which con- sists of a sequence of checkpoint oracles to efficiently handle Symbol U at = hu, at′ it N L Wt, Wt[i] It(u), It(S) It[i](u), It[i](S) Table 1: Frequently used notations Definition and Description the set of all users in a social network a user u performs an action at time t triggered by an action at′ (t′ < t) the size of the sliding window the number of actions for each window slide, L = 1 by default the sliding window at time t, and the i-th action in the window the influence set of a user u or a set of users S wrt. Wt the influence set of u or S for contigu- ous actions {Wt[i], . . . , Wt[N ]} a monotone function the cardinality constraint of SIM an influential checkpoint maintaining an ε-approximate solution of SIM for {Wt[i], . . . , Wt[N ]} the optimal seed set of SIM wrt. Wt, influence value OPTt = and its f (It(Sopt )) the optimal seed set of SIM for {Wt[i], . . . , Wt[N ]}, and its influence value submodular influence t , OPTt [i], OPTt[i] f k Λt[i] Sopt t Sopt t the expiry and the arrival of actions simultaneously. We first give an overview of the IC framework in Section 4.1. Then, we describe how to construct a checkpoint oracle in Section 4.2. Finally, we take SieveStreaming [3] as an example to illustrate the Set-Stream Mapping interface in Section 4.3. 4.1 The Influential Checkpoints Framework The high level idea of the IC framework is to avoid han- dling the expiry of old actions when the window slides. To- wards this goal, the framework maintains a partial result (i.e., an influential checkpoint) incrementally for each win- dow slide. When an old action expires, the outdated result is simply deleted. In this way, the sliding window model is transformed to a simpler append-only model for each check- point, where many existing approaches [3, 18] can provide theoretically bounded approximate solutions. Technically, let an influential checkpoint Λt[i] (1 ≤ i ≤ N ) denote a checkpoint oracle 5 which provides an ε-approximate solution for SIM over contiguous actions {Wt[i], . . . , Wt[N ]}. By maintaining N checkpoints (i.e., Λt[1], . . . , Λt[N ]), a sim- ple procedure to handle a window slide from Wt−1 to Wt is presented in Algorithm 1. Whenever a new action at arrives, the oldest checkpoint in Wt−1 (i.e., Λt−1[1]) expires and a new checkpoint Λt[N ] is added to Wt (Line 2). After adding the remaining checkpoints in Wt−1 to Wt (Lines 3-5), each checkpoint in Wt processes at as an appending action to update its partial solution (Lines 6-8). To answer the SIM query for Wt, we simply return the solution of Λt[1]. Example 3. Figure 2 illustrates the maintenance of check- points in the IC framework following Example 1. Let N = 8 and k = 2. The number of checkpoints always equals to 5 We overload the notation Λt[i] to denote the influence value returned by the oracle when it is clear in the context. (cid:513)8[1]=5 (cid:513)8[2]=5 (cid:513)8[3]=4 (cid:513)8[4]=4 (cid:513)8[5]=3 (cid:513)8[6]=3 (cid:513)8[7]=2 (cid:513)8[8]=1 a1 a1 a1 a2 a2 a2 a3 a3 a3 a4 a4 a4 a5 a5 a5 (cid:513)9[1]=5 (cid:513)9[2]=5 (cid:513)9[3]=5 (cid:513)9[4]=4 (cid:513)9[5]=4 (cid:513)9[6]=3 (cid:513)9[7]=2 (cid:513)9[8]=1 a6 a6 a6 a7 a7 a7 a8 a8 a8 a9 a9 a10 Checkpoints Seed users Checkpoints Seed users (cid:513)8[1] (cid:513)8[2] (cid:513)8[3] …… (cid:513)8[8] u1,u3 u1,u3 u3 …… u3 …… (cid:513)10[1] (cid:513)10[2] (cid:513)10[3] …….. (cid:513)10[8] u2,u3 u2,u3 u2,u3 …… u2 (cid:513)10[1]=6 (cid:513)10[2]=6 (cid:513)10[3]=5 (cid:513)10[4]=5 (cid:513)10[5]=4 (cid:513)10[6]=3 (cid:513)10[7]=2 (cid:513)10[8]=1 Figure 2: An example of checkpoint maintenance in IC. Algorithm 1 IC Maintenance Require: IC:{Λt−1[1], . . . , Λt−1[N ]} 1: - on receiving action at - 2: Delete Λt−1[1], create Λt[N ]; 3: for all Λt−1[i] do 4: 5: end for 6: for all Λt[i] do 7: 8: end for 9: - on query - 10: return the solution of Λt[1]; Λt[i − 1] ← Λt−1[i]; Λt[i].process(at); the window size (i.e., 8). When action a10 arrives, a2 will expire. Consequently, the checkpoint Λ10[8] is created and Λ9[1] is deleted. When the SIM query is issued at time 10, the result from Λ10[1] (i.e.,{u2, u3}) is returned. It is not hard to see that once each checkpoint oracle main- tains an ε-approximate solution for its append-only action stream, IC always returns the solution with the same appro- ximation ratio. 4.2 Checkpoint Oracle The approximation ratio of IC relies on the checkpoint oracle providing an ε-approximate solution over an append- only action stream. Although submodular maximization in an append-only stream has attracted many research inter- ests [2, 3, 18, 30, 38], they focused on a different set-stream model where elements in the stream are sets instead of ac- In general, an algorithm A on an append-only set- tions. stream contains two components: f ′(·) is a monotone sub- modular objective function and CXt is a candidate solu- tion containing no more than k sets from t observed sets (i.e., X1, . . . , Xt). Given a stream of sets {X1, X2, . . . , Xm}, the objective of A is to maximize f ′(CXt) at any time t (1 ≤ t ≤ m). Although this problem resembles our problem, the set-stream model cannot directly fit in our scenario due to the following mismatch: it strives to keep k sets from a stream of sets but all observed sets are immutable. How- ever, SIM aims to maintain k user s from a sequence of ac- tions and each arrival action may induce updates in existing users' influence sets. To bridge the gap between the two stream models and leverage existing algorithms based on the set-stream model, we propose a generic Set-Stream Mapping (SSM) interface. The interface makes two adaptations for a set-stream algo- rithm to serve as the checkpoint oracle. First, the candi- date solution CX is adapted to store k users. Second, the objective function f ′ is adapted to the influence function f (It[i](·)), where It[i] denotes the influence set of user(s) over contiguous actions {Wt[i], . . . , Wt[N ]}. Subsequently, SSM maps an action stream to a set-stream and feeds the set-stream to Λt[i]. Whenever a new action at arrives, the following steps are taken for each Λt[i]: (1) Identify users u1, u2, . . . , ud whose It[i](·) is updated. (2) Feed Λt[i] with a stream S′ (3) Update the solution of Λt[i] for each It[i](u) ∈ S′ t. t = {It[i](u1), . . . , It[i](ud)}. There are several choices of oracles that are developed for the set-stream model with differences on the solution quality, update performance, and function generality. Typical ora- cles are listed in Table 2. An important conclusion is that our SSM procedure does not affect the quality guarantee of the mapped algorithms. Formally: Theorem 2. Let A be an ε-approximate SSO algorithm in the set-stream model and A be the mapped algorithm of A using SSM. Then, A is also ε-approximate for SIM. Proof. To show A is also ε-approximate, we consider an append-only set-stream generated by SSM over the action stream. At any time t, let OPTt be the optimal influence value of SIM wrt. Wt, and OPT∗ t be the optimal influence value achieved by any set of at most k sets from the mapped set-stream. We treat all influence sets in the mapped stream as independent sets regardless of whether they belong to the same user. We run A on the mapped set-stream till time t and produce a result with at most k sets: CXt = {Ita (uta ), . . . , Itb (utb )}. Note that the influential sets in CXt may be outdated and refer to the same user. Neverthe- less, we can still use CXt to approximate OPTt without af- fecting the approximation ratio. To obtain the seed set from CXt, we select a set of distinct users Ut from CXt. Since the influence function f is monotone and the up-to-date influ- ence set of any user always grows larger in the append-only stream, we have f (It(Ut)) ≥ f (∪X∈CXt X). Moreover, CXt is an ε-approximate solution over the append-only stream, i.e., f (∪X∈CXt X) ≥ εOPT∗ t . As the up-to-date influence sets always appear in the append-only set-stream, we have OPT∗ t ≥ OPTt, and thus f (It(Ut)) ≥ εOPTt. Therefore, Ut is an ε-approximate solution for SIM wrt. Wt. According to the SSM steps, an action at is mapped to at most d influence sets, where d is the number of ancestors of at in its propagation. In practice, d is usually small, e.g., d is less than 5 on average as shown in our experiments (see Table 3). Since the number of checkpoints in the IC framework is N , the total number of checkpoint evaluations is O(dN ). If the update complexity of the checkpoint oracle for each set is O(g), the total time complexity of the IC framework for each action is O(dgN ). In the remaining of this section, we conduct a case study on using SieveStreaming [3] as the checkpoint oracle. The Table 2: Candidate checkpoint oracles Oracle SieveStreaming [3] ThresholdStream [18] Blog Watch [30] MkC [2] Quality Update 1/2 − β β ) β ) 1/2 − β 1/4 1/4 Function General O( log k O( log k General O(k) Cardinality O(k log k) Cardinality adoption of other oracles can be similarly inferred. 4.3 A Case Study on SieveStreaming The SieveStreaming Algorithm: SieveStreaming [3] works as follows: Given a monotone submodular function f ′ and the optimal value OPT′ of f ′ over the entire stream under a cardinality constraint, SieveStreaming maintains a candidate solution CX that includes an incoming set Xt if CX has less than k sets and the following holds: f ′(CX ∪ {Xt}) − f ′(CX) ≥ OPT′/2 − f ′(CX) k − CX (2) However, since OPT′ is unknown in advance, SieveStream- ing maintains a sequence of possible values for OPT′, i.e., Ω = {(1 + β)jj ∈ Z, m ≤ (1 + β)j ≤ 2 · k · m} where m = maxX f ({X}) that has been observed. Accordingly, SieveStreaming keeps Ω = O( log k β ) instances to ensure at least one of them achieves a (1/2−β) approximation ratio (see [3] for more details). Set-Stream Mapping for SieveStreaming: Following SSM, we create Λt[i] as follows: Let CXi be the user set maintained by Λt[i]. For each user u with her updated in- fluence set It[i](u), Λt[i] selects u to CXi if CXi < k and: f (It[i](CXi ∪ {u})) − f (It[i](CXi)) ≥ OPTt[i]/2−f (It[i](CXi)) k−CXi where OPTt[i] is the optimal influence value achievable on all actions from Wt[i] to Wt[N ]. Similar to SieveStream- ing, each Λt[i] keeps a set of possible values for OPTt[i], i.e., Ωt[i] = {(1 + β)jj ∈ Z, m ≤ (1 + β)j ≤ 2 · k · m} where m denotes the maximum influence value of a sin- gle influence set over the actions {Wt[i], . . . , Wt[N ]}, i.e., m = maxu∈U f (It[i](u)), and maintains Ωt[i] = O( log k β ) corresponding instances. To answer the SIM query, we al- ways maintain the candidate user set achieving the largest influence value within the checkpoint. Figure 3 is an ex- ample for using SieveStreaming as the checkpoint oracle. Example 4. Figure 3 illustrates the contents of Λ8[1] in Example 3. Λ8[1] consists of the meta information and a sequence of SieveStreaming instances. In the meta infor- mation, the Checkpoint ID indicates the relative position of this checkpoint in the current window. The Seed Users and the Influence Value are maintained for query processing and checkpoint maintenance (as shown in Figure 3). The Max Cardinality is the maximum cardinality of a single user's in- fluence set, i.e., I8(u3) = 4 for Λ8[1]. Suppose β = 0.3, 5 candidates with j = 6, . . . , 10 are maintained for Λ8[1] (4 < 1.36 < . . . < 1.310 < 16). Each instance is maintained independently over the mapped set-stream and the instance with the largest influence value is used as the candidate so- lution (i.e., Instance with j = 6 as highlighted in Figure 3). Combining the results of Table 2 with Theorem 2, we can see that at least one user set maintained by Λt[1] guarantees (a) Meta Information (b) SieveStreaming Instances Checkpoint ID 1 Seed Users u1,u3 Influence Value f=5 Max Cardinality 4 j 6 7 8 9 10 Contents OPT=1.36, seeds={u1,u3}, f=5 OPT=1.37, seeds={u1,u3}, f=5 OPT=1.38, seeds={u1,u3}, f=5 OPT=1.39, seeds={u1,u3}, f=5 OPT=1.310, seeds={u3}, f=4 Figure 3: Contents of Checkpoint Λ8[1] a (1/2 − β)-approximate solution for SIM wrt. Wt when Sie- veStreaming is used as the checkpoint oracle. In addition, the time complexity of IC for each update is O( dN log k ), since the update complexity of SieveStreaming is O( log k β ). β 5. SPARSE INFLUENTIAL CHECKPOINTS In the IC framework, N checkpoints should be maintained to guarantee an ε-approximation ratio. This implies that O(dN ) checkpoint oracle updates need to be performed for each arrival action. However, real world applications often require millions of actions in one window. Therefore, it in- curs prohibitive cost to maintain all checkpoints in practice. To reduce the number of checkpoints maintained and thus improve the update efficiency, we design a Sparse Influential Checkpoints (SIC) framework to selectively maintain a sub- set of checkpoints without losing too much solution accuracy as the window slides. Specifically, the number of checkpoints maintained by SIC is logarithmic with the window size N while its approximation ratio remains ε(1−β) for any β > 0 if the checkpoint oracle is ε-approximate. 2 In this section, we first present the SIC framework and demonstrate its checkpoint maintenance in Section 5.1. In Section 5.2, we analyze the theoretical soundness and the complexity of SIC. Finally, we discuss how to generalize IC and SIC to handle multiple window shifts in Section 5.3. 5.1 The SIC Framework The idea of SIC is to leverage a subset of checkpoints to approximate the rest. On the one hand, to reduce the update cost, the number of checkpoints maintained should be as small as possible; on the other hand, the approximation ratio should remain tight. To achieve both goals, we propose a strategy to safely remove some checkpoints in the current window while ensuring the remaining checkpoints are able to approximate any windows with a bounded ratio. We consider a sequence of checkpoints {Λt[x0], Λt[x1], . . . , Λt[xs]} maintained by SIC at time t. Intuitively, given any three consecutive checkpoints Λt[xi−1], Λt[xi], Λt[xi+1] kept by SIC and a parameter β ∈ (0, 1), as long as (1−β)Λt[xi−1] is less than Λt[xi] and Λt[xi+1], we can safely delete Λt[xi] as Λt[xi+1] is at least (1−β)-approximate to Λt[xi]. Given a checkpoint oracle with an ε-approximation for SIM, it is not hard to identify that using Λt[xi+1] for OPTt[xi] offers an ε(1−β) approximate solution. Although such a maintenance strategy is simple, we need to ensure that the approximation ratio does not degrade seriously over time, i.e., the ratio should be at least ε(1−β) at any time t′ > t. We leave this rather complex analysis to Section 5.2 and focus on describing the maintenance procedure in the remaining of this subsection for ease of presentation. 2 a1 (cid:513)8[1]=5 a1 (cid:513)9[0]=5 a1 (cid:513)10[0]=6 a2 a2 a2 a3 a3 a3 a4 a5 (cid:513)8[4]=4 (cid:513)8[5]=3 (cid:513)8[6]=3 (cid:513)8[7]=2 (cid:513)8[8]=1 a6 a6 a6 a7 a7 a7 a8 a8 a8 a4 (cid:513)9[3]=5 a4 a5 a5 (cid:513)9[5]=4 (cid:513)9[6]=3 (cid:513)9[7]=2 (cid:513)9[8]=1 a9 a9 a10 (cid:513)10[4]=5 (cid:513)10[5]=4 (cid:513)10[6]=3 (cid:513)10[7]=2 (cid:513)10[8]=1 Checkpoints (cid:513)8[x1=1] (cid:513)8[x2=4] (cid:513)8[x3=6] …… (cid:513)8[x5=8] Seed users u1,u3 u3 u3 …… u3 …… Checkpoints (cid:513)10[x0=0] (cid:513)10[x1=4] (cid:513)10[x2=5] …… (cid:513)10[x5=8] Seed users u2,u3 u2,u3 u2,u3 …… u2 Figure 4: An example of checkpoint maintenance in SIC. Λt[xi] ← Λt−1[xi], xi ← xi − 1; Algorithm 2 SIC Maintenance Require: SIC:{Λt−1[x0], Λt−1[x1], ..., Λt−1[xs]} 1: - on receiving action at - 2: Create Λt[xs+1] where xs+1 = N ; 3: for all Λt−1[xi] do 4: 5: end for 6: for all Λt[xi] do 7: 8: end for 9: for all xi do 10: 11: 12: Λ− ← ∅; for all xj > xi do Λt[xi].process(at); if xj+1 ≤ xs and Λt[xj] ≥ (1 − β)Λt[xi] and Λt[xj+1] ≥ (1 − β)Λt[xi] then else break Λ− ← Λ− ∪ {Λt[xj ]}; end if end for 13: 14: 15: 16: 17: 18: Delete all checkpoints in Λ− from SIC; 19: 20: end for 21: if x1 = 0 then 22: Delete Λt[x0] and shift the remaining checkpoints; 23: end if 24: - on query - 25: return the solution of Λt[x1]; Shift the remaining checkpoints accordingly; Algorithm 2 presents how to efficiently maintain the check- points over sliding windows in the SIC framework. Similar to the maintenance of IC, upon receiving a new action at, we create a new checkpoint for at (Line 2), add all check- points in Wt−1 to Wt, and use at to update all checkpoints in Wt (Lines 3-8). Then the efficient deletion of checkpoints are presented in Lines 9-20. For each checkpoint Λt[xi], we find the first xj (j ≥ i) such that Λt[xj ] ≥ (1 − β)Λt[xi] and Λt[xj+1] < (1 − β)Λt[xi]. Then, all checkpoints between xi and xj are deleted and will be approximated by Λt[xj] in the subsequent window slides. Finally, if the second check- point (i.e., Λt[x1]) has expired, the earliest checkpoint (i.e., Λt[x0]) will be deleted (Lines 21-23). It is notable that an additional checkpoint (Λt[x0]) is stored in SIC to keep track of the solution over a window with size larger than N . Since Λt[x0] approximates the upper bound of the optimal solu- tion for the current window and Algorithm 2 always main- tains a bounded ratio between two neighboring checkpoints, a bounded approximation ratio is guaranteed by using Λt[x1] as the solution for the current window. Figure 4 and Exam- ple 5 provide the running example of the SIC maintenance. Example 5. Figure 4 illustrates the maintenance of check- points in the SIC framework following Example 1. Let N = 8, k = 2 and β = 0.3. There are initially 6 checkpoints in SIC at time 8. According to Algorithm 2, Λ8[5] is deleted from SIC since Λ8[6] = 3 > (1 − 0.3) × 3 = (1 − β)Λ8[4]. At time 8, Λ8[1] will be used to answer the SIM query. As the window shifts at time 9 with the arrival of a9, a1 and Λ8[1] (which later becomes Λ9[0]) expire. But Λ9[0] is stored because Λ9[3] has not expired yet. Then all checkpoints will be updated according to a9. After the update procedure, we find Λ9[3] can be deleted since Λ9[5] > (1 − β)Λ9[0]. Finally, all checkpoints are updated according to a10 at time 10 and no checkpoints are deleted. Λ10[4] will be used to answer the SIM query at time 10. In the following, we will demonstrate the theoretical soun- dness of SIC and also analyze the complexity of SIC. 5.2 Theoretical Analysis To establish our theoretical claims for SIC, we first analyze the property of the optimal checkpoint oracle which always returns the optimal solution for SIM over an append-only action stream. There are two important properties of the optimal checkpoint oracle. Definition 3 (Monotonicity & Subadditivity). Let ta ≤ tb be two timestamps and W ta tb represents a window containing a set of contiguous actions: ata , ..., atb with the corresponding checkpoint denoted as Λta . Given any t1, t2, t3 tb t3 ≥ Λt1 s.t. t1 ≤ t2 ≤ t3, the checkpoint is monotone if Λt1 t2 . Moreover, the checkpoint is subadditive if Λt1 t3 ≤ Λt1 t2 + Λt2 t3 . Lemma 1. Let ta ≤ tb be two timestamps and OPTta tb de- note the optimal oracle (as well as the optimal value) for W ta . The optimal oracle is both monotone and subadditive. tb Proof. Let I ta t3 , it is obvious to see OPTt1 tb (S) be the influence set of S and Sopt ta,tb be the optimal solution of SIM for contiguous actions {Wta , . . . , Wtb }. Because Sopt t1,t2 must be a candidate solution for W t1 t2 . Then, we prove OPTt1 t3 (S) = I t1 t2 (S) ∪ I t2 OPTt1 t3 . For any S ⊆ U , we have I t1 t3 ≥ OPTt1 t3 ≤ OPTt1 t2 + OPTt2 t3 (S). Then, we have: t3 = f (Sopt t1,t3 ) ≤ f (I t1 ≤ OPTt1 t1,t3 )) + f (I t2 t2 (Sopt t2 + OPTt2 t3 t3 (Sopt t1,t3 )) where the first inequality holds for the property of influence sets, and the second inequality is satisfied because Sopt t1,t3 is also a candidate solution for both W t1 t2 and W t2 t3 . We note that although the optimal checkpoint oracle is both monotone and subadditive, it is intractable unless P = N P . In practice, we utilize the approximate checkpoint ora- cles as listed in Table 2. The approximate oracles are mono- tone. This is essential due to their greedy nature: updating the maintained result only when this update increases the function value. Given the monotonicity of the approximate checkpoint oracles, the monotonicity and subadditivity of the optimal oracle, we are ready to prove that the checkpoint maintenance strategy used in SIC is theoretically bounded. Lemma 2. Given any t1, t2, t3, t4 s.t. t1 ≤ t2 ≤ t3 ≤ t4, ∀β ∈ (0, 1), if (1 − β)Λt1 t3 , then ε(1−β) Proof. The following inequalities hold: t3 ≤ Λt2 2 OPTt1 t4 ≤ Λt2 t4 . t3 + Λt2 t4 ) ≥ 1 2 ((1 − β)Λt1 t3 + Λt2 t4 ) (Λt1 t3 + Λt2 t4 ) ≥ ε(1 − β) 2 (OPTt1 t3 + OPTt2 t4 ) (Λt2 1 2 1 − β 2 Λt2 t4 ≥ ≥ ≥ ε(1 − β) 2 OPTt1 t4 where the first inequality holds from the monotonicity of the approximate checkpoint oracles; the second inequality is due to the condition that Λt2 t3 ; the third inequality is obvious since β ∈ (0, 1); the fourth inequality holds because of the approximation ratio of checkpoint oracles and the final inequality holds as the optimal checkpoint oracle is both monotone and subadditive. t3 ≥ (1−β)Λt1 According to Lemma 2, if (1 − β)Λt1 t3 , using the checkpoint oracle started at t2 to approximate any check- points between t1 and t2 always achieves an ε(1−β) appro- ximation for any number of appending actions. Next, we present Lemma 3 to demonstrate the property of the check- points maintained by Algorithm 2. t3 ≤ Λt2 2 Lemma 3. The SIC on window Wt contains s checkpoints Λt[x0], Λt[x1], . . . , Λt[xs] (x0 < x1 < . . . < xs) maintained by Algorithm 2. Given a constant β ∈ (0, 1), any neighboring checkpoints Λt[xi], Λt[xi+1] and Λt[xi+2] satisfy one of the following conditions: 1. if Λt[xi+1] ≥ (1 − β)Λt[xi], then Λt[xi+2] < (1 − β)Λt[xi]. 2. if xi+1 6= xi + 1 ∧ Λt[xi+1] < (1 − β)Λt[xi], then ε(1−β) 2 OPTt[xi] ≤ Λt[xi+1]. 3. xi+1 = xi + 1 ∧ Λt[xi+1] < (1 − β)Λt[xi]. Proof. We prove the lemma by induction. As the base case, initially there are only 2 actions in the window and either condition 1 or 3 holds. Next, assume Lemma 3 holds at time t and we show that it still holds after the update procedure in Algorithm 2 at time t + 1. Let Λt[xi] be a checkpoint instantiated before t + 1 and is not deleted during the update procedure at t + 1, then Λt[xi+1] is the subsequent checkpoint of Λt+1[xi] at time t, Next, we discuss all possible cases when performing the update procedure of Algorithm 2 at time t + 1: Case 1: xi+1 6= xi +1 and Λt[xi+1] is deleted at t+1. In this case, we have Λt+1[xi+1] ≥ (1−β)Λt+1[xi] and Λt+1[xi+2] < (1 − β)Λt+1[xi] according to Lines 9-20 of Algorithm 2. In this case, condition 1 holds at t + 1. Case 2: xi+1 6= xi + 1 and Λt+1[xi+1] is not deleted at t + 1. In this case, Λt+1[xi+1] must become the subsequent 2 checkpoint of Λt+1[xi] at some time t′ ≤ t. Then, at t′, we have Λt′ [xi+1] ≥ (1 − β)Λt′ [xi]. According to Lemma 2, Λt+1[xi+1] ≥ ε(1−β) OPTt+1[xi] holds. Because Λt+1[xi+1] is not deleted at t + 1, we have either condition 1 (when Λt+1[xi+1] ≥ (1 − β)Λt+1[xi]) or condition 2 holds (when Λt+1[xi+1] < (1 − β)Λt+1[xi]) at t + 1. If Λt+1[xi+1] ≥ (1 − β)Λt+1[xi], Case 3: xi+1 = xi + 1. then condition 1 holds since Λt+1[xi+1] is not deleted at t + 1; otherwise, condition 3 holds. Therefore, at least one condition in Lemma 3 holds in all possible cases at t + 1 and we conclude the proof. Leveraging Lemma 3, we are able to analyze SIC theo- retically. First, from conditions 1 and 2, we can infer that if there are checkpoints deleted between xi and xi+1, the ratios between Λt[xi+1] and the optimal solution of deleted checkpoints are guaranteed to be at least ε(1−β) . Next, by collectively examining conditions 1–3, we can see that there is at least one checkpoint in Λt[xi+1] and Λt[xi+2] return- ing an influence value of smaller than (1−β)Λt[xi], and thus the number of checkpoints maintained is O( log N β ). Based on these intuitions, we then formally state the approximation guarantee and the complexity of SIC in Theorems 3–5: 2 Theorem 3. SIC maintains a ε(1−β) -approximate solu- tion for SIM in Λt[x1] when a ε-approximate checkpoint or- acle is used. 2 Proof. We use OPTt to denote the optimal solution of is a lower bound SIM w.r.t. Wt and we prove that ε(1−β) 2 for the ratio between Λt[x1] and OPTt. Let Λt[x0] be the expired checkpoint just before Λt[x1]. Since Λt[x0] and Λt[x1] are neighboring checkpoints in SIC, one of the conditions in Lemma 3 holds at time t. If condition 3 in Lemma 3 holds, we have OPTt ≤ εΛt[x1] since Λt[x1] directly maintains an approximate solution on Wt. Otherwise, we have: OPTt ≤ OPTt[x0] ≤ 2 ε(1−β) Λt[x1] since Λt[x0] has expired. Thus, SIC maintains an at least ε(1−β) -approximate solution in Λt[x1]. 2 Theorem 4. SIC obtains a (1/4 − β)-approximate solu- tion for SIM when SieveStreaming is used as the check- point oracle. Proof. Since the SieveStreaming algorithm guaran- tees a (1/2 − β) approximation ratio to the optimal solu- tion, SIC with SieveStreaming as the checkpoint oracle preserves a 1 2 −β)(1−β) approximation guarantee accord- 4 β +β2 > 1 ing to Theorem 3. As 1 4 −β, we get at least a (1/4−β)-approximate solution for SIM. 2 −β)(1−β) = 1 4 − 3 2 ( 1 2 ( 1 Theorem 5. The number of checkpoints maintained by SIC wrt. a sliding window of size N is O( log N β ). Proof. Lemma 3 guarantees either Λt[xi+1] or Λt[xi+2] is less than (1 − β)Λt[xi]. Since we have Λt[x1]/Λt[N ] is bounded by O(N ), the number of checkpoints is at most log(1−β)−1 for β ∈ (0, 1). Therefore, the number of check- points maintained by SIC is O( log N 2·log N β ). As the time complexity for a checkpoint to update each action is O(dg) if each checkpoint takes O(g) to evaluate one influence set and the number of checkpoints maintained by SIC is O( log N β ), the time complexity of SIC to update each action is O( dg log N checkpoint oracle, we have g = O( log k complexity of SIC for each update is O( d log N log k ). When SieveStreaming is used as the β ) and thus the time β β2 ). 5.3 Handling Multiple Window Shifts Although we have discussed how to handle SIM queries for windows which shift for one action at a time, many applica- tions do not require to retrieve the result at such an intense rate. Hereby, we discuss how to handle multiple window shifts, i.e., each window shift receives L new actions while the earliest L actions become expired at the same time. To handle multiple window shifts for IC, we create only one new checkpoint and delete the earliest checkpoint when the window slides from time t to t + L. Subsequently, all actions from at+1 to at+L are collected to update all check- points in the window. Thus, the number of checkpoints cre- ated for multiple window shifts will be (cid:6) N L (cid:7). On top of the IC maintenance strategy, we still use the same SIC algorithm over the checkpoints created by IC to support multiple win- dow shifts. Lastly, the aforementioned maintenance strategies still pre- serve the theoretical results as there is no fundamental dif- ferences between handling single window shift and multiple window shifts using our proposed frameworks. 6. EXPERIMENTAL RESULTS In this section, we evaluate the efficiency and effectiveness of our proposed frameworks on several real-world and syn- thetic datasets. First, we compare IC and SIC for influence values and processing efficiency with varying β. Then, we compare the solution qualities and throughputs of all ap- proaches with different seed set size. Finally, we evaluate the scalability of all compared approaches. 6.1 Experimental Setup Datasets: We collect two real-world datasets and synthe- size two datasets for extensive studies. • Reddit: Reddit is an online forum where user actions include post and comment. We collect all Reddit comment actions in May 2015 from kaggle 6 and query the Reddit API for the post actions in the same period. The dataset contains 48, 104, 875 actions from 2, 628, 904 users. • Twitter: Twitter is an online social network where ac- tions include tweet, retweet, quote and reply. We crawl these actions for one week via Twitter stream API7 on trending topics such as US presidential election, 2016 NBA finals and Euro 2016. The dataset contains 9, 724, 908 ac- tions from 2, 881, 154 users. • Synthetic Datasets: We synthesize two action streams with different response patterns to test the robustness of the proposed solutions. There are two types of actions in concern: post and follow. We use the R-MAT model [8] to synthesize 5 different power law graphs with the number of users ranging from 1-5 million (2 million by default). For each synthetic graph, we generate 10 million actions by randomly selecting a user to perform either a post or a follow action. If an action at is follow, it will respond to a previous action at′ with a response distance ∆ = t−t′. To demonstrate different response patterns, two datasets are 6https://www.kaggle.com/reddit/reddit-comments-may-2015 7https://dev.twitter.com/streaming/overview Table 3: Statistics on datasets Dataset Users Actions Resp. dist. Avg. depth Reddit 2,628,904 48,104,875 Twitter 2,881,154 9,724,908 SYN-O 1M–5M 10,000,000 SYN-N 1M–5M 10,000,000 404714.9 294609.4 500,000 5,000 4.58 1.87 2.5 2.59 generated based on the distances conforming to exponen- tial distributions with different parameters: (1)SYN-O: ∆ ∼ exp(λ = 2.0 × 10−6), which indicates "old posts get more followers"; (2)SYN-N: ∆ ∼ exp(λ = 2.0 × 10−4), which represents "recent posts get more followers". The statistics of these datasets are summarized in Table 3. Approaches: All approaches compared in the experiments are listed as follows: • IMM [35]: To support our argument on the effective- ness, we use the state-of-the-art IM algorithm on static graphs as a baseline. At each time t, we construct an influence graph Gt by treating users as vertices and the influence relationships between users wrt. Wt as directed edges. The edge probabilities between users are assigned by the weighted cascade (WC) [17] model. To extract the influential users at time t, we set the parameters of IMM to be ε = 0.5, l = 1 [35] and run the algorithm on the generated influence graph Gt. • UBI [10]: We use the state-of-the-art method for IM on dynamic graphs as another baseline. The generation of influence graphs is the same as IMM. Then, a sequence of influence graphs {G1, G2, . . .} are fed to UBI in a chrono- logical order to track the influential users. We keep the same interchange threshold as used in [10], i.e., γ = 0.01. • Greedy [27]: We also implement the classic greedy algo- rithm in [27] since it achieves the best theoretical appro- ximation (i.e., 1−1/e) of SIM queries. A detailed descrip- tion of this algorithm is presented in Section 4. Since the Greedy algorithm does not store any intermediate result, it always recomputes the solution when being queried. • IC: The IC framework proposed in Section 4. We use SieveStreaming [3] as the checkpoint oracle. • SIC: The SIC framework proposed in Section 5. We use the same checkpoint oracle as IC. Quality Metric: We note that IMM and UBI work under the WC model whereas Greedy, IC and SIC are proposed to answer SIM queries in Section 3. To verify the effective- ness of our proposed solutions, we retrieve the seed users returned by all approaches for each window slide. When a set of seed users is returned by each approach at time t, we evaluate the influence spread of the users under the WC model with 10,000 rounds of Monte-Carlo simulation on the corresponding influence graph Gt. Finally, we use the aver- age influence spread of all windows for each approach as the quality metric. Performance Metric: We use throughput as our perfor- mance metric. Specifically, whenever the window slides for L actions, we measure the elapsed CPU time of each approach and the throughput is L divided by the elapsed time. We do not measure the query processing time because all ap- proaches maintain the seed users explicitly and the time to retrieve them is negligible. Parameters: The parameters examined in our experiments: (1) β is the parameter in IC and SIC to achieve a trade-off between quality and efficiency. (2) k is the size of the seed SIC IC l e u a V e c n e u l f n I 38k 36k 34k 32k 30k 28k 26k 95k 90k 85k 80k 75k 70k 65k l e u a V e c n e u l f n I SIC IC SIC IC l e u a V e c n e u l f n I 14k 13k 12k 11k 10k SIC IC l e u a V e c n e u l f n I 17k 16k 15k 14k 13k 12k 11k 0.1 0.2 0.3 β 0.4 0.5 (a) Reddit 0.1 0.2 0.3 β 0.4 0.5 (b) Twitter 0.1 0.2 0.3 β 0.4 0.5 (c) SYN-O 0.1 0.2 0.3 β 0.4 0.5 (d) SYN-N Figure 5: Influence Values of IC and SIC with varying β. 120 SIC IC 120 SIC IC 120 SIC IC 120 SIC IC i s t n o p k c e h C f o . o N 100 80 60 40 20 0 0.1 100 i s t n o p k c e h C 80 60 40 20 0 0.1 f o . o N 0.4 0.5 0.2 0.3 β (a) Reddit 100 i s t n o p k c e h C 80 60 40 20 0 0.1 f o . o N 0.2 0.3 β 0.4 0.5 (b) Twitter 100 i s t n o p k c e h C 80 60 40 20 0 0.1 0.2 0.3 β 0.4 0.5 (d) SYN-N f o . o N 0.2 0.3 β 0.4 0.5 (c) SYN-O Figure 6: The number of checkpoints maintained by IC and SIC with varying β. SIC IC 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 0.1 SIC IC 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0.4 0.5 0 0.1 0.2 0.3 β (a) Reddit 0.2 0.3 β 0.4 0.5 (b) Twitter SIC IC 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 0.1 0.2 0.3 β 0.4 0.5 (c) SYN-O SIC IC 150 ) s / K 120 ( t u p h g u o r h T 90 60 30 0 0.1 0.2 0.3 β 0.4 0.5 (d) SYN-N Figure 7: Throughputs of IC and SIC with varying β. 100k SIC IC Greedy IMM UBI d a e r p S e c n e u l f n I 35k 30k 25k 20k 15k 10k 5k 0 SIC IC Greedy IMM UBI d a e r p S e c n e u l f n I 5 25 50 k 75 100 (a) Reddit 80k 60k 40k 20k 0 d a e r p S e c n e u l f 25k 20k 15k 10k 5k 0 SIC IC Greedy IMM UBI SIC IC Greedy IMM UBI 25k 20k 15k 10k d a e r p S e c n e u l f 5 25 50 k 75 100 (c) SYN-O n I 5k 0 5 25 50 k 75 100 (d) SYN-N n I 5 25 50 k 75 100 (b) Twitter Figure 8: Solution qualities of compared methods with varying k. 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 SIC IC UBI IMM Greedy 0 25 50 k 75 100 (a) Reddit 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 SIC IC UBI IMM Greedy 0 25 50 k 75 100 (b) Twitter ) s / K ( t u p h g u o r h T 120 90 60 30 0 0 SIC IC UBI IMM Greedy 75 100 25 50 k (c) SYN-O 200 150 100 ) s / K ( t u p h g u o r h T SIC IC UBI IMM Greedy 50 0 0 25 50 k 75 100 (d) SYN-N Figure 9: Throughputs of compared methods with varying k. 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 SIC IC UBI IMM Greedy 0 250 500 N (x103) 750 1000 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 SIC IC UBI IMM Greedy 0 250 500 N (x103) 750 1000 ) s / K ( t u p h g u o r h T 120 90 60 30 0 SIC IC UBI IMM Greedy 0 250 500 N (x103) 750 1000 ) s / K ( t u p h g u o r h T 160 120 80 40 0 0 SIC IC UBI IMM Greedy 250 500 N (x103) 750 1000 (a) Reddit (b) Twitter (c) SYN-O (d) SYN-N Figure 10: Throughputs of compared approaches with varying W . SIC IC UBI IMM Greedy 0 2.5 5 L (x103) 7.5 10 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 SIC IC UBI IMM Greedy 0 2.5 5 L (x103) 7.5 10 ) s / K ( t u p h g u o r h T 100 80 60 40 20 0 SIC IC UBI IMM Greedy 0 2.5 5 L (x103) 7.5 10 160 120 ) s / K ( t u p h g u o r h T 80 40 0 0 SIC IC UBI IMM Greedy 2.5 5 L (x103) 7.5 10 (a) Reddit (b) Twitter (c) SYN-O (d) SYN-N Figure 11: Throughputs of compared approaches with varying L. Table 4: Parameters in experiments Parameter Values k β N L U 5, 25, 50, 75, 100 0.1, 0.2, 0.3, 0.4, 0.5 100K, 250K, 500K, 750K, 1,000K 1K, 2.5K, 5K, 7.5K, 10K 1M, 2M, 3M, 4M, 5M set. (3) N is the window size. (4) L is the number of ac- tions for each window slide. (5) U is the total number of users for synthetic datasets. We vary N , L and U to test the scalability of the compared approaches. The summary of parameters is listed in Table 4. The default values of all parameters are in bold. Experiment Settings: All experiments are conducted on a desktop machine running Ubuntu 14.04 with a quad core 3.4 GHz Intel i7-2600 processor and 16 GB memory. All the approaches except IMM are implemented in Java 8. The IMM implementation available8 is written in C++. 6.2 Testing β for IC and SIC We first vary β to test its effect on IC and SIC in terms of the average influence value of SIM queries using the cardi- nality function, the number of maintained checkpoints and the throughput. Note that we compare the seed qualities of IC and SIC with the baselines in Section 6.3 and only focus on their effectiveness of answering SIM queries here. Influence Value: The influence values of IC and SIC with varying β are presented in Figure 5a–5d. The influence val- ues of IC are slightly better than SIC in most experiments. This is because SIC trades quality for efficiency by main- taining fewer checkpoints. In spite of that, SIC is able to obtain competitive values with at most 5% off from IC. In addition, we can see that both SIC and IC achieve better influence values for a smaller β and the influence values of 8https://sourceforge.net/projects/im-imm/ SIC degrade faster than IC for a larger β due to the dele- tion of checkpoints. We note that in the SYN-N dataset, the influence values of SIC degrade more severely than other datasets for a larger β. This is because the average reply distance is very short, which leads to the frequent changes of the influential users. Nevertheless, SIC still returns solu- tions within the theoretical bound stated in Section 5.2. Number of checkpoints: We examine the average number of checkpoints maintained by IC and SIC for all sliding windows. The results are presented in Figure 6a–6d. IC maintains a constant number of checkpoints wrt. β. This is because the number of checkpoints maintained by IC in each sliding window exactly equals to ⌈ N L ⌉. On the contrary, the number of checkpoints in SIC is O( log N β ) according to Theorem 5 in Section 5.2, and is thus negatively correlated with β. The trend for the number of checkpoints emphasizes the superiority of SIC in both space and time efficiencies. Throughput: The throughputs of IC and SIC are pre- sented in Figure 7a–7d. Both IC and SIC achieve better performance for a larger β. There are two reasons behind such an observation. First, both approaches employ Sie- veStreaming as the checkpoint oracle where fewer candi- date instances are kept within each checkpoint for a larger β, which makes the update time shorter for each check- point. Second, SIC maintains fewer checkpoints as β be- comes larger, which naturally leads to shorter processing time. Thus, for a larger β, SIC shows even more superior- ity over IC in all experiments because fewer checkpoints are maintained by SIC. 6.3 Comparing Approaches with Varying k We compare different approaches by using the quality and the performance metric defined in Section 6.1 for varying k. Quality: The results of solution qualities for different ap- proaches are presented in Figure 8a–8d. Compared with IMM, Greedy, IC and SIC achieve less than 10% quality losses. The results have verified the effectiveness of SIM as the seeds for SIM queries achieve nearly equivalent influence spreads as the seeds retrieved by IMM under the WC model. 100 ) s / K ( t u p h g u o r h T 80 60 40 20 0 SIC IC UBI IMM Greedy 1 2 3 U (x106) 4 5 ) s / K ( t u p h g u o r h T 120 SIC IC UBI IMM Greedy 90 60 30 0 1 2 3 U (x106) 4 5 (a) SYN-O (b) SYN-N Figure 12: Throughputs with varying U . Moreover, SIC shows competitive qualities though it main- tains fewer checkpoints than IC. In contrast, the qualities of UBI are close to IMM when k is small (i.e., k ≤ 25). But its qualities degrade dramatically when k increases. This is because UBI relies on interchanging users to maintain the influential users against the updates of the influence graph. It interchanges a user into the maintained influential user set only when a substantial gain is achieved for the estimated influence spread (i.e., 1% of the total influence spread prior to the interchange). Thus, for a larger k, it becomes harder for a user to be interchanged since the total influence spread of the maintained user set is larger. This results in the delays of interchanges and causes larger errors. Throughput: The performances with varying k are pre- sented in Figure 9a–9d. The throughputs of all approaches are inversely proportional to k. IC and SIC both employ SieveStreaming as the checkpoint oracle, each checkpoint maintains a number of candidate instances and each instance contains up to k candidate users. When k gets larger, it is more expensive to evaluate the influence function for each checkpoint. This explains why the performances of IC and SIC drop while k becomes larger. Compared with IC and all baseline methods, SIC shows significant advantages in effi- ciency for all experiments. Moreover, SIC dominates Greedy and IMM by achieving a speedup of up to 2 orders of magni- tude across all datasets. The throughput of UBI is also far behind SIC and IC on all datasets except Twitter, where it achieves an equivalent throughput compared to IC. Nonethe- less, UBI is still more than 3 times slower than SIC. 6.4 Scalability In this section, we evaluate the scalability of compared methods through measuring the throughputs when varying the window size N , the length of each window slide L and the total number of users U . Varying N : The performances for varying N are presented in Figure 10a–10d. Although the throughputs of all ap- proaches decrease with increasing N , SIC shows better scal- ability as it only maintains O(log N ) checkpoints when β is fixed. We observe a smaller performance gap between IC and SIC in all datasets when N is small (i.e., N = 100, 000). This is because the number of checkpoints maintained by IC is very close to SIC (fewer than 8) and the benefits of sparse checkpoints become less significant. Nonetheless, when N increases, SIC regains its superiority. Moreover, SIC achie- ves speedups of up to 40x, 100x and 70x compared to Greedy, IMM and UBI respectively. Varying L: We show the performances for varying L in Figure 11a–11d. As L increases, the throughputs of IC and SIC increase. This is because larger L results in a smaller number of checkpoints for both methods. IC exhibits a lin- ear performance improvement wrt. larger L since it main- tains ⌈ N L ⌉ checkpoints. As SIC deletes some checkpoints created by IC, it continues to be superior to IC in terms of performance, which demonstrates its scalability in han- dling multiple window slides. Like the results for varying N , SIC dominates Greedy, IMM and UBI in terms of the throughput. Varying U : Finally, we show the performances for varying U on two synthetic datasets in Figure 12a–12b. We observe that the throughputs of SIC, IC and UBI increase as U becomes larger. Fixing the window size N , the influence graphs become more sparse for a larger U . All these three approaches show better performance on more sparse graphs. However, Greedy and IMM need more processing time to run as U increases since these complexities are directly re- lated to U . Finally, SIC still shows superior performances in all experiments with various U settings. 7. CONCLUSION In this paper, we proposed a novel Stream Influence Max- imization (SIM) query to retrieve k influential users who collectively maximize the influence value over a social action stream. Then, we presented a novel framework Influential Checkpoints (IC) and its improved version Sparse Influen- tial Checkpoints (SIC) to efficiently support the continuous SIM queries over high-speed social streams. Theoretically, β ) checkpoints to obtain an ǫ(1−β) SIC maintained O( log N - approximate solution for SIM queries. Empirically, our ex- periments showed that SIC achieves up to 2 orders of magni- tude speedups over the state-of-the-art static and dynamic IM approaches with less than 10% losses in seed quality. In particular, SIC demonstrated a peak processing rate of more than 150K actions per second, which is adequate for real-world social streams. In the future, we plan to extend our proposed frameworks to support a broader class of IM problems, e.g., competitive IM [5, 22, 26]. 2 Acknowledgment We thank Mr. Ohsaka Naoto for providing his implementa- tion of algorithms in [29]. 8. REFERENCES [1] C. C. Aggarwal, S. Lin, and P. S. Yu. On influential node discovery in dynamic social networks. In SDM, pages 636–647, 2012. [2] G. Ausiello, N. Boria, A. Giannakos, G. Lucarelli, and V. T. Paschos. Online maximum k-coverage. Discrete Applied Mathematics, 160(13–14):1901–1913, 2012. [3] A. Badanidiyuru, B. Mirzasoleiman, A. Karbasi, and A. Krause. Streaming submodular maximization: Massive data summarization on the fly. In KDD, pages 671–680, 2014. [4] N. Barbieri, F. Bonchi, and G. Manco. Topic-aware social influence propagation models. In ICDM, pages 81–90, 2012. [5] S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks. In WINE, pages 306–311, 2007. [6] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA, pages 946–957, 2014. [7] V. Braverman and R. Ostrovsky. Smooth histograms 9(2):60–71, 2015. for sliding windows. In FOCS, pages 283–293, 2007. [8] D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-mat: A recursive model for graph mining. In SDM, pages 442–446, 2004. [27] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions-i. Mathematical Programming, 14(1):265–294, 1978. [9] S. Chen, J. Fan, G. Li, J. Feng, K.-L. Tan, and [28] H. T. Nguyen, M. T. Thai, and T. N. Dinh. J. Tang. Online topic-aware influence maximization. PVLDB, 8(6):666–677, 2015. [10] X. Chen, G. Song, X. He, and K. Xie. On influential nodes tracking in dynamic social networks. In SDM, pages 613–621, 2015. [11] M. Datar, A. Gionis, P. Indyk, and R. Motwani. Maintaining stream statistics over sliding windows. SIAM Journal on Computing, 31(6):1794–1813, 2002. [12] P. Domingos and M. Richardson. Mining the network value of customers. In KDD, pages 57–66, 2001. [13] U. Feige. A threshold of ln n for approximating set cover. Journal of the ACM, 45(4):634–652, 1998. [14] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. Learning influence probabilities in social networks. In WSDM, pages 241–250, 2010. [15] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. A data-based approach to social influence maximization. PVLDB, 5(1):73–84, 2011. [16] L. Guo, D. Zhang, W. Wu, G. Cong, and K.-L. Tan. Influence maximization in trajectory databases. IEEE Transactions on Knowledge and Data Engineering. to appear. [17] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD, pages 137–146, 2003. [18] R. Kumar, B. Moseley, S. Vassilvitskii, and A. Vattani. Fast greedy algorithms in mapreduce and streaming. ACM Transactions on Parallel Computing, 2(3):1–14, 2015. [19] K. Kutzkov, A. Bifet, F. Bonchi, and A. Gionis. Strip: Stream learning of influence probabilities. In KDD, pages 275–283, 2013. [20] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In KDD, pages 420–429, 2007. [21] G. Li, S. Chen, J. Feng, K.-L. Tan, and W.-S. Li. Efficient location-aware influence maximization. In SIGMOD, pages 87–98, 2014. [22] H. Li, S. S. Bhowmick, J. Cui, Y. Gao, and J. Ma. Getreal: Towards realistic selection of influence maximization strategies in competitive networks. In SIGMOD, pages 1525–1537, 2015. [23] H. Li, S. S. Bhowmick, A. Sun, and J. Cui. Conformity-aware influence maximization in online social networks. The VLDB Journal, 24(1):117–141, 2015. [24] Y. Li, J. Fan, D. Zhang, and K.-L. Tan. Discovering your selling points: Personalized social influential tag exploration. In SIGMOD, 2017. to appear. [25] Y. Li, D. Zhang, and K.-L. Tan. Real-time targeted influence maximization for online advertisements. PVLDB, 8(10):1070–1081, 2015. [26] W. Lu, W. Chen, and L. V. S. Lakshmanan. From competition to complementarity: Comparative influence diffusion and maximization. PVLDB, Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In SIGMOD, pages 695–710, 2016. [29] N. Ohsaka, T. Akiba, Y. Yoshida, and K.-i. Kawarabayashi. Dynamic influence analysis in evolving networks. PVLDB, 9(12):1077–1088, 2016. [30] B. Saha and L. Getoor. On maximum coverage in the streaming model and application to multi-topic blog-watch. In SDM, pages 697–708, 2009. [31] K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for independent cascade model. In KES, pages 67–75, 2008. [32] G. Soda, A. Usai, and A. Zaheer. Network memory: The influence of past and current networks on performance. Academy of Management Journal, 47(6):893–906, 2004. [33] X. Song, B. L. Tseng, C.-Y. Lin, and M.-T. Sun. Personalized recommendation driven by information flow. In SIGIR, pages 509–516, 2006. [34] K. Subbian, C. C. Aggarwal, and J. Srivastava. Querying and tracking influencers in social streams. In WSDM, pages 493–502, 2016. [35] Y. Tang, Y. Shi, and X. Xiao. Influence maximization in near-linear time: A martingale approach. In SIGMOD, pages 1539–1554, 2015. [36] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: near-optimal time complexity meets practical efficiency. In SIGMOD, pages 75–86, 2014. [37] X. Wang, Y. Zhang, W. Zhang, and X. Lin. Distance-aware influence maximization in geo-social network. In ICDE, pages 1–12, 2016. [38] H. Yu and D. Yuan. Set coverage problems in a one-pass data stream. In SDM, pages 758–766, 2013. [39] H. Zhuang, Y. Sun, J. Tang, J. Zhang, and X. Sun. Influence maximization in dynamic social networks. In ICDM, pages 1313–1318, 2013. APPENDIX A. DISCUSSION In this section, we discuss how to extend our proposed frameworks to different types of IM problems in a streaming setting. Here, we take topic-aware IM [4, 9], location-aware IM [21, 37], and conformity-aware IM [23] as examples. Topic-Aware IM: First, we consider processing topic-aware SIM queries in a dynamic social stream. Given a set of top- ics T , we assume that a topic oracle can provide a subset of topics Tt ⊆ T for each arrival action at, where Tt contains all topics that are related to at. Then, we consider each SIM query q only concerns a subset of topics Tq ⊆ T . To maintain the influential users for q, we can invoke IC or SIC but only process a sub-stream of actions {atTt ∩ Tq 6= ∅}. Location-Aware IM: Then, we consider the location-aware SIM queries in a dynamic social stream. For a location- aware SIM query q with a spatial region R, we aim to find users who have the largest influences in R. It can be pro- cessed in a similar way with topic-aware SIM queries. We assume each action at is associated with a position pt, which means that at happens at pt. To maintain the influential users for q, we can also invoke IC or SIC but only process a sub-stream of actions {atpt ∈ R}. Conformity-Aware IM: In conformity-aware IM, the in- fluence and conformity scores of all users are calculated offline. To incorporate these scores into SIM, we can de- sign the influence function as follows: given any user set S, the influence function is set to Pu′∈I(S) wS(u′) where I(S) is the set of users influenced by S in our model and wS(u′) is the conformity-aware influence score from S to a user u′. Specifically, wS(u′) is evaluated as wS(u′) = 1 − Qu∈S∧u′∈I({u})(1 − Φ(u)Ω(u′)) with Φ(·) and Ω(·) de- noting the influence and conformity scores calculated by the conformity-aware model offline. As conformity-aware scores naturally evolve slowly, it is reasonable to treat them as constants for a long time and recompute them periodically. As the adapted influence function retains the monotone and submodular properties, our proposed frameworks remain ef- fective and efficient when considering conformity-aware IM. From the above examples, we see different types of IM problems with monotone submodular objective functions can be adapted to our frameworks. However, it is still an open problem to use our frameworks to support IM problems hav- ing non-monotone or non-submodular objective functions (e.g. opinion-aware IM) or considering the dependency of different queries (e.g., competitive IM).
1507.04192
1
1507
2015-07-15T12:45:35
Beyond Contagion: Reality Mining Reveals Complex Patterns of Social Influence
[ "cs.SI", "physics.soc-ph" ]
Contagion, a concept from epidemiology, has long been used to characterize social influence on people's behavior and affective (emotional) states. While it has revealed many useful insights, it is not clear whether the contagion metaphor is sufficient to fully characterize the complex dynamics of psychological states in a social context. Using wearable sensors that capture daily face-to-face interaction, combined with three daily experience sampling surveys, we collected the most comprehensive data set of personality and emotion dynamics of an entire community of work. From this high-resolution data about actual (rather than self-reported) face-to-face interaction, a complex picture emerges where contagion (that can be seen as adaptation of behavioral responses to the behavior of other people) cannot fully capture the dynamics of transitory states. We found that social influence has two opposing effects on states: \emph{adaptation} effects that go beyond mere contagion, and \emph{complementarity} effects whereby individuals' behaviors tend to complement the behaviors of others. Surprisingly, these effects can exhibit completely different directions depending on the stable personality or emotional dispositions (stable traits) of target individuals. Our findings provide a foundation for richer models of social dynamics, and have implications on organizational engineering and workplace well-being.
cs.SI
cs
Beyond Contagion: Reality Mining Reveals Complex Patterns of Social Influence Aamena Alshamsi1, Fabio Pianesi2, Bruno Lepri2,3, Alex Pentland3, and Iyad Rahwan1,3 1Masdar Institute, UAE 2Foundation Bruno Kessler, Italy 3Massachusetts Institute of Technology, USA October 1, 2018 Abstract Contagion, a concept from epidemiology, has long been used to characterize social in- fluence on people's behavior and affective (emotional) states. While it has revealed many useful insights, it is not clear whether the contagion metaphor is sufficient to fully characterize the complex dynamics of psychological states in a social context. Using wearable sensors that capture daily face-to-face interaction, combined with three daily experience sampling surveys, we collected the most comprehensive data set of person- ality and emotion dynamics of an entire community of work. From this high-resolution data about actual (rather than self-reported) face-to-face interaction, a complex picture emerges where contagion (that can be seen as adaptation of behavioral responses to the behavior of other people) cannot fully capture the dynamics of transitory states. We found that social influence has two opposing effects on states: adaptation effects that go beyond mere contagion, and complementarity effects whereby individuals' behaviors tend to complement the behaviors of others. Surprisingly, these effects can exhibit com- pletely different directions depending on the stable personality or emotional dispositions (stable traits) of target individuals. Our findings provide a foundation for richer models of social dynamics, and have implications on organizational engineering and workplace well-being. Introduction Social influence is a fundamental force in society that drives the formation and propa- gation of opinions [1], attitudes [2], behaviors [3], social norms [4] and of psychological states [5]. Its power can be exploited to increase political participation [6], promote physical activity and personal well-being [7], and reduce energy consumption [8]. 1 The metaphor of contagion provides a powerful framework for modeling social influ- ence [9, 10, 11]. Psychological and behavioral phenomena can be seen to spread, like a disease, from one person to another as a result of face-to-face [12] or electronic communi- cation [13, 14]. Recent work showed that contagion can characterize (at least partially) the spread of obesity [12], eating habits [15], cooperative behavior [16, 17, 18], generosity [19], smoking [20], happiness [21], smiling [22], depression [23, 24], and emotion more generally [25, 26]. It is also possible to estimate parameters of epidemic models, such as the Susceptible-Infected-Susceptible (SIS) model, directly from behavioral data [27, 28]. Recently, the notion of behavioral contagion in social networks has become a sub- ject of heated debate, particularly surrounding the difficulty of differentiating between contagion and homophily from observational data [29, 11, 30, 31]. The present article is not a contribution to this debate, but rather raises a number of orthogonal issues that we believe are equally important to our understanding of social dynamics. Firstly, existing literature has mostly captured the dynamics of long-lasting state, with a temporal resolution of months [10] or years [11], with no consideration to the fleeting states that we all go through daily. One possible reason for this could be that traditional sampling methodologies have so far made it difficult to capture those states, as well as the similarly fast-changing situational factors, at a high enough temporal resolution. Another limitation of existing work stems from the fact that social and biological contagion are fundamentally different [32]. In particular, existing contagion models focus on social-situational influences [21, 27] and neglect the role of individual differences in psychological state dynamics [33, 34]. Individuals differ in their tendencies to experience given psychological states, since the dynamics of states are a result of the interplay between situational factors (e.g., social interaction) and individuals' stable traits (also known as dispositions) [35]. Thus, one should expect that individual between-subject differences should play an equally important role in social dynamics as situational factors [36, 37]. For example, consider the Big-Five personality model, which measures openness, conscientiousness, extraversion, agreeableness, and neuroticism [38]. A person might be high on the extraversion trait, but his extraversion state fluctuates over time. Indeed, through experience sampling, Fleeson [39] showed that: (a) people pass through all levels of personality states in their daily lives; (b) the central tendency of personality states is stable and reflects the corresponding trait level; (c) within-person variation in personality states can be attributed to the interplay between situational aspects and the stable dispositions captured by traits. Another source of limitation in the classical contagion model is that it typically deals with transition among discrete conditions -- infected and not infected. Yet, sociological and psychological theory has long recognized that social influence often involves changes across continuous [40] or ordinal state structure [36], as people transition among levels of the same state (e.g. higher or lower extraversion). We collected high-resolution data of daily face-to-face interaction among members of an organization, along with detailed experience sampling (3 times per day) of their Big- 2 Five personality states, and their affective (emotional) states using measures of Positive and Negative Affect [41]. Results reveal a complex picture whereby: (a) contagion plays a marginal role; (b) more nuanced effects like attraction, inertia, repulsion and push that are reminiscent of the mimicry/adaptation vs. complementarity distinction [42, 43]; (c) these processes are moderated by individual dispositions (traits). Our findings suggest that the intuitive preventive actions, of avoiding infection by staying away from people in undesirable states (e.g. depression) and seeking people in desirable states (e.g. high positive affect) may not always be effective. A more nuanced approach, which takes into account these subtle social influences, would be necessary. These results are highly relevant to organizational engineering [44] and efforts to make work environments, teamwork, and schools more effective [45, 46, 47, 48]. Methods High-resolution sensors have made collecting and analyzing enormous amount of social interaction data possible [49, 50, 51, 52, 53], alleviating the exclusive reliance on un- reliable, subjective self-reports based on people's memory [54]. Moreover, sensors can log data at very fine time-scales without interfering with people's routines or consuming their time, making it easier to investigate short-duration phenomena. Data Collection Sociometric Badges, designed and built by author Pentland, are capable of tracking various activities and behaviors of individuals [49]. These sensors -- Fig. 1(ii) -- track face-to-face interactions by means of infrared (IR) sensors that recognize similar sensors facing them, implying that the two participants wearing them had a conversation or eye contact. We used these badges to track face-to-face interactions of 52 individuals and con- ducted three daily experience sampling surveys [55] to collect information about their personality and emotional states -- Fig. 1(i). In addition, affect and personality (sta- ble) traits were measured at the beginning of the study. This methodology was applied to five personality states and their corresponding traits (extraversion, agreeableness, conscientiousness, emotional stability and creativity) and two affect states and their corresponding traits -- high positive affect (HPA) and low negative affect (LNA). Specifically, we followed the well-established procedure proposed by Fleeson [39]. At the beginning and at the end of the experiment the participants filled extended surveys about: (1) dispositional (stable) personality traits (2) dispositional affective traits. These scores are considered as the dispositional factors of participants in our study. During the 30 work days, participants were asked to fill three experience sampling surveys about transient psychological states (personality and affect) that they have experienced in the last 30 minutes. The three daily reports were the same format as Big Five scales traditionally used for traits, with the exception that rather than describing themselves in general, participants described their personality-related behaviors during the previous 3 Figure 1: (i) Framework of the Study: First, participants filled a survey capturing personality and affect (stable) traits. Then they filled 3 daily surveys for 30 work days to measure personality and affect (dynamic) states. (ii) Sociometric Badge: Each participant's social network between any two consecutive surveys was constructed from infrared sensor data from sociometric badges worn around the neck [49]. (iii) Mea- suring Situational Factors: An example of how the situational factors (intensity of contacts) is calculated. The ego's infrared sensor (in the middle) detected 7 alters be- tween two consecutive surveys. Two of the alters were in the high level (green) with 14 infrared hits, leading to intensity of contact 14/2 = 7. Similarly, the intensity of contact with three alters in the neutral level (yellow) is 15/3 = 5 and that for alters in the low level (red) is 20/2 = 10. (iv) Social Influences: Four possible social influences exemplified. Attraction: an ego in the high level interacts with others in the low level, then moves to the low level to adapt to his peers. Repulsion: a participant in the high level interacts with others in the low level, and consequently remains in the high level in complement to his peers. Inertia: a participant in the low level interacts with others in the same level, who prevent him from moving to a different level, maintaining his adaptation to their level. Push: a participant in the low level interacts with others in the same level, as a result pushing him away to a different, complementary level. 4 30 minutes (e.g. during the last 30 minutes, how well does talkative describe you?). It is very unlikely that people would have experienced significantly varying affect or personality states during such a short period of time. The surveys were triggered to be sent via email every working day at (11:00 AM, 2:00 PM and 5:00 PM). The participants were given 2.5 hours to fill the surveys. We refer to the first survey as the morning survey, the second survey as the midday survey and the third survey as the afternoon survey. Group Survey Personality States Affect Ten-Item Personality Inventory (TIPI) Measurement Extraversion Agreeableness Conscientiousness Emotional Stability Traits Creativity Big Five Marker Scale (BFMS) High Positive Affect States High Negative Affect Positive and Negative Affect Schedule (PANAS) Traits Low Positive Affect Multidimentional Personality Questionnaire (MPQ) Low Negative Affect Table 1: Surveys for personality and affect states and traits Table 5 summarizes the types of surveys used to capture different groups of states and traits. The Big Five Marker Scale (BFMS) is widely used to assess personality scores for extraversion, agreeableness, conscientiousness, emotional stability and creativity [63]. Therefore, BFMS was used in the Sociometric Badge Corpus at the beginning and at the end of the experiment to capture personality traits of participants [56]. Similarly, Mul- tidimensional Personality Questionnaire (MPQ) was utilized to measure dispositional affective scores of participants [64]. On the other hand, experience sampling surveys elicit transient states of personality and affect (emotions) including questions about BIG5 personality scale and fifteen items concerning affective states. Questions in these surveys report participants' states which were experienced in the last 30 minutes. For transient states of personality, the ten-item personality inventory TIPI was used in the experience sampling [65]. For each personality dimension e.g. extraversion, we recoded the reverse-scored items and then we computed the average of the two items (the standard item and the recoded reverse-scored item) that make up each dimension. The short version of Positive and Negative Affect Schedule (PANAS) was used to evaluate the affective states of participants [66]. High positive affect (HPA) was assessed using 3 items: enthusiastic, interested and active. High negative affect (HNA) was assessed using 3 items: sad, bored and sluggish. Low positive affect was assessed using 2 items: calm and relaxed while low negative affect (LNA) was assessed using 2 items lonely and isolated. The study lasted 30 working days and was performed during work hours at the premises of a research organization in northern Italy (for more details, see [56]). The data comprised 1,426 surveys by the 52 participant (see SI for more details). The total 5 number of Infrared hits detected by participants' sensor while socializing with other participants is 114,642. When discussing the social interaction that a given participant was involved in, we refer to him/her as an ego and to the peers he/she interacted with as alters. Based on source, destination and time of those Infrared hits, we were able to construct the temporal face-to-face networks for each participant. When an ego's Infrared sensor detects an alter, a directional transient edge is created between ego and alter and the weight of the edge is determined by the number of Infrared hits detected by ego's sensor that are triggered by the recognition of alter's sensor. The temporal networks consisted of 1,643 transient edges. Personality and affect states' scores are measured through continuous scales which are quantized into three ordinal levels -- low, medium (neutral) and high -- according to the three quantiles of their distributions in such a way that level L (Low) consisted of cases between the 0-th and the 33rd quantile; level N (Neutral) consisted of cases between the 33rd and the the 66th quantiles, and level H (High) consisted of cases above the latter (see SI for more details). In [27], high and low state levels are considered as infectious while the medium (neutral) level is considered susceptible. In our case, state dynamics consist of changes (or lack thereof) of level between two consecutive surveys filled by a participant in a given day. Although our data is temporal, we focused on immediate single transitions within each state rather than looking at longer-term temporal trends. The addressed states fluctuate more than once on daily basis, so we just focused on the transitions that take place between two subsequent time periods and therefore we studied which social-situational factors are associated with those transitions. Following the Italian regulations all participants were asked to sign an informed consent form and the study was conducted in accordance to them. The form and the general study was also approved by the Ethical Committee of Ca' Foscari University of Venice. Contact intensity is distinguished according to the level that the interacting partners were at the beginning of the relevant time interval (i.e., t) as illustrated in Fig. 1(iii). The intensity of contacts with alters in a particular level (e.g. high) of the state is the ratio between the total number of infrared hits with those people and the total number of unique alters in the level. As a consequence, we have three different measures of situ- ational factors: L, N and H corresponding to the intensity of contact with people in the low, medium (neutral) and high levels, respectively. Concerning individual dispositions, the level transitions for a given state were associated with the normalized score of the corresponding trait measured at the beginning of the study. In order to investigate the moderating role each trait plays in the association between transitions between levels of the state and the social-situational factors, we focused only on high and low trait scores (± 1 standard deviation). Statistical Models For each possible transition between levels of a particular state (e.g. from Low to High in extraversion), our model consists of one dependent variable, the transition probability. Independent variables capture the corresponding trait score (T ), the three situational 6 measures L, N and H concerning contact intensity described above, the interaction effects T ∗ L, T ∗ N and T ∗ H between trait and situational variables to account for the moderating effect of the former on the latter. The association between the dependent and the independent variables, including interactions, is modeled through logistic regression as shown in Equation 2. Following Banerjee et al [57], we used logistic regression instead of OLS regression (used by Hill et al [27]) because the value of the dependent variable is binary (0 if there is no transition and 1 otherwise). Let X → Y denote a transition by the ego from level X to level Y of some state S (X = Y denotes stability). Let p(X → Y ) be the probability of this transition between two consecutive surveys. For each dynamic state S, we fit the following model: p(X → Y ) 1 − p(X → Y ln( ) = α+βLL+βN N +βH H+βT T +βT∗LT∗L+βT∗N T∗N +βT∗H T∗H+βCC (1) where α is a constant (intercept); βL, βN , βH and βT are coefficients of the main effects; βT∗L, βT∗N and βT∗H are coefficients of the interaction effects between the trait T and the situational variables, and βC is the coefficient of all the control variables. Our inclusion of individual-level trait effect reduces the likelihood that correlation is driven by choice of social connections, since it accounts for observable homophily [13, 57]. However, latent homophile effects cannot be completely ruled out [29]. The model also contains control variables, denoted C, whose role is modelled by parameter βC (see SI for more details). Importantly, it has been shown that the time of day can have a significant, universal (i.e. culture-independent) effect on mood -- e.g. people tend to be more positive in the morning [58]. This circadian rhythm can be a major confounding variable in our analysis. By controlling for it, we eliminate a major confounding factor, since transitions between different levels of a particular state S (e.g. HPA) may be correlated due to spontaneous changes due to the time of day. Model and Parameter Estimation Our dataset consists of repeated observations for each participant, so we expected to have correlations within observations of participants. Hence, we used generalized linear models to analyze our longitudinal data using unstructured covariance matrices whereby variances and covariances are estimated directly from the data. Generalized Estimation Equations (GEE) are used to estimate the parameters of our models. For each transition in each state, we used backward elimination that starts with a full model that contains all candidate variables. Then, we tested the effect of deletion of insignificant variables using QICC (Corrected Quasilikelihood under Independence Models Criterion) [67] iteratively until there is no further enhancement in the results. We evaluated the goodness of fit based on QICC which is an indicator of goodness of fit of models that use generalized estimating equations. Therefore, it can be utilized to choose between two models favoring the one with the smaller QICC. After we end up with the best sub-model for each state transition, we compare its QICC to the QICC of the null model thats contains only 7 the intercept. If the best sub-model is better than the null model, then we retain it. Otherwise, we consider the null model. Although it is not possible, with current statistical techniques, to check whether a decrease in QICC is statistically significant, the significance of the independent variables remain the same during the backward elimination in the majority of the cases. Moreover, backward elimination is widely used with information criterion for model selection [61]. Hence, the usage of QICC for model selection, as suggested by Pan[67], is capable of supporting the significance of our results. Results We investigated 63 types of transitions by applying Equation 2 (3 transitions for each state level × three levels per state × 7 states). We analyzed 2,378 transitions and 3,390 stability cases in total (see Table 2 for other statistics). Transition Max Min Median Mean L → L L → N L → H N → L N → N N → H H → L H → N H → H 167 98 35 112 268 99 44 81 185 79 72 10 59 173 46 13 42 110 100 81 18 95 240 57 21 67 153 111 84 19 90 226 61 24 62 146 Table 2: The maximum, minimum, median and mean number of transitions between levels of states for each transition. Here, for simplicity, we discuss the results of conscientiousness state only and we move the results of other states to the supporting information. Table 3 shows the detailed results of the conscientiousness state. The search for confirmation of the contagion model involves investigating the transition from the neutral level to another level, and transitions from the high or the low level back to the neutral level. According to Hill et al's SISa model [27], a high or a low level is infectious only if (a) transitions to that level are only affected by the presence of people in that level, and (b) recovery is independent of social contact. We could not find any case that conformed to these conditions in conscientiousness state or the remaining six states as shown in SI. We did, however, find evidence for conditional contagion. These are cases where the satisfaction of Hill et al's definition was contingent on trait level. We found that transitions (N → L) do satisfy these requirements for people who have low scores in the conscientiousness trait. The same pattern was not observed for egos who have high scores in the conscientiousness trait; in this case, the probabilities of (N → L) decrease 8 L to L L to N Variable Coefficient P-value Variable Coefficient P-value Variable L Intercept (period=1) H L N T N L*T T L*T H*T N*T 0.0017 0.0129 0.0000 0.0286 0.0127 0.0060 0.003 -0.002 0.003 -0.269 0.003 -0.002 Intercept N 0.0000 0.0000 -0.441 -0.003 N to L N to N Variable Coefficient P-value Variable Coefficient P-value Variable Intercept Intercept (period=1) L L*T T H*T -0.408 -0.0025 -0.006 -0.002 0.0447 0.0005 0.0007 0.0010 0.0005 0.0231 0.0000 0.0357 -0.001 -0.406 0.0025 0.003 H T L*T H*T H to L H to N Variable Coefficient P-value Variable Coefficient P-value Variable Intercept L H L*T Intercept N T 0.0000 0.0294 0.0255 0.0006 -1.579 0.0024 -0.008 -0.003 -0.483 -0.0039 -0.270 0.0002 0.0004 0.0050 N T N*T L to H Coefficient P-value -1.727 0.0000 0.0130 0.715 0.0000 -0.034 0.0041 -0.009 0.751 0.1131 0.0000 0.013 -0.008 0.0012 N to H Coefficient P-value -1.564 0.726 0.405 0.00 0.00 0.013 H to H Coefficient P-value 0.0088 0.003 0.0000 0.5106 -0.003 0.0144 Table 3: Results of Conscientiousness State. The mere effects of social-situational factors (intensity with alters in each level: L, N and H) and corresponding traits of egos (T) are reported in the table, if they are statistically significant. The interaction results between the two effect are reported also (L∗ T , N ∗ T and H ∗ T ), if they are statistically significant. The coefficients of the control variables are reported also: the main effect of the time of the day (period) and the interaction between the time of the day and the trait (period*T). Some reported coefficients are relatively small, therefore we used a threshold of 0.001 to consider them relevant. We focus more on the direction of the effect (increase or decrease in the probability) rather than the actual value of the effect. when the contact intensity with alters in state level L increases. This is illustrated in the state diagram in Fig. 2 (left). No other cases conformed to the contagion model. One reason for the failure of the contagion model is the fact that the role of alters in the neutral state level is not as passive as required by Hill et al [27] to define the recovery from infection. However, the presence of alters in the neutral level can be associated with changing probabilities of moving towards that level. This is what happens with alters in the neutral level whose presence was associated with a decrease in the probability of (H → N ) and (L → N ) transitions. We observed also other roles of alters. For example, the presence of alters in the low level is associated with an increase in the probability of (H → L) for people who have low scores in the conscientiousness trait; while contact with alters in a low level of the 9 Figure 2: (Left) Transition graph for conscientiousness: Nodes represent con- scientiousness level of the ego. Arrows represent transitions from one level to another. Transitions are labeled with conditions that affect the corresponding probabilities. Icons represent the conscientiousness levels of alters and ego's trait level. Symbol ↑ (respec- tively ↓) indicates an increase (respectively decrease) in transition probability associated with the given combination of alters' state level and ego's trait level. For example, if the ego high in the conscientiousness state, then the probability of the ego transitioning to the high level decreases with ego's contact with alters in the neutral level of the state. Another example is the transition from neutral to low level of conscientiousness, which is moderated by the ego's trait score. If the ego is high in trait, then the probability of transition from a neutral state to a low state decreases with his contact with alters in high and low levels. But if the ego is low in the trait, then the probability increases instead. (Right) Social influences: The table summarizes the level transition graph by means of adaptation (A) and complementarity (C). Rows represent ego's state levels; columns are labeled with alters' state levels and sub-labeled with ego's trait level (Low or High). Cells report the effects observed when egos in the corresponding state level and trait level interact with alters in the corresponding state level. For example, the square with thick border indicates that when the ego is low in conscientiousness state and also low in conscientiousness trait, contact with alters who are also low in conscientiousness state results in an adaptation effect. Empty cells lack statistically significant effects in a given combination. 10 state is associated with a decrease in the ego's probability of transition (N → N ). Putting together all these observations, we introduce attraction, as a generalization of contagion. Intuitively, attraction obtains whenever increased interaction with alters in a state level different from the ego's corresponds to either an increased probability for the ego to move towards that level or a decreased probability to move away from that level. Two things should be noted about this definition: (a) it does not require the "behavior" of the ego to fully conform to that of his/her alter, but simply to become more similar to it; (b) nothing is assumed concerning the recovery mechanism. Attraction, by itself, is not enough, though. Often, we observed repulsion -- cases in which increased interaction with people in a certain state level corresponds to decreasing probabilities of transition towards that level. This is what happens, for examples, with transitions (L → N ) and (H → N ). In the trait-conditional mode, it applies to the (N → L) transition of conscientiousness state for people who have high scores in the corresponding trait. Attraction and repulsion cover the associations between the intensity of contacts with alters in a level different from the ego's initial one. But there is no reason not to expect that the intensity of contacts with people in the same level as the ego's can also affect his/her transition probabilities. For instance, Ego 1 of Fig. 3, who was in the neutral level and interacted with an alter in the same level, was pushed to the high level at the later sampling. Ego 2, who was in the high level and interacted with people in that same level, did not move, a situation we call inertia. At the level of the whole sample, inertia is exemplified by increasing probability for people who are in the low level of the state but have high scores in the conscientiousness trait to remain at that level when they interact with alters in the low level of state (L → L). Similarly, the intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of people in the same level to go to the low level (H → L). There are push effects in the conscientiousness state. However, there are some cases in other states (for push effects, see SI). In attraction, alters are in levels that are different from egos and therefore they encourage people to move to their levels; whereas, in inertia, alters are in the same levels of egos and encourage them to stay at the same levels. Both attraction and inertia represent a tendency of egos to conform to their alters. In repulsion, alters are in levels different from egos and therefore discourage people to move to their levels; whereas, in push, alters are in the same levels of egos and push people away from their levels. Therefore, repulsion and push represent the tendency to diverge from alters. We can, therefore, subsume our four effects under the mimicry/adaptation vs. complementarity distinction [42, 43, 50]. So far, we addressed one transition at a time. For a more complete picture, observe the state diagram of conscientiousness in Fig. 2 (left) that summarizes the effect of the interplay between social-situational factors and individual dispositional factors on each transition. Due to space limitation, detailed results of other states can be found in SI. We present our results in a more compact format in Fig. 2 (right). Alters in the low level of the state attract egos to stay in the low level or switch to lower levels if those egos are 11 Figure 3: Two consecutive snapshots of 1st to 2nd survey in day 1, with the transient social network. Nodes are participants who filled both surveys. Edge thickness is proportional to contact intensity (IR hits) between surveys. Colors represent state levels (red:low, yellow:medium, green:high) and are shown only for egos 1 -- 4 and their alters. The four types of social influence discussed in the text can be seen: ego 1 moved from the neutral level to the high level in the presence of interaction with an alter in the neutral level (push). Ego 2 remained in the high level in correspondence to intense contact with an alter in the high level (inertia). Ego 3 was in the low level and moved to neutral after intense contact with alters in the high level (attraction). Remarkably, the three egos have low scores in their corresponding traits. Ego 4 remained in the low level after contact with an alter in the high level (repulsion). The represented states are creativity for node 1, extraversion for nodes 2 and 4 and agreeableness for node 3. 12 already not conscientious by nature. Nevertheless, the alters cannot drag conscientious egos by nature towards their level unless the egos are already in the low level. Alters in the neutral level repulse egos to stay in their transient levels. Alters in the high level help egos to stay in the high level or move to their level except egos who are in the neutral level and have low trait scores. Discussion Summary and Implications From a methodological perspective, our study shows how the combination of automated sensing of social interaction with high-frequency experience sampling [59] can build a detailed picture of the dynamics of personality and affect states in a sizable work com- munity. This provides a significantly finer grained perspective compared to methodolo- gies that exclusively rely on surveys and self-reported social interaction [21, 27]. This methodology can be applied well beyond the present study, e.g. to study the spread of healthy behavior or productive work practices in an organization. Our methodology quantified complex patterns of social influence that go beyond the contagion metaphor [21, 27]. The associations we identified between social-situational aspects and transition probabilities -- attraction, repulsion, inertia and push -- account for a consistent majority (70%, 43 out of 63 ) of the transition types (3 transitions for each state level × three levels per state × 7 states) within the seven personality and affect states addressed in this work. They and their grouping under the headings of adaptation/mimicry and complementarity constitute an alternative and, we think, more appropriate taxonomy of social influence, one that is better suited to the ordinal nature of our psychological states. The model that emerges is one in which personality and affect states are not caught from someone else; they are not the result of mere contact, but from the ways egos (possibly unconsciously) respond to other people's behaviors by either adapting to it -- as discussed by social psychologists under the rubric of the "perception behavior link" or "chamaleon effect" [42] -- or diverging from it. From this perspective, the ubiquitous moderating effect of individual differences (traits) corresponds to differential dispositions to respond to external solicitations. Our observations suggest that interventions should not simply increase the prevalence of desired behavior. For example, while extrovertedly acting peers bring an introvert out of his shell (contagion), they push already extroverted persons towards introversion. So, simply adding extroverts to a group may not lead to an increase in overall extraversion. In this work, we examined the role of corresponding traits in moderating the rela- tionship between social-situational factors and variability within personality and affective states. Nevertheless, it was previously found that some traits such as extroversion and emotional stability traits are associated with fleeting affective states [68, 69]. In the future, it would be interesting to conduct similar investigations using all personality and affective traits. 13 The Issue of Causality Recently, the notion of contagion has been subject to considerable debate. In a seminal paper, Shalizi and Thomas identified situations in which latent homophily (similarity among interaction partners) together with causal effects from the homophilous trait cannot be distinguished, observationally, from contagion [29]. They argue that this raises barriers to many inferences social scientists would like to make about the underlying causal mechanisms. They further argue that these barriers can only be overcome by making exogenous assumptions about the causal architecture of the process in question. While the contagion versus homophily debate is still ongoing [11, 30], it is important to clarify that our present paper is neutral on this particular issue. Rather, our results call for attention to a fundamental orthogonal issue: even if we take contagion as a given, it would still fail to account for the majority of potential social influence effects (i.e. effects that may be attributed to contact among individuals). That is, regardless of whether true (causal) contagion exists, we show that all kinds of other associations (not just positive) can be observed when psychological dynamics are measured at higher resolution, and that these associations are moderated by individual stable traits. But the nature of our data still restricts us to correlational conclusions. For instance, just as contagion and homophily may be confounded in observational data [29], it may very well be the case that our observed 'repulsion' or 'push,' may be confounded with corresponding phenomena like 'heterophily' (the tendency to interact preferentially with people who exhibit opposing behavior or traits). Whether these associations reflect new causal mechanisms of influence remains an open question, and claims of causality must be based on well-justified assumptions [11]. The goal of this paper is precisely to motivate further investigation of these issues. Said differently, we hope that our findings will encourage the broadening of the present research agenda on social dynamics [29, 30, 31, 60, 27, 28, 62, 13], from the spe- cific idea of 'contagion' to the broader notion of 'social influence' which manifests itself through other psychological mechanisms (like mimicry/adaptation and complementar- ity). If true social influence exists, contagion is only a small part of it, and more complex interpersonal psychological dynamics are likely at play. Recognizing this is, we believe, a necessary prerequisite to unravelling the true nature of social dynamics. Competing Financial Interests The author declare no competing interests. Author Contributions IR, BL, FP conceived, designed, and coordinated the study; BL and FP collected the data; AA carried out data processing, statistical analysis, and visualization of results. AP, BL, FP and IR interpreted the results; All authors wrote the manuscript and gave final approval for publication. 14 References [1] Asch, S. E. Opinions and social pressure. Readings about the social animal 17 -- 26 (1955). [2] Wood, W. Attitude change: Persuasion and social influence. Annual review of psychology 51, 539 -- 570 (2000). [3] Pentland, A. Social Physics (Penguin Press, 2014). [4] Cialdini, R. B. & Goldstein, N. J. Social influence: Compliance and conformity. Annu. Rev. Psychol. 55, 591 -- 621 (2004). [5] Fleeson, W. Situation-based contingencies underlying trait-content manifestation in behavior. Journal of Personality 75, 825 -- 861 (2007). [6] Bond, R. M. et al. A 61-million-person experiment in social influence and political mobilization. Nature 489, 295 -- 298 (2012). [7] Mani, A., Rahwan, I. & Pentland, A. Inducing peer pressure to promote coopera- tion. Scientific reports 3, 1 -- 9 (2013). [8] Schultz, P. W., Nolan, J. M., Cialdini, R. B., Goldstein, N. J. & Griskevicius, V. The constructive, destructive, and reconstructive power of social norms. Psychological science 18, 429 -- 434 (2007). [9] Burt, R. S. Social contagion and innovation: Cohesion versus structural equivalence. American journal of Sociology 92, 1287 -- 1335 (1987). [10] Coleman, J., Katz, E. & Menzel, H. The diffusion of an innovation among physi- cians. Sociometry 253 -- 270 (1957). [11] Christakis, N. & Fowler, J. Social contagion theory: examining dynamic social networks and human behavior. Statistics in Medicine 556 -- 577 (2013). [12] Christakis, N. & Fowler, J. The Spread of Obesity in a Large Social Network over 32 Years. New England Journal of Medicine 357, 370 -- 379 (2007). [13] Coviello, L. et al. Detecting emotional contagion in massive social networks. PLOS ONE 9, e90315 (2014). [14] Kramer, A. D., Guillory, J. E. & Hancock, J. T. Experimental evidence of massive- scale emotional contagion through social networks. Proceedings of the National Academy of Sciences 111, 8788 -- 8790 (2014). [15] Madan, A., Moturu, S. T., Lazer, D. & Pentland, A. S. Social sensing: Obesity, unhealthy eating and exercise in face-to-face networks. In Wireless Health 2010, 104 -- 110 (ACM, New York, NY, USA, 2010). 15 [16] Fowler, J. & Christakis, N. Cooperative Behavior Cascades in Human Social Net- works. PNAS: Proceedings of the National Academy of Sciences 107, 5334 -- 5338 (2010). [17] Jordan, J. J., Rand, D. G., Arbesman, S., Fowler, J. H. & Christakis, N. A. Con- tagion of cooperation in static and fluid social networks. PLOS ONE 8, e66199 (2013). [18] Suri, S. & Watts, D. J. Cooperation and contagion in web-based, networked public goods experiments. PLOS ONE 6, e16836 (2011). [19] Tsvetkova, M. & Macy, M. W. The social contagion of generosity. PLOS ONE 9, e87275 (2014). [20] Christakis, N. & Fowler, J. The Collective Dynamics of Smoking in a Large Social Network. New England Journal of Medicine 358, 2249 -- 2258 (2008). [21] Fowler, J. & Christakis, N. Dynamic spread of happiness in a large social network: Longitudinal analysis over 20 years in the framingham heart study. British Medical Journal 337, 1 -- 9 (2008). [22] Pugh, S. D. Service with a smile: emotional contagion in the service encounter. The Academy of Management Journal 44, 1018 -- 1027 (2001). [23] Madan, A., Cebrian, M., Lazer, D. & Pentland, A. Social sensing for epidemiolog- ical behavior change. In Proceedings of the 12th ACM international conference on Ubiquitous computing, 291 -- 300 (ACM, 2010). [24] Howes, M. J., Hokanson, J. E. & Loewenstein, D. A. Induction of depressive affect after prolonged exposure to a mildly depressed individual. Journal of Personality and Social Psychology 49, 1110 -- 1113 (1985). [25] Hatfield, E., Cacioppo, J. & Rapson, R. L. Emotional contagion (Cambridge Uni- versity Press, 1994). [26] Barsade, S. G. The Ripple Effect: Emotional Contagion and its Influence on Group Behavior. Administrative Science Quarterly 47, 644 -- 675 (2002). [27] Hill, A., Rand, D., Nowak, M. & Christakis, N. Emotions as infectious diseases in a large social network: the SISa model. Proceedings of Royal Society B: Biological Sciences 277, 3827 -- 3835 (2010). [28] Hill, A. L., Rand, D. G., Nowak, M. A. & Christakis, N. A. Infectious disease modeling of social contagion in networks. PLOS computational biology 6, e1000968 (2010). [29] Shalizi, C. R. & Thomas, A. C. Homophily and contagion are generically confounded in observational social network studies. Sociological Methods & Research 40, 211 -- 239 (2011). 16 [30] Steeg, G. V. & Galstyan, A. Statistical Tests for Contagion in Observational So- cial Network Studies. In Paper presented at International Conference on Artificial Intelligence and Statistics (2013). [31] Aral, S., Muchnik, L. & Sundararajan, A. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences 106, 21544 -- 21549 (2009). [32] Dodds, P. S. & Watts, D. J. A generalized model of social and biological contagion. Journal of Theoretical Biology 232, 587 -- 604 (2005). [33] Friedkin, N. E. The attitude-behavior linkage in behavioral cascades. Social Psy- chology Quarterly 73, 196 -- 213 (2010). [34] Smilkov, D., Hidalgo, C. A. & Kocarev, L. Beyond network structure: How hetero- geneous susceptibility modulates the spread of epidemics. Scientific reports 4, 1 -- 7 (2014). [35] Zelenski, J. M. & Larsen, R. J. The distribution of basic emotions in everyday life: A state and trait perspective from experience sampling data. Journal of Research in Personality 34, 178 -- 197 (2000). [36] Fleeson, W. Moving personality beyond the person-situation debate the challenge and the opportunity of within-person variability. Current Directions in Psychological Science 13, 83 -- 87 (2004). [37] Fleeson, W. & Noftle, E. The end of the person-situation debate: an emerging syn- thesis in the answer to the consistency question. Social and Personality Psychology Compass 2, 1667 -- 1684 (2008). [38] Costa, P. T. & McCrae, R. R. The revised neo personality inventory (neo-pi-r). The SAGE handbook of personality theory and assessment 2, 179 -- 198 (2008). [39] Fleeson, W. Toward a structure- and process-integrated view of personality: traits as density distribution of states. Journal of Personality and Social Psychology 80, 1011 -- 1027 (2001). [40] Friedkin, N. E. & Johnsen, E. C. Social influence network theory: a sociological examination of small group dynamics, vol. 33 (Cambridge University Press, 2011). [41] Watson, D., Clark, L. A. & Tellegen, A. Development and validation of Jour- URL brief measures of positive and negative affect: nal of Personality and Social Psychology 54, http://view.ncbi.nlm.nih.gov/pubmed/3397865. the PANAS scales. 1063 -- 1070 (1988). [42] Chartrand, T. L. & Bargh, J. A. The chameleon effect: The perception -- behavior link and social interaction. Journal of personality and social psychology 76, 893 (1999). 17 [43] Tiedens, L. Z. & Fragale, A. R. Power moves: complementarity in dominant and submissive nonverbal behavior. Journal of personality and social psychology 84, 558 (2003). [44] Pentland, A. The New Science of Building Great Teams. Harvard Business Review 90, 60 -- 70 (2012). [45] Barrick, M. R., Mount, M. K. & Judge, T. A. Personality and Performance at the Beginning of the New Millennium: What Do We Know and Where Do We Go Next? International Journal of Selection and Assessment 9, 9 -- 30 (2001). [46] Ilies, R. & Judge, T. A. Understanding the dynamic relationships among personal- ity, mood, and job satisfaction: A field experience sampling study. Organizational Behavior and Human Decision Processes 89, 1119 -- 1139 (2002). [47] Bell, S. T. Deep-level composition variables as predictors of team performance: a meta-analysis. Journal of Applied Psychology 92, 595 -- 615 (2007). [48] Barsade, S., Brief, A. P. & Spataro, S. E. The affective revolution in organizational behavior: The emergence of a paradigm. Organizational Behavior: The State of the Science 3 -- 52 (2003). [49] Olgu´ın Olgu´ın, D. et al. Sensible organizations: Technology and methodology for automatically measuring organizational behavior. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39, 43 -- 55 (2009). [50] Pentland, A. S. Honest signals (MIT press, 2010). [51] Cattuto, C. et al. Dynamics of person-to-person interactions from distributed rfid sensor networks. PLOS ONE 5 (2010). [52] Salath´e, M. et al. A high-resolution human contact network for infectious disease transmission. Proceedings of the National Academy of Sciences 107, 22020 -- 22025 (2010). [53] Stehl´e, J. et al. High-resolution measurements of face-to-face contact patterns in a primary school. PLOS ONE 6, e23176 (2011). [54] Todd, P. M., Penke, L., Fasolo, B. & Lenton, A. P. Different cognitive processes underlie human mate choices and mate preferences. Proceedings of the National Academy of Sciences 104, 15011 -- 15016 (2007). [55] Csikszentmihalyi, M. & Hunter, J. Happiness in everyday life: The uses of experi- ence sampling. Journal of Happiness Studies 4, 185 -- 199 (2003). [56] Lepri, B. et al. The sociometric badges corpus: A multilevel behavioral dataset for social behavior in complex organizations. In Privacy, Security, Risk and Trust (PASSAT), International Confernece on Social Computing (SocialCom), 623 -- 628 (IEEE, 2012). 18 [57] Banerjee, A., Chandrasekhar, A. G., Duflo, E. & Jackson, M. O. The diffusion of microfinance. Science 341 (2013). [58] Golder, S. A. & Macy, M. W. Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures. Science 333, 1878 -- 1881 (2011). [59] Killingsworth, M. A. & Gilbert, D. T. A wandering mind is an unhappy mind. Science 330, 932 -- 932 (2010). [60] Aral, S. & Walker, D. Identifying influential and susceptible members of social networks. Science 337, 337 -- 341 (2012). [61] Patrick Royston, Karel GM Moons, Douglas G Altman, and Yvonne Vergouwe. Prognosis and prognostic research: developing a prognostic model. Bmj, 338:b604, 2009. [62] Muchnik, L., Aral, S. & Taylor, S. J. Social influence bias: A randomized experi- ment. Science 341, 647 -- 651 (2013). [63] M. Perugini and Blas L. The big five marker scales (bfms) and the italian ab5c taxonomy: Analyses from an emic-etic perspective, 2012. [64] Auke Tellegen and Niels G. Waller. Exploring personality through test construc- tion: Development of the multidimensional personality questionnaire. In Gregory J. Boyle, Gerald Matthews, and Donald H. Saklofske, editors, The SAGE Handbook of Personality Theory and Assessment: Volume 2 -- Personality Measurement and Testing, pages 261 -- 293. SAGE Publications Ltd, 2008. [65] Samuel Gosling, Peter Rentfrow, and William Swann. A very brief measure of the big-five personality domains. Journal of Research in Personality, 37(6):504 -- 528, 2003. [66] David Watson, Lee A Clark, and Auke Tellegen. Development and validation of brief measures of positive and negative affect: the PANAS scales. Journal of personality and social psychology, 54(6):1063, 1988. [67] Wei Pan. Akaike's information criterion in generalized estimating equations. Bio- metrics, 57(1):120 -- 125, 2001. [68] Auke Tellegen. Structures of mood and personality and their relevance to assessing anxiety, with an emphasis on self-report. 1985. [69] David Watson and Lee A Clark. Negative affectivity: the disposition to experience aversive emotional states. Psychological bulletin, 96(3):465, 1984. [70] Brian S. Yandell. Practical data analysis for designed experiments (1997). 19 [71] Tamlin S. Conner and Howard Tennen and William Fleeson and Lisa Feldman Bar- rett Experience sampling methods: A modern idiographic approach to personality research. Social and personality psychology compass, 3, 2009. [72] Mihaly Csikszentmihalyi and Reed Larson Validity and reliability of the experience- sampling method. The journal of nervous and mental disease, 175:9, 1987. 20 Supporting Information Methods Data Collection Through an experiment, the SocioMetric Badges Corpus tracked the activities of 52 participants [56]. The fifty two participants are employees in a research institution in Italy who volunteered to participate in the experiment for six weeks (working days are considered only). They belong to five units whereby all the employees of these units participated in the experiment along with the heads of these units. Their ages range from 23 to 53 with an average of 36. Forty seven participants are men (90.3%) and five are women (9%). Forty four participants are Italian (84%) and eight participants are from other countries (15.3%). Forty-six out of the fifty-three participants were researchers in computer science belonging to four research groups; the remaining six participants were part of the full-time IT support staff. Procedure At the beginning and at the end of the experiment, the participants filled extended sur- veys about: (1) dispositional (stable) personality traits (2) dispositional affective traits. These scores are considered as the dispositional factors of participants in our study. Dur- ing the 6 weeks, participants were asked to fill three experience sampling surveys about transient psychological states (personality and affect) that they have experienced in the last 30 minutes. It is very unlikely that people would have experienced significantly varying affect or personality states during such a short period of time. The surveys were triggered to be sent via email every working day at (11:00 AM, 2:00 PM and 5:00 PM). The participants were given 2.5 hours to fill the surveys. We refer to the first survey as the morning survey, the second survey as midday survey and the third survey as the afternoon survey. Table 5 summarizes the types of surveys used to capture different groups of states and traits. The Big Five Marker Scale (BFMS) is widely used to assess personality scores for extraversion, agreeableness, conscientiousness, emotional stability and creativity [63]. Therefore, BFMS was used in the Sociometric Badge Corpus at the beginning and at the end of the experiment to capture personality traits of participants [56]. Similarly, Mul- tidimensional Personality Questionnaire (MPQ) was utilized to measure dispositional affective scores of participants [64]. On the other hand, experience sampling surveys elicit transient states of personality and affect (emotions) including questions about BIG5 personality scale and fifteen items concerning affective states. Questions in these surveys report participants' states which were experienced in the last 30 minutes. For transient states of personality, the ten-item personality inventory TIPI was used in the experience sampling [65]. For each personality dimension e.g. extraversion, we recoded the reverse-scored items and then we computed the average of the two items (the standard item and the recoded reverse-scored item) 21 that make up each dimension. The short version of Positive and Negative Affect Schedule (PANAS) was used to evaluate the affective states of participants [66]. High positive affect (HPA) was assessed using 3 items: enthusiastic, interested and active. High negative affect (HNA) was assessed using 3 items: sad, bored and sluggish. Low positive affect was assessed using 2 items: calm and relaxed while low negative affect (LNA) was assessed using 2 items lonely and isolated. After we calculate the scores of personality and affective states of each participant in each filled survey, we centered all the scores of personality and affect dynamic states using the median of each state. We generated the quantiles for each state, discretizing the scores of personality and affect dynamic states into three ordered levels (Low, Neutral and High).The three levels were identified on the basis of the 33rd and 66th quantiles of the state scores distribution in such a way that level L (low) consisted of cases between the 0-th and the 33rd quantile; level N (neutral) consisted of cases between the 33rd and the the 66th quantiles, and level H (high) consisted of cases above the latter. Note that the experience sampling method has a long history and is highly reliable in measuring dynamics of psychological states within individuals [71]. For those inter- ested in the caveats around the use of experience sampling, we also point to extensive discussions elsewhere [72]. The participants wore SocioMetric Badges every working day within the institution. These sensors are equipped with accelerometers, audio, Bluetooth and Infrared to re- spectively capture: body movements, prosodic speech features, co-location with other individuals and face-to-face interactions [49]. We harnessed Infrared (IR) transmissions to detect face-to-face interactions between people. In order for a badge to be detected through IR, two of them must have a direct line of sight and the receiving badge's IR must be within the transmitting badge's IR signal cone of height h <= 1 meter and a radius of r <= htanθ, where θ = 15◦ degrees; the infrared transmission rate (TRir) was set to 1Hz. Preprocessing the surveys The data comprises 1,426 surveys by the 52 participants. Ideally, the number of filled surveys should be 4,680 (52 participants × 3 daily surveys × 30 working days). However, participants reported absence from work 536 times [56]. This reduces the number of expected responses to 4,144. We addressed transitions in states, the levels between daily first surveys and second surveys and transitions in states, the levels between the second and the third surveys. Therefore, the number of daily expected transitions is 2. This further reduces the number of records (transitions) by 1,560 (52 participants × 30 days) to reach 2,582 expected records. Also, it has been observed that the majority of participants used to leave the organization before 5PM on Fridays afternoon. This further reduces the number of expected responses. The response rate of filling surveys is 83.9% according to Lepri et al [56] which means that participants skip some surveys despite their availability at work. Unfilling surveys has an impact on the number of transitions. For example, if a participant missed the second daily survey, then two 22 transitions will be missing: transition from first to second survey and transition from second survey. Also, we did not consider the transitions of egos in which the alters have not filled the corresponding surveys. Therefore, we ended up having only 1,426 surveys. Transient states of personality and affect First we centered all the scores of personality and affect dynamic states using the median of each state. Then, we generated the quantiles for each state, discretized the scores of personality and affect dynamic states into three ordered levels (Low, Neutral and High).The three levels were identified on the basis of the 33rd and 66th quantiles of the state scores distribution in such a way that level L (low) consisted of cases between the 0-th and the 33rd quantile; level N (neutral) consisted of cases between the 33rd and the the 66th quantiles, and level H (high) consisted of cases above the latter. We discarded both high negative affect and low positive affect because their distributions are very skewed making it difficult to identify appropriate intervals for each level of these states. Hence, high negative affect and low positive affect were not discussed in the results. Accordingly, the level of each participant in each dynamic state recorded at a given survey is identified to be one of the three above levels. We leveraged those levels to extract the transitions in levels of dynamic states between two consecutive survey in the same day. Also, we used those levels to extract the social-situational factors by categorizing the social ties (other participants) whom the Infrared sensor of a particular participant detected between two consecutive surveys to be one of the three predefined levels. Remarkably, we used the lagged levels of the social ties. For example, the transition in question is taking place between the morning survey (time t) and midday survey (time t + 1) for a particular participant. Therefore, we consider the scores of social ties recorded in the morning survey (time t). The statistics of transitions in each level is provided in Table 4. Transition L → L L → N L → H N → L N → N N → H H → L H → N H → H Extraversion Agreeableness Conscientiousness Emotional Stability Creativity HPA LNA 79 77 35 59 240 99 44 76 115 100 98 25 90 254 51 25 71 110 167 83 21 112 173 47 18 50 153 147 72 10 79 187 57 20 67 185 107 97 14 102 246 60 21 45 132 91 81 18 95 217 65 13 81 163 89 79 13 95 268 46 25 42 167 Transition to Extraversion Agreeableness Conscientiousness Emotional Stability Creativity HPA LNA 25.364 L 52.925 N H 34.451 27.913 54.114 33.226 24.150 51.705 37.730 29.854 48.154 41.653 22.087 52.752 37.275 26.092 58.425 29.712 36.044 46.575 38.502 Table 4: Statistics of transitions between levels of each state: The first sub-table presents the number of cases per transition in each state. The second sub-table presents the percentage of transitions to each target level of each state. 23 Dispositional Traits of Personality and Affect We considered the trait scores that were reported by participants at the beginning of the experiment. Then, we normalized the trait scores of participants using the mean and the standard deviation. To discuss the statistical interaction between traits and social-situational factors associated with a given transition, we focused on only on participants with high scores in the trait (+1 standard deviation) and participants with low scores in the trait (-1 standard deviation). By using this method, we are able to know how levels of traits moderates the association between the social-situational factors and transitions in states. For example, we are interested to know how introverts respond to an increase in the intensity of contacts with others in a certain extraversion level in comparison to extroverts' response to the same increase. One might argue that there might be a systematic difference in how emotive mar- keting and sales people are compared to engineers. However, our control for personality traits would capture these variations. In fact, our control for traits goes significantly beyond broad classifications based on profession, since it captures underlying personality types using a systematic approach founded in well-established dimensions of personality. Group Survey Personality States Affect Ten-Item Personality Inventory (TIPI) Measurement Extraversion Agreeableness Conscientiousness Emotional Stability Traits Creativity Big Five Marker Scale (BFMS) High Positive Affect States High Negative Affect Positive and Negative Affect Schedule (PANAS) Low Positive Affect Traits Multidimentional Personality Questionnaire (MPQ) Low Negative Affect Table 5: Surveys for personality and affect states and traits. Dynamic Social networks We created dynamic temporal networks of face-to-face interaction for each participant . Between each two subsequent surveys a participant filled, we created the participant's temporal social network based on the social ties that the Infrared sensor had detected. We considered only social networks that were formed between morning and midday daily surveys or between midday and afternoon daily surveys. Based on this, we considered the transition in personality and emotional states of egos between these surveys (time t and time t + 1) and compared them to lagged states' levels of alters and traits of egos at time t + 1. To generate our social networks, we exploited the Sociometric Badges Corpus, first introduced by Lepri et al. [56]. We harnessed the experience sampling data and Infrared readings to create the dy- namic social networks for participants. The time boundary of each social network is delineated by the time of subsequent surveys a participant filled. Between the two sur- veys, all face-to-face interactions detected via Infrared sensors are considered to be the 24 social-situational factors for the participant. Particularly, what matters is the level at which each alter was at time t (morning survey if the transition was initiated at the morning survey and midday surveys if the transition was initiated at midday survey). Model and Parameter Estimation Our dataset consists of repeated observations for each participant, so we expected to have correlations within observations of participants. Hence, we used generalized linear models to analyze our longitudinal data using unstructured covariance matrices whereby variances and covariances are estimated directly from the data. Generalized Estimation Equations (GEE) are used to estimate the parameters of our models. For each transition in each state, we used backward elimination that starts with a full model that contains all candidate variables. Then, we tested the effect of deletion of insignificant variables using QICC (Corrected Quasilikelihood under Independence Models Criterion) iteratively until there is no further enhancement in the results. We evaluated the goodness of fit based on QICC which is an indicator of goodness of fit of models that use generalized estimating equations. Therefore, it can be utilized to choose between two models favoring the one with the smaller QICC. After we end up with the best sub-model for each state transition, we compare its QICC to the QICC of the null model thats contains only the intercept. If the best sub-model is better than the null model, then we retain it. Otherwise, we consider the null model. Table 6 compares between the QICC of our best sub-model and the null model for each transition in each state. If the QICC of the null model is better, then we report only the QICC of the null model. In other words, we used QICC to penalize having complex models that might cause overfitting. Therefore, for each transition in each state, we start with having the complete model M odel1 that includes all of the candidate independent variables and calculate the QICC of the model. Then, each time we encounter a statistically insignificant inde- pendent variable, we drop the variable, run the model again without this variable and calculate the QICC of the reduced model M odel2. If the QICC of M odel2 is higher than the QICC of M odel1, we consider the results of Model1 and report them in the paper. If there is any statistically insignificant variable, we drop the variable from the model, run the model again without this variable M odel3 and calculate the QICC of M odel3. Then, we compare QICC of M odel2 and QICC of M odel3. If the QICC of M odel2 is lower, then we report the results of M odel2. Otherwise, we repeat the same process until there is no further reduction in QICC. Although we do not have any statistical test to check whether the decrease in QICC is statistically significant, the significance of the independent variables remain the same during the backward elimination in the majority of the cases. Hence, we believe that using QICC for model selection is capable of supporting the significance of our results. For each possible transition between levels of a particular state, our model consists of: one dependent variable, the transition probability; nine independent variables that capture the corresponding trait score (T ) and the three situational measures concerning contact intensity described above: L, N and H. The model also contains the interaction effects between trait and situational variables, in order to account for the moderating 25 effect of the former on the latter: T ∗ L, T ∗ N and T ∗ H. The level transitions might take place spontaneously due to the time of the day as highlighted by Golder and Macy [58]. Therefore, we added a time period variable that can act as a control variable to capture possible diurnal rhythms P . Particularly, we are interested to study the effect of time of day at time t + 1 for the transition that takes place between time t and time t+1. Therefore, the time period could be either midday or afternoon. Also, we expect to have an interaction between the time of the day and the corresponding trait. Therefore, we added one more control variable P ∗ T . The association between the dependent and the independent variables, including interactions, is modeled through logistic regression as shown in Equation 2. We used logistic regression instead of OLS regression (used by Hill et al [27]) because the value of the dependent variable is binary (0 if there is no transition and 1 otherwise). Let X → Y denotes a transition by the ego from level X to level Y of some state S (we permit X = Y denoting stability). Let p(X → Y ) be the probability of this transition between two consecutive surveys. For a given dynamic personality or affect state S : p(X → Y ) 1 − p(X → Y ln( ) = α+βLL+βN N +βH H+βT T +βT∗LT∗L+βT∗N T∗N +βT∗H T∗H+βP P +βP∗T P∗T (2) where α is a constant (intercept); T , L, N and H are as explained above. βL, βN , βH and βT are the coefficients of the main effects L, N , H and T , respectively. βT∗L, βT∗N and βT∗H are the coefficients of the interaction effects between the trait T and the situational variables L, N and H, respectively. βP is the coefficient of time of the day and βP∗T is the coefficient of the interaction between the corresponding trait and the time of the day. Results First, we discuss some descriptive statistics about network dynamics and potential ho- mophily in the networks of participants. Second, we describe the four social influence processes that we identified in our model. Third, we describe our results in the context of these processes. Descriptive Statistics We provide some descriptive statistics about social network dynamics. Fig. 5 and Fig. 6 show the degree distribution and interaction distribution. In most cases, the dynamic networks of participants vary in terms of the number of alters and the total number of interactions. Also, we quantify the similarity between egos and alters in terms of their state levels. We calculated the ratio between the number of alters in the same level of egos and the total number of alters using the following equation similaritys = ns n where similaritys is the quantified similarity between egos at level s in a given state, ns is the number of alters at level s for a given state and n is the total number of alters. We calculated this ratio 26 for each dynamic network of participants and considered the levels of egos and alters at the same time. Then, we took the average of all calculated ratios. In all cases, we found that the percentage of similar alters does not exceed 50% which means that interaction between people does not necessarily take place based on homophily (Check Table 7). We repeated the same process to quantify the similarity between people with respect to the number of interaction. We calculated the ratio between the number of interactions with alters in the same level of egos and the total number of interactions using the following equation similaritys = is i where similaritys is the quantified similarity between egos at level s in a given state, is is the total interaction with alters at level s for a given state and i is the total number of interactions with alters. Again, we calculated this ratio for each dynamic network of participants and considered the levels of egos and alters at the same time. Then, we took the average of all calculated ratios. Again, we found that the percentage of similar alters does not exceed 50% (Check Table 7). Social Influence Processes In our results, we identified four social influence processes : (1) attraction (2) repulsion (3) inertia (4) push. Attraction and Repulsion Formally, let P (X → Y K) be the probability of transition X → Y conditional on intensity of contacts K with alters in level Z of a state S: Attraction by K on egos in X level iff, for X different from Y , P (X → Y K) is increasing with K and either Z<X and Y < X, or Z > X and Y > X. Repulsion we have repulsion by K on people in X iff, for X different from Y , P (X → Y K) is decreasing with K and either Z < X and Y < X, or Z > X and Y > X. Equivalently, we have repulsion by K on people in X iff, for X different from Y , P (X → Y K) is increasing with K and either Z < X and Y ≥ X or Z > X and Y ≤ X Fig. 7 exemplifies some ways in which attraction and repulsion can manifest. We already gave examples of Case 1 in the main paper. Concerning Case 2, it was observed with agreeableness state and transition (L → N ): the intensity of contacts with alters in the high level is associated with egos scoring high in the trait to upgrade the level from low to neutral. Case 3 is exemplified by transition (H → L) of conscientiousness state. Intensity of contacts with alters in the neutral level is associated with shifting egos who have high trait score to the low level. Case 4 is exemplified by transition (N → N ) of conscientiousness. Intensity of contacts with alters in the low level is associated with increased probabilities of that stability of egos with high scores in the trait. All detailed examples are provided in the supporting information. 27 Inertia and Push Formally, let P(X → Y K) be the probability of transition X → Y conditional to contacts with people K in level X of a state S: Inertia : K is inertial for people in level X iff P (X → XK) increases with K. Equiv- alently, X is inertial iff, for X different from Y , P (X → Y K) decreases with K. Push : K pushes away egos in level X iff, for X different from Y , P (X → Y X) increase with K. Equivalently, K pushes away alters in level X iff P (X → XK) decreases with K. Fig. 8 depicts the inertia and push influences triggered by intensity contacts with alters in egos' initial levels. Control Variables We believe that there might be diurnal rhythms in the between-subject correlations observed in our data [58]. Hence, transitions between levels of states can be attributed to the day of the week or the time of the day and not only attributed to social-situational factors and dispositional traits. To test for the existence of diurnal rhythm, we ran an ANOVA to check if the average level of each personality and affect measure changes systematically across days of the week or times of the day. Then, we controlled for the statistically significant diurnal rhythms by running regressions which controls for those rhythms. Analysis of variance (ANOVA) is used to analyze the differences between group In our case, the groups contain either the days of the week or the times of means. the day (morning, midday and afternoon). In the case of week days, we found that there are no statistically significant differences of affect and personality states between weekdays except for creativity (p-value 0.00006). We took one more step to pairwise compare means of affect and personality states using Tukey's test [70]. Tukey HSD is a statistical test that is used with an ANOVA to do pairwise comparisons between the means of different treatments. In our case, we have seven weekdays and thus we have 10 pairwise comparisons. We found that people tend to be more creative at the end of the week than the beginning of the week: (1) Monday-Friday (diff: -0.23, p-value: 0.003) (2) Thursday-Friday (diff: 0.27, p-value: 0.0001). Also, there is a difference in the mean of creativity between Wednesday and Thursday (diff: -0.19, p-value: 0.018). If we were addressing transitions in creativity states between days, then controlling for the day of the week would be essential. However, we address transitions between times of the day. Therefore, the days of the week are not suitable to be used as control variables in our model. When we ran the ANOVA test to investigate whether the means of personality and affect states changes systematically across times of the day, we found that those dif- ferences are statistically significant for most of the states. Therefore, we ran Tukey's 28 test to check for pairwise comparisons across different times of the day. With respect to extraversion, people are less extrovert on average at the end of the day in comparison to their extraversion state's mean score at the beginning of the day (diff: -0.136, p-value: 0.029) or at midday (diff: -0.2, p-value: 0.0003). With respect to agreeableness, people got less agreeable on average in comparison to their mean score at the beginning of the day (-0.113, p-value: 0.023). With respect to conscientiousness, people got less consci- entious on average at midday in comparison to their mean score at the beginning of the day (diff: -0.2, p-value: 0.0000006) and they are less conscientious on average at the end of the day in comparison to their score at the beginning of the day (diff: -0.118, p-value: 0.016). However, people are more conscientious on average at the end of the day in com- parison to their mean score at midday. With respect to emotional stability, people are less emotionally stable on average at the end of the day in comparison to midday (diff: -0.117, p-value: 0.033) and beginning of the day (diff: -0.14, p-value: 0.0078). Creativity on average doesn't change according to the time period. With respect to high positive affect state, people's mean score is lower at midday in comparison to the beginning of the day (-0.177, p-value = 0). Also, their mean score in HPA is lower at the end of the day in comparison to the beginning of the day. However, people's mean score at the end of the day is higher at the end of the day than the mean score at midday (diff: 0.088, p-value). With respect to low negative affect state, people's mean score is lower at the end of the day in comparison to their mean score at midday (diff: -0.099, p-value: 0.018) and the mean score at the beginning of the day (diff: -0.095, p-value: 0.0245). In our model, we address the transitions in states' level from mornings to middays and from middays to afternoons. Thus, we are interested in the mean differences in states in those two types of transitions. 29 Figure 4: The composite social network of participants. The aggregate social network is plotted showing the social ties among participants where the nodes are the participants and the edges are the IR hits detected between each pair of participants. The size of the nodes indicates their degree while the thickness of the edges is propor- tional number of total number of IR hits between a pair of participants. Remarks: We considered only IR hits that are in total more than 10 to create the social ties between participants. 30 llllllllllllllllllllllllllllllllllllllllllllllllllllll Extraversion Agreeableness Conscientiousness 258.823 Transition Our Model Null Model 261.053 260.987 194.776 348.420 540.690 460.236 239.164 303.378 329.069 L to L L to N L to H N to L N to N N to H H to L H to N H to H 193.796 346.415 536.751 321.325 231.949 302.3 303 167.87 Transition Our Model Null Model 309.7 308.9 171.7 435.9 520.5 316.1 171.5 270.8 290.359 L to L L to N L to H N to L N to N N to H H to L H to N H to H 262.045 271.5 519.7 314.4 Transition Our Model Null Model 367.347 340.500 167.498 430.617 463.190 286.849 142.188 247.471 281.446 355.184 336.434 156.765 420.844 455.696 273.47 140.832 236.687 263.305 L to L L to N L to H N to L N to N N to H H to L H to N H to H Emotional Stability Creativity High Positive Affect (HPA) 111.789 299.310 Transition Our Model Null Model 304.301 302.174 126.067 463.480 551.166 356.400 153.455 226.689 270.706 L to L L to N L to H N to L N to N N to H H to L H to N H to H 205.969 251.582 348.1 400.737 Transition Our Model Null Model 406.689 310.175 306.805 206.045 176.941 203.480 374.595 316.248 481.045 L to L L to N L to H N to L N to N N to H H to L H to N H to H 294.914 196.9 175.454 355.656 307.305 443.738 Transition Our Model Null Model 305.981 293.489 101.587 367.961 442.637 310.707 163.776 315.597 354.350 L to L L to N L to H N to L N to N N to H H to L H to N H to H 91.054 359.896 434.818 305.636 161.530 Low Negative Affect (LNA) 251.309 Transition Our Model Null Model 252.927 250.422 111.148 452.999 531.894 308.433 184.558 242.474 302.914 L to L L to N L to H N to L N to N N to H H to L H to N H to H 107.607 449.815 529.541 302.882 169.170 232.818 263.323 Table 6: Comparison of Goodness of Fit: We compare between the QICC of our best sub-model and the QICC of the null model of each transition in each state. Only the QICC of the null model is reported if it is less (better) than the QICC of the sub-model. 31 Figure 5: The Degree Distribution for each Participant Each box plot shows the variation in the number of alters in dynamic networks of participants. We can observe that there is a variation in the number of alters in the dynamic networks of participants. 32 Figure 6: The Interaction Distribution for each Participant Each box plot shows the variation in the total number of interactions (IR hits) in dynamic networks of par- ticipants. We can observe that there is a variation in the number of interactions in the dynamic networks of participants. Figure 7: Attraction and Repulsion. Case 1-3 exemplify different ways which attraction can manifest. In Case 1, the presence of alters in level Z is associated with ego's switching to that level. In Case 2, the ego moves to level Y which is though lower than that of the attracting alters but higher than his/her original level. In Case 3, the ego moves to a level that is higher of both his/her original one and that of the attracting alters. Case 4 exemplifies repulsion: the presence of alters in a lower level is associated with the ego remaining at his/her current state or moving to a higher level. Attraction to lower levels works in the same way. 33 Ego in XAlters in ZType 1Attraction (+)Level XLevel Y = Level ZEgo in XAlters in ZType 2Attraction (+)Level XLevel YLevel ZEgo in XAlters in YType 3Attraction (+)Level YLevel XLevel ZEgo in XAlters in ZLevel XLevel ZRepulsion (+)Type 4Level YRepulsion (+) State Number of Alters Total Interaction 0.38 0.41 0.38 0.4 0.39 0.388 0.35 0.41 0.37 0.335 0.42 0.29 0.28 0.49 0.28 0.34 0.44 0.3 0.266 0.199 0.49 Mean Standard Deviation Mean Standard Deviation Extroversion 0.4 Low 0.366 Neutral High 0.45 Conscientiousness Mean Standard Deviation Mean Standard Deviation Low 0.43 0.45 Neutral High 0.417 Mean Standard Deviation Mean Standard Deviation Agreeableness Low 0.41 0.45 Neutral High 0.422 Emotional Stability Mean Standard Deviation Mean Standard Deviation 0.44 Low 0.44 Neutral High 0.44 Mean Standard Deviation Mean Standard Deviation Creativity 0.42 Low 0.45 Neutral High 0.445 Mean Standard Deviation Mean Standard Deviation High PA (HPA) 0.44 Low 0.39 Neutral High 0.45 Mean Standard Deviation Mean Standard Deviation Low NA (LNA) 0.4 Low 0.45 Neutral High 0.44 0.387 0.22 0.5 0.39 0.39 0.4 0.38 0.4 0.4 0.31 0.45 0.29 0.36 0.43 0.38 0.38 0.21 0.5 0.27 0.48 0.4 0.29 0.45 0.27 0.35 0.43 0.39 0.4 0.36 0.42 0.37 0.4 0.39 0.3 0.54 0.346 0.31 0.55 0.344 0.25 0.51 0.43 Table 7: Quantifying similarity between people according to their states. We quantified the similarity between egos and alters in terms of their state levels. We calculated the ratio between the number of alters in the same level of egos and the total number of alters. Then, we took the mean and the standard deviation of those quantities. Also, we calculated the ratio between the total number of interactions with alters in the same level of egos and the total number of interactions. Then, we took the mean and the standard deviation of those quantities. In both cases, the similarity does not exceed 50%. 34 Figure 8: Inertia and Push: Alters are inertial for egos to move away from the alters' levels by either lowering the transition probability to another level or increasing the probability of staying at the alter's level. Vice versa for the push affect Figure 9: Social Influences: The table summarizes each state's results by means of the two adverse effects introduced in the text: adaptation (A) and complementarity (C). Also, the detailed effects are listed between the brackets: (1) attraction (T) (2) repulsion (R) (3) inertia (I) and (4) push (P). Rows represent ego's state levels; columns are labeled with alters' levels and sub-labeled with ego's trait level (Low or High). Cells report the effects observed when egos in the corresponding state level and trait level interact with alters in the corresponding state level. 35 Ego in XAlters in XLevel XInertia (+) Level YPush (+)C(P)dddLNHA(I)A(I)C(R)A(T)C(R)C(R)A(T)C(R)A(T)C(R)A(T)C(R)A(I)C(P)Extrav.dddLNHA(I)A(I)A(I)C(R)C(R)A(T)A(I)A(T)C(R)A(T)C(R)A(I)C(P)LowNeutralHighLowNeutralHighAgr.dddLNHC(R)C(R)C(R)C(R)C(P)A(I)LowNeutralHighESdddLNHA(I)A(I)C(R)C(R)A(T)A(T)C(P)A(I)A(I)A(I)LowNeutralHighCreat.dddLNHC(P)A(I)C(P)A(I)C(R)C(R)C(R)A(T)C(P)A(I)LowNeutralHighHPAdddLNHA(I)A(I)C(R)C(R)A(T)C(R)A(T)A(T)C(R)A(T)C(R)A(T)LowNeutralHighLNALegendIntensity of contacts with alters in the low level of the stateIntensity of contacts with alters in the neutral level of the stateIntensity of contacts with alters in the high level of the stateEgos scoring low in the trait Egos scoring high in the traitdddLNHA(I)A(I)C(R)C(R)A(T)A(T)C(R)C(R)A(T)A(T)C(R)C(R)A(I)A(I)LowNeutralHighConsc. Figure 10: Level transition graph for extraversion state: Nodes represent extraversion level of the ego. An arrow between two circles represents the transition from one level to another. These transitions are labeled with conditions that affect the correspond- ing probabilities. Icons represent the extraversion levels of alters and ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition prob- ability associated with the given combination of alters state level and ego trait level. For example, if the ego is in the low level of the extraversion state, then the probability of him/her transitioning to the high level decreases with his/her interactions with alters in the high level. 36 Neutral Level of StateHigh Level of StateLow Level of StateExtraversion= ↓= ↓= ↓= ↑= ↓= ↓= ↑= ↑= ↓= ↑= ↑= ↓= ↑= ↓ Figure 11: Level transition graph for conscientiousness state: Nodes represent consci- entiousness level of the ego. An arrow between two circles represents the transition from one level to another. These transitions are labeled with conditions that affect the corresponding probabilities. Icons represent the conscientiousness levels of alters and ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition probability associated with the given combination of alters state level and ego trait level. For example, if the ego is in the low level of the conscientiousness state, then the probability of him/her interactions with alters in the high level. 37 Neutral Level of StateHigh Level of StateLow Level of StateConscientiousness= ↓= ↑= ↑= ↓= ↓= ↓= ↓= ↓= ↑= ↑= ↓= ↓= ↑= ↑= ↓= ↑= ↓= ↑ We added the time of day as a diurnal control variable in our model besides the social-situational factors and dispositional traits to capture between-subject effect. We are interested to know the effect of the time period to which the transition takes place: midday (second surveys) in case of transitions from mornings to middays and the after- noon and afternoons (third surveys) in case of transitions from middays to afternoons. We represent the time of day as a dummy variable: 0 for middays (reference group) and 1 for afternoons. First, we present the effects of time of the day and the interaction between time of the day and the corresponding trait. The coefficients of time of the day and the interactions are reported in tables 8, 9, 3, 10, 11, 12 and 13. Variable Intercept N*T L to L Coefficient P-value -0.363 0.0016 0.0011 -0.002 Variable Intercept N H*T (Period=1) N to L Coefficient P-value 0.0000 -1.508 0.0155 0.0009 0.003 0.0100 0.0258 0.352 Variable Intercept (period=1) T H*T period*T H to L Coefficient P-value 0.0000 -1.503 0.0000 0.792 -0.466 0.0042 0.0008 0.005 0.487 0.0112 L to N L to H Variable Coefficient P-value Variable Coefficient P-value Intercept 0.0000 0.0000 0.0016 -0.758 H -0.005 L -0.005 Intercept 0.0382 -0.218 N to N N to H Variable Coefficient P-value Variable Coefficient P-value Intercept 0.0000 Intercept -0.720 0.177 T -0.284 H*T -0.0009 L*T 0.002 period*T 0.239 0.0193 0.0382 0.0015 0.0034 0.0065 H to N H to H Variable Coefficient P-value Variable Coefficient P-value 0.0001 Intercept 0.0006 H* T -0.007 N*T 0.004 0.0002 -0.415 Table 8: Extraversion Results 38 Figure 12: Level transition graph for agreeableness state: Nodes represent agreeableness level of the ego. An arrow between two circles represents the transition from one level to another. These transitions are labeled with conditions that affect the correspond- ing probabilities. Icons represent the agreeableness levels of alters and ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition prob- ability associated with the given combination of alters state level and ego trait level. For example, if the ego is in the low level of the agreeableness state, then the probability of him/her transitioning to the high level decreases with his/her interactions with alters in the high level. 39 Neutral Level of StateHigh Level of StateLow Level of StateAgreeableness= ↑= ↓= ↓= ↓= ↓= ↑= ↓= ↑= ↑= ↓= ↓= ↓= ↓= ↓= ↓= ↑= ↑= ↓= ↑= ↓= ↑= ↑= ↑= ↑= ↑ Figure 13: Level transition graph for emotional stability state: Nodes represent emo- tional stability level of the ego. An arrow between two circles represents the transition from one level to another. These transitions are labeled with conditions that affect the corresponding probabilities. Icons represent the emotional stability level of alters and ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition probability associated with the given combination of alters state level and ego trait level. For example, if the ego is in the low level of the emotional stability states, then the probability of him/her transitioning to the high level decreases with his/her interactions with alters in the high level. 40 Neutral Level of StateHigh Level of StateLow Level of StateEmotional Stability= ↓= ↑= ↑= ↓= ↓= ↓= ↑ Figure 14: Level transition graph for high positive affect state: Nodes represent high positive affect level of the ego. An arrow between two circles represents the transition from one level to another. These transitions are labeled with conditions that affect the corresponding probabilities. Icons represent the high positive affect levels of alters and ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition probability associated with the given combination of alters state level and ego trait level. For example, if the ego is in the low level of the high positive affect state, then the probability of him/her transitioning to the high level decreases with his/her interactions with alters in the high level. 41 Neutral Level of stateHigh Level of StateLow Level of StateHigh Positive Affectivity (HPA)= ↓= ↓= ↑= ↓= ↑= ↑= ↓= ↓= ↑= ↑= ↓= ↑= ↑= ↓= ↑= ↓= ↑= ↓= ↑= ↓ Figure 15: Level transition graph for low negative affect state: Nodes represent low negative affect level of the ego. An arrow between two circles represents the transition from one level to another. These transitions are labeled with conditions that affect the corresponding probabilities. Icons represent the low negative affect level of alters and ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition probability associated with the given combination of alters state level and ego trait level. For example, if the ego is in the low level of the low negative affect states, then the probability of him/her transitioning to the high level decreases with his/her interactions with alters in the high level. 42 Neutral Level of StateHigh Level of StateLow Level of State Low Negative Affectivity (LNA)= ↓= ↑= ↓= ↓= ↓= ↓= ↑= ↓= ↑= ↓= ↑ L to L L to N L to H Variable Coefficient P-value Variable Intercept H*T -0.350 -0.007 0.003 0.001 H*T 0.004 Coefficient P-value Variable Coefficient P-value 0.0000 0.007 0.0000 0.0014 0.0020 0.0000 Intercept L N H N*T -1.033 -0.009 -0.007 -0.002 -0.011 N to L N to N N to H 0.854 Coefficient P-value Variable Coefficient P-value Variable Coefficient P-value Variable 0.365 Intercept Intercept N*T 0.002 (period=1) * T 0.205 (period=0) * T -0.170 0.0000 0.0187 0.0149 0.0841 Intercept N*T -1.472 -0.003 0.000 0.015 0.0000 H to L H to N H to H -1.177 0.0000 Variable Coefficient P-value Variable Intercept Intercept H L*T N*T H*T Coefficient P-value Variable Coefficient P-value -0.282 -0.004 -0.003 -0.005 0.009 0.053 0.055 0.000 0.002 0.001 N L*T N*T H* T -.004 .005 .008 -.004 .004 .000 .000 .001 Table 9: Agreeableness Results 43 Variable Intercept L to L L to N L to H 0.0252 Intercept Coefficient P-value Coefficient P-value Variable Coefficient P-value Variable 0.0000 -2.451 Intercept 0.273 -0.005 0.0208 N 0.0079 1.102 T 0.0097 T*N -0.006 (period=1) * T -3.001 0.0000 0.0001 -0.428 N to L N to N N to H Coefficient P-value Variable Coefficient P-value Variable Variable Intercept -1.005 Intercept 0.548 H (period=1) -0.002 H*T L T 0.271 (period=1) * T -0.907 0.000 0.002 0.000 0.056 0.002 0.001 0.005 0.379 -0.007 0.008 0.000 0.001 0.000 L H T H*T H to L H to N Coefficient P-value Variable Coefficient P-value Variable Variable -1.398 Intercept Intercept -0.503 (period=1) -0.014 H H*T -0.018 (period=1) *T -0.771 (period=0) *T 0.035 0.000 0.006 0.034 0.021 0.014 0.890 Intercept -0.690 0.000 Coefficient P-value -1.001 -0.012 0.011 0.000 0.002 0.002 H to H Coefficient P-value 0.325 0.044 Table 10: Emotional Stability Results 44 L to L Variable Coefficient P-value Variable H Intercept 0.0009 -0.010 N to L Variable Coefficient P-value Variable Intercept Intercept 0.0000 -0.916 H to L Variable Coefficient P-value Variable Intercept 0.0000 -1.268 H T H*T (period=1) 0.1284 L to H L to N Coefficient P-value Variable Coefficient P-value Intercept -0.115 0.0001 -1.125 L -0.0432 0.0013 N 0.0001 -0.009 T 0.0000 1.910 L*T 0.0019 -0.022 0.0001 N*T -0.0067 H*T -0.027 0.0000 0.0025 (period=1) * T -1.085 N to N Coefficient P-value Variable Intercept 0.318 (period=1) T N*T 0.0000 N to H Coefficient P-value 0.0000 -1.53 0.009 0.466 0.0000 0.689 -0.002 0.003 H to N Coefficient P-value Variable -0.026 -0.728 0.013 -0.660 0.0000 0.0000 0.0035 0.0015 T H to H Coefficient P-value 0.0012 0.533 Table 11: Creativity Results 45 P-value 0.0000 0.0015 0.0000 0.0005 P-value 0.006 P-value 0.0016 0.0484 0.0002 0.0019 0.0014 L to L L to N L to H Variable Coefficient P-value Variable T Intercept L*T 0.0002 0.0256 -0.424 0.0013 Coefficient P-value Variable Coefficient -0.928 0.0000 Intercept T L*T period -1.027 0.4947 -0.002 0.511 N to L N to N N to H Coefficient P-value Variable Coefficient Variable Coefficient P-value Variable -0.73 Intercept Intercept -0.005 H N N*T N 0.0196 (period=1) *T -0.356 N*T (period=0)*T 0.015 0 0.0486 0.0704 0.0198 0.9122 -0.439 0.002 0.007 -0.015 0.001 0.037 0.00 0.05 Intercept -0.34 H to L H to N H to H Variable Coefficient P-value Variable Intercept Intercept H L T T L*T L*T H*T 0.0000 0.0306 0.0359 0.0451 0.002 -1.134 0.0011 -0.440 0.002 -0.006 Coefficient P-value Variable Coefficient -1.180 -0.0042 -0.448 0.002 0.0000 0.0016 0.0080 0.0249 0.416 -0.0013 0.594 -0.003 0.003387911 Intercept L T L*T H*T Table 12: High Positive Affect (HPA) Results 46 L to L L to N Variable Coefficient P-value Variable H*T Intercept 0.0215 0.003 Coefficient P-value Variable -0.157 Intercept L N 0.1354 N to L N to N Variable Coefficient P-value Variable Intercept Intercept N N*T period (period=1) *T 0.248 (period=0) *T -0.267 0.0000 0.0481 0.0000 -1.156 0.001 0.615 Coefficient P-value Variable Intercept 0.440 L 0.0005 N 0.0000 0.0602 0.0265 0.0567 H to L H to N Variable Coefficient P-value Variable Intercept Intercept T L N*T T L*T period 0.0000 0.0490 0.0072 0.0004 -1.193 -0.002 -0.594 0.004 Coefficient P-value Variable -0.876 -0.403 0.002 0.403 (period=1) (period=0) T L*T 0.0000 0.0018 0.0601 0.0011 L to H Coefficient P-value -1.151 0.0000 0.0059 -0.003 -0.017 0.0000 N to H Coefficient P-value 0.0000 -1.317 0.0034 -0.009 -0.0007 0.0305 H to H Coefficient P-value 0.9501 0.011 0.0587 0.321 0.0000 0.708 -0.003 0.0228 Table 13: Low Negative Affect (LNA) Results Effect of Time of Day Extraversion The spontaneous transition (N → L and H → L) during the afternoon (transition from midday to afternoon) increases with respect to midday (transition from morning to midday). This is consistent with the post hoc comparisons of ANOVA that are reported earlier in this section. That is, the spontaneous tendency is for people who behaved more extravertedly at middays to behave introvertedly in afternoons. Conscientiousness During the afternoon, people tend to move from the low level of conscientiousness state to reach the high level (L → H). Also during the afternoon, the spontaneous transitions (N → H) increases with respect to midday. Quite generally, people who behaved low or neutral in conscientiousness in midday tend to behave in a highly conscientious way in the afternoon. Emotional Stability During the afternoon, the spontaneous transition (N → L) increases with respect to midday. However, the spontaneous transition (H → L) decreases with respect to midday. Therefore, during the afternoon, emotional stability level tend to decrease by only one level (N → L). Creativity During the afternoon, people tend to move from the neutral level to the high level (N → H) with respect to midday. On the other hand, during the afternoon, the spontaneous transition (H → N) decreases with respect to midday. 47 Figure 16: Level transition graph for creativity state: Nodes represent creativity level of the ego. An arrow between two circles represents the transition from one level to another. These transitions are labeled with conditions that affect the corresponding probabilities. Icons represent the creativity levels of alters and ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition probability associated with the given combination of alters state level and ego trait level. For example, if the ego is in the low level of the creativity state, then the probability of him/her transitioning to the high level decreases with his/her interactions with alters in the high level. 48 Neutral Level of StateHigh Level of StateLow Level of StateCreativity= ↓= ↑= ↓= ↓= ↓= ↑= ↓= ↓ High Positive Affect During the afternoon, people move from the low level to the high level (L → H) with respect to midday. This is consistent with ANOVA results that were reported earlier for HPA. Low Negative Affect During the afternoon, spontaneous transitions (N → L) and (H → N) increases with respect to midday. 0.0.1 Interaction between Time of Day and Trait We have anticipated that there would be an interaction between the corresponding trait and the time of the day. Therefore, we added the interaction as an additional control variable in our model. With respect to extraversion, the baseline probablity of (N → N ) stability for ex- troverts (according to trait level) increases from midday to the afternoon. However, the baseline probability of the same stability for introverts decreases during the same period. The probability of spontaneous (H → L) tranisition increases for all egos from midday to the afternoon and more markedly so for extroverts. With respect to agreeableness, the baseline probablity of (N → N ) stability for people with high score in agreeableness trait decreases from midday to the afternoon. However, the baseline probability of the same stability for people with low scores in agreeableness trait increases during the same period. With respect to emotional stability, the baseline probablity of (L → H) transition for people with high score in emotional stability trait decreases from midday to the afternoon. However, the baseline probability of the same transition for people with low scores in emotional stability trait increases during the same period. The basline probability of (N → L) transitions importantly increase from midday to afteroon for neurotic people (according to trait) and decrease for emotionally stable ones. Putting this together with the former, it seems that emotionally stable people are indeed more stable because they have a strong tendency to maintain their level they had in the morning. The spontaneous transition (H → L) for emotionally stable people (according to the trait score) decreases. This confirms that emotionally stable people (according to trait) have decreasing probability of moving from where they are from midday to the afternoon while neurotic people tend to change their level more often. With respect to creativity, the spontaneous (L → H) transition decreases in the afternoon for highly creative people (according to their trait). The opposite holds for people with low scores in the creativity trait. With respect to high positive affect state, the probability of spontaneous (N → N ) stability increases for people who have low scores in the trait in the afternoon and decreases for people who have high scores in the trait. With respect to low negative affect state, the probability of spontaneous (N → N ) stability ncreases for people who have high scores in the trait in the afternoon and decreases for people who have low scores in the trait. Second, we present our results of social influences in an increasing order according to provided details. First, we present the social influences of interaction between the 49 social-situational factors and the dispositional factor. Second, we present the results from which we derive the social influences by reporting the direction of impact of each interaction between the two aforementioned factors: either increasing or decreasing the probability of the transition between each two levels of the state. Third, we present the coefficients of main effects and the interaction effects as a result of running our logistic regression model. State-Specific Patterns In Fig. 9, we demonstrate the role that social-situational factors (intensity of contacts with alters in a certain level) played with respect to the dispositional factor (trait's level of the ego) towards the transitions between levels of the state in question. Extraversion: • Generally, alters acting introvertedly (according to state level) attract egos to stay or move towards their level except the egos who are already in the neutral state level and have high scores in the trait. • Alters in the neutral level urge egos to act according to their traits. • Surprisingly, alters in the high level of the state mostly attract egos with low trait scores to stay in the high level or move towards the alters' level whereas those alters repulse egos with high trait scores. Agreeableness: • Generally, alters in the low level of the state encourage egos to be less agreeable except for egos who are agreeable by nature (trait) and already in the high level. • Alters in the neutral level urge egos with high trait scores to stay at their transient states while they mostly have an inconsistent role in case of egos with low trait scores. • Alters in the high level play a balancing role. They encourage egos with low trait scores to stay at their level but they repulse those egos if they are in the low level. Inversely, they push egos with high trait scores who are in their level but they attract those egos if they are in the low level of the state. Conscientiousness: • Alters in the low level of the state attract egos to stay in the low level or switch to lower levels if those egos are already not conscientious by nature. Nevertheless, the alters cannot drag conscientious egos by nature towards their level unless the egos are already in the low level. 50 • Alters in the neutral level repulse egos to stay in their transient levels. • Alters in the high level help egos to stay in the high level or move to their level except egos who are in the neutral level and have low trait scores. Emotional Stability: • Alters in the low level repulse egos who are in the neutral level. • Alters in the neutral level of the state repulse egos, if those egos are in the low level of the state and have high scores in the trait. • Mostly, alters in the high level repulse egos with low trait scores and enocurage egos to stay at the high level if the egos already have high trait scores. Creativity: • Alters in the low level mostly encourage egos to stay at their level. • Alters in the neutral level mostly repulse egos away from their level except the egos who are in their level and have high trait scores. • Alters in the high level mostly encourage egos to stay or move towards their level regardless of egos' traits. High Positive affect (HPA): • Surprisingly, alters in the low level push egos with low trait scores away from their level and attract egos with high scores in the trait to stay or move towards the low level. • Alters in the neutral level push egos with low trait scores away from their level and encourage egos with high trait scores to stay at the neutral level • Alters in the high level push egos with low trait scores away from the high level and attract egos with high trait scores to stay at the high level of the state. Low Negative affect (LNA): • Mostly, alters in the low level attract egos to stay or move to their level except the egos who are in the high state level and have low trait scores • Alters in the neutral level mostly repulse egos away from their level. • Surprisingly, alters in the high level attract egos with low trait scores and repulse egos with high trait scores. 51 State Diagrams of Dynamic States In order to derive the social influences depicted in Fig. 9, we observed the individual effects of the interaction between social-situational factors (intensity of contacts with alters in each level) and the dispositional factor (trait level of the ego) for each transition in the state in question as illustrated in Fig. 10, Fig. 12, Fig. 11, Fig. 13, Fig. 16, Fig. 14 and Fig. 15. In the figures, we labeled each arrow between each pair of levels of the state according to the direction of the effect of the mentioned factors (increasing (↑) or decreasing the probability of transition (↓)) We reported only the effects of factors that have statistically significant results in a given transition. Those effects could be: (1) the marginal effects of intensity of contacts with alters in a certain level of the state (e.g. intensity of contacts with alters in the high level) (2) the interaction between social- situational and dispositional factors e.g. the interaction between intensity of contacts with alters in the high level and the trait's high level of the ego. Extraversion L → L The intensity of contacts with alters in the neutral level is associated with an increase in the probability that the ego will stay at the low level (L → L), in case the ego has a low score in the extraversion trait. The intensity of contacts with the same alters turns to be associated with a decrease in the probability of (L → L), if the ego has a high score in the corresponding trait. This manifests the interaction effect of the ego's trait level and the state's levels of alters with whom the ego get in touch with. L → H The intensity of contacts with alters in low and high levels of the state is associated with a decrease in the probability of this transition. N → L The intensity of contacts with alters in the high level is associated with a decrease in the probability of (N → L), if the ego has a low score in the trait. The intensity of contacts with the same alters is associated with an increase in the probability of the same transition, if the ego has a high score in the trait. N → N The intensity of contacts with alters in the low level is associated with an increase in the probability of stability in the neutral level (N → N ) if the ego has a high score in the trait. However, the same intensity is associated with a decrease in the probability of (N → N ), if the ego has a low score in the trait. H → L The intensity of contacts with alters in the high level is associated with a decrease in the probability of the transition, if the ego has a low score in the trait. The intensity of contacts with alters in the high level is associated with an increase in the probability of the transition, if the ego has a high score in the trait. 52 H → H The intensity of contacts with alters in the neutral level is associated with a decrease in the probability of the stability, if the ego has a low score in the trait. However, the intensity of contacts with the same alters becomes associated with an increase in the probability of the stability, if the ego has a high score in the trait. The intensity of contacts with alters in the high level is associated with an increase in the probability of the stability, if the ego has a low score in the trait. However, the intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of the stability, if the ego has a high score in the trait. Agreeableness L → L The intensity of contacts with alters in the high level is associated with an increase in the probability of the stability, if the ego has a low score in the trait. However, the intensity of contacts with alters in the high level is associated with a decrease in the probability of the stability, if the ego has a high score in the trait. L → N The intensity of contacts with alters in the high level of the state is associated with an increase in the probability of the transition, if the ego has a high score in the trait. However, the intensity of contacts with the same alters is associated with a decrease in the probability of the transition, if the ego has a low score in the trait. L → H The intensity of contacts with alters in low or high levels of the state is associated with a decrease in the probability of the transition. Also, the intensity of contacts with alters in the neutral level of the state is associated with a decrease in the probability of the transition, if the ego has a high score in the trait. However, the intensity of contacts with alters in the neutral level is associated with an increase in the probability of transition of egos with low trait scores N → N The intensity of contacts with alters in the neutral level of the state is asso- ciated with a decrease in the probability of the stability, if the ego has a low score in the trait. If the ego has a high score in the trait, then the intensity of contacts with the same alters becomes associated with an increase in the probability of stability. N → H The intensity of contacts with alters in the neutral level of the state is associ- ated with an increase in the probability of the transition, if the ego has a low score in the trait. However, the intensity of contacts with the same alters is associated with a decrease in the transition, if the ego has a high score in the trait. H → N The intensity of contacts with alters in low and neutral levels of the state is associated with an increase in the probability of the transition, if the ego has a low score in the trait. However, the intensity of contacts with the same alters is associated with a decrease in the probability of the transition, if the ego has a high score in the trait. The intensity of contacts with alters in the high level of the state is associated with 53 an decrease in the probability of the transition, if the ego has a low score in the trait. However, the intensity of contacts with the same alters is associated with an increase in the transition of egos with high trait scores. H → H The intensity of contacts with alters in low and neutral levels of the state is associated with a decrease in the probability of the stability of egos with low scores in the trait, whereas the intensity of contacts with the alters is associated with an increase in the probability of the stability of egos with high scores in the trait. The intensity of contacts with alters in the high level of the state is associated with an increase in the probability of the stability of egos with low scores in the trait, whereas the intensity is associated with a decrease in the probability of the stability of egos with high scores in the trait. Conscientiousness L → L The intensity of contacts with alters in the neutral level is associated with an increase in the probability of staying at the low level. Also, the intensity of contacts with alters in the low level is associated with an increase in the probability of stability of egos with high trait scores. The intensity of contacts with alters in the high level is associated with a decrease in the probability of stability of egos with high trait scores. L → N The intensity of contacts with alters in the neutral level is associated with a decrease in the probability of the transition. L → H The intensity of contacts with alters in the neutral level is associated with a decrease in the probability of the transition of egos with high trait scores. Also, the intensity of contacts with alters in the low level is associated with a decrease in the probability of the transition of all egos. N → L The intensity of contacts with alters in the low level is associated with a decrease in the probability of the transition of egos with high trait scores. However, the intensity of contacts with the same alters becomes associated with an increase in the probability of the transition of egos with low trait scores. The intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of the transition of egos with high trait scores. However, the intensity of contacts with the same alters becomes associated with an increase in the probability of the transition of egos with low trait scores. N → N The intensity of contacts with alters in low and high levels of the state is associated with a decrease in the probability of the stability of egos with low traits scores.The intensity of contacts with the same alters is associated with an increase in the probability of the stability of egos with high trait scores. 54 H → L The intensity of contacts with alters in the high level is associated with a decrease in the probability of the transition. The intensity of contacts with alters in the low level is associated with an increase in the probability of the transition of egos with low trait scores. H → N The intensity of contacts with alters in the neutral level of the state is associ- ated with a decrease in the probability of the transition. H → H The intensity of contacts with alters in the neutral level of the state is associ- ated with an increase in the probability of the stability of egos with low trait scores. Emotional Stability L → H The intensity of contacts with alters in the neutral level of the state is associated with a decrease in the probability of the transition of egos with high trait scores. N → L The intensity of contacts with alters in the low level of the state is associated with a decrease in the probability of the transition. N → N The intensity of contacts with alters in the low level of the state is associated with an increase in the probability of the stability. Also, the intensity of contacts with alters in the high level of the state is associated with an increase in the probability of the stability of egos with low trait scores. N → H The intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of the transition of egos with low trait scores. H → L The intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of the transition of egos with high trait scores whereas the intensity of contacts is associated with an increase in the probability of the transition of egos with low trait scores. Creativity L → L The intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of the stability. L → H The intensity of contacts with alters in the low and neutral levels of the state is associated with a decrease in the probability of the transition. Also, the intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of the transition of egos with high trait scores. However, the intensity of contacts with alters in the high level is associated with an increase in the probability of the transition of egos with low trait scores. 55 N → H The intensity of contacts with alters in the neutral level is associated with an increase in the probability of the transition of egos with low trait scores whereas the intensity becomes associated with a decrease in the probability of the transition of egos with high trait scores. H → N The intensity of contacts with alters in the high level of the state is associated with a decrease in the probability of the transition. High Positive Affect (HPA) L → L The intensity of contacts with alters in the low level is associated with a decrease in the probability of the stability of egos with low trait scores. The intensity of contacts with the same alters becomes associated with an increase in the probability of the stability of egos with high trait scores. L → H The intensity of contacts with alters in the low level is associated with a decrease in the probability of the transition of egos with high trait scores. The intensity of contacts with the same alters becomes associated with a increase in the probability of the transition of egos with low trait scores. N → L The intensity of contacts with alters in the high levels is associated with an increase in the probability of the transition. The intensity of contacts with alters in the neutral level is associated with a decrease in the probability of the transition of egos with high trait scores. The intensity of contacts with the same alters becomes associated with a increase in the probability of the transition of egos with low trait scores. N → N The intensity of contacts with alters in the neutral level is associated with a decrease in the probability of the stability of egos with low trait scores. The intensity of contacts with the same alters becomes associated with a increase in the probability of the stability of egos with high trait scores. H → L The intensity of contacts with alters in the low level is associated with a decrease in the probability of the transition of egos with low trait scores whereas the intensity becomes associated with an increase in the probability of the transition of egos with high trait scores. The intensity of contacts with alters in the high level is associated with a decrease in the probability of the transition of egos with high trait scores whereas the intensity becomes associated with an increase in the probability of the transition of egos with low trait scores. H → N The intensity of contacts with alters in the high level is associated with a decrease in the probability of the transition. The intensity of contacts with alters in the low level is associated with a decrease in the probability of the transition of egos 56 with low trait scores whereas the intensity becomes associated with an increase in the probability of the transition of egos with high trait scores. H → H The intensity of contacts with alters in the high level is associated with an increase in the probability of the stability of egos with high trait scores,whereas the intensity becomes associated with an decrease in the probability of the stability of egos with low trait scores. The intensity of contacts with alters in the low level is associated with an increase in the probability of the stability of egos with low trait scores,whereas the intensity becomes associated with an decrease in the probability of the stability of egos with high trait scores. Low Negative Affect (LNA) L → L The intensity of contacts with alters in the high level is associated with an increase in the probability of the stability of egos with high trait scores whereas the intensity becomes associated with a decrease in the probability of the stability of egos with low trait scores. L → H The intensity of contacts with alters in neutral and low levels is associated with a decrease in the probability of the transition. N → H The intensity of contacts with alters in the low level is associated with a decrease in the probability of the transition. H → L The intensity of contacts with alters in the low level is associated with an increase in the probability of the transition of egos with high trait scores, whereas the intensity becomes associated with a decrease in the probability of the transition of egos with low trait scores. H → N The intensity of contacts with alters in the neutral level is associated with an increase in the probability of the transition of egos with high trait scores, whereas the intensity becomes associated with a decrease in the probability of the transition of egos with low trait scores. H → H The intensity of contacts with alters in the low level of the state is associated with an increase in the probability of the stability of egos with low trait scores whereas the intensity becomes associated with a decrease in the probability of the stability of egos with high trait scores. Detailed Results We report our detailed results (best sub-model according to QICC) for each transition in each state in Tables 8, 9, 3, 10, 11, 12 and 13. Each sub-table is labeled at the top 57 with the corresponding transition in a given state. The mere effects of social-situational factors (intensity with alters in each level: L, N and H) and corresponding traits of egos (T) are reported in the table, if they are statistically significant. The interaction results between the two effect are reported also (L∗ T , N ∗ T and H ∗ T ), if they are statistically significant. The coefficients of the control variables are reported also: the main effect of the time of the day (period) and the interaction between the time of the day and the trait (period*T). Some reported coefficients are relatively small, therefore we used a threshold of 0.001 to consider them relevant. We focus more on the direction of the effect (increase or decrease in the probability) rather than the actual value of the effect. Broad Speculations and Further Work So far, we have mainly been describing the data focusing on statistically significant effects and on their interpretation in terms of broader patterns of adaptation and com- plementarity. As stated in the main paper, we cannot make conclusive statements about causality without adopting additional assumptions. Nevertheless, in this section, we allow ourselves some liberty to make bolder speculations about possible implications of our findings, in case they corresponded to causal mechanisms. By definition, these ob- servations are preliminary, and require further validation. Nonetheless, we believe they provide useful insights for further targeted studies. Conscientiousness Conscientious behaviors mutually reinforce: People acting conscientiously help each other maintain conscientious behavior, regardless of their trait. Unconscientious behaviors mutually reinforce: As above but in the opposite direction, people acting unconscientiously help each other maintain the unconscientious behavior regardless of their trait. We cannot help you become good, but we can help you stay good: Conscientiously be- having people fail to pull bad apples. However if the latter already engage in virtuous behaviors, conscientiously behaving people can help them keep going. We cannot make you bad, unless you already chose to: Similarly, unconscientiously be- having people fail to pull good apples. But if the latter are already going astray, the former can keep them on the wrong way. Agreeableness The spiral of stubbornness: If someone is behaving stubbornly (e.g. being difficult, argumentative, less agreeable), then interacting with people who are behaving similarly helps keep him/her in that state irrespective of his/her trait. 58 stubbornly behaving people activate others' stubbornness: If you are stubborn by nature, and happen to behave agreeably, stay away from argumentative people, because they can stimulate your natural stubbornness. Extraversion Bringing you out of the shell: behaving extrovertedly can help you become more outgoing. If you are introvert by nature, hanging out with people Stealing the thunder effect: If you are extrovert by nature, and acting extrovertedly in a group of extroverts, the latter might "steal your thunder" and suppress your extroverted behavior. Creativity Creative behaviors are attractive and mutually reinforce: behaving in a creative way, hang out with creative people. If you want to behave or continue Low-creative behaviors mutually reinforce: People behaving uncreatively help each other maintain the uncreative behavior, regardless of their trait. 59
1209.2910
1
1209
2012-09-13T14:35:58
Community Detection in the Labelled Stochastic Block Model
[ "cs.SI", "cs.LG", "math.PR", "physics.soc-ph" ]
We consider the problem of community detection from observed interactions between individuals, in the context where multiple types of interaction are possible. We use labelled stochastic block models to represent the observed data, where labels correspond to interaction types. Focusing on a two-community scenario, we conjecture a threshold for the problem of reconstructing the hidden communities in a way that is correlated with the true partition. To substantiate the conjecture, we prove that the given threshold correctly identifies a transition on the behaviour of belief propagation from insensitive to sensitive. We further prove that the same threshold corresponds to the transition in a related inference problem on a tree model from infeasible to feasible. Finally, numerical results using belief propagation for community detection give further support to the conjecture.
cs.SI
cs
Community Detection in the Labelled Stochastic Block Model Simon Heimlicher∗ University of Massachusetts Amherst, USA Marc Lelarge INRIA-ENS Paris, France Laurent Massouli´e∗ INRIA-Microsoft Research Joint Centre Palaiseau, France 2 1 0 2 p e S 3 1 ] I S . s c [ 1 v 0 1 9 2 . 9 0 2 1 : v i X r a Abstract We consider the problem of community detection from observed interactions between individuals, in the context where multiple types of interaction are possible. We use labelled stochastic block models to represent the observed data, where labels correspond to inter- action types. Focusing on a two-community scenario, we conjecture a threshold for the problem of reconstructing the hidden communities in a way that is correlated with the true partition. To substantiate the conjecture, we prove that the given threshold correctly iden- tifies a transition on the behaviour of belief propagation from insensitive to sensitive. We further prove that the same threshold corresponds to the transition in a related inference problem on a tree model from infeasible to feasible. Finally, numerical results using belief propagation for community detection give further support to the conjecture. 1 Introduction Community detection consists in the identification of underlying clusters of individuals with similar properties in an overall population. It is relevant in vastly diverse contexts such as biology and sociology, where one might want to classify proteins or humans respectively, based on their interactions. Most methods assume interactions to be described by a graph, whose edges represent pairs of individuals known to interact. They then amount to graph clustering, with potentially distinct flavours: assortative communities see more interactions within than across communities, while the opposite holds in the disassortative case. The stochastic block model provides a versatile model of community structure, allowing representation of diverse scenarios and analytical comparison of candidate algorithmic detection procedures. In this model, nodes are partitioned into blocks, and an edge is present between any two nodes with a probability depending only on the blocks to which each of the two nodes belong. Despite its simplicity, this model already displays rich behaviours, some of which are not yet fully understood. One phenomenon of practical interest consists in a phase transition from a situation where the graph of interactions does not reveal any structure, to one where it reflects some of the underlying structure. In the latter case, algorithmic procedures such as belief propagation can perform non-trivial classifications of nodes. The simplest example of this situation consists in a model with n nodes partitioned into two equal-size blocks, and where two nodes are connected with probability a/n or b/n depending on whether they belong to the same block or not. Then it is known that the Condition (a − b)2 > 2(a + b) (1) ∗part of this author’s work has been conducted while employed at Technicolor. 1 is necessary for reconstruction, i.e. cluster in a way correlated with the true partition. Mossel et al. [1] have indeed shown that, if it is violated, then the distribution of the observed graph is absolutely continuous with respect to that of an unstructured fully symmetric random graph without underlying block structure. When this condition holds, it is conjectured by Decelle et al. [2] that the underlying block structure can at least partially be recovered by belief propa- gation. Beyond their theoretical interest, such threshold phenomena also have some practical implications: they indicate what amount of downsampling or perturbation of original data can be tolerated before all useful information is lost. Three elements support the conjecture that under Condition (1) community detection is possible. First, Decelle et al. [2] show that it implies sensitivity of belief propagation to noise. Second, it is known to correspond to a certain reconstruction threshold for a model of infinite random trees, whose structure locally resembles that of the stochastic block model. Third, numerical evaluations indicate the ability of belief propagation to retrieve some of the underlying structure under (1). In the present work, we initiate an investigation of similar phenomena in the more general context of labelled stochastic block models. In such models the observation of an interaction be- tween any two individuals is enriched with a label which represents that interaction’s particular type. Many applications of community detection naturally feature such labels. Protein-protein chemical reactions may be exothermic or endothermic; (movie-user) associations in collabora- tive filtering typically come with user ratings; email exchanges may be cold, formal, or familiar; etc. Our main contribution consists in a generalization of Condition (1) describing the transition from unidentifiable to identifiable to the context of labelled stochastic block models. Specifi- cally, after introducing necessary notation and our main conjecture in Section 3, we show in Section 4 that our generalized condition corresponds to the transition between insensitivity to sensitivity in belief propagation. We then show in Section 5 that it also coincides with the reconstruction threshold for the corresponding labelled tree model. The conjecture is further validated numerically in Section 6 where belief propagation is shown to achieve useful detection only above the threshold. Conclusions are drawn in Section 7. 2 Related Work Several works address community detection in the un-labelled stochastic block model. The two main approaches are based on belief propagation and spectral methods. Spectral methods typically ensure consistent reconstruction in regimes with high (ω(1)) average degree. An early [4] use Laplacian spectra, and address reference is McSherry [3]. More recently Rohe et al. growing numbers of communities, but still require high (ω(1)) connectivity. Decelle et al. [2] rely on belief propagation, and heuristically determine a threshold for detectability in a “sparse” regime, where node degrees are of order 1. The related problem of tree reconstruction has initially been considered by Evans et al. [5], who identified a threshold on the tree’s mean degree above which reconstruction is feasible through a simple “census” method. This threshold was later shown to correctly identify the onset of “robust reconstruction” by Janson and Mossel [6]. We refer to [7] for a survey of this area. A complete understanding of the relation between thresholds for community detectability in block models and reconstrruction in associated tree models is still missing. See, however, Gerschenfeld and Montanari [8] for conditions under which the two thresholds coincide. For the symmetric two-community case, Mossel et al. [1] show that the threshold for community detectability is at least as large as that for tree reconstruction; Coja-Oghlan [9] determines an upper bound on the threshold for community detection, that is believed to be loose. In contrast, to the best of our knowledge the problem of community detection and tree 2 reconstruction in the labelled case has not been explicitly considered in the literature. 3 Model description and main conjecture In the sequel we focus on the simplest non-trivial labelled stochastic block model, which is defined as follows. A total of n nodes are split into two equal-size blocks, namely block 0 and block 1. The type of any given node i ∈ {1, . . . , n} refers to the block it belongs to, and is denoted by σi ∈ {0, 1}. Any two nodes i, j are related with probability a/n if σi = σj, and with probability b/n otherwise, where a, b are two positive constants. Furthermore, given any two related nodes i, j, one observes a label Lij taking its values in some finite set L. Label Lij is drawn from distribution {µ((cid:96))}(cid:96)∈L if σi = σj, and from distribution {ν((cid:96))}(cid:96)∈L otherwise. Note that the present model generalizes the one studied in Mossel et al. [1], to which it reduces when the labels do not bring extra information relative to the types of the underlying nodes, that is when µ((cid:96)) ≡ ν((cid:96)). In this context, we make the following conjecture: Conjecture: In the labelled stochastic block model with two symmetric blocks, connectivity parameters a, b > 0 and label distributions µ, ν, reconstruction is infeasible if τ < 1, while it is feasible when τ > 1, where the threshold value τ is defined as (cid:88) (cid:18) aµ((cid:96)) − bν((cid:96)) (cid:19)2 τ := λ aµ((cid:96)) + bν((cid:96)) (cid:96)∈L a + b aµ((cid:96)) + bν((cid:96)) , (2) and λ := (a + b)/2 is the mean degree in the corresponding block model. Note that this extends the conjecture made for the un-labelled case in [1], as the Condition τ > 1 simplifies to (1) when µ((cid:96)) ≡ ν((cid:96)). We will now establish several results supporting this conjecture. 4 Phase transition for belief propagation sensitivity We first introduce a labelled tree which can be coupled with the original graph, see Proposition 5.2 in [1] (the only difference here is the addition of labels on edges). Consider the following random tree version of the reconstruction problem. Starting from a root node r with type σr ∈ {0, 1}, consider a branching process with the following characteristics. Each node i with type σi gives birth to a number of children of type t = σi with Poisson distribution Poi(a/2) and to a number of children of type t = 1 − σi with Poisson distribution Poi(b/2). Conditional on the types (t, t(cid:48)) of a (parent-child) pair (i, j), a label Lij is attached to the edge (i, j), drawn independently of everything else with distribution µ if t = t(cid:48), and with distribution ν if t (cid:54)= t(cid:48). Consider now such a tree up to depth d, that we denote Td. For each node i ∈ Td, denote by Td(i) the subtree rooted at node i, together with its labels. Let Xi = P(σi = 1Td(i)), and Bayes formula entails that Ri = Ri := Xi 1 − Xi · (cid:89) j child of i Xjaµ(Lij) + (1 − Xj)bν(Lij) Xjbν(Lij) + (1 − Xj)aµ(Lij) · This readily reduces to a recursion in terms of the random variables Rj: (cid:89) Ri = j child of i Rjaµ(Lij) + bν(Lij) Rjbν(Lij) + aµ(Lij) · 3 It also follows at once from these expressions that if one starts from uniform beliefs (X = 1/2 or equivalently R = 1 on the leaves), then uniform beliefs constitute a fixed point. Following Decelle et al. [2], we introduce the following notion of robustness to noise for this fixed point: Definition 1. Assume that belief ratios R for leaf nodes at depth less than d are fixed to 1. The belief ratio Rr at root r is then determined by induction from the belief ratios Rj of nodes at depth d, i.e. j ∈ ∂Td, through a map Fd: Rr = Fd(Rj, j ∈ ∂Td). The infinitesimal sensitivity χ(d) of the root belief Rr to noise at depth d is defined as (3) where the ξj are i.i.d. unit variance random variables. The fixed point R ≡ 1 is then said to be insensitive to noise if limd→∞ χ(d) = 0, and sensitive to noise if limd→∞ χ(d) = +∞. χ(d) = lim →0 2 Var (Fd(1 + ξj, j ∈ ∂Td)Td) , 1 With these definitions at hand, we are ready to state the following Theorem 1. Let τ be defined by expression (2). Then the fixed point R ≡ 1 is insensitive to noise if τ < 1 and sensitive to noise if τ > 1. Before we prove the theorem, let us comment on the implications. As conjectured in Decelle et al. in the case of un-labelled data, community detection is infeasible in an instance which is insensitive to noise, while it is feasible (i.e. some reconstruction classifying correctly more than half the nodes) in an instance that is sensitive to noise. This leads us to state the conjecture in Section 3. sampled in an i.i.d. fashion with moment generating function: ϕ(θ) = E(cid:2)eθW(cid:3) < ∞. Before proving Theorem 1 we need a technical result. Consider thus a branching process with Poisson offspring distribution with mean λ for some λ > 1. In addition, each parent-child edge in the corresponding branching tree is endowed with a real weight. All weights W are We let N (d) denote the number of descendants in the d−th generation. We further let N +(d, s) (resp. N−(d, s)) denote the number of such descendants whose sum of weights along the path from the ancestor to them is larger (resp. smaller) than ds. Let us now introduce the so-called rate function h as follows. First, we let h0(x) := sup y∈R (xy − log(ϕ(y))) . determines the behaviour of large deviations of empirical means (1/d)(cid:80)d This is the so-called Cram´er transform of the weights distribution, which by Cram´er’s theorem t=1 Wt of i.i.d. weights from their expectation ¯w := ϕ(cid:48)(0). Let now w− and w+ be defined as (cid:26) w+ = inf{x ≥ ¯w : h0(x) ≥ log λ}, w− = sup{x ≤ ¯w : h0(x) ≥ log λ}. (cid:26) h0(x) if x ∈ [w−, w+], +∞ otherwise. We then let h(x) := We are now ready to state the following Theorem 2. For any x ≥ ¯w, x (cid:54)= w+, on the event that the branching process survives indefi- nitely, one has the almost sure convergence (5) Similarly, for all x ≤ ¯w, x (cid:54)= w−, on the event that the branching process survives indefinitely, one has lim d→∞ (cid:0)N +(d, x)(cid:1)1/d = λe−h(x). (cid:0)N−(d, x)(cid:1)1/d = λe−h(x). lim d→∞ 4 (4) (6) Proof. We only prove (5), as the other property (6) is shown similarly. Consider first the case where x > w+. The expectation of the summation in (5) reads EN +(d, x) = λdP Wt ≥ xd . (cid:33) (cid:32) d(cid:88) 1 Chernoff’s bound implies that this is no larger than ed(log λ−h0(x)). Being an integer-valued random variable, the summation is then positive only with probability at most ed(log λ−h0(x)). By Borel-Cantelli’s lemma, it is then positive only for finitely many d’s. Thus the limit in (5) is 0, as announced. The case where x ∈ [ ¯w, w+) follows from a general result for branching random walks [10]. Indeed consider the random measure on R: Z(d) = δ(Xi), N (d)(cid:88) i=1 (cid:90) where Xi is the sum of the weigths along the path from the ancestor to the i-th individual in generation d. Note that we have N +(d, x) = Z(d)[xd;∞). It is well-known that M (d)(x) := (λϕ(x)) −d exyZ(d)(dy), is a positive martingale and hence has an almost sure limit M (x) as d tends to infinity. For x ∈ (w−, w+), as shown in [10], the limit M (x) is stricly positive if the process survives. Then Theorem 4 in [10] implies that for any fixed 0 < h as d tends to infinity: (cid:16) Z(d)[xd − h, xd + h] (cid:17)1/d → λe−ho(x). (cid:90) This clearly gives a lower bound to (5). The upper bound is easily obtained by the following argument: N +(d, x) = Z(d)[xd,∞) ≤ eθ(y−xd)Z(d)(dy) minimizing over θ < w+ (which ensures that limd→∞ M (d)(θ) = M (θ) > 0) gives the desired result. = e−θxdM (d)(θ)λdϕ(θ)d, Let us now prove Theorem 1. We first determine an expression for the infinitesimal sensi- tivity χ(d). Using linearization, we have that (cid:88) (cid:89) χ(d) = j∈F (d) (uv)∈path (j∼r) The derivative in the above formula reads Raµ(Luv) + bν(Luv) aµ(Luv) + Rbν(Luv) (cid:19)2 (cid:12)(cid:12)(cid:12)(cid:12)R=1 . Let us denote the absolute value of this expression by eWuv for some suitably defined weight Wuv, so that ∂ ∂R Raµ(Luv) + bν(Luv) aµ(Luv) + Rbν(Luv) aµ(Luv) − bν(Luv) aµ(Luv) + bν(Luv) · . (cid:88) j∈F (d) χ(d) = exp 2Wuv (uv)∈path (r∼j)  . ∂R (cid:18) ∂ (cid:12)(cid:12)(cid:12)(cid:12)R=1  (cid:88) = 5 Note that in the present model, thanks to symmetry between the two classes 0, 1, the labels Luv are i.i.d., with probability distribution P(L = (cid:96)) = aµ((cid:96))+bν((cid:96)) from this label distribution and the transform W = log(aµ(L) − bν(L)/(aµ(L) + bν(L)). We are thus in the setup of Theorem 2, with a dsitribution for the weights suitably derived a+b . We then have, from Theorem 2, applying the Laplace method, the exponential equivalent: 1 d log χ(d) ∼ log λ + sup x∈R (7) Consider the modified expression supx(2x − h0(x)), and let x∗ denote the point attaining this supremum. By convexity of h0 and the fact that it achieves its minimum at ¯w, necessarily x∗ ≥ ¯w. This supremum equals log Ee2W by convex duality. Note also that x∗ ≤ 0, since the support of the distribution of W is in R−. Consider first the case where τ > 1, or equivalently, (2x − h(x)). log λ + log Ee2W > 0. We then have h0(x∗) = 2x∗ − log Ee2W < log λ by the above condition, so that h0(x∗) = h(x∗). Thus the logarithmic equivalent (7) reads log(τ ) and is strictly positive. We thus have sensitivity to perturbations. log Ee2W < − log λ. In that case, the logarith- mic equivalent (7) is upper-bounded by log(τ ) and is thus strictly negative. Insensitivity to perturbations follows. Consider next the case where τ < 1, i.e. 5 Phase transition for reconstructability on labelled trees In this section, T is an infinite tree with types σ ∈ {0, 1} on its vertices and labels L on its edges. To have consistent notation with previous section, a child has the same type as its parent with probability a a+b . Given that the child has the same type as its parent, its label is distributed as µ((cid:96)), otherwise it is distributed according to ν((cid:96)). Note that if T is a realization of a Galton-Watson tree with offspring distribution Poi(cid:0) a+b (cid:1) conditioned on non-extinction, we get exactly the same tree model as in the previous section. In this section, the underlying tree is fixed (i.e. non-random) so that the only randomness considered here is associated with the types of the vertices and the labels of the edges. labels of the edges of the tree. We define the function  : L → [0, 1/2] by We denote by P0 and E0 the probability distribution and expectation conditional on the 2 a If j is a child of i, we have ((cid:96)) = bν((cid:96)) aµ((cid:96)) + bν((cid:96)) . P0 (σi (cid:54)= σj) = (Lij). We now give an alternative description of the random types of the vertices of the tree when the labels of the edges are known, i.e. conditionally on the labels. At the root r of the tree T a binary random variable is chosen uniformly at random. This type is then propagated, with error, throughout the tree as follows: the child j of the vertex i receives the type of i with probability 1 − (Lij), and the opposite type with probability (Lij). These events at the vertices are statistically independent. This model has been studied in information theory, mathematical genetics and statistical physics when the function  is constant. We refer to [5] for references. Suppose we are given the types that arrived at the d-th level ∂Td of the tree T . Observing the labels of the edges and using optimal reconstruction strategy (maximum likelihood), the prob- ability of correctly reconstructing the original type at the root is denoted by (1 + ∆(T , d)) /2, where clearly ∆(T , d) ≥ 0. 6 Galton-Watson tree with offspring distribution Poi(cid:0) a+b For an infinite tree T , we denote by λ = lim supd ∂Td1/d its growth rate. Note that our notation is consistent with the previous section, as in the case where T is a realization of a 2 a.s. We still define τ by the (cid:1), λ = a+b expression (2). Adapting the argument of [5], we are able to show: Theorem 3. Let T be an infinite labelled tree with root r as defined above. Consider the problem of reconstructing the type of the root σr from the types at the d-th level ∂Td of T and the labels on the tree. 2 1. If τ > 1 then inf d≥1 ∆(T , d) > 0; 2. If τ < 1 then inf d≥1 ∆(T , d) = 0. Proof. Following [5], we derive a lower bound for ∆(T , d) in terms of the effective electrical conductance from the root r to ∂Td and an upper bound which is the maximum flow from r to ∂Td for certain edge capacities. We refer to [11] for background on these notions. (cid:89) child of i, we define θij = 1 − 2(Lij) = aµ(Lij )−bν(Lij ) For the conductance lower bound, we follow Section 5 of [5] and for each edge (i, j), j a aµ(Lij )+bν(Lij ) and then assign the resistance Rij = (1 − θ2 ij) θ−2 uv , where path (r ∼ j) is the path from the root r to node j. We also define for each vertex i (uv)∈path (r∼j) (cid:89) Θi = θuv. (uv)∈path (r∼i) By Theorem 1.2’ and 1.3’ of [5], we have where Reff(r ↔ ∂Td) is the effective resistance between the root r and the d-th level of the tree. We first prove our second claim. Note that and ∆(T , d)2 ≤ 2 Θ2 i , (cid:88) i∈∂Td ∆(T , d) ≥ (cid:2)θ2 uv E0 1 1 + Reff(r ↔ ∂Td) (cid:88) (cid:3) = (cid:88) a + b Θ2 i E0 (cid:96) aµ((cid:96)) + bν((cid:96)) i∈∂Td (cid:19)2 aµ((cid:96)) + bν((cid:96)) (cid:18) aµ((cid:96)) − bν((cid:96)) (cid:17)d → 0, = τ λ ,  = ∂Td(cid:16) τ (cid:88) λ so that we have for τ < 1, as d tends to infinity. Hence by Fatou’s lemma, we have lim inf d i∈∂Td Θ2 i = 0 a.s., ij =(cid:81) (uv)∈path (r∼j) θ−2 Our first claim will hold, once we prove that for τ > 1, we have Reff(r ↔ ∞) = supd≥1 Reff(r ↔ (cid:3) so that by Theorem 1(i) of [12], for τ > 1, we have and our second claim holds. ∂Td) < ∞. This fact follows indeed from a computation done in [12]. Define the resistance R(cid:48) uv . Note that in our framework the labels of the edges are i.i.d. with . In particular the random variables θuv are also i.i.d. and since θuv ≤ 1, distribution aµ((cid:96))+bν((cid:96)) we have min0≤x≤1 E0 R(cid:48) Reff(r ↔ ∞) ≤ R(cid:48) (cid:2)θ2x (cid:2)θ2 eff(r ↔ ∞) < ∞ a.s. Since Ruv ≤ R(cid:48) eff(r ↔ ∞) < ∞ a.s. uv, we have by Rayleigh’s monotonicity law (see [11]), (cid:3) = E0 a+b uv uv 7 6 Numerical results Figure 1: Overlap Q as a function of the parameter ε (left: a = b; right a < b) We now investigate numerically the validity of our proposed conjecture. We consider first a labelled stochastic block model with two symmetric blocks where the connectivity parameters are identical, i.e. a = b, so that community detection can only succeed based on the labels. We assume for simplicity only two labels + and − and define the distributions µ(+) = p for edges among nodes of the same type and ν(+) = q for edges between nodes of different type for two parameters p, q ∈ [0, 1]. In this case, Condition (1) does not hold, yet reconstruction may still be feasible depending on the values of p and q. In order to validate our conjecture that if the value τ given in (2) is greater than 1, reconstruction may be feasible, we parametrize p = 1 2 + ε and q = 1 2 − ε, which leads to the simplified condition for reconstruction: ε > √ 1 2 . a (8) We characterize the success of the reconstruction using the overlap metric introduced by Decelle et al. in equation (5) of [2], which we repeat below: (cid:80) Q({σi},{σi}) = max π 1 n i δσi,π(σi) − maxt nt 1 − maxa na , (9) where σi denotes the original assignment of types to nodes i = 1 . . . n, σi, denotes the estimated assignment, t denotes communities, and nt is the size of community t. In our setup, t = 0 or 1 and nt = n/2. Since types may be assigned in different order in the estimate, we vary over all permutations π(σi) of σi and take the one with maximum overlap. This overlap metric ranges from 0 to 1, equating zero when classification is no better than assigning all nodes to a fixed class (or equivalently, assigning nodes to a randomly chosen type). We generate a labelled stochastic block model graph with the parameters given above and n = 5000 nodes. Then, we use the standard sum–product belief propagation algorithm to infer the types of the nodes based on the labels. We vary both the density, i.e. a = b, and ε. All plotted values are averages over several different seeds. In Fig. 1 (left), we plot the overlap metric Q against ε on the x-axis for a = b given by 2, 5, 10. For each curve, we indicate the threshold (8) as a vertical line in the same style as the corresponding curve. We observe that to the left of the threshold, Q remains around zero and the variation may be attributed to the initial conditions and small-scale effects. To the right of the threshold, however, Q increases steadily. For comparison, in Fig. 1 (right), we provide the same metric but with a < b given by (a, b) = (1, 3), (4, 6), (8, 12). Accordingly, belief propagation can now exploit both edges as well as their labels and the corresponding curves are shifted towards the left, along with the threshold of ε where τ = 1, again indicated by a vertical line for each curve. It is interesting, that even for reasonably small scales, belief propagation consistently fails below the threshold, with overlap close to zero, yet achieves positive overlap above the threshold. 8 7 Concluding remarks We have initiated an analysis of community detection in the context of labelled interactions. We have formulated a conjecture on when detectability is feasible, in the form of Condition (2). While restricted to the two symmetric communities case, this condition is already useful in determining how the availability of labels affects detectability. A natural extension will consider richer scenarios with more communities, where our techniques can potentially characterize the corresponding transition thresholds. On the theoretical front, we have established that two phase transitions, namely sensitivity of belief propagation, and tree reconstructability, coincide in the case of labelled trees. The main outstanding question there is to validate our conjecture that these thresholds characterize the onset of community detectability. References [1] Elchanan Mossel, Joe Neeman, and Allan Sly. Stochastic Block Models and Reconstruction, February 2012, arXiv:1202.1499. [2] Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborov´a. Asymptotic analysis of the stochastic block model for modular networks and its algorithmic applica- tions. Physical Review E, 84(6):066106, 2011. [3] F. McSherry. Spectral partitioning of ranodm graphs. IEEE Symposium on Foundations of Computer Science, pages 529–537, 2001. [4] Karl Rohe, Sourav Chatterjee, and Bin Yu. Spectral Clustering and the High-Dimensional Stochastic Blockmodel. Annals of Statistics, 39(4):1878–1915, 2011. [5] William Evans, Claire Kenyon, Yuval Peres, and Leonard J. Schulman. Broadcasting on trees and the Ising model. Ann. Appl. Probab., 10(2):410–433, 2000. [6] S. Janson and E. Mossel. Robust reconstruction on trees is determined by the second eigenvalue. Annals of Probability, pages 2630–2649, 2004. [7] Elchanan Mossel. Survey: information flow on trees. In Graphs, morphisms and statistical physics, volume 63 of DIMACS Ser. Discrete Math. Theoret. Comput. Sci., pages 155–170. Amer. Math. Soc., Providence, RI, 2004. [8] A. Gerschenfeld and A. Monatanari. Reconstruction for models on random graphs. IEEE Symposium on Foundations of Computer Science, pages 194–204, 2007. [9] A. Coja-Oghlan. Graph partitioning via adaptive specral techniques. Combinatorics, Prob- ability and Computing, pages 227–284, 2010. [10] J. D. Biggins. Uniform convergence of martingales in the branching random walk. Ann. Probab., 20(1):137–151, 1992. [11] Russel Lyons and Yuval Peres. Probability on Trees and Networks. Cambridge University Press, in preparation. [12] Russell Lyons and Robin Pemantle. Random walk in a random environment and first- passage percolation on trees. Ann. Probab., 20(1):125–136, 1992. 9
1806.03211
1
1806
2018-06-08T15:14:06
The landscape of NeuroImage-ing research
[ "cs.SI", "stat.AP" ]
As the field of neuroimaging grows, it can be difficult for scientists within the field to gain and maintain a detailed understanding of its ever-changing landscape. While collaboration and citation networks highlight important contributions within the field, the roles of and relations among specific areas of study can remain quite opaque. Here, we apply techniques from network science to map the landscape of neuroimaging research documented in the journal NeuroImage over the past decade. We create a network in which nodes represent research topics, and edges give the degree to which these topics tend to be covered in tandem. The network displays small-world architecture, with communities characterized by common imaging modalities and medical applications, and with bridges that integrate these distinct subfields. Using node-level analysis, we quantify the structural roles of individual topics within the neuroimaging landscape, and find high levels of clustering within the structural MRI subfield as well as increasing participation among topics related to psychiatry. The overall prevalence of a topic is unrelated to the prevalence of its neighbors, but the degree to which a topic becomes more or less popular over time is strongly related to changes in the prevalence of its neighbors. Broadly, this work presents a cohesive model for understanding the landscape of neuroimaging research across the field, in broad subfields, and within specific topic areas.
cs.SI
cs
The Landscape of NeuroImage-ing Research Jordan D. Dworkina,∗, Russell T. Shinoharaa, Danielle S. Bassettb,c,d,e aDepartment of Biostatistics, Epidemiology, and Informatics, Perelman School of Medicine, University of Pennsylvania, bDepartment of Bioengineering, School of Engineering and Applied Sciences, University of Pennsylvania, Philadelphia, PA, Philadelphia, PA, USA cDepartment of Physics & Astronomy, College of Arts and Sciences, University of Pennsylvania, Philadelphia, PA, USA dDepartment of Electrical & Systems Engineering, School of Engineering and Applied Sciences, University of Pennsylvania, eDepartment of Neurology, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA, USA Philadelphia, PA, USA USA Abstract As the field of neuroimaging grows, it can be difficult for scientists within the field to gain and maintain a detailed understanding of its ever-changing landscape. While collaboration and citation networks highlight important contributions within the field, the roles of and relations among specific areas of study can remain quite opaque. Here, we apply techniques from network science to map the landscape of neuroimaging research documented in the journal NeuroImage over the past decade. We create a network in which nodes represent research topics, and edges give the degree to which these topics tend to be covered in tandem. The network displays small-world architecture, with communities characterized by common imaging modalities and medical applications, and with bridges that integrate these distinct subfields. Using node-level analysis, we quantify the structural roles of individual topics within the neuroimaging landscape, and find high levels of clustering within the structural MRI subfield as well as increasing participation among topics related to psychiatry. The overall prevalence of a topic is unrelated to the prevalence of its neighbors, but the degree to which a topic becomes more or less popular over time is strongly related to changes in the prevalence of its neighbors. Broadly, this work presents a cohesive model for understanding the landscape of neuroimaging research across the field, in broad subfields, and within specific topic areas. Keywords: knowledge network, graph theory, neuroimaging 1. Introduction In many fields of research, scientists develop intu- itive knowledge of which topics are popular, which might be on the horizon, and which tend to be stud- ied in tandem. Yet each scientist's view of the re- search landscape is based on a subsampling of the full space, depending on the nature and extent of their experiences in the field. It is therefore of- ten daunting for those who are new to a field to construct even a superficial picture of the research landscape. Moreover, even for those steeped in a particular research area, it can be challenging to ∗Corresponding author: Email address: [email protected] (Jordan D. Dworkin) imagine new connections that might be drawn be- tween topics that historically have been thought of as unrelated. Recently, the emerging field of network science has proven useful for gaining an understanding of the broader space of scientific research. Previous work on collaboration and citation networks has provided insight into authors social patterns 1,2, im- portant turning points in the literature 3, and the large-scale structure of the scientific landscape 4,5. But to gain an understanding of the particular land- scape of a subfield, it is useful to consider topic networks, which reflect the relationships between scientific ideas. Here, the operationalization of sci- ence as a set of interconnected ideas provides a unique opportunity to study how research topics are related within and across sub-disciplines, and June 11, 2018 how these topics and their relations have grown and changed over time. As neuroimaging researchers, we sought to apply this technique to literature from our field. In this work, we apply graph theoretical approaches to a network of the 100 most common topics covered in the journal NeuroImage over the ten-year span from 2008 to 2017. We discuss the large-scale structure of this network, the communities of research areas that emerge from the topic relationships, the roles of individual topics in shaping the network, and the ways in which these roles have changed over time. In sum, our study offers unique insights into the na- ture and use of scientific research in contemporary neuroimaging. Methods Data collection For this study, we retrieved keywords and ab- stracts from 8,547 articles published in NeuroIm- age between 2008 and 2017. We used the keyword sections to create a list of potential topics to be searched for in the abstracts. We chose this tech- nique over latent topic modeling for two reasons: (1) it reflected scientists' explicit opinions as to the words and phrases that constitute relevant scientific topics, and (2) it allowed for the incorporation of multi-word phrases. We manually curated the list of topics to eliminate redundancy, unify variations, and account for abbreviations (i.e., functional mri, fMRI, functional magnetic resonance imaging, and functional magnetic resonance images were all de- noted as fmri ). Finally, we algorithmically edited abstracts to reflect these changes. Network construction We calculated the prevalence of each potential topic by finding the proportion of abstracts or key- word sections containing the topic phrase within the timespan of study. We used the 100 most common topics between 2008 and 2017 as nodes to construct the network, as this value represented the approx- imate number at which the least prevalent words occurred sufficiently often to produce a statistically reliable signal. Edges were weighted by the φ co- efficient for binary association 6, representing the degree to which two topics tended to be discussed in the same articles. We applied a threshold of pos- itive significance to increase the interpretability of the inter-topic links, and the network that resulted from them. Network structure To quantify the structural features of the full net- work, we sought to investigate the degree to which topics tended to form tightly connected clusters, as well as the overall level of integration of research topics across the network. Local topic clustering can be quantified using the clustering coefficient, which is defined for a node as the probability that two of its adjacent nodes are connected to one another. The version of the clus- tering coefficient used here is a measure of transi- tivity defined as follows 7: (cid:88) cw i = 1 si(ki − 1) h,j∈N 2 (wij + wih) aijaihahj, where N is the set of all nodes, and si is the node's strength, or the sum of all edge weights originating at node i. The variable ki is the node's degree, or the number of edges originating at node i. Finally, wij is the edge weight connecting node i and node j, and aij is 1 if wij > 0 and 0 otherwise. The overall clustering behavior of the network can be obtained by taking the average clustering coefficient over all nodes 8. Integration across the network can be quantified using the characteristic path length of a net- work. Path length is defined as the average short- est path length between all node pairs 9. A version of the path length for a weighted network can be defined as follows: (cid:88) i(cid:54)=j L = 1 n(n − 1) dij, where n is the number of nodes and dij is the short- est weighted path length between nodes i and j. Notably, these two measures of clustering coeffi- cient and path length can be combined to obtain the small-world propensity of a network, which represents the degree to which a network shows sim- ilar clustering to that of a lattice network, and sim- ilar path length to that of a random network 10. This metric is similar to the commonly used small- world index 9, σ, but has been shown to be unbi- ased even in the context of networks with varying densities 10. Both measures broadly represent how well a network can be characterized as having both disparate clusters and strong between-cluster inte- gration. The small-world propensity of a network is defined as follows: 2 (cid:114) φ = 1 − ∆2 C + ∆2 L 2 , ∆C = Clattice − Cobserved Clattice − Crandom ∆L = Lobserved − Lrandom Llattice − Lrandom , where and with C representing the network clustering coeffi- cient, defined as the average of all node-specific cw i values. Community detection To determine how the network clustered into sub- fields, we performed community detection using an iterative generalized Louvain-like locally greedy al- gorithm to maximize a common modularity quality function 11. This technique implements a stochastic optimization of the quality index value Q, in which nodes are reassigned to modules one by one until no reassignment can improve Q. By iterating this optimization until convergence, one obtains a glob- ally optimal set of community assignments, after accounting for local maxima in the Q space. The modularity value, Q, of a network repre- sents the degree of separation between nodes in dif- ferent groups 12,13. Intuitively, it quantifies how well the network can be separated into non-overlapping communities with many, strong within-group con- nections and few, weak between-group connections. For a weighted network, the modularity can be de- fined as follows: (cid:88) (cid:104) i,j∈N (cid:105) Qw = 1 lw wij − sisj lw δmimj , where lw is the sum of all edge weights in the net- work, and δmimj is 1 if i = j and 0 otherwise. Importantly, it is well known that the modularity landscape suffers from a near degeneracy of optimal solutions 14. We addressed this issue by using 100 iterations of the Louvain-like algorithm 11. From the set of partitions obtained across these many it- erations, we build a agreement matrix from which we subsequently extract a consensus partition 15. Node-level structure We examined several additional structural fea- tures at the level of network nodes. In addition to the previously mentioned measures of node de- gree and node strength, we sought to understand the ways in which nodes served as bridges between distant topics, and the degree to which they main- tained connections to topics outside of their own cluster. Bridging behavior can be measured using the be- tweenness centrality, which is the proportion of all shortest paths within the network that pass through a given node 16. It is defined as follows: (cid:88) bi = 1 (n − 1)(n − 2) h,j∈N ;h(cid:54)=j,h(cid:54)=i,j(cid:54)=i ρ(i) hj ρhj , where ρhj is the number of shortest weighted paths between node h and node j, and ρ(i) hj is the number of shortest weighted paths between node h and node j that pass through node i. The diversity of a topic's connections can be measured by the participation coefficient, which quantifies the degree to which the node's connec- tions are evenly distributed across all modules (or clusters) in a network 17. The participation coeffi- cient tends towards 1 as connections bridge mod- ules, and tend towards 0 as connections remain largely intramodular. This metric is defined as fol- lows: i = 1 − (cid:88) P w (cid:18) si(m) (cid:19)2 , m∈M si where M is the set of modules, and si(m) is the sum of edge weights from node i to other nodes within module m. To understand how these measures of a node's topological role within the network might relate to the topic's usage in the literature, we examined the prevalence of each topic. We defined the prevalence of a topic as the proportion of article abstracts and keyword sections in which that topic appeared. To further understand how one topic's popularity in the literature might be related to the popularity of topics to which it was closely related, we defined a new measure, ξ, that quantified the prevalence of a topic's neighbors. This measure was defined as: (cid:88) j(cid:54)=i wijpj, ξi = 1 si 3 where pj is the overall prevalence of node j, given by the proportion of articles in which topic j ap- pears within the time window covered by the given network. Temporal node structure To examine changes in topic contributions over time, we created a dynamic network using a sliding window of ±6 months from a central month. Cen- tral months ranged from July, 2008 to June, 2017 and data from January, 2008 to December, 2017 were included in the analyses. This dynamic net- work was comprised of 109 individual networks with overlapping time windows, each with the same 100 topics examined in the full static network. To examine how topics' structural roles changed over time, we obtained the temporal slopes of each network measure described previously. These slopes were calculated using linear regression on a 'month' variable, and were standardized by the magnitude of the measure over the full 10 year time window. The formula is given below, for an exam- ple measure, θ: θj,t = α + βt + , ∆θ j = β θj , where θj,t is the θ value for node j at the network at time t, ∆θ j represents the slope of measure θ for node j, and θj represents the value of θ for node j within the context of the full network. We additionally introduced a measure, Ω, that quantified the degree to which a node is connected to topics that are increasingly used in the literature. It is given by the weighted average of the prevalence slope values of a node's neighbors. It is defined as follows: (cid:88) j(cid:54)=i Ωi = 1 si wij∆p j , where ∆p j is the prevalence slope of node j, given by the percent change per month in the proportion of articles in which topic j appears, according to the same algorithm given above for calculating slope measures. Results We collated data from 8,547 articles published in NeuroImage between January, 2008 and Decem- ber, 2017. Using phrases in the keyword sections 4 and their appearance within abstracts, we created a network of research topics. Nodes in the network represented the 100 most common topics over this time span. Edges in the network represented the co- occurrence of topics within articles, quantified by the φ coefficient of association for binary variables 6. We removed negative and non-significant correla- tions, comprising roughly 63% of edges; these edges had notably lower magnitude and less variability (range: [-0.23,0.02], interquartile range: 0.02) than the edges that remained (range: in- terquartile range: 0.06). [0.02,0.59], Structure of the topic network To understand the overall structure of the neu- roimaging landscape, we calculated the average node clustering and characteristic path length for the topic network. For comparison, we constructed benchmark distributions from 100 random net- works with equivalent size, degree distribution, and strength distribution 19. We found that the topic network had high levels of clustering (p < 0.01), with a clustering coefficient 2.24 times the aver- age value found in the null networks. Additionally, the network had a higher characteristic path length than the random networks (p < 0.01), with a path length 1.31 times the average value of the null net- works. High values of the clustering coefficient and mid- dling values of the characteristic path length can be indicative of small-world architecture in a net- work. We therefore tested for the presence of small- worldness in the topic network using the small- world propensity score 10. Its value was 0.72, which was significantly higher than would be expected from a random network (p < 0.01). These re- sults indicate that research topics in neuroimaging have small-world properties, with high local clus- tering within, and bridges between, distinct sub- fields. This structure may suggest a pathway for in- novation, in which tight clusters advance and refine existing relationships and ideas, and links between clusters facilitate the creation of new connections and future research opportunities 20. Topic communities We next sought to characterize neuroimaging subfields as defined in a data-driven manner from the architecture of the topic network. We per- formed community detection using a Louvain- like locally greedy algorithm to maximize a com- Figure 1: Architecture of the topic network. Nodes (N = 100) reflect research topics and edges (E = 969) reflect the degree of co-occurrence in abstracts and keyword sections. (A) The adjacency matrix sorted by topics' community affiliations, with communities defined by their dominant topic category. (B) Visualization of the topic network using the Fruchterman-Reingold layout 18, where node color represents community affiliation and node size represents prevalence in the literature. mon modularity quality function 11. The mod- ularity value of a network intuitively represents the degree of separation between nodes in differ- ent groups 12,13. It quantifies how well the net- work can be separated into non-overlapping com- munities, with many within-group connections and few between-group connections. Using this tech- nique, we identified five communities, character- ized by topics related to structural magnetic reso- nance imaging (MRI), functional MRI, brain struc- tures, Alzheimer's disease, and electroencephalog- raphy (EEG), respectively (Figure 1, SI Interac- tive). From the community structure of this network, we were able to identify familiar subfields. Specifi- cally, broad divisions appeared based on imaging modality, with structural MRI, functional MRI, and EEG forming the bases of three separate com- munities. Additionally, data collection and analysis techniques that are commonly utilized within spe- cific modalities tended to cluster within the modal- ity's community. This was true of the terms seg- mentation, tractography, and voxel-based morphom- etry within the structural community. Similarly, it was true of the terms resting state, motion, and independent component analysis within the func- tional community. And finally, it was also true of the terms oscillations, event-related potential, and synchronization within the EEG community. Intu- itively, papers that bridge these communities might combine imaging modalities, or might use the same analysis technique on data acquired in two different imaging modalities. While these three communities separated from one another along boundaries of the imaging modal- ity used, the other two communities were more characterized by the content of the neuroscientific question being asked and answered. For exam- ple, the largest community, instead of being clus- tered around a modality, was instead focused on physical structures and associated research topics. This community contained various brain regions, including the cortex, insula, cerebellum, thalamus, and amygdala, as well as topics that tend to be considered alongside specific regions, such as emo- tion, depression, reward, and pain. Interestingly, the remaining community appeared to be heavily focused on Alzheimer's disease research, including topics like cognition, hippocampus, aging, atrophy, and mild cognitive impairment. Perhaps unsurpris- ingly, the closest neighbors of this community were the structural MRI community, and the brain struc- 5 different subfields, yielding weak connections to a wide range of other topics. Topics exemplary of this pattern were brain, thalamus, and somatosen- sory cortex. Topics on the other end of the spec- trum, which had high values for average strength per edge, included white matter, diffusion tensor imaging, and fractional anisotropy. To understand the trade-off between tight con- nections within a subfield and broad use connec- tions across the field, we investigated the rela- tionship between topics' clustering coefficient and participation coefficient. Somewhat unsurprisingly, we observed a significant negative relationship be- tween clustering coefficient and participation coef- ficient (ρ = −0.66, p < 0.001), suggesting that topics with highly related neighbors tend not to have many inter-community connections. Highly clustered topics included multiple sclerosis, cor- pus collosum, and white matter, while highly par- ticipatory topics included learning, hippocampus, and schizophrenia (Table 1). The high cluster- ing coefficient throughout the structural MRI com- munity possibly reflects relative isolation of these modalities, methods, and neuroscientific applica- tions within the field. Figure 3: Relationships between degree, betweenness centrality, and average edge weight. Points represent individual topics, and are scaled by topic prevalence and colored by the topic's strength per edge. 6 Figure 2: Strength of cross-community connections. The distributions of non-zero edge weights for every pair of topic communities. The colors of each boxplot show the pair of communities being represented. tures community (Figure 2). Structural roles of individual topics Overall structural roles To investigate the roles of individual topics in shaping the overall structure of the network, we ex- amined the topics' general connectivity (degree and strength), their role in creating efficient pathways between clusters (betweenness centrality), their level of local clustering (clustering coefficient), and the degree to which they have relationships with topics outside of their own community (participa- tion). See SI Interactive to explore the values of these metrics for each node. Interestingly, we found that betweenness central- ity and degree were significantly related (ρ = 0.49, p < 0.001) but betweenness centrality and strength were not (ρ = 0.18, p = 0.08). These relation- ships suggest that topics that serve as bridges con- necting disparate communities tended to have many somewhat weak connections. To explore further, we calculated each topic's average strength per edge. This value was significantly negatively related to betweenness centrality (ρ = −0.37, p < 0.001), further supporting the previous finding (Figure 3). These results are consistent with the presence of broad topics that are covered often and in many Rank Prevalence Degree Betweenness Clustering Participation 1 2 3 4 5 6 7 8 9 10 DTI Brain fMRI Cortex Human MRI BOLD EEG Development White matter Dorso. pf cortex Memory Cortex fMRI Prefrontal cortex Thalamus MRI Brain Hippocampus Gray matter Thalamus Brain Somato. cortex Multiple sclerosis Corpus callosum White matter Frac. anisotropy Myelin Diffusion DWI Emotion fMRI Motion Cortex Plasticity Func. connec. Depression Dorso. pf cortex Brain development DM network Schizophrenia Learning Hippocampus Rat Stroke Plasticity Epilepsy Medial temp. lobe Memory Insula Table 1: Rankings of topics' overall structural measures. Rank ∆ Prevalence ∆ Degree ∆ Betweenness ∆ Clustering ∆ Participation 1 2 3 4 5 6 7 8 9 10 Dyn. caus. modeling Basal ganglia Speech Inf. front. gyrus Reading DM network Resting state DWI Func. connec. Oscillations Brain development Reliability Plasticity TMS Auditory cortex Motion Brain development Cerebellum Anxiety Alzheimer's disease Plasticity Cerebral cortex Somato. cortex CBF Children DWI Synchronization Speech Longitudinal EEG Reading Coherence Corpus callosum Development Auditory cortex ICA Myelin DTI Myelin Emotion Depression Pain Orbito. cortex Anxiety Ant. cing. cortex Auditory Multiple sclerosis Amygdala Segmentation Hemo. response Table 2: Rankings of topics' increases in structural measures over time. Temporal changes in structural roles Though the contributions of individual nodes to the topic network demonstrate the manner in which topics relate to the field as a whole, these metrics only capture a static snapshot of highly dynamic relationships. As such, it was of interest to inves- tigate the dynamic properties of the topic features described in the previous section, in order to better understand how changes in the field may emerge over time. To do so, we created a dynamic network using a ±6-month sliding window that captured the network structure at each central month between July, 2008 and June, 2017. With the ±6-month window, data between January, 2008 and Decem- ber, 2017 were incorporated into the network. Dynamic properties of topics were examined by obtaining the slope of each graph metric, and stan- dardizing by the overall metric obtained in the pre- vious section. This calculation yields an estimate of a topic's percent increase or decrease in each mea- sure month-over-month, and can reveal whether topics' roles within the field have been changing over time. The term connectome was removed for the following analyses because it was not mentioned in the literature until 2010, making its trajectories strong outliers for almost all measures. Since the metrics that accompanied this topic's entry into the field are still of qualitative interest, the data can be examined in SI Interactive. As with their absolute magnitudes, we fount that topics' temporal slopes of betweenness centrality and degree were significantly related (ρ = 0.58, p < 0.001). However, unlike their absolute magni- tudes, slopes of betweenness centrality and strength were also significantly related (ρ = 0.29, p < 0.01). This distinction suggests that although topics with the highest betweenness centrality tended to have many weak connections, topics' changes in between- ness centrality were positively related to both the number and strength of their connections. Top- ics showing increases in betweenness, degree, and strength over time included speech, longitudinal, and reading. Topics that showed decreases in these metrics included dopamine, cerebral blood flow, and vision. While the trade-off between static clustering co- efficient and participation coefficient reflects over- all isolation or integration in the past ten years, 7 the changes in these measures over time may bet- ter reflect how a topic will relate to the field going forward. Here, the slopes of the clustering coeffi- cient and participation coefficient were negatively related (ρ = −0.64, p < 0.001), suggesting that as topics' become more integrated into a subfield, the strength of their relationships with topics outside of that subfield tends to fade. Topics that have shown increasing clustering over time included plasticity, development, and multiple sclerosis, while topics with increasing participation included DTI, emo- tion, and depression (Table 2). For this measure, structural MRI topics, while generally high in over- all clustering, were found to be moving in a variety of directions. Specifically, topics related to tractog- raphy (e.g., DTI, myelin) showed increasing partic- ipation, suggesting increasing integration into the field, while more traditional structural topics (e.g., segmentation, multiple sclerosis) showed increasing clustering, suggesting further isolation. Structural foundations of topic prevalence Figure 4: Illustration of the relationships between topics' prevalence and the prevalence of their neigh- bors. Node size represents prevalence, reflecting the finding that topics do not tend to be more strongly connected to topics with similar overall prevalence. Dotted lines repre- sent changes in prevalence over time, reflecting the finding that topics tend to be more strongly connected to topics with similar prevalence change. Overall topic prevalence Temporal changes in topic prevalence Of particular interest was the relationship be- tween graph measures and topics' popularity in the literature, operationalized by the proportion of arti- cles in which they appeared. In addition to consid- ering the structural features described in the pre- vious section, for this analysis we defined a new variable, ξ, which measured the degree to which a topic was a member of a "rich club" of commonly discussed topics. As opposed to the typical rich club coefficient that measures the edge strengths of each node's neighbors, this metric measured the prevalence of each node's neighbors. We then re- gressed the log of topic prevalence on betweenness centrality, degree, strength per edge, clustering co- efficient, participation coefficient, and ξ. We found that degree (t93 = 5.29, p < 0.001), strength per edge (t93 = 4.27, p < 0.001), and clustering co- efficient (t93 = −3.45, p < 0.001) were associ- ated with topic prevalence. These relationships suggest that, accounting for the other variables, topic prevalence tends to be associated with hav- ing more, stronger, and more diverse connections. Interestingly, ξ was not associated with prevalence (t93 = 0.72, p = 0.47), indicating that topics do not tend to be preferably connected to similarly popu- lar topics. We next sought to investigate whether changes in topics' structural roles were associated with changes in their prevalence in the literature. Similar to the "prevalence-rich club" measure just described, for this analysis we defined a new variable, Ω, that measured the degree to which a topic tended to be related to topics with increasing or decreasing prevalence in the literature. We then regressed the slope of topic prevalence on Ω and the slopes of betweenness centrality, degree, strength per edge, clustering coefficient, and participation coefficient. We found that slopes of degree (t92 = 3.30, p = 0.001) and participation coefficient (t93 = −2.28, p = 0.03) were significantly associated with the slope of topic prevalence. These relationships sug- gest that topics tend to gain more connections as they become more commonly discussed in the liter- ature, but these connections tend to be limited to the topic's own subfield. Interestingly, Ω was strongly associated with changes in topic prevalence (t93 = 7.61, p < 0.001), indicating that although a topic's overall prevalence is not related to the prevalence of its neighbors, changes in a topic's prevalence are highly related to changes in the prevalence of its neighbors (Fig- ure 4). This pattern is best exemplified by the 8 Figure 5: Changing prevalence of neuroimaging topics. (A) The relationship between topics' changes in prevalence, along the y-axis, and the changes in prevalence of their neighbors, along the x-axis. (B) Examples of prevalence trajectories for five exemplary topics with notable increases or decreases in prevalence over the course of the study. trio of topics, functional connectivity, resting state, and default mode network. Certain topics' deviance from the model fit also suggests that – based on their role in the network – they might be currently undervalued in the literature. Two such topics, in- dependent component analysis and synchronization, were predicted to show greater increases in preva- lence than was actually observed (Figure 5). Discussion Neuroimaging is an exciting, broad, and rapidly changing field. These features make it a rich terri- tory for new ideas and innovative connections be- tween existing topics, but also contribute to a com- plex and dynamic landscape of research. In this study, we set out to examine the structure of neu- roimaging research over the last ten years, and to describe the changing roles of specific areas of study. Structure of the topic network A network of research topics was constructed us- ing ten years of NeuroImage articles, and was found to have features uncharacteristic of a random net- work. Specifically, the network had higher levels of clustering and higher path length than a random network. As a result of the large increase in cluster- ing and moderate increase in path length compared to a random network, the neuroimaging landscape was found to show a high degree of small-worldness. This feature signifies local clustering within distinct subfields, potentially facilitating iteration and ad- vancement within existing topic relationships, and sparse connections between subfields, potentially facilitating innovation and the creation of new con- nections 21,22,20. This small-world structure is con- sistent with the networks described in studies of co-authorship and citation 4,5 at larger scales of sci- entific research, and interestingly also resembles the structure found in many brain networks 23. Topic communities While examinations of the network structure of scientific research at a larger scale have revealed in- terdisciplinary communities of research scientists 24 and topics 20, it remains of interest to gain a bet- ter understanding of topic communities at the scale of individual fields. At the smaller scale of the neuroimaging topic network, communities appear to largely agree with the subfields that might be expected by a scientist, in that they are divided along the major lines of structural MRI, functional MRI, and EEG/MEG research (Figure 1, SI In- teractive). Yet while potentially unsurprising, the strong divisions across imaging modalities suggest 9 that there might be opportunities for further in- sight and innovation through the joint investiga- tion of several modalities within studies. Indeed, researchers in the field have recently argued that while some specialization is beneficial, experience across modalities is important both professionally and scientifically 25. In some ways, this trade-off re- flects a small-scale version of the debate surround- ing interdisciplinarity across scientific fields 26,27, in which some believe better science arises from spe- cialization 28 and others believe cross-disciplinary work is vital for innovation 29. One additional and perhaps surprising finding was the presence of a community that was almost exclusively related to research on Alzheimer's dis- ease. The existence of this community is potentially a reflection of the growing burden of Alzheimer's disease 30, which has been met with increases in research efforts 31 and neuroimaging resources 32. While the prevalence of these topics within neu- roimaging appears to indicate a strong response within the field to the pressing need for research in this area, future work could investigate how the characteristics of this sub-field influence the trans- lation of neuroimaging findings to clinical research and practice. This question could potentially be pursued by quantifying the ways in which topic re- lationships relate to future citation patterns. Structural roles of individual topics In addition to quantifying the overall landscape of neuroimaging, we sought to gain a better un- derstanding of how individual topics contributed to its structure. The degree to which topics bridged gaps between distinct clusters (betweenness central- ity) was significantly associated with the number of connections they had to other topics (degree). This pattern of relations is consistent with the presence of "hub nodes," which have many diverse connec- tions across the network. Yet, interestingly, be- tweenness centrality was not associated with the strength of these connections, suggesting that hub nodes tended to have relatively weak relationships with the topics that they were connected to. Topics that fit this pattern tended to be very broad, such as brain and cortex, but some more specific topics also served to connect seemingly distant subfields, like functional connectivity, plasticity, and motion (Table 1). While patterns in overall betweenness centrality seem to be strongly related to the breadth or spe- cialization of topics, similarly interesting relation- 10 ships between degree, betweenness centrality, and strength held when looking at their percent change over time within nodes. For these measures, both change in degree and change in strength were posi- tively associated with change in betweenness cen- trality, suggesting that the associations observed between the overall measures may not be strictly reflective of the inherent nature of the topics, but may instead be tapping into the way topics' struc- tural roles develop and change over time. Addition- ally, topics that followed this patterns of increas- ing betweenness centrality and degree over time did not show much overlap with the broad topics that had high overall levels in these measures, and were instead more specific applications like speech and reading (Table 2). In terms of the relationships that topics formed with other topics, there seemed to be a trade-off be- tween strong integration in a specific subfield (clus- tering) and having diverse connections across com- munities (participation), as evidenced by a signif- icant negative association between the two mea- sures. Topics related to structural MRI tended to be highly clustered, relating very strongly to other topics in that area and rarely forming asso- ciations with topics from other subfields. In fact, seven of the ten most clustered topics were directly related to white matter tracts or diffusion imag- ing. Topics that had diverse connections across subfields were more variable, but tended to be re- search applications, as opposed to modalities, re- gions, or methods. Highly participatory topics in- cluded schizophrenia, learning, stroke, epilepsy, and memory (Table 1). The negative association between clustering and participation held for topics' changes in clustering and changes in participation, again suggesting that the overall associations may tap into the manner in which structural roles change alongside topics' changing roles in the literature. Interestingly, al- though topics related to structural MRI were some of the most highly clustered overall, different topics within this subfield seem to be moving in different directions over time. Multiple sclerosis and segmen- tation, for example, showed increasing clustering, while myelin and DTI showed increasing participa- tion. Applications related to psychiatry also seem to be developing more diverse associations across the neuroimaging landscape, with emotion, depres- sion, and anxiety all showing relative increases in participation (Table 2). Structural foundations of topic prevalence Although the structural roles of topics within the network can provide valuable information about how ideas and subfields interact and change, the aspect that is potentially the most relevant to re- searchers in the field is the frequency with which topics are discussed in the literature. As such, we sought to understand how a topic's structural fea- tures in the neuroimaging network might be asso- ciated with its overall prevalence in the literature, and how changes in those features might correspond to changes in its prevalence. Over the past ten years, we found that a topic's overall prevalence in the literature, defined as the proportion of keyword sections and abstracts in which it was mentioned, was positively associated with its total number of connections and the aver- age strength of its connections, and negatively as- sociated with the degree of local clustering within its neighboring topics. These results suggest that common topics tend to have many relatively strong connections to other topics, and that these neigh- boring topics tend not to be highly related to each other. Interestingly, highly prevalent topics were not more likely to be connected to other prevalent topics, and therefore little evidence was found for a prevalence-based rich club. Potentially more interesting than the structural foundations of overall prevalence are the structural foundations of changes in topic prevalence. In other words, we were curious what changes in network features might be associated with changes in how commonly a topic was discussed in the literature. Here, we again found that degree was relevant, with changes in degree showing a positive association with changes in prevalence. Importantly, this find- ing demonstrates that not only are popular topics also well-connected, but that becoming more well- connected is associated with becoming more pop- ular. Additionally, changes in participation were negatively associated with changes in prevalence, suggesting that as a topic becomes more prevalent, its connections tend to become more localized to the topic's own community. Interestingly, the degree to which a topic's neigh- bors increased or decreased in prevalence was strongly associated with the degree to which that topic itself increased or decreased in prevalence. This pattern of relations is perhaps unsurprising, as one might expect the fortunes of related topics to be linked. Yet the pattern is also potentially quite use- ful, as it provides a method for determining which 11 topics are out of sync with their neighbors, and therefore might have recently been superseded by other similar topics or might be ripe areas for fur- ther research. One example of this phenomenon is independent component analysis, which has not seen an increase in prevalence in recent years de- spite the rise in popularity of many topics with which it is strongly connected (Figure 5). Conclusion As science advances, collaboration grows, and the boundaries between research areas blur, it will be increasingly difficult to form and maintain a com- plete picture of the landscape of any given field. As these changes occur, formal quantitative stud- ies of scientific research offer an opportunity to better synthesize and understand relationships be- tween existing and new domains of inquiry. Here, we used network science to gain insight into the landscape of neuroimaging research in a ten-year span between 2008 and 2017, and revealed pre- viously unknown structural features that emerge from published literature. We found the network to have small-world properties, with communities centered largely around distinct imaging modali- ties, and bridges between them made up of broadly relevant applications and methods. We additionally quantified the structural contri- butions of individual nodes, finding high clustering among topics related to structural MRI and increas- ing participation among topics related to psychia- try. Finally, we discovered that the degree to which topics see increasing or decreasing prevalence in the literature is strongly associated with increases or decreases in the prevalence of their neighbors in the network – a relationship that may help reveal top- ics that are currently undervalued or recently super- seded. Overall, this work sought to characterize the landscape of neuroimaging research at the current moment, and to inform researchers of the structural and literary trends that form the foundations of the field. Acknowledgements The authors would like to thank Lili Dworkin and Ipek Oguz for advice on data collection and analysis. RTS would like to acknowledge support from the National Institute of Neurological Disor- ders and Stroke (R01 NS085211 & R01 NS060910). DSB would like to acknowledge support from the John D. and Catherine T. MacArthur Founda- tion, the Alfred P. Sloan Foundation, the ISI Foundation, the Paul Allen Foundation, the Army Research Office (DCIST-W911NF-17-2-0181), and the National Science Foundation CAREER (PHY- 1554488). The content is solely the responsibility of the authors and does not necessarily represent the official views of any of the funding agencies. Supporting Information SI Interactive A fully interactive version of the network described in this paper can be accessed at https://jdwor.shinyapps.io/NeuroimagingLandscape/ using the password: NeuroIm10. References [1] M. E. J. Newman. Clustering and preferential at- tachment in growing networks. Physical Review E, 64 (2), July 2001. ISSN 1063-651X, 1095-3787. doi: 10. 1103/PhysRevE.64.025102. URL https://link.aps. org/doi/10.1103/PhysRevE.64.025102. The [2] Stuart R. Borrett, James Moody, and Achim Edel- mann. rise of Network Ecology: Maps of the topic diversity and scientific collaboration. Ecological Modelling, 293:111–127, December 2014. ISSN 03043800. 10.1016/j.ecolmodel.2014. 02.019. URL http://linkinghub.elsevier.com/ retrieve/pii/S0304380014001136. doi: [3] C. Chen. Searching for intellectual turning points: Pro- gressive knowledge domain visualization. Proceedings of the National Academy of Sciences, 101(Supplement 1): 5303–5310, April 2004. ISSN 0027-8424, 1091-6490. doi: 10.1073/pnas.0307513100. URL http://www.pnas.org/ cgi/doi/10.1073/pnas.0307513100. [4] M. E. J. Newman. The structure of scientific collabora- tion networks. Proceedings of the National Academy of Sciences, 98(2):404–409, January 2001. ISSN 00278424. doi: 10.1073/pnas.021544898. URL \left(. [5] Matthew L. Wallace, Vincent Larivire, and Yves Gin- gras. A small world of citations? The influence of collaboration networks on citation practices. PLoS ONE, 7(3):e33339, March 2012. ISSN 1932-6203. doi: 10.1371/journal.pone.0033339. URL http://dx.plos. org/10.1371/journal.pone.0033339. [6] Ernest C. Davenport and Nader A. El-Sanhurry. Phi/Phimax: Review and synthesis. Educational and Psychological Measurement, 51(4):821–828, December 1991. 10.1177/ 001316449105100403. URL http://journals.sagepub. com/doi/10.1177/001316449105100403. ISSN 0013-1644, 1552-3888. doi: [7] A. Barrat, M. Barthelemy, R. Pastor-Satorras, The architecture of complex and A. Vespignani. weighted networks. Proceedings of the National Academy of Sciences, 101(11):3747–3752, March 2004. ISSN 0027-8424, 1091-6490. 10.1073/pnas. doi: 12 0400087101. URL http://www.pnas.org/cgi/doi/10. 1073/pnas.0400087101. [8] Mikail Rubinov and Olaf Sporns. Complex network measures of brain connectivity: Uses and interpre- NeuroImage, 52(3):1059–1069, September tations. 2010. doi: 10.1016/j.neuroimage. 2009.10.003. URL http://linkinghub.elsevier.com/ retrieve/pii/S105381190901074X. ISSN 10538119. [9] D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440–442, June 1998. ISSN 0028-0836. doi: 10.1038/30918. [10] Sarah Feldt Muldoon, Eric W. Bridgeford, and Small-world propensity and Danielle S. Bassett. weighted brain networks. Scientific Reports, 6(1), April 2016. ISSN 2045-2322. doi: 10.1038/srep22057. URL http://www.nature.com/articles/srep22057. [11] L.G.S. Jeub, M. Bazzi, I.S. Jutla, and P.J. Mucha. A generalized Louvain method for community detec- tion implemented in MATLAB, 2011. URL http: //netwiki.amath.unc.edu/GenLouvain. [12] M. E. J. Newman and M. Girvan. Finding and evalu- ating community structure in networks. Physical Re- view E, 69(2), February 2004. ISSN 1539-3755, 1550- 2376. doi: 10.1103/PhysRevE.69.026113. URL https: //link.aps.org/doi/10.1103/PhysRevE.69.026113. [13] M. E. J. Newman. Modularity and community structure in networks. Proceedings of the National Academy of Sciences, 103(23):8577–8582, June 2006. ISSN 0027-8424, 1091-6490. 10.1073/pnas. 0601602103. URL http://www.pnas.org/cgi/doi/10. 1073/pnas.0601602103. doi: [14] Benjamin H. Good, Yves-Alexandre de Montjoye, and Aaron Clauset. Performance of modularity maximiza- tion in practical contexts. Physical Review E, 81(4), April 2010. doi: 10. 1103/PhysRevE.81.046106. URL https://link.aps. org/doi/10.1103/PhysRevE.81.046106. ISSN 1539-3755, 1550-2376. [15] Andrea Lancichinetti and Santo Fortunato. Consensus clustering in complex networks. Scientific Reports, 2 (1), December 2012. ISSN 2045-2322. doi: 10.1038/ srep00336. URL http://www.nature.com/articles/ srep00336. [16] Linton C. Freeman. Centrality in social networks conceptual clarification. Social Networks, 1(3):215– 239, January 1978. 10. 1016/0378-8733(78)90021-7. URL http://linkinghub. elsevier.com/retrieve/pii/0378873378900217. ISSN 03788733. doi: [17] Roger Guimer and Lus A. Nunes Amaral. Functional cartography of complex metabolic networks. Nature, 433(7028):895–900, February 2005. ISSN 0028-0836, 1476-4687. doi: 10.1038/nature03288. URL http: //www.nature.com/articles/nature03288. [18] Thomas M. J. Fruchterman and Edward M. Reingold. Graph drawing by force-directed placement. Software: Practice and Experience, 21(11):1129–1164, November 1991. ISSN 00380644, 1097024X. doi: 10.1002/spe. 4380211102. URL http://doi.wiley.com/10.1002/ spe.4380211102. [19] Mikail Rubinov and Olaf Sporns. Weight-conserving characterization of complex functional brain net- works. NeuroImage, 56(4):2068–2079, June 2011. ISSN 10538119. 10.1016/j.neuroimage.2011. 03.069. URL http://linkinghub.elsevier.com/ retrieve/pii/S105381191100348X. doi: [20] J. D. Dworkin, R. T. Shinohara, and D. S. Bassett. roimaging Initiative, 2004 to 2014. Alzheimer's & De- mentia, 11(7):865–884, July 2015. ISSN 15525260. doi: 10.1016/j.jalz.2015.04.005. URL http://linkinghub. elsevier.com/retrieve/pii/S1552526015001715. The emergent integrated network structure of scientific research. ArXiv e-prints, April 2018. [21] M. E. J. Newman. Coauthorship networks and pat- terns of scientific collaboration. Proceedings of the Na- tional Academy of Sciences, 101(Supplement 1):5200– 5205, April 2004. ISSN 0027-8424, 1091-6490. doi: 10.1073/pnas.0307545100. URL http://www.pnas.org/ cgi/doi/10.1073/pnas.0307545100. [22] Caroline S. Wagner and Loet Leydesdorff. Network structure, self-organization, and the growth of interna- tional collaboration in science. Research Policy, 34(10): 1608–1618, December 2005. ISSN 00487333. doi: 10. 1016/j.respol.2005.08.002. URL http://linkinghub. elsevier.com/retrieve/pii/S0048733305001745. [23] Danielle Smith Bassett and Ed Bullmore. Small- world brain networks. The Neuroscientist, 12(6):512– 523, 2006. doi: 10.1177/1073858406293182. URL https://doi.org/10.1177/1073858406293182. PMID: 17079517. [24] Borut Luar, Zoran Levnaji, Janez Povh, and Matja Perc. Community structure and the evolution of inter- disciplinarity in Slovenia's scientific collaboration net- work. PLoS ONE, 9(4):e94429, April 2014. ISSN 1932-6203. doi: 10.1371/journal.pone.0094429. URL http://dx.plos.org/10.1371/journal.pone.0094429. Neuroscience: A head start for brain imaging. Nature, 503(7474):153–155, Novem- ber 2013. 10. URL http://www.nature.com/ 1038/nj7474-153a. doifinder/10.1038/nj7474-153a. ISSN 0028-0836, 1476-4687. [25] Virginia Gewin. doi: [26] D. Rhoten. Risks and rewards of an interdisciplinary research path. Science, 306(5704):2046–2046, December 2004. ISSN 0036-8075, 1095-9203. doi: 10.1126/science. 1103628. URL http://www.sciencemag.org/cgi/doi/ 10.1126/science.1103628. [27] Jerry A. Jacobs and Scott Frickel. Interdisciplinarity: Annual Review of Sociol- A critical assessment. ogy, 35(1):43–65, August 2009. ISSN 0360-0572, 1545-2115. doi: 10.1146/annurev-soc-070308-115954. URL http://www.annualreviews.org/doi/10.1146/ annurev-soc-070308-115954. [28] Lennard J Davis. A grand unified theory of interdisci- plinarity. Chronicles of Higher Education, 53(40):B9, 2007. [29] Facilitating interdisciplinary research. National Academies Press, Washington, D.C., April 2004. ISBN 978-0-309-09435-1. URL http://www.nap.edu/ catalog/11153. DOI: 10.17226/11153. [30] Oscar L. Lopez. The growing burden of Alzheimer's disease. The American Journal of Managed Care, 17 Suppl 13:S339–345, November 2011. ISSN 1936-2692. [31] Michael E. Hughes, John Peeler, John B. Hogenesch, and John Q. Trojanowski. The Growth and Impact of Alzheimer Disease Centers as Measured by Social Network Analysis. JAMA Neurology, 71(4):412, April 2014. 10.1001/jamaneurol. 2013.6225. URL http://archneur.jamanetwork.com/ article.aspx?doi=10.1001/jamaneurol.2013.6225. ISSN 2168-6149. doi: [32] Michael W. Weiner, Dallas P. Veitch, Paul S. Aisen, Laurel A. Beckett, Nigel J. Cairns, Jesse Cedarbaum, Michael C. Donohue, Robert C. Green, Danielle Har- vey, Clifford R. Jack, William Jagust, John C. Morris, Ronald C. Petersen, Andrew J. Saykin, Leslie Shaw, Paul M. Thompson, Arthur W. Toga, and John Q. Trojanowski. Impact of the Alzheimer's Disease Neu- 13
1904.04558
1
1904
2019-04-09T09:23:33
Enabling the Social Internet of Things and Social Cloud
[ "cs.SI" ]
Social Internet of Things are changing what social patterns can be, and will bring unprecedented online and offline social experiences. Social cloud is an improvement over social network in order to cooperatively provide computing facilities through social interactions. Both of these two field needs more research efforts to have a generic or unified supporting architecture, in order to integrate with various involved technologies. These two paradigms are both related to Social Networks, Cloud Computing, and Internet of Things. Therefore, we have reasons to believe that they have many potentials to support each other, and we predict that the two will be merged in one way or another.
cs.SI
cs
I Enabling Social Internet of Things and Social Cloud Weishan Zhang 1, Qun Jin 2, Didier El Baz 3 1 Department of Software Engineering, China University of Petroleum No.66 Changjiang West Road, Qingdao, China. 266580 2 Department of Human Informatics and Cognitive Sciences, Waseda University, Japan 3 LAAS-CNRS, 7 avenue du Colonel Roche 31077, Toulouse Cedex 4, France Abstract -- Social Internet of Things are changing what social patterns can be, and will bring unprecedented online and offline social experiences. Social cloud is an improvement over social network in order to cooperatively provide computing facilities through social interactions. Both of these two field needs more research efforts to have a generic or unified supporting architecture, in order to integrate with various involved technologies. These two paradigms are both related to Social Networks, Cloud Computing, and Internet of Things. Therefore, we have reasons to believe that they have many potentials to support each other, and we predict that the two will be merged in one way or another. Index Terms -- Social Internet of Things, Social Cloud, Social network, Cloud computing 1 INTRODUCTION With the development of Internet of Things (IoT), people begin to live in a cyber-physical-social hyper space. The Internet of Things are changing dramatically what it means to be social. The very obvious examples are smart phones, tablets, laptops and all other wearable devices are connecting people directly or indirectly through different applications, like Twitter1, Facebook2, WeChat3, and other social network applications. Everyday objects and people are connected with each other to establish social relationships and form a social network, which is called Social Internet of Things (SIoT) [1]. SIoT will bring unprecedented online and offline social experiences. SIoT is the interconnection of different services, objects and people where participants can benefit from involving in this network. For example, smart transportations that involving vehicle networks, drivers, smart phones, and other devices may make traffic congestion as less as possible where traffic information are timely disseminated at real time. As the next evolutionary step of the internet of things, SIoT is expected to enhance performance of object discovery, service composition, and evaluation of trustworthiness of objects [2]. However, even there are some projects that are dedicated to provide SIoT platforms (e.g the project Social- IoT 4 and INPUT5), it is noted that SIoT enabling technologies need more efforts in different directions including [2]: - Definition of inter-object relationships, like semanticrepresentational models for social relationships, solutions to autonomously sense other objects and exchange information. - Network analysis algorithms tailored for SIoT after the establishment of a social network. - Architecture tailored for SIoT that allows for establishment and exploitation of social relationships, resources and services. A closely related field with respect to SIoT is the "Social Cloud (SoC)" [3] [4], which is an improvement over social network in order to cooperatively provide computing facilitiesthrough social interactions. SoC is playing important roles in different areas, e.g. serving as shared infrastructure for software crowdsourcing [5]. Another interesting example is a SoC supported approach for helping to alleviate communication breakdowns led by asymmetries in media and time preferences among different ages of family members [6]. SoC and SIoT can be integrated together to make use of advantages of both paradigms. Novel data fusion algorithms, artificial intelligence techniques can be used to realize automated decision making in SoC in order to support better communication and collaboration among people and things in SIoT. The combination of SoC and SIoT can realize ubiquitous sensing and computing beyond the capability of individual of people or things, and stimulate innovations in various fields. 2 WHAT DO WE COVER IN THIS SPECIAL ISSUE? This special issue presents most recent research on SoC and SIoT. We have three papers on various research issues of SIoT in which one paper presents their work for integrating SoC with SIoT. There is one paper that presents a review of SoC research. SIoT can be used to enable the integration of a variety of devices into people daily life, being empowered by the interconnectivity and the FOAF (Friend of a Friend) feature offered by Social Networking Services (SNS). As a promising paradigm, SIoT can provide an infrastructure to study and integrate the intelligence mechanisms required to enhance services adaptability and user-friendliness. In their article "Social Cloud-based Cognitive Reasoning for Task-oriented Recommendation in the Social Internet of Things", Dina Hussein, Son N. Han, Gyu Myoung Lee and Noel Crespi from Institut Mines-Telecom and Liverpool John Moores University describe their approach to the integration of cognitive reasoning into SIoT for providing recommendation ofquotidian tasks in smart homes, in which reasoning about both physical and social aspects of context is required to achieve situation characterization. They propose and developan intelligent recommendation framework as a service built on top of SoC, by utilizing the reasoning mechanism on context elements represented by ontologies. ThingsChat, a proof-of-concept prototype, is built and explained with experiment results, which demonstrates improvement in adaptability of recommendation results to users situations. Implementations of the SIoT model envision cyber counterparts of physical objects are called social virtual objects (SVOs), virtualized in the cloud. However, most of the IoT devices do not have the processing and communication capabilities required to create and manage social relationships. The paper "Social Virtual Objects in the Edge Cloud: a key component for distributed IoT applications" by I. Farris, R. Girau, L. Militano, M. Nitti, L. Atzori, A. Iera and G. Morabito, investigates how to address this issue by exploiting computing resources in the edge of a network to hostSVOs of the SIoT. Edge cloud technologies is used for the implementation of their SIoT platform, which is expected to reduce latency, to increase scalability, and to ease management of physical node mobility. Through experimental simulations, they investigate the frequency of each type of message exchanged under different inter-cloud migrations of processes associated to virtual objects, and assess the latency reduction w.r.t. conventional cloud solutions. There have been three types of efforts to enable SoC since it was proposed in 2010 [3], namely Social Compute Cloud supports sharing of compute resources between friends, Social Storage Cloud supports storage resource sharing, allowing users to store data on friends resources, Social Content Delivery Network (S-CDN) provides a fabric for replicating and sharing data, using friends resources as intermediate content delivery nodes, as summarized in the paper titled "Social Clouds: A Retrospective" by Kyle Chard, Simon Caton, Omer Rana, Kris Bubendorfer. Based on their previous implementations, the authors propose a general social cloud architecture to facilitate heterogeneous bilateral resource sharing. Interoperability and cloud federation standards thus will be important to ensure seamless resource usage. Similar to SIoT research, suitable algorithms and metrics are needed to analyze social clouds. In Social Internet of Things (SIoT), devices are usually divided to groups with different relationship in social networks. However, radio access network (RAN) used for connecting IoT devices is short of supporting SIoT groups. For this, network virtualization with software defined network (SDN) structure is a scalable solution. But this solution is hard to support enough groups due to rule space limitation of existing SDN enabled devices. In their work titled "Cloud Radio Access Network Virtualization for Social Internet of Things" by He Li, Mianxiong Dong, and Kaoru Ota, a SDN based RAN virtualization framework is proposed to maximize the number of SIoT groups with limited SDN rule space. Extensive simulations show that the proposed solution provides more SIoT groups compared with some other allocation methods, with better performance at thesame time. 3 CONCLUSION Both SIoT and SoC are at infant stage, and more research efforts are need to have a better, and probably unified supporting architecture, in order to integrate with heterogeneous technologies involved in SIoT and SoC. Security and trust issues are still there and obviously need more attentions, especially in social environments. And clearly, SIoT and SoC have more potentials to go ahead hand by hand, and to support each other. We would like to say that the two have very good potentials to merge as a unified paradigm. ACKNOWLEDGMENTS This special issue would not have been possible without the support of Mazin Yousif, editor in chief of IEEE Cloud Computing, colleagues from the IEEE Computer Society office, and all reviewers involved the review process. REFERENCES [1] L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet of things (siot) -- when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, no. 16, pp. 3594 -- 3608, 2012. [2] L. Atzori, A. Iera, and G. Morabito, "From" smart objects" to" social objects": The next evolutionary step of the internet of things," Communications Magazine, IEEE, vol. 52, no. 1, pp. 97 -- 105, 2014. [3] K. Chard, S. Caton, O. Rana, and K. Bubendorfer, "Social cloud: Cloud computing in social networks," in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010, pp. 99 -- 106. [4] K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, "Social cloud computing: A vision for socially motivated resource sharing," Services Computing, IEEE Transactions on, vol. 5, no. 4, pp. 551 -- 563, 2012. [5] K. Chard and S. Caton, "Social clouds: Crowdsourcing cloud infrastructure," in Crowdsourcing, ser. Progress in IS, W. Li, M. N. Huhns, W.-T. Tsai, and W. Wu, Eds. Springer Berlin Heidelberg, 2015, pp. 191 -- 217. [Online]. Available: http://dx.doi.org/10.1007/978-3-662-47011-4 11 [6] D. Muoz, R. Cornejo, F. J. Gutierrez, J. Favela, S. F. Ochoa, and M. Tentori, "A social cloud-based tool to deal with time and media mismatch of intergenerational family communication," Future Generation Computer Systems, vol. 53, pp. 140 -- 151, 2015. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S0167739X14001356 Weishan Zhang Weishan Zhang is a full professor, deputy head for research of Department of Software Engineering, School of Computer and Communication Engineering, China University of Petroleum (UPC). He is the director of 'Big Data Intelligent Processing Innovation Team of Huangdao District', director of 'Big Data Processing for Petroleum Engineering of UPC', and founding director of the Autonomous Service Systems Lab. He was a Research Associate Professor/Senior Researcher at Computer Science Department, University of Aarhus (til Dec. 2010). He was a visiting scholar of Department of Systems and Computer Engineering, Carleton University, Canada (Jan. 2006 - Jan. 2007). He was an Associate Professor at School of Software Engineering, Tongji University, Shanghai, China (Aug. 2003- June 2007). He was a NSTB post-doctoral research fellow at Department of Computer Science, National University of Singapore (Sept. 2001 to Aug. 2003). His current h-index according to google schoolar is 14 and the numberof total citations is around 540 in Dec. 2015. Qun Jin un Jin is a professor and the chair of the Department of Human Informatics and Cognitive Sciences, Waseda University, Japan. His recent research interests cover human-centric ubiquitous computing, behavior and cognitive informatics, big data, personal analytics and individual modeling, e-learning, e-health, and computing for wellbeing.Jin received a PhD in computer science and electrical engineering from Nihon University. He is a member of IEEE. Contact him at [email protected]. Didier El Baz Dr. Didier El Baz is a CNRS research scientist at LAAS-CNRS since 1985. He is head and founder of the Distributed Computing and Asynchronism team (CDA). His H index is 21 and I10 index is 30. He has broad research interests including Parallel computing, distributed computing, Peer to peer computing, Applied Mathematics and Optimal Control.
1510.02583
1
1510
2015-10-09T07:20:06
Community Detection Using Slow Mixing Markov Models
[ "cs.SI" ]
The task of \emph{community detection} in a graph formalizes the intuitive task of grouping together subsets of vertices such that vertices within clusters are connected tighter than those in disparate clusters. This paper approaches community detection in graphs by constructing Markov random walks on the graphs. The mixing properties of the random walk are then used to identify communities. We use coupling from the past as an algorithmic primitive to translate the mixing properties of the walk into revealing the community structure of the graph. We analyze the performance of our algorithms on specific graph structures, including the stochastic block models (SBM) and LFR random graphs.
cs.SI
cs
Community Detection Using Slow Mixing Markov 1 Models Ramezan Paravi Torghabeh Member, IEEE, and Narayana Prasad Santhanam Member, IEEE 5 1 0 2 t c O 9 ] I S . s c [ 1 v 3 8 5 2 0 . 0 1 5 1 : v i X r a Abstract The task of community detection in a graph formalizes the intuitive task of grouping together subsets of vertices such that vertices within clusters are connected tighter than those in disparate clusters. This paper approaches community detection in graphs by constructing Markov random walks on the graphs. The mixing properties of the random walk are then used to identify communities. We use coupling from the past as an algorithmic primitive to translate the mixing properties of the walk into revealing the community structure of the graph. We analyze the performance of our algorithms on specific graph structures, including the stochastic block models (SBM) and LFR random graphs. Random Walk, Slow Mixing Markov Processes, Graph Partitioning, Community Detection, Correlation Clustering, Coupling From the Past. Index Terms I. INTRODUCTION Applications in biology [1]–[3], social sciences [4] and recommendation systems [5], [6] can be abstracted into community detection problems, where one attempts to find subsets of nodes that share common properties [7]. Typically, one constructs a graph with vertices corresponding to the objects to be organized together, while the graph edges represent connections between them. In the simplest setting for the community detection problem, one would partition the vertices into clusters that are strongly connected within themselves, while the cross- cluster connections are weak. One could consider more nuanced extensions as well, where vertices could belong to multiple clusters, or where edges may be weighted. To evaluate community detection algorithms, several variants of random graph models play an important role in generating test graphs that capture properties of real networks [8]–[10] in some way. One widely used model is the Stochastic Block Models (SBM). In this case, information theoretic limits for exact and partial recovery has been addressed as well in [11]–[14]. For community detection in SBMs, the approaches that have been widely considered are the maximum likelihood approach, semidefinite programming and belief propagation methods [15]–[17]. Many approaches for community detection implicitly require that the true number of clusters be known a-priori. An alternate approach is taken in Correlation Clustering where an objective function is designed so optimizing the objective function cost will automatically capture the underlying partition [18]. The correlation clustering problem is often formalized as an integer linear program. In [19], a randomized expected 3-approximation algorithm for correlation clustering was provided. In biological networks, one of the core algorithms used traces back to [2], [20] and is based on what is called centrality indices. The idea is to remove cross-cluster edges–if there are a few tight communities connected sparsely by inter-cluster edges, most cross-community shortest paths will go through the cross-cluster edges. The algorithm formalizes this insight and removes what it thinks are cross-cluster edges, leaving behind the communities. The authors are with the Department of Electrical Engineering, University of Hawai‘i, M¯anoa (Email:{paravi, nsanthan}@hawaii.edu). The closest other line of work to our approach is spectral clustering [21]–[24]. This method uses a given pairwise similarity between nodes in a network to assign weights to the edges, and uses the eigenvectors of the (symmetric, normalized) graph Laplacian to assign nodes to clusters. For two clusters, the Fiedler eigenvector can be partitioned around the median to yield clusters and for more than two clusters, similar extensions can be used involving k eigenvectors. While the implementation is simple, a couple of drawbacks need to be addressed—the pairwise similarity is often not automatically given in community detection problems, the Laplacian could be ill conditioned and the number of clusters need to be known in advance, see e.g., [25], [26]. 2 Markov Processes Let p be an irreducible and aperiodic first-order Markov process {Yi}∞ i=−∞ taking values in a finite alphabet S with S = r. Let Q = [p(ss(cid:48))] with s, s(cid:48) ∈ S denote the transition probability matrix of the process. Here, p(ss(cid:48)) (cid:44) p(Y1 = sY0 = s(cid:48)) denotes the transition probability from s(cid:48) to s. Furthermore, let π denote the unique stationary distribution of p, the unique solution of πQ = π. Namely, π is the unique solution to π(s(cid:48))p(ss(cid:48)), (1) (cid:88) s(cid:48)∈S π(s) = for all s ∈ S. Clearly p(Y1 = s) = π(s). Core idea Empirical properties of finite sized samples from Markov processes need not reflect staionary properties—e.g., the number of occurances of a string w in a finite sized sample from a Markov process p need to yield a good estimate of p(w). Roughly speaking, when the empirics of the sample eventually reflect the stationary properties, we say that the process has mixed. The core idea in this paper revolves around interpretation of the random walk before mixing has occured. Naturally then, to build clustering and community detection algorithms on graphs, we build Markov random walks such that the restriction of the random walk to within any one cluster mixes much faster than the overall walk itself. Once we obtain a walk like that, a careful interpretation of samples from the random walk along the lines of the theorems we obtain in [27] should reveal the community structure of the graph. II. COMMUNITY DETECTION USING SLOW MIXING MARKOV PROCESSES In order to identify communities in the graph, we define random walk on the graph, such that the mixing properties of the walk reveal the clusters. To do so, we use Coupling From The Past (CFTP) [28] to sample appropriately from the constructed random walk. CFTP was devised by Prop and Wilson and allows to obtain samples distributed according to the exact stationary distribution of a Markov process. In CFTP, the idea is to simulate different copies of a given Markov chain, each starting from a different initial state, but in a way that is often described as “backwards” in time—details will be outlined in Section II-B. While each chain is marginally faithful to the same Markov law, different copies are not independent from each other. Rather, the joint evolution is set up so that chains coalesce— once chains hit the same state at the same time, their future evolution is identical. When all copies of the chain coalesce at time 0, the obtained sample is distributed perfectly according to stationary distribution. Rather than sampling from the stationary distribution, we adapt the CFTP approach to identify clusters before the chains coalesce. To achieve this, we will identify subsets of state space which coalesce together faster. In following section, we introduce the notion of restriction of a Markov process to a subset G ⊆ S which will be translated into algorithmic rules for community detection in graphs. A. Restriction of a Markov Process to G Let G be an arbitrary nonempty subset of the state space S of the Markov process p with G = r(cid:48). Let { Yj} = {··· , Y−1, Y0, Y1,···} be the restriction of p to G. Note that Yj ∈ G, for all j. We will refer to restricted process at p. By the strong Markov property, p is also a Markov process over G. Furthermore, if p is aperiodic, then it has a stationary distribution which will be denoted by π. Let π(G) denote the stationary distribution of G, i.e. 3 (cid:88) w∈G π(G) = π(w). (cid:32) (cid:33) Q = QGG QGB QBG QBB The transition probability matrix of the process, Q, can be written as , (2) where B = S\G. Note that QGG and QBB are square matrices of size r(cid:48) × r(cid:48) and (r − r(cid:48)) × (r − r(cid:48)), respectively. Before proceeding further, we prove following useful lemma. Lemma 1. λi < 1 where λi’s are the eigenvalues of A. Then, Let A be an m × m matrix with max 1≤i≤m (I − A)−1 = I + A + A2 + A3 + ··· Proof The condition max 1≤i≤m equality follows by direct multiplication. Theorem 2. λi < 1 insures that the infinite series I + A + A2 + A3 + ··· is convergent. The 2 The transition probability matrix of the Markov process p is given by where I is the identity matrix with size r − r(cid:48). Furthermore, p has a unique stationary distribution π given by Q = QGG + QGB(I − QBB)−1QBG, for all w ∈ G. B. Partial CFTP π(w) = π(w) π(G) , (3) (4) 2 In this section, we first briefly review CFTP algorithm and then introduce the notion of partial coupling which is the core idea to identify clusters in our proposed community detection algorithm. Recall that S is the state space of the Markov process p with S = r. In CFTP algorithm, we run coupled copies of p, a different copy from every state in S. We use Dobrushin coupling [29] to couple the different chains. To run the CFTP for 1 step, we start all coupled copies from time -1, and run them for one step. To run it for the second step, we start coupled copies of the Markov process from every state in S at time -2, and run the chains for one step. Now we reuse the evolution from step -1 to 0. See [28] for why we choose this peculiar way of running the chains backward in time. initial state. Note Y (s,−n) Definition 1. We say that the CFTP algorithm has coalesced in the regular sense in n steps if n is the smallest number such that for all s, s(cid:48) ∈ S We represent the samples of p starting from time −n with state s by {Y (s,−n) } where superscript s denotes the = s. −n −i Y (s,−n) 0 = Y (s(cid:48),−n) . 0 Let Y0 denote the element that all chains have coalesced to, namely Y0 = Y (s−n) does not imply that time 0 is the point at which the chains Y (s,−n) first coalesce. 0 0 4 , s ∈ S. Note also that the definition 2 2 (5) We will refer to Y0 in Definition 1 as the output of CFTP algorithm. Theorem 3. [From [28]] Let Y0 be the output of the CFTP algorithm. Then, for all s ∈ S P(Y0 = s) = π(s), where P and π denote the coupling distribution and the stationary distribution of p, respectively. Let G ⊆ S. For a fixed n and w ∈ G, we define n−1(cid:88) i=0 (cid:44) N w−n 1(Y (w,−n) −i ∈ G), which denotes the number of occurrences of elements in G along the realization of the copy of p starting from w. Definition 2. We say that the CFTP algorithm at time −n is partially coalesced with respect to G if −n is the smallest time index such that for all w, w(cid:48) ∈ G Y (w,−n) = Y (w(cid:48),−n) , and N w−n = N w(cid:48) −n. (6) 0 0 for all w ∈ G. We refer to Y0 as the output of the algorithm. Let Y0 = Y (w,−n) 0 Let p be a Markov process over state space S and let G be an arbitrary nonempty subset of S. Theorem 4. Assume that the CFTP algorithm at time −n has partially coalesced w.r.t. G with Y0 ∈ S as the output of the CFTP algorithm per Definition 2. Suppose we further continue the simulation of the chain (starting from comt), and let j be the first time Yj ∈ G for some j ≥ 1. Let Y = Yj. Then, for all w ∈ G, we have 2 where π denotes the stationary distribution of p, respectively. 2 Pr( Y = w) = π(w) π(G) , C. Algorithm for Community Detection i=1 Ci = S. We will refer to individual Ci as a cluster. for all i and Ci ∩ Cj = ∅ for i (cid:54)= j with(cid:83)m The mixing properties of the process can be used to identify communities in the set of states of the process. To this end, we need to consider finding a partition C = {C1,··· Cm} of the state space S such that Ci ⊆ S, Ci (cid:54)= ∅ Note that we can associate to every partition C, a cost function J(C) depending on the application. For instance, in the context of random walks on graphs, one convenient choice can be cluster editing cost as we will discuss in section III-A. The other parameter is the number of clusters m. In our approach, in contrast to traditional methods such as k-means, m need not to be known a a-priori. In the Algorithm 1, the number of clusters will automatically will be determined by the algorithm and its value depend on the cost function J we consider. The algorithm is based on Theorem 4 which essentially describes how to identify a subset of states which have been partially coalesced. In essence, the algorithm identifies communities which have coalesced together during one sample run of CFTP algorithm. Description of the Algorithm: We consider one run of the CFTP algorithm and our setup is the same as original CFTP. We emphasize that the chains are simulated backward in time and the the random variables used during execution are reused. Recall that S = r. Initially, we have a partition of state space which consists of all singletons, i.e., C0 = {C1,··· , Cr} such that Ci = {s} for some s ∈ S. As we proceed backward in time to obtain a sample from stationary distribution, we will identify a set of critical times denoted by T , which are the times which some clusters have been coalesced. Definition 3. During execution of CFTP algorithm, we say that a time index n is a critical time if there exist at least two clusters C1 and C2 such that for all w, w(cid:48) ∈ C1 ∪ C2 5 where Y (w,−n) 0 N w−n = (cid:18) n−1(cid:88) = Y (w(cid:48),−n) 0 and N w−n = N w(cid:48) −n, (cid:19) Y (w,−n) −i ∈ C1 ∪ C2 1 . 2 i=0 Note that above definition can naturally be extended to more that two clusters. As a consequence, we can identify clusters which have been merged in critical times. Observe that when all the chains coalesce, we have a single partition consisting of all states. In other terms, we start off with all-singleton partition up to the point where we have a single partition. However, during this process, at critical times, we can identify clusters which merge together to yield a coarser partition. We can compute the cost associated to the particular partition that the sampling process yields and find the optimal partition C∗ with respect to the cost function J. In following pseudo-code, we represent all-singleton partition by C0 and CFlag denotes the coalescence flag. Here, we assume that we are minimizing a cost function J. A container T is used to store the critical times. Algorithm 1 DETECTING COMMUNITIES IN A MARKOV PROCESS Input: A Markov process p over S. Output: A partition C∗ of S. Initialize: k ← 1, C = C0, C∗ = C0, T = [0], CF lag = F alse. while CF lag = F alse do Simulate r copies of the chain starting at time −k. if k is a critical time then Update C by merging clusters which are coalesced; T = T.Append{k}; if J(C) ≤ J(C∗) then C∗ = C; end end if All r chains reach to some common state at time 0 then CF lag = T rue; else k ← k + 1 end end return C∗ Remark We need to carefully define the Markov process depending on the application on hand to exploit mixing properties of the process for revealing the underlying community structure. Furthermore, the choice of cost function depends on how the Markov process is defined. 2 Remark Note that in general, the algorithm can stop at any critical time and still yields a partition (though perhaps not optimal). A criteria which empirically seems to be effective is to record the difference ∆Ti (cid:44) Ti − Ti−1 6 between consecutive critical times. If the difference exceeds a prescribed threshold, the algorithm will stop. As we discuss simulation results in next chapter, we will see that if the process is slow mixing, then the resulted clusters usually coincide with ground truth communities. 2 III. SIMULATION RESULTS Our algorithm creates a random walk on the nodes of the graph. We start different, coupled random walks from different nodes. We then adapt the coupling from the past approach to to identify clusters before the chain mixes (rather than sample from the stationary distribution). Construction of Random Walk: In order to use Algorithm 1 for graph partitioning problem, first we define a non-uniform random walk on the graph as follows: Given an undirected graph G = (V, E) and v ∈ V , let N (v) be the set of neighbors of v in G. We assign a weight to every edge e = (v, w) ∈ E(G) given by where f (x) = xr for some r ∈ Z+. Then, for all u ∈ N (v), the transition probability of the walk is given by w(e) (cid:44) w(v, u) = f P(uv) = (cid:18)(cid:12)(cid:12)N (v) ∩ N (u)(cid:12)(cid:12)(cid:19) (cid:80) w(v, u) , w(v, u(cid:48)) . u(cid:48)∈N (v) (7) (8) The above scaling can be interpreted how different similar neighbor nodes vote on transition probabilities. A similar scaling method (with exponential function) was used in [23] for image segmentation applications. This reflects the fact that cross-cluster edges have smaller weight compare to in-cluster edges. To evaluate the performance of the algorithm we considered random graph generative models including the (i) Stochastic Block Models (SBM), (ii) LFR models (random graphs with power law degree distribution having well defined community structure [30]), and (iii) real world networks with known community structure are used to test the algorithm. The number of communities is not known to our algorithm in advance, nor is any generative model we may have used. Where relevant, we used cluster edit distance (number of addition and deletion of edges needed to turn a graph into disjoint cliques) and compared the results with the state-of-the-art Correlation Clustering (CC-PIVOT) [19] algorithm. A. Stochastic Block Model the set of the nodes in G. Assume that there exists an underlying true partition V =(cid:83)k Let G(n, p, q, k) be the random graph model which will has following properties. Let V = {1,··· , n} (cid:44) [n] be (cid:80)k i=1 Vi of the nodes such that i=1 Vi = n. In this generative model, for all w, v ∈ V , if v ∈ Vi and w ∈ Vj for some i (cid:54)= j, then w is connected to v with probability q. If v, w ∈ Vi for some i, then w is connected to v with probability p. All choices of edges are independent from each other and E(G) denote the set of edges in the G. For SBM random graphs G(n, p, q, k), we tested the performance of algorithm by varying model parameters n, p and q and number of communities in the graph. Note that given a partition of graph a G, we can associate a cost to that partition. One convenient choice is the number of edge addition and deletion in order to turn the graph into disjoint clusters. This measure is known as cluster editing cost [31]. This is in the spirit of correlation clustering setting in which one tries to transform a given graph into disjoint cliques by using minimum number of edge deletion or edge addition [18]. In order to evaluate the quality of the recovered communities in the SBM, we first consider the average cluster editing cost. For random graphs with roughly equal size ground truth communities, we computed and compared TABLE I: Comparison of average cost of our algorithm and CC-PIVOT on 10 samples taken uniformly at random from G(n, p, q). All cluster have the same size while the number of clusters in the graph varies. 7 Cluster-Size Num-Cluster 5 5 5 10 10 10 20 20 20 20 20 20 30 60 60 60 60 60 75 75 75 75 75 75 100 100 100 100 100 100 60 60 60 30 30 30 15 15 30 30 30 30 20 10 10 10 10 10 8 8 8 8 8 8 6 6 6 6 6 6 p 0.95 0.95 0.8 0.95 0.95 0.8 0.85 0.8 0.9 0.9 0.8 0.7 0.8 0.9 0.8 0.8 0.7 0.7 0.9 0.9 0.8 0.8 0.7 0.7 0.9 0.9 0.8 0.8 0.7 0.7 q 0.05 0.2 0.1 0.05 0.2 0.1 0.05 0.1 0.05 0.2 0.2 0.2 0.1 0.05 0.1 0.2 0.1 0.2 0.1 0.2 0.1 0.2 0.1 0.2 0.1 0.2 0.1 0.2 0.1 0.2 13977.6 41432 41042.9 40594 24626.5 22302.9 29711.2 47510.2 28827.9 47028 33773.6 51431.9 32683.4 49895.8 31452.8 48284.7 38898.6 55986.7 37517.8 53975.2 35612.8 51948.8 Our-Cost CCPivot-Cost 3020.3 9803.4 5249.1 3382.5 10425.2 5748.9 4059.8 6646 3572.3 11992.4 6518.6 4243.4 12725.3 7023.4 5030.6 8119.2 17569.8 51590.5 51225.3 50626.8 31612.9 22466.3 36251.1 57262.2 35849.5 55923.3 37830.4 59096 38469.7 58606 38101.2 57460.1 39732.2 61159.9 40637.8 61695.5 41015 60161 the average cost of partitions obtained by our algorithm and CC-PIVOT. The simulation results are summarized in TABLE I. The result show that the partitions found by our method are usually have smaller cluster editing cost. Remark The values of p and q are designed such that the resulting random graphs have well-knit clusters. Here, the emphasize is to only compare cluster editing cost obtained by our method with those obtained by CC-PIVOT. 2 The actual performance for recovering communities is depicted in Fig. 1 where matrix representation of the adjacency matrix of a realization of a SBM is used to visualize community structure. As it can be seen from the figure, almost all identities are recovered correctly. B. LFR Random Graphs Stochastic block models are not realistic in the sense that they usually have communities with approximately the same size and furthermore, all vertices have the same degree. In realistic networks, the degree distributions are usually skewed and size of communities varies. We consider another class of random graphs introduced in [30] which is known as LFR benchmark graphs. In these models, the distributions of both node degrees and number of communities admit power laws. The construction is as follows: Let n be the number of nodes. First a sequence of community sizes distributed by power law with exponent τ1 is generated. The degree of each node is distributed by power law with exponent τ2. Each node within a community of size k, shares a fraction 1 − µ of his corresponding edges with the members of his community and a fraction µ of his edges with other communities. The connection of edges is done similar to Configuration Model in such a way that the degree sequence is maintained. 8 (a) (b) (c) (d) Fig. 1: (a) Matrix representation of a realization of an SBM with n = 300, k = 5, p = 0.55, q = 0.07. (b) Same graph with random relabeling of nodes which serves as is the input to the algorithm. (c) Communities recovered by our algorithm. (d) Communities recovered by CC-PIVOT algorithm. Fig. 2 shows a realization of LFR graph with n = 200 nodes and 6 communities and parameters τ1 = 2, τ2 = 3 and µ = 0.25 with average degree equals 30. The communities are showed with different colors in circular layout for convenience. As it can be seen, the CC-PIVOT tends to create lots of singletons compared to ours. Observe that in our algorithm if we wait and track the clusters up before coalescence happens, we actually can recover communities as depicted in Fig. 2 (d). C. Real World Network We tested the performance of the algorithm on a real world benchmark network of American football games between Division IA colleges during regular season Fall 2000 [2]. There are in total 115 teams and 615 edges in the graph. Every edge represents a game between corresponding end nodes. As depicted in Fig. 3, almost all nodes in the graph are assigned to their corresponding community correctly. The nodes with same color belong to the same cluster (note that the identity of nodes is not revealed to the algorithm). 050100150200250050100150200250 9 (a) (b) (c) (d) Fig. 2: (a) An LFR random graph with 200 nodes and 6 communities. (b) Communities recovered by our algorithm. (c) Communities recovered by CC-PIVOT algorithm. (d) Communities recovered by our algorithm with fine tuning of algorithm parameters. 10 (a) (b) Fig. 3: (a) American Football College benchmark network with 115 nodes. (b) Communities recovered by our algorithm. (c) Communities recovered by CC-PIVOT algorithm. (c) 11 REFERENCES [1] A. Ben-Dor, R. Shamir, and Z. Yakhini, “Clustering gene expression patterns,” Journal of computational biology, vol. 6, no. 3-4, pp. 281–297, 1999. [2] M. Girvan and M. E. Newman, “Community structure in social and biological networks,” Proceedings of the national academy of sciences, vol. 99, no. 12, pp. 7821–7826, 2002. [3] P. F. Jonsson, T. Cavanna, D. Zicha, and P. A. Bates, “Cluster analysis of networks generated through homology: automatic identification of important protein communities involved in cancer metastasis,” BMC bioinformatics, vol. 7, no. 1, p. 2, 2006. [4] M. S. Handcock, A. E. Raftery, and J. M. Tantrum, “Model-based clustering for social networks,” Journal of the Royal Statistical Society: Series A (Statistics in Society), vol. 170, no. 2, pp. 301–354, 2007. [5] B. J. Mirza, B. J. Keller, and N. Ramakrishnan, “Studying recommendation algorithms by graph analysis,” Journal of Intelligent Information Systems, vol. 20, no. 2, pp. 131–160, 2003. [6] A. Shepitsen, J. Gemmell, B. Mobasher, and R. Burke, “Personalized recommendation in social tagging systems using hierarchical clustering,” in Proceedings of the 2008 ACM conference on Recommender systems. ACM, 2008, pp. 259–266. [7] S. Fortunato, “Community detection in graphs,” Physics Reports, vol. 486, no. 3, pp. 75–174, 2010. [8] P. Erdos and A. R´enyi, “On random graphs I,” Publ. Math. Debrecen, vol. 6, pp. 290–297, 1959. [9] ——, “On the evolution of random graphs,” Publ. Math. Inst. Hung. Acad. Sci, vol. 5, pp. 17–61, 1960. [10] M. E. Newman, D. J. Watts, and S. H. Strogatz, “Random graph models of social networks,” Proceedings of the National Academy of Sciences, vol. 99, no. suppl 1, pp. 2566–2572, 2002. [11] E. Abbe, A. S. Bandeira, and G. Hall, “Exact recovery in the stochastic block model,” arXiv preprint arXiv:1405.3267, 2014. [12] E. Mossel, J. Neeman, and A. Sly, “Reconstruction and estimation in the planted partition model,” Probability Theory and Related Fields, pp. 1–31, 2014. [13] E. Abbe and C. Sandon, “Community detection in general stochastic block models: fundamental limits and efficient recovery algorithms,” arXiv preprint arXiv:1503.00609, 2015. [14] L. Massouli´e, “Community detection thresholds and the weak ramanujan property,” in Proceedings of the 46th Annual ACM Symposium on Theory of Computing. ACM, 2014, pp. 694–703. [15] B. Hajek, Y. Wu, and J. Xu, “Achieving exact cluster recovery threshold via semidefinite programming,” arXiv preprint arXiv:1412.6156, 2014. [16] ——, “Achieving exact cluster recovery threshold via semidefinite programming: Extensions,” arXiv preprint arXiv:1502.07738, 2015. [17] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, “Asymptotic analysis of the stochastic block model for modular networks and its algorithmic applications,” Physical Review E, vol. 84, no. 6, p. 066106, 2011. [18] N. Bansal, A. Blum, and S. Chawla, “Correlation clustering,” Machine Learning, vol. 56, pp. 89–113, 2004. [19] N. Ailon, M. Charikar, and A. Newman, “Aggregating inconsistent information: ranking and clustering,” in Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 2005, pp. 684–693. [20] M. E. Newman and M. Girvan, “Finding and evaluating community structure in networks,” Physical review E, vol. 69, no. 2, p. 026113, 2004. [21] M. E. Newman, “Finding community structure in networks using the eigenvectors of matrices,” Physical review E, vol. 74, no. 3, p. 036104, 2006. [22] S. White and P. Smyth, “A spectral clustering approach to finding communities in graph.” in SDM, vol. 5. SIAM, 2005, pp. 76–84. [23] M. Meila and J. Shi, “Learning segmentation by random walks,” in Neural Information Processing Systems, 2001. [24] R. Kannan, S. Vempala, and A. Vetta, “On clusterings: Good, bad and spectral,” Journal of the ACM (JACM), vol. 51, no. 3, pp. 497–515, 2004. [25] U. Von Luxburg, “A tutorial on spectral clustering,” Statistics and computing, vol. 17, no. 4, pp. 395–416, 2007. [26] A. Y. Ng, M. I. Jordan, and Y. Weiss, “On spectral clustering: Analysis and an algorithm,” Advances in neural information processing systems, vol. 2, pp. 849–856, 2002. [27] M. Asadi, R. P. Torghabeh, and N. P. Santhanam, “Stationary and transition probabilities in slow mixing, long memory markov processes,” Information Theory, IEEE Transactions on, vol. 60, no. 9, pp. 5682–5701, 2014. [28] J. G. Propp and D. B. Wilson, “Exact sampling with coupled markov chains and applications to statistical mechanics,” Random structures and Algorithms, vol. 9, no. 1-2, pp. 223–252, 1996. [29] A. Galves, V. Maume-Deschamps, and B. Schmitt, “Exponential inequalities for vlmc empirical trees,” ESAIM: Probability and Statistics, vol. 12, pp. 219–229, 2008. [30] A. Lancichinetti, S. Fortunato, and F. Radicchi, “Benchmark graphs for testing community detection algorithms,” Physical review E, vol. 78, no. 4, p. 046110, 2008. [31] R. Shamir, R. Sharan, and D. Tsur, “Cluster graph modification problems,” Discrete Applied Mathematics, vol. 144, no. 1, pp. 173–182, 2004.
1603.07445
2
1603
2016-08-25T05:48:36
Time Is of the Essence: Analyzing the Effect of Vertex-Joining Time on Complex Network Evolution
[ "cs.SI", "physics.soc-ph" ]
Complex networks have non-trivial characteristics and appear in many real-world systems. Such networks are vitally important, but their full underlying dynamics are not completely understood. Utilizing new data sources, however, can unveil the evolution process of these networks. This study uses the recently published Reddit dataset, containing over 1.65 billion comments, to construct the largest publicly available social network corpus to date. We used this dataset to deeply examine the network evolution process, which resulted in two key observations: First, links are more likely to be created among users who join a network at a similar time. Second, the rate in which new users join a network is a central factor in molding a network's topology; i.e., different user-join patterns create different topological properties. Based on these observations, we developed the \textit{Temporal Preferential Attachment} random network generation model. This model produces not only scale-free networks that have relative high clustering coefficients, but also networks that are sensitive to both the rate and the time in which users join the network. This results in a more accurate and flexible model of how complex networks evolve, one which more closely represents real-world data.
cs.SI
cs
Time Is of the Essence: Analyzing the Effect of Vertex-Joining Time on Complex Network Evolution Michael Fire1,2 and Carlos Guestrin1 1Department of Computer Science & Engineering, University of Washington 2The eScience Institute, University of Washington September 27, 2018 Abstract Complex networks have non-trivial characteristics and appear in many real-world systems. Such networks are vitally important, but their full underlying dynamics are not completely understood. Utilizing new data sources, however, can unveil the evolution process of these networks. This study uses the recently published Reddit dataset, containing over 1.65 billion comments, to construct the largest publicly available social network corpus to date. We used this dataset to deeply examine the network evolution process, which resulted in two key observations: First, links are more likely to be created among users who join a network at a similar time. Second, the rate in which new users join a network is a central factor in molding a network's topology; i.e., different user-join patterns create different topological properties. Based on these observations, we developed the Temporal Preferential Attachment random network generation model. This model produces not only scale-free networks that have relative high clustering coefficients, but also networks that are sensitive to both the rate and the time in which users join the network. This results in a more accurate and flexible model of how complex networks evolve, one which more closely represents real-world data. Project Links: (cid:73) Website (cid:73) Data (cid:73) Code Keywords: Complex Network Models; Online Social Networks; Reddit 1. Introduction of data. Complex networks are loosely defined as networks with non-trivial structure and dynamics, appearing in social, molecu- lar, biological, ecological, and economical real- world complex systems [8]. Many studies have provided models and algorithms to explain how complex networks evolve [4, 22, 10, 19]. However, scores of questions remain unan- swered [1]. With the recent rapid advances in the field of data science, new algorithms, infrastructures, and techniques for data mining, data storage, data prediction, and data visualization have emerged [3, 7, 14, 24]. These tools make it fea- sible to gain new insights from large quantities In this study, we utilize data science tools to thoroughly examine the evolution process of online social networks. Our study focuses on Reddit,1 a huge collection of online com- munities that discuss what is new and pop- ular on the Internet. Namely, we utilize the recently published Reddit dataset, which con- tains over a terabyte of uncompressed data and consists of over 13.2 million users2 who posted over 1.65 billion comments published over a 7-year time period. This vast dataset contains information on the evolution process of more than 239,000 online communities and the con- 1http://www.reddit.com 2The dataset contains 13,213,173 unique usernames. However, many Reddit users have several usernames. 1 Analyzing the Effect of Vertex-Joining Time • August 2016 nections among the community members (see Section 3). We used the Reddit dataset to con- struct a large corpus of 11,965 directed social networks, which contain over 97% of all the posted comments in the dataset (see Section 3). We assembled an unprecedented corpus of so- cial networks with diverse topologies, ranging from social networks with 11 vertices up to so- cial networks with over 4 million vertices (see Table 1). By closely examining the social networks' evolution process, we observed that users tend to connect to those users having similar join- ing times. For example, we discovered that the median join-time difference between two connected users was 350.79 days. Moreover, we observed that the likelihood of a link be- ing established between two users decreases sharply as the join-time difference increases (see Section 5.2). For instance, only 3.2% of the examined edges were between two users with a join-time difference over 4 years (see Fig- ure 3). Furthermore, we identified six common patterns in which users joined the network (see Section 5.1.3 and Figure 1). Moreover, we ob- served that different user-join patterns influ- ence the structures of the social networks. For example, networks with sigmoidal-like growth usually have denser and higher average cluster- ing coefficients than networks with polynomial growth (see Section 5). The majority of ran- dom network generation models do not take into account either the time or the rate that new vertices join the network (see Section 2 and Sallaberry et al. [19]). Inspired by the above observations, we de- veloped the Temporal Preferential Attachment random network generation model (denoted TPA model). This model generalizes the well- known Barabási-Albert network generation model (denoted BA model) [4] by adding to the model the rate in which vertices join the network, as well as storing each vertex's ar- rival time. Moreover, the model takes as input the probability that each vertex will connect to other vertices with the same or with a different join-time (see Section 6). We demonstrate that the presented TPA 2 model is able to produce arbitrary-sized ran- dom scale-free networks with relative high clus- tering coefficients, which are sensitive to ver- tex arrival times and rates (see Section 6.2). This model mimics realistic social networks and should help to better understand the evo- lution process of complex networks. The remainder of the paper is organized as follows: In Section 2, we provide an overview of various related studies. In Section 3, we give details on the Reddit dataset and present our methodology to clean the dataset. Section 4 describes how we constructed the subreddit so- cial networks and outlines the social network topological features we utilized in this study. Next, in Section 5, we analyze the networks' temporal dynamics. Subsequently, in Section 6, we introduce the TPA model. Then, in Sec- tion 7, we discuss the obtained results. Lastly, in Section 8, we present our conclusions and also offer future research directions. 2. Related Work The study of complex networks began over half a century ago, in 1965. While studying a network of citations among scientific papers, Price observed a network in which the degree distribution followed a power law [17]. Later, in 1976, Price provided an explanation of the creation of these types of networks: "Success seems to breed success. A paper which has been cited many times is more likely to be cited again than one which has been little cited" [18]. Price subsequently offered a method for the creation of networks in which the degree dis- tribution follows a power law. Several decades later, in 1998, Watts and Strogatz [22] presented a model for generating small-world networks. Typically, small-world networks have a relatively high clustering co- efficient, and the distance between any two vertices scales as the logarithm of the number of vertices [19]. In the following year, Barabási and Albert observed that degree distributions that follow power laws exist in a variety of networks, including the World Wide Web [4]. Barabási and Albert coined the term "scale-free Analyzing the Effect of Vertex-Joining Time • August 2016 Figure 1: Common User-Join Curves of the following subreddits: Blogging, 90s, AskComputerScience, Learnmusic, Eagle-Scouts, and BlackFriday. networks" for describing such networks. Sim- ilar to Price's method [18],3 Barabási and Al- bert [4] suggested a simple and elegant model for creating random complex networks based on the rule that the rich are getting richer. In the BA model, a network starts with m con- nected vertices. Each new vertex that is added (one at a time) has a greater probability of con- necting to pre-existing vertices with higher de- gree, where the probability of connecting to an existing v is proportional to v's degree [4]. Con- sequently, "rich" vertices with high degrees tend to become even "richer" due to their con- nections with new vertices that join the graph. Many real-world complex networks have a community structure in which "the division of network nodes into groups within which the network connections are dense, but between which they are sparser" [16]. In 2004, Newman and Girvan proposed a community detection algorithm and offered a simple method to cre- ate networks with community structure [16]. Even though the models described above can explain some of the characteristics of real- world complex networks, the random networks 3A detailed explanation of the differences between Price's method and the Barabási-Albert model for con- structing complex networks can be found in [15]. created by these models were lacking in other properties that were observed in real-world complex networks. Therefore, in recent years, other models have been suggested which have additional characteristics [4, 10, 19, 22]. A similar study to ours was conducted by Leskovec et al. [13]. They performed edge- by-edge analysis of four large-scale networks - Flickr, Delicious, LinkedIn, and Yahoo An- swers - with time spans ranging from four months to almost four years. By studying a wide variety of network formation strategies, they observed that edge locality plays a critical role in the evolution of networks, and they of- fered a model which focused on microscopic vertex behavior. In their proposed model, ver- tices arrive at a pre-specified rate and choose their lifetimes. Afterwards, each vertex "inde- pendently initiates edges according to a 'gap' process, selecting a destination for each edge according to a simple triangle-closing model free of any parameters" [13]. They showed that their model could closely mimic the macro- scopic characteristics of real social networks. Additionally, Leskovec et al., similar to our study, observed the arrival patterns of vari- ous vertices. Namely, they observed that (a) Flickr's network data has grown exponentially; 3 0501001502002503003504000.00.20.40.60.81.0Users Join PercentagePolynomial (Blogging)0501001502002500.00.20.40.60.81.0Sublinear (90s)0501001502002500.00.20.40.60.81.0Linear (AskComputerScience)050100150200250300Number of Weeks0.00.20.40.60.81.0Users Join PercentageSuperlinear (Learnmusic)050100150200Number of Weeks0.00.20.40.60.81.0Sigmoidal (Eagle_Scouts)050100150200250Number of Weeks0.00.20.40.60.81.0Events Oriented (BlackFriday) Analyzing the Effect of Vertex-Joining Time • August 2016 (b) Delicious has grown slightly superlinearly; (c) LinkedIn has grown quadratically; and (d) Yahoo Answers has grown sublinearly. Due to these observations, they concluded that ver- tex arrival functions needed to be part of their proposed model. However, their study did not analyze the implications of using different arrival functions. In this study, we extend the BA model. Our presented TPA model is able to generate small- world, scale-free networks, with relatively high clustering-coefficient values. Moreover, our model takes into consideration the time and rate in which vertices join the network. the current comment replied. For this study, we cleaned the dataset by removing nonessential comments, specifically those that were marked as deleted and those that did not include the information of the user who posted them. Additionally, we removed posts by users who with high probability were bots. Namely, we removed all the users who posted more than 100,000 comments each, and we removed 897 redditors whose comments appeared in the bots list published in the Bot- Watchman subreddit.5 After the removal of these posts, we were left with over 1.42 billion comments. 3. The Reddit Dataset 4. Subreddit Social Networks Reddit is a news aggregation website and on- line social platform, which was launched in 2005 by Steve Huffman and Alexis Ohanian [6]. Reddit users (also known as "redditors") can submit content on the website, which is then commented upon, and upvoted or downvoted by other users in order to increase or decrease the submission visibility. Redditors can also create their own subreddit on a topic of their choosing, make it public or private, and let other redditors join it. This makes Reddit a col- lection of online communities, centered around a variety of topics such as books, gaming, sci- ence, and asking questions.4 In this study, we utilized the Reddit dataset which was recently made public by Jason Michael Baumgartner (see Section 9). The Reddit dataset contains over 1.65 billion com- ments that were posted from October 2007 through May 2015. These posts were created by 13,213,173 users, with unique usernames, in 239,772 different subreddits. The dataset contains information on the exact time and date each comment was posted. Moreover, the dataset contains each comment's ID, as well as information on the user who posted it and the ID of the parent comment, i.e., the ID to which 4Each subreddit web page can be accessed at the follow- ing URL: https://www.reddit.com/r/<SubredditName> /, by replacing <Subreddit Name> with the subreddit's name. 4 In the following subsections, we give a detailed description of the methods that we used to construct and analyze the subreddit social net- works. In Section 4.1, we introduce the meth- ods we used to construct each subreddit's so- cial network. Then, in Section 4.2, we present the topological features we extracted from each network. Additionally, we provide a statistical overview of each topological feature across all social networks. 4.1. Social Network Construction To perform the analysis of the subreddits' un- derlying social networks, we first needed to construct these social networks. However, many of the subreddits did not contain enough users or were not active for a long enough time to extract meaningful insights on the user-join patterns. For example, the median number of redditors in a subreddit was 3, while only 5% of the subreddits consisted of 371 redditors or more. Therefore, for all subreddits in the clean dataset of over 1.42 billion comments, we se- lected only those subreddits that had at least 10 users, consisted of at least 1,000 comments, and were active6 for at least 1 year. Out of all the 5We downloaded the bots list from the BotWatchman https://www.reddit.com/r/BotWatchman/ subreddit during December 2015. 6Throughout this study, we considered the time in which a subreddit was active as the time difference be- Analyzing the Effect of Vertex-Joining Time • August 2016 subreddits, 11,965 subreddits with over 1.38 billion posts (referred to as selected subreddits) fulfilled this criteria. Next, for each selected subreddit, similar to the construction method used by Kairam et al. [12], we created the subreddit's social net- work directed graph by connecting users who posted comments as replies to other posted comments. Namely, for a subreddit, we define the subreddit's directed graph to be: G :=< V, E > where V is the set of vertices, repre- senting all the subreddit's users who posted at least a single comment in the subreddit, and e := (u, v) ∈ E is the list of all edges between the subreddit's users u ∈ V and v ∈ V. We define an edge between u and v to exist if there exists a comment on the subreddit posted by u to which v posted a reply on the same sub- reddit. Lastly, we used the Powerlaw Python package [2] and observed that most of the so- cial networks' vertex connection distributions matched power law distributions with various exponent values. It important to notice that the constructed directed graph also includes single vertices of redditors who posted comments and did not receive any reply, as well as self-loop edges of redditors who posted a comment and then posted a comment as a reply to their own comment. 4.2. Calculating Topological Features For each selected subreddit constructed social network graph, G :=< V, E >, we calculated the following topological features: • Vertices number - the number of vertices in • Edges number - the number of edges in the • Density - the graph density, defined as the graph, defined as V. graph, defined as E. E D := V·(V−1) . • Number of self-loops - the number of self- loops in the graph, defined as Loops := {(v, v) ∈ Ev ∈ V}. • Number of triangles - the number of trian- gles (denoted by T) in the graph [21]. tween the first and last comments published in the subred- dit. • Average clustering coefficient - the graph's average clustering coefficient (denoted by CC) [20]. • Degree-based features - for a vertex v ∈ V, we defined the in-degree, out-degree, and total-degree of v to be: -- din(v) := {u ∈ V∃(u, v) ∈ E} -- dout(v) := {u ∈ V∃(v, u) ∈ E} -- dtot(v) := {u ∈ V∃(u, v) ∈ E or ∃(v, u) ∈ E}. Using the vertex degree definitions, we can define the following four degree fea- tures: ∑v∈V dtot(v) V ∑v∈V din(v) -- Avg-deg := -- Avg-in-deg := -- Max-in-deg := maxv∈V(din(v)); -- Max-out-deg := maxv∈V(dout(v)), V [23], where the Max function returns the maxi- mum value in a set. • Connected components-based features - we separated the graph into a set of weakly connected components (denoted by WCC) in which WCC := {H ≤ GH is subgraph of G} and G = (cid:116)H∈WCCH. Using the WCC, we can also define the graph's largest component (re- ferred to as LC) GLC :=< VLC, ELC >, where GLC ≤ G, and ∀H :=< V(cid:48), E(cid:48) >∈ WCC,VLC ≥ V(cid:48). Using the above defi- nitions, we can define the following five features: -- Number of connected components - the number of weakly connected compo- nents, defined as WCC -- Largest component vertices number - the number of vertices in LC, defined as VLC -- Largest component edges number - the number of edges in LC, defined as ELC -- Largest component ratio - the ratio be- tween the number of users in the largest component and all users in the subreddit, defined as LC-Ratio := VLC V -- The number of single components - the number of components in WCC 5 Analyzing the Effect of Vertex-Joining Time • August 2016 that consist of only a single vertex (denoted by Single), defined as {H :=< V(cid:48)(cid:48), E(cid:48)(cid:48) >∈ WCCV(cid:48)(cid:48) = 1}. Additionally, for v ∈ V, we defined vjoin as the time v was first active in the network. We then used this feature to calculate a Days feature, defined as Days(G) := maxv∈Vvjoin − minv∈Vvjoin. The Days feature is the number of days that had passed between the post times of the first and last comments. Moreover, for each edge in the complete Reddit social network with links, we calculated each edge time difference by etimedi f f = ujoin − vjoin,∀e = (u, v) ∈ E Table 1 presents an overview of the various calculated topology features. Notice that the full set of topological features of all 11,965 se- lected subreddits is available online (see Sec- tion 9). 5. Analyzing Temporal Dynamics of Networks 5.1. Network User-Join Curves In the following subsections, we describe in de- tail the methods which were used to construct and analyze user-join curves (denoted UJC). In Section 5.1.1, we define the UJC function and explain how we constructed the selected sub- reddit UJCs. Next, in Section 5.1.2, we describe the process we utilized to match each UJC and its corresponding function. Afterwards, in Sec- tion 5.1.3, we present the methods used to cat- egorize the different UJCs. Lastly, Section 5.1.4 gives details on the methods used to predict the UJC categories based on the subreddits' topologies. 5.1.1 User-Join Curve Construction For all the selected subreddits, we constructed the UJCs using the following methodology: First, for each subreddit S, using the cleaned Reddit dataset, we calculated the number of 6 weeks (denoted as tS end) between the first com- ment and the last comment that were posted on the subreddit. Afterwards, we defined Users-NumberS(t) for t ∈ [0, tS end] to be the number of users who joined the subreddit in t weeks since the first comments were posted on the subreddit. We also defined the overall number of users who joined the subreddit after tS end weeks to be Total-UsersS. Then, using the above definitions, we defined UJC : [0, tS → [0, 1] as UJCS(t) = Users-NumberS(t) , where UJCS(0) and UJCS(tS end) are always equal to 0 and 1, respectively. Lastly, to create the UJCs for a network S, we calculated the UJCS values in 4-week intervals.7 By using this interval, the number of samples of the UJCs for each sub- reddit ranged from 15 to 101, with a median value of 47. Total-UsersS end] 5.1.2 User-Join Curve Regression Analysis To better understand the 11,965 UJCs that we created, we utilized CurveExpert software [11] to match several selected UJCs with their best- fit functions using regression analysis. In most cases, the best fit was a high-degree polyno- mial function. To avoid over-fitting, we used the python-fit package8 to find the polynomial function that was a best-fit for the majority of UJCs and still had a relatively low degree. We discovered that 11,273 (94.2%) and 9,199 (76.9%) of the UJCs matched a quartic func- tion (q(x) := a + bX + cX2 + dX3 + eX4) with R2 ≥ 0.95 and R2 ≥ 0.99, respectively. Additionally, we performed regression anal- yses of the 692 UJCs that did not match quartic functions. Out of these UJCs, we observed that 274 matched the MMF model [11], ab+cxd b+xd , with R2 ≥ 0.95. The other 418 UJCs (referred to as anomalous UJCs) presented a wide range of patterns. 7In case tS end did not divide evenly by 4, the time interval between the next-to-last and last UJC values was less than 4 weeks. 8https://pypi.python.org/pypi/python-fit/1.0. 0 Analyzing the Effect of Vertex-Joining Time • August 2016 Table 1: Subreddits Social Network Features Overview Feature Avg-deg Avg-in-deg CC D Days LC-Ratio Loops Max-in-deg Max-out-deg ELC E Single T VLC V WCC Min 0.0 0.0 0.0 0.0 365.69 0.002 0.0 0.0 0.0 0.0 0.0 0.0 0.0 1.0 11.0 1.0 Max 53.343 26.672 0.941 0.936 2,785.48 1 73,791 24,469 24,113 42,973,517 42,980,043 1,643,749 73,148,002 2,391,502 4,043,528 1,647,816 Median 1.893 0.947 0.025 0.001 1,271.79 0.416 7 39 40 768 860 626 92 341 1,110 663 Mean 2.889 1.444 0.047 0.003 1,312.68 0.389 88.058 151.107 162.092 Std 3.4 1.7 0.067 0.017 570.68 0.189 931.786 466.91 484.83 30,118.416 30,287.708 4,037.163 70,057.296 4,345.554 8,605.852 4,132.8 484,602.04 484,771.67 31,026.64 1,289,299.62 39,425.02 70,357.23 31,247.4 5.1.3 User-Join Curve Categorization (cid:82) tS 0 end qS(x)dx tS end After matching the UJCs with their best-fit quartic functions, we could now categorize the different UJCs. For each matched quartic func- tion qS(x) of subreddit S, we defined the nor- malized area function norm-area : qS → [0, 1] as: norm-area(qS) := narea(qS) := In considering the 11,273 subreddit norm-areas, we observed that the norm-area distributions were skewed to the right, with a minimal value of 0.065, a maximal value of 0.935, and a me- dian value of 0.4, with a standard deviation of 0.159 (see Figure 2). As a rule of thumb, we can foresee that fast growing subreddits, such as the Blogging sub- reddit (see Figure 1), will have a relatively small norm-area value of close to 0. On the other hand, subreddits that had their growth halted for a relatively long time, such as the Eagle-Scouts subreddit (see Figure 1), will have a norm-area of about 1, and subreddits with constant growth rates will have a norm-area of about 0.5. Keeping this in mind, we di- vided the matched polynomials into five sets, according to their norm-area values: Set 1, {qSnarea(qS) ∈ [0, 0.24)} (with 905 UJCs); Figure 2: Normalized matched quartic functions' area distributions. Set 2, {qSnarea(qS) ∈ [0.24, 0.4)} (with 4,733 UJCs); Set 3, {qSnarea(qS) ∈ [0.4, 0.56)} (with 3,435 UJCs); Set 4, {qSnarea(qS) ∈ [0.56, 0.72)} (with 1,483 UJCs); and Set 5, {qSnarea(qS) ∈ [0.72, 1)} (with 717 UJCs). For the five sets of matched polynomials, we calculated the various coefficient distributions and manually viewed the UJC graph visualizations for each set,9 and we observed the following: 1. The majority of the UJCs with narea ∈ [0, 0.24) (Set 1) have positive d and e co- efficients. Therefore, these UJCs typically have a cubic or quartic growth rate (referred to as polynomial growth). 9The UJC graphs are available for download; see Sec- tion 9. 7 0.00.20.40.60.81.0Normalized Area Analyzing the Effect of Vertex-Joining Time • August 2016 2. The majority of the UJCs with narea ∈ [0.24, 0.4) (Set 2) have a negative e co- efficient. Additionally, by manually re- viewing the UJCs, we observed that in most cases these UJCs have a sublinear growth rate. The growth typically starts relatively slowly and then changes into linear growth. 3. The majority of the UJCs with narea ∈ [0.4, 0.56) (Set 3) have relatively large c coefficients. However, in most cases the d and e coefficients have opposite signs; one is positive and the other is negative. This indicates that most of the UJCs do not grow at a fast rate. By manually reviewing the UJCs in this set, we observed that these UJCs have a nearly linear growth rate. 4. The majority of the UJCs with narea ∈ [0.56, 0.72) (Set 4) have a relatively high positive b coefficient. However, in most cases the d and e coefficients have oppo- site signs, indicating that most of the UJCs do not grow at a polynomial rate. Indeed, by manually examining the UJCs, we ob- served that most UJCs in this set have a superlinear growth rate. Many of the UJCs in this set started with a faster than linear growth rate and then dropped to a linear growth rate. 5. The majority of the UJCs with narea ∈ [0.72, 1) (Set 5) have relatively high pos- itive b and d coefficients, and low nega- tive c and e coefficients. This indicates that the UJCs grew very fast and then slowed down until the growth stopped. Indeed, we observed a growth pattern in these UJCs which is similar to the sigmoidal growth rate. Additionally, we inspected the growth pat- terns of the 692 UJCs that did not match quartic functions. As mentioned in Section 5.1.2, 274 of these UJCs matched the MMF model, which has a sigmoidal growth rate. A closer look at the remaining 418 anomalous UJCs revealed that external events often affected the growth, such as the launch of a new season of TV shows. We refer to this growth pattern as events-oriented growth. 8 5.1.4 User-Join Curve Prediction One of this study's goals was to understand how various UJC growth rates affect networks' topologies. To achieve this goal, using the 11,965 selected subreddits, we first calculated the Pearson correlations between the subred- dit topological features (see Section 4.2) and the subreddit normalized-area values (see Sec- tion 5.1.3). Then, we used regression algo- rithms to construct models which could predict a subreddit's normalized-area values. Lastly, we used different classification algorithms to construct classifiers that could predict UJC cat- egories based on their topologies. In the rest of this subsection, we provide an overview of each method we used and the obtained results. Correlations. We calculated the Pearson cor- relations between the 11,965 subreddit social network topological features and their normal- ized areas. The obtained results indicate that there is a weak positive correlation between norm-area and the network's average cluster- ing coefficient (r = 0.23), and also between the norm-area and the network's density (r = 0.21). Additionally, there is a negligible negative cor- relation between the norm-area and the net- work's maximal in-degree (r = −0.12), as well as between the norm-area and the maximal out-degree (r = −0.14). Moreover, there is a moderate negative correlation between the norm-area and the Days feature (r = −0.47). Regression Analysis. We constructed re- gression prediction models, which can pre- dict a subreddit's UJC normalized area using GraphLab Create [14]. We evaluated three re- gression models: linear regression, Boosted Trees regression, and Random Forest regres- sion. We created these models twice, one time using all the topological features described in Section 4.2 and the second time with all the features plus the Days feature. We evaluated the models using 10-fold cross validation and measuring the models' average value of (a) mean absolute error (MAE), (b) mean square error (MSE), and (c) root mean squared error (RMSE). Out of these regression models, the Boosted Analyzing the Effect of Vertex-Joining Time • August 2016 Trees regression presented the best results, which were slightly better than the linear and Random Forest models, with MAE = 0.125, MSE = 0.027, and RMSE = 0.163, using only the topological features; and MAE = 0.114, MSE = 0.232, and RMSE = 0.152, using the topological features plus the Days feature. Ad- ditionally, the linear regression model created using the 11,965 subreddits' topology features presented an R2 value of 0.125, using only the topological features, and an R2 value of 0.262, using all the topological features plus the Days feature. Moreover, in the linear regression model constructed with all the features, the CC, T, and D, WCC had positive coefficients. The Avg-deg, E, LC-Ratio, Max-out-deg, Single, V, and Days had negative coefficients. ELC,VLC, Max-in-deg, Loops, Supervised Learning. We constructed su- pervised learning classifiers which can classify the category of the subreddit's UJC, based on only the 11,965 selected subreddits' topological features, in the following way: First, we created a labeled dataset with the six growth categories we defined in Section 5.1.3. Next, using the labeled dataset, we used WEKA [9] and con- structed various classifiers using the following algorithms: OneR, J48 decision tree, Logistic, K-Nearest-Neighbors (KNN) with K = 1, Ro- tation Forest, and Random Forest. Then, we evaluated each classifier using the 10-fold cross validation method and calculated the classi- fier's AUC (area under the ROC curve) values. Lastly, we repeated the construction and eval- uation process, only this time with only two growth categories -- polynomial growth and sigmoidal growth. Out of all the trained classifiers, the Logistic classifier obtained the best results, in terms of AUC, on both datasets. On the first dataset, with six categories, the Logistic classifier ob- tained the highest weighted average AUC and the highest correct classification percentage of 0.64 and 41.2%, respectively. These results were considerably better than the simple OneR and KNN classifiers that obtained weighted aver- age AUCs of 0.52 and 0.53, and correct classifi- cation percentages of 37.4% and 31.7%, respec- tively. On the second dataset, which consisted of subreddits with only polynomial growth and sigmoidal growth, the Logistic classifier obtained the highest AUC and highest true pos- itive rate of 0.82 and 0.81, respectively. These results were considerably better than the sim- ple OneR and KNN classifiers that obtained AUCs of 0.67 and 0.64, respectively. 5.2. Vertices' Join-Time Difference Similar to Price's observation [17] that new pa- pers tend to be cited more than older papers, we noticed that redditors tend to be more en- gaged with other redditors who joined the net- work at a similar time, and less engaged with redditors who became active either a long time before or after they did. To validate our obser- vation, for each edge e in 362,230,386 links in the full Reddit network, we calculated the join- time difference in days (etimedi f f ) between each edge's vertices (see Section 4.2). Afterwards, we calculated the probability of each time dif- ference value. Moreover, we utilized regression analysis to match a function that estimated the probability of two redditors connecting, based on the join-time difference. The analysis results are presented in Figure 3. Additionally, using regression analysis, we dis- covered that the probability of two redditors with join-time difference t to be linked can be estimated to be: link-probability(t) ≈ 0.002e−0.0019t According to these results, we can observe that the probability of two redditors to be linked decreases sharply as the join-time dif- ference between them increases. For example, while over 51% of edges are between users with a join-time difference of less than a year, only 1% of edges are between redditors with a join-time difference of over 5 years. 6. The Temporal Preferential Attachment Model Inspired by the above results in which the ver- tex join-rate changes over time and edges tend 9 Analyzing the Effect of Vertex-Joining Time • August 2016 g ← empty undirected graph TimeGroupsList ← empty list for i = 0 to l.length do NewVerticesList ← list of l[i] new vertices AddNewVerticesTimeGroup(NewVList,i) AddVerticesToGraph(g NewVList) AddToList(TimeGroupsList, i) for v in NewVerticesList do Algorithm 1 The Temporal Preferential Attach- ment Model Algorithm Overview 1: procedure GenerateRandomGraph Require: m, l, f 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: procedure AddRandomEdges Require: g,v,m,f 13: 14: 15: 16: 17: 18: r ← SelectFromList(TimeGroupsList,f) u ← GetVertexInGroupByDegree(g,r) AddRandomEdges(g,v,m,f) for j = 0 to m do repeat until (v, u) /∈ g AddEdge(g,v,u) : N → R) that given a function (denoted f a time difference value, returns the relative probability of an edge existing across two time groups. The algorithm starts by creating an empty undirected graph (line 1) and an empty time group list (line 2). Then, for each pos- itive integer l[i] in l, the algorithm does the following: (1) creates new l[i] vertices with the time group set to i (lines 5-6); (2) adds the new vertices to the graph (line 7); (3) adds i to the TimeGroupsList (line 8); and (4) connects each new added vertex to the other m vertices using the AddRandomEdges procedure (line 10). The AddRandomEdges procedure (lines 12- 18) is the core of the model. The procedure receives as input five parameters: a graph (g), a vertex (v), the number of edges (m), a probability time difference function ( f ), and a list of existing time groups (TimeGroupsList). The AddRandomEdges procedure connects v to m other vertices in the graph using the following routine. First, it randomly selects from TimeGroupsList a time group (denoted r) where the probability of selecting each time group is given by f (line 1).10 Then, similar to the BA model, the procedure selects one vertex 10Given t1, t2, .., tn time groups, the actual probability of an edge being created between two time groups with a Figure 3: Edge time difference distribution. It can be observed that as the join-time difference between two redditors increases, the probability of a link between them decreases sharply. to be formed among vertices with similar join times, we developed the TPA model for gener- ating undirected random networks. The model is a generalization of the well-known BA model [4], with two main extensions: (a) instead of adding one vertex in each iteration to the net- work, the TPA model inserts a set of vertices in each iteration, where the set's size can be modi- fied in each iteration; and (b) the probability of an edge forming between two vertices is neg- atively correlated with the time gap between the two vertices' join times. In the rest of this section, we first formally define the TPA model. Subsequently, we evalu- ate the model by using it to generate various random networks of different sizes, and we compare the constructed networks' properties to the properties of real-world networks as well as to random networks created by other mod- els. 6.1. The TPA Model Algorithm An overview of the TPA model algorithm is presented in Algorithm 1. The TPA model receives as input three parameters: first, the number of edges (denoted m) to attach a new vertex to existing vertices; second, an integers list (denoted l) with the number of vertices to add to the graph in each iteration; and third, 10 05001000150020002500Days Difference0.00000.00050.00100.00150.00200.0025 Analyzing the Effect of Vertex-Joining Time • August 2016 (u) among all the vertices that are in the se- lected time group r, where vertices with higher degree have higher likelihood of being selected (line 16). In case the edge (u, v) already exists in the graph, then the selection process of u is repeated until a new u in the graph is cre- ated.11 A detailed implemented TPA model in Python can be found in the paper's website (see Section 9). To illustrate our TPA model algorithm, we can create a random graph using the following input parameters: m = 3, l = [100, 200, 400], and f (t) = 2−1−t. We start running the model with an empty graph. In the first iteration, we add 100 (l[0]) new vertices to the graph, and each new vertex has a time group value of 0. In this iteration there are not any other time groups. Therefore, the 100 new vertices will only create 300 (100 · 3) edges among them- selves in the following manner: each vertex will select 3 other vertices in the group, and similar to the BA model, vertices with higher degree will have higher probability of being selected, and the "richer" vertices will have a higher probability of becoming "richer." In the second iteration, the model will in- sert 200 (l[1]) new vertices which will form 600 (200 · 3) new edges. However, this time we have two time groups: (a) a time group of 1 (with time difference 0), which contains all the 200 new vertices, and according to the time difference probability function, the probability of each new vertex establishing a connection to this group is f (0) = 2−1−0 = 0.5; and (b) a time group of 0 (with time difference of 1), which contains the previous 100 vertices, with a probability of f (0) = 2−1−1 = 0.25 of connect- ing to vertices in this time group. According to these parameters, we can observe that the probability ratio of the two time groups is 2 to 1. Therefore, we can use this ratio to estimate that out of the 600 edges of the second iteration, about 400 edges will be formed among the ver- time difference of d ≤ n is equal to 11In the Python implementation of the TPA model, to prevent cases where it is impossible to add new edges to v, we limited the number of repeats and moved on to connect the next vertex. f (d) ∑i∈[1,n] f (ti) . tices of time group 1, and about 200 edges will be formed among the vertices of time group 1 and time group 0, where each edge has a higher probability of connecting vertices with higher degree. Lastly, in the third iteration, our model will insert an additional 400 (l[2]) new vertices to the graph with a time group value of 2. These vertices will formulate 1200 (400 · 3) edges, of which about 686 will be among the vertices of time group 2; about 343 edges will be among the vertices of time groups 2 and 1 (time differ- ence of 1), and about 171 edges will be among the vertices of time groups 2 and 0 (time differ- ence of 2). Overall, the TPA model will have constructed a graph with 700 vertices and 2,100 edges. 6.2. TPA Model Evaluation To empirically evaluate the TPA model, we created various random networks by using var- ious input parameters: 1. The vertices number was set to three differ- ent sizes: 700, 6,200, and 12,350. 2. The edge number, parameter m, was set to 3, creating networks with about 2,100, 18,600, and 37,050 edges. 3. We used linear, polynomial, and sigmoidal vertices growth rates. For the linear growth rate, we added 10 new vertices in each it- eration. For the polynomial growth rate, we used the sequence of 5, 20, 45, ..., 5 · x2, with a maximal x value of 8, 16, and 20 for creating networks with 2,100, 18,600, 37,050 edges, respectively. For the sig- moidal growth rate, we used the same growth sequence as used in polynomial growth only in reverse order. 4. We used f (t) = 2−1−t and f (t) = 0.8 · 0.2t functions as time difference functions ( f ), where the f (t) = 0.8 · 0.2t will create con- siderably more edges among all the ver- tices in the same time group than f (t) = 2−1−t. Overall, we assembled 18 different parame- ter settings for generating random networks. For each parameter setting, we utilized the TPA 11 Analyzing the Effect of Vertex-Joining Time • August 2016 Table 2: Random Networks' Topological Properties Model TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA TPA BA BA BA WS WS WS V 700 700 700 700 700 700 6200 6200 6200 6200 6200 6200 12350 12350 12350 12350 12350 12350 700 6200 12350 700 6200 12350 Rate Linear Poly. Sig. E 2100 2095 2100 2100 2095 2100 18600 Linear Poly. 18595 18600 Sig. 18600 Linear Poly. 18595 18600 Sig. 37050 Linear Poly. 37045 37050 Sig. 37050 Linear Poly. 37045 37050 Sig. 2091 18591 37041 2100 18600 37050 Linear Poly. Sig. - - - - - - f 2−1−t 2−1−t 2−1−t 0.8 · 0.2t 0.8 · 0.2t 0.8 · 0.2t 2−1−t 2−1−t 2−1−t 0.8 · 0.2t 0.8 · 0.2t 0.8 · 0.2t 2−1−t 2−1−t 2−1−t 0.8 · 0.2t 0.8 · 0.2t 0.8 · 0.2t - - - - - - CC 0.063 0.03 0.053 0.15 0.07 0.094 0.045 0.007 0.012 0.141 0.025 0.029 0.044 0.004 0.007 0.139 0.017 0.02 0.04 0.008 0.005 0.444 0.442 0.443 dmax Avg. SP 28.4 37.2 58.1 28.0 43.8 54.0 32.8 61.1 119.5 31.6 97.4 113.2 33.1 81.7 155.4 33.0 116.0 163.6 82.9 234.4 362.2 8.9 9.8 10.1 4.23 3.7 3.73 5.78 3.96 4.19 13.62 4.89 4.92 31.03 5.59 5.79 24.23 5.3 5.36 60.69 6.27 6.51 3.36 4.12 4.36 5.76 8.11 8.85 k−γ k4.41 k4.13 k3.7 k3.81 k3.53 k3.32 k6.95 k4.07 k3.62 k3.18 k3.37 k3.26 k7.14 k4.3 k3.72 k7.15 k3.35 k3.34 k3.13 k3.07 k3.04 - - - model to create 18 random networks. Subse- quently, for each network, we calculated the network's average clustering coefficient (de- noted CC), the maximal degree of vertex in the network (denoted dmax), the network's average shortest paths value (denoted Avg. SP), and the power law function (k−γ) that matched the degree distribution of the network. To reduce variance of the calculated features, we repeated the network construction process and feature calculations 10 times for each parameter setting and calculated the average value of each fea- ture. The results of these calculations are pre- sented in Table 2. Furthermore, for comparing the TPA model to other models, we used both the BA model and the Watts-Strogatz model to generate random networks of similar sizes (see Table 2).12 7. Discussion By analyzing the results presented in Sec- tions 4, 5, and 6, the following can be noted: First, from the construction process results presented in Section 4.1, we can observe that most of Reddit's online communities have an activity period of less than a year. Moreover, 12The p parameter in the Watts-Strogatz model was set to 0.1. 12 we can observe that the 11,965 selected subred- dits, which are about 5% of all the subreddits in the dataset, contain 1.38 billion posts; these are 97.7% of all the posts in the constructed clean Reddit dataset. This indicates that most communities are short-lived and contain sig- nificantly less content than what can be found in other more active communities. Therefore, studies aiming to analyze online communities need to carefully select the communities they choose to study. Second, from Table 1 we can observe that the Reddit dataset contains many types of com- munities with a wide range of size scales and with various topologies. However, from the results presented in Section 5.1.2, we can sur- prisingly observe that even though there are many different social networks and the reasons people join these communities are varied and complex, in most online communities the UJCs match quartic functions. Third, according the correlation results pre- sented in Section 5.1.4, we can observe that, in general, UJCs with higher normalized ar- eas typically have higher CC values. This ob- servation aligns with the networks generated by the TPA model, in which networks created by sigmoidal growth usually presented higher CC values than same-size networks created by polynomial growth (see Table 2). Fourth, by observing the regression results in Section 5.1.4, which presented models with rel- atively low RMSE values, and the classification results presented in Section 5.1.4, which pre- sented promising results with AUC of 0.82, we can infer that analyzing a social network topol- ogy can, in many cases, predict the normalized area size of the UJC that created the network. Therefore, in many cases, we can predict the general pattern in which users joined the social network. Moreover, according to the classifi- cation results, the difference is noticeable be- tween networks created by polynomial growth and networks created by sigmoidal growth. Lastly, according to the results presented in Table 2, it can be noted that the TPA model generates scale-free networks with similar de- gree distribution to networks created by the BA Analyzing the Effect of Vertex-Joining Time • August 2016 model, and with small average shortest path values. Additionally, the TPA model can gen- erate networks with much higher CC values than the BA model. However, in most cases networks created by the TPA model presented much lower dmax values than networks of the same size created by the BA model. Never- theless, in the BA model most vertices with high degree are likely vertices that join the network in the first iterations. By setting the TPA model's vertices join rate and time dif- ference functions, it is possible to create ver- tices with relatively high degree that join the network in later iterations. This can more ac- curately mimic a network's evolution process and provide additional insight on how a newly added vertex suddenly becomes popular, such as when a post becomes viral in social net- works. 8. Conclusions Over a half century ago, Price estimated that half of papers' citations contained new papers while the other half were to "immortal" pa- pers [17]. In the last decades, much of the focus of network generation models was on connect- ing new vertices in the graph to the "immortal" vertices. In this study, we demonstrate the importance of time as part of the network evo- lution process. We achieved this by analyzing a large-scale dataset containing over 1.65 billion comments. We analyzed 11,965 social networks created from the dataset and showed that the network UJCs have a high impact on the net- works' structure (see Section 5). Moreover, we showed that most edges are created between users who joined the network in a time differ- ence of less than a year (see Section 5.2). Taking into account these observations, we developed the TPA model, which incorporates both the rate and time that vertices join the network (see Section 6). Moreover, we demon- strated that the TPA model can generate scale- free networks with relatively high CC val- ues and relatively small average shortest path values (see Table 2). Even though the TPA model is fairly simple, we believe it presents a more accurate model of the evolution process of complex networks than other preferential attachment-based models. Moreover, the TPA model will help in better understanding the role of time in the network evolution process. In the future, we hope to analytically ana- lyze the TPA model and create a similar model for creating directed and weighted networks. Additionally, we plan to explore how different input parameters influence the created network topology. Another research direction we hope to pursue is to analyze the effect of different UJCs on the topologies of various complex net- works, such as biological networks. Moreover, the large corpus of social networks created and released as a result of this study can greatly contribute to better understanding online com- munities and complex networks. According Albert-László Barabási, "If data of similar de- tail capturing the dynamics of processes taking place on networks were to emerge in the com- ing years, our imagination will be the only limitation to progress" [5]. 9. Data and Code Availability Instructions on how to download the raw Red- dit dataset are available in the following Reddit post. Additionally, the dataset can be down- loaded from this link. This study is repro- ducible research. Therefore, the social network datasets and a considerable part of the study's code, including implementation of the TPA model, are available at the project's website, which also gives researchers the ability to in- teractively explore and better understand the social networks in this study's dataset. 10. Acknowledgments First and foremost, we would like to thank Jason Michael Baumgartner for making the Reddit dataset available online. We would like to thank Carol Teegarden for editing and proofreading this article to completion. We also want to thank Stephen Spencer for his IT expertise, which greatly assisted us during this research. Additionally, we thank the AWS 13 Analyzing the Effect of Vertex-Joining Time • August 2016 Cloud Credits for Research. We also thank the Washington Research Foundation Fund for Innovation in Data-Intensive Discovery, and the Moore/Sloan Data Science Environments Project at the University of Washington for sup- porting this study. References [1] R. Albert and A.-L. Barabási. Statistical mechanics of complex networks. Reviews of modern physics, 74(1):47, 2002. [2] J. Alstott, E. Bullmore, and D. Plenz. pow- erlaw: a python package for analysis of heavy-tailed distributions. PloS one, 9(1):e85777, 2014. [3] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al. A view of cloud computing. Communications of the ACM, 53(4):50 -- 58, 2010. [4] A.-L. Barabási and R. Albert. Emergence of scaling in random networks. science, 286(5439):509 -- 512, 1999. [5] A.-L. Barabási et al. Scale-free networks: a decade and beyond. science, 325(5939):412, 2009. [6] K. Bergstrom. "don't feed the troll": Shut- ting down debate about community ex- pectations on reddit. com. First Monday, 16(8), 2011. [7] M. Bostock, V. Ogievetsky, and J. Heer. D3 data-driven documents. Visualization and Computer Graphics, IEEE Transactions on, 17(12):2301 -- 2309, 2011. [8] E. Estrada. Journal of complex networks: Quo vadis? Journal of Complex Networks, 1(1):1 -- 2, 2013. [9] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. ACM SIGKDD explorations newsletter, 11(1):10 -- 18, 2009. 14 [10] P. Holme and B. J. Kim. Growing scale- free networks with tunable clustering. Physical review E, 65(2):026107, 2002. [11] D. Hyams. Curveexpert software. http: // www. curveexpert. net , 2010. [12] S. R. Kairam, D. J. Wang, and J. Leskovec. The life and death of online groups: Pre- dicting group growth and longevity. In Proceedings of the fifth ACM international conference on Web search and data mining, pages 673 -- 682. ACM, 2012. [13] J. Leskovec, L. Backstrom, R. Kumar, and A. Tomkins. Microscopic evolution of so- In Proceedings of the 14th cial networks. ACM SIGKDD international conference on Knowledge discovery and data mining, pages 462 -- 470. ACM, 2008. [14] Y. Low, J. E. Gonzalez, A. Kyrola, D. Bick- son, C. E. Guestrin, and J. Hellerstein. Graphlab: A new framework for par- arXiv preprint allel machine learning. arXiv:1408.2041, 2014. [15] M. E. Newman. The structure and func- tion of complex networks. SIAM review, 45(2):167 -- 256, 2003. [16] M. E. Newman and M. Girvan. Finding and evaluating community structure in networks. Physical review E, 69(2):026113, 2004. [17] D. Price. Statistical studies of networks of scientific papers. In Statistical Associa- tion Methods for Mechanized Documentation: Symposium Proceedings, volume 269, page 187. US Government Printing Office, 1965. [18] D. Price de Solla. A general theory of bib- liometric and other cumulative advantage process. Journal of the American Society of Information Science, 27:292 -- 306, 1976. [19] A. Sallaberry, F. Zaidi, and G. Melançon. Model for generating artificial social net- works having community structures with small-world and scale-free properties. So- cial Network Analysis and Mining, 3(3):597 -- 609, 2013. Analyzing the Effect of Vertex-Joining Time • August 2016 [20] J. Saramäki, M. Kivelä, J.-P. Onnela, K. Kaski, and J. Kertesz. Generalizations of the clustering coefficient to weighted complex networks. Physical Review E, 75(2):027105, 2007. [21] T. Schank. Algorithmic aspects of triangle- based network analysis. Phd in computer science, University Karlsruhe, 3, 2007. [22] D. J. Watts of and S. H. Strogatz. â AŸsmall- Collective worldâ A ´Znetworks. nature, 393(6684):440 -- 442, 1998. dynamics [23] E. W. Weisstein. Weakly connected com- ponent. [24] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica. Spark: clus- ter computing with working sets. In Pro- ceedings of the 2nd USENIX conference on Hot topics in cloud computing, volume 10, page 10, 2010. 15
1305.4760
1
1305
2013-05-21T09:17:16
How modular structure can simplify tasks on networks
[ "cs.SI", "cs.DS", "physics.soc-ph", "q-bio.QM" ]
By considering the task of finding the shortest walk through a network we find an algorithm for which the run time is not as O(2^n), with n being the number of nodes, but instead scales with the number of nodes in a coarsened network. This coarsened network has a number of nodes related to the number of dense regions in the original graph. Since we exploit a form of local community detection as a preprocessing, this work gives support to the project of developing heuristic algorithms for detecting dense regions in networks: preprocessing of this kind can accelerate optimization tasks on networks. Our work also suggests a class of empirical conjectures for how structural features of efficient networked systems might scale with system size.
cs.SI
cs
How modular structure can simplify tasks on networks Binh-Minh Bui-Xuan and Nick S. Jones CNRS -- APR, LIP6, UPMC and Department of Mathematics, Imperial College London By considering the task of finding the shortest walk through a network we find an algorithm for which the run time is not as O(2n), with n being the number of nodes, but instead scales with the number of nodes in a coarsened network. This coarsened network has a number of nodes related to the number of dense regions in the original graph. Since we exploit a form of local community detection as a preprocessing, this work gives support to the project of developing heuristic algorithms for detecting dense regions in networks: preprocessing of this kind can accelerate optimization tasks on networks. Our work also suggests a class of empirical conjectures for how structural features of efficient networked systems might scale with system size. The last decade has seen a widespread appreciation that networks in Nature have a structure which makes them poorly modeled as samples from the more traditional random graph ensembles [1, 2]. A feature of many real networks is that a marked modular (or community) structure is present [3 -- 6] where a network community is a subset of nodes with relatively dense connections within the subset but sparse connections to the rest of the network. Though algorithms for detecting communities are actively constructed in physics, mathematics, engineering and computer science, the reason for detecting these dense regions is not always articulated. Studies of empirical graphs suggest that nodes in the same community tend to have similar properties in the world and thus community detection can help us, for example, assign functional labels to uncharacterized nodes [3]. In this paper we investigate how community detection can also help simplify problems on graphs. Even though community detection tasks can be hard [8, 9] experience with greedy algorithms suggests that plausible solutions can be found quickly for networks with a pronounced community structure (though, of course, sub-optimal solutions need to be treated with care [10]) [3]. Recent theoretical work in network physics and computer science also suggests that for certain types of graphs, community detection need not be costly [11 -- 13]. It is also the case that a marked community structure is present in many empirical networks and that networks with similar functions appear to have similar community structure [4 -- 6]. It is possible that this similarity occurs because community structure constrains dynamics on the graphs. Indeed it has been found that particular choices of dynamics on networks can in turn correspond to particular methods for detecting communities in graphs [14]. The literature asking why the networks we observe in the world are modular is substantial [15]: one might speculate that assembly rules for real networks are such as to simplify either optimization tasks or dynamics on them and so in turn this leads to a pronounced community structure. The notion that networks in nature are often optimized for transport is an established part of theoretical biological physics (e.g. [16]). Parameterized Complexity: Weakly coupled to the stream of empirically motivated networks literature is recent work in computational complexity called parameterized complexity, or fixed parameter tractability [17]. The concerns of this vibrant field are common to the empirical interests of the network research community: how do (parameterized) constraints on graph structure simplify problems on graphs? Researchers in empirical studies of networks ask: how are real world networks simple? Asking whether some hard problems are simple on empirical graphs is thus natural. In the following, though we use recent work from parameterized complexity, we will not be providing algorithms that have computational cost scaling in polynomial time with network size; instead we will show that a problem scaling like 2n (n is the number of nodes in the graph) can be converted into one which scales like ≤ 2n but where we can suggest n ≪ n by relating n to (a local version of) the number of communities in the graph. Hamiltonian Walk and Communities Motivated by the above observations, we ask whether a particular problem, Hamiltonian Walk, HAMWALK (an NP-hard task [18]) is simpler on networks with pronounced community structure. We define a Hamiltonian Walk as a shortest closed walk on a graph which visits every node at least once [20, 21]. The study of self avoiding walks on lattices and fractals is an established area of probability and statistical physics and modifications which allow limited self crossings have been considered [22]; problems of this kind are of broad relevance to understanding percolation and polymer phenomena. We note, of course, that the interface between problems in computational complexity and statistical physics is now a lively one [23]. We hypothesize that partitioning graphs into communities, coarsening the graphs to yield smaller graphs with nodes representing entire communities [24], and then solving problems on the coarsened graph and on the individual communities of the full graph in combination, might lead to significant computational speed-ups for some real graphs and appropriately chosen optimization tasks (see Fig 1). We hope to exploit the fact, noted above, that empirical networks often have pronounced community structure and finding this structure need not be hard. 2 FIG. 1: Community detection can be fast if pronounced communities are present [11, 12]. Solutions to optimization problems on the coarsened graph can sometimes be converted into solutions for the full graph. For real networks this hypothesis could be converted into a class of heuristic algorithms for solving optimization problems. It thus seems desirable to see whether the preceding intuition can be expressed mathematically: is there a class of (crudely) realistic graphs for which HAMWALK has a runtime scaling which is provably less than the O(2n) bound that can currently be achieved [18]? We believe this both motivates further work in providing tighter runtime bounds for more realistic graphs, justifies the development of appropriate heuristic optimization algorithms and makes a connection between parameterized complexity and network empirics: making explicit the notion that the modular network structure we observe in Nature could help simplify tasks for networked systems. In Ref. A local clustering algorithm: [11] the authors study the runtime of finding partitions of networks into clusters (disjoint sets of nodes) where each cluster, Ci (for all i), has (i) a total number of links connected to nodes not in Ci that is ≤ δ (call this the degree of Ci) and (ii) the number of pairs of nodes in Ci between which there is no link is ≤ µ. This bears some resemblance to the local community detection in Ref. [25] and seeks to identify sets of densely connected nodes (µ small) which are isolated from other such sets (δ small). If δ is treated as a fixed input then, remarkably, this problem can be solved in randomized time 2O(µ)nO(1). Similarly if µ is held fixed then the run time is 2O(δ)nO(1) [11]. Special cases: We first run an algorithm that detects all clusters in graph, G, with degree ≤ δ and ≤ µ missing links [11]. In the simple case when δ = 2 and µ = 0 a naive solution is as follows. Define a coarsened version of G, G′, in which, for each cluster taken consecutively (the order is irrelevant), all nodes of the cluster are removed and substituted for a single node, called a cluster-node, which is connected to the nodes (≤ 2 nodes) to which the cluster was previously connected. We then solve HAMWALK on G′ using the Held-Karp algorithm a [18, 19] and obtain a walk (in G′) as result. We finally expand this walk to become a walk in G simply by a replacement of every cluster-node by its original cluster of G and quickly computing an appropriate paths through the clique (note that µ = 0 so this task is simple). It is a standard exercise to check the obtained walk is indeed a Hamiltonian walk of G. The intuition behind is that sets of nodes which are strongly isolated from the rest of the graph (like in the case of δ = 2) allow marked simplifications of problems on the graph. This provokes the question that we consider in the following: does this intuition hold for richer classes of graphs, with more general δ and µ? Unfortunately, unlike the previous case, not all solutions to HAMWALK(G′) can be easily modified to make solutions to HAMWALK(G). Consider the graph G and its coarsened graph G′ in Fig. 2 A) and B). Both W ′ 1 = (a, x, f, g, h, x, i, j, a) and W ′ 1 can be expandable to a Hamiltonian walk of G just by replacing the first occurrence of x with b and the second occurrence of x with c, d, e, namely to obtain W1 = (a, b, f, g, h, c, d, e, i, j, a) (a cycle, hence optimal in size). However, applying such local expansions on W ′ 2 will not be as successful (not a cycle, because of multiple occurrence of j, hence, longer walk than before). 2 = (a, j, f, g, h, j, i, x, a) are Hamiltonian walks of G′. Here, W ′ Given the above one might conclude that if we carefully count the number of times that each cluster-node is visited, that will help us extend, simply, our walks on G′ to walks on G. 1 visits x twice, whereas W ′ 2 visits x only once, so it could be that the number of visits to the cluster-node x is important. However, graphs exist which allow two solutions to HAMWALK(G′) which visit cluster-nodes the same number of times but which do not both allow a simple expansion to a solution for G e.g., Fig. 2 C) and D). In G′ (Fig. 2D), In the preceding example W ′ 1 = (a, b, c, d, x, i, j, k, l, a, m, n, p, x, a) and W ′ 2 = (a, b, c, d, x, i, j, k, l, i, x, p, n, m, a) are walks of G′ visiting both W ′ cluster-node x twice. W ′ 1 can be locally expanded to a Hamiltonian walk of G by replacing the first occurrence of x with e, h and the second occurrence of x with f, g: W1 = (a, b, c, d, e, h, i, j, k, l, a, m, n, p, f, g, a) is a Hamiltonian walk of G. One can check that W ′ 2 cannot be expanded to a Hamiltonian walk of G only by replacing occurrences of x with vertices from {e, f, g, h}, by exhaustive case analysis for instance (the edge (h, i) must be traversed twice). 3 A) B) d b e c a f g j h i a f x g j h i C) a l k b c d g m n p h e f i j D) b c d m n p a l k x i j FIG. 2: A) Graph G, where {b, c, d, e} is a clique. B ) Coarsened graph G′ where clique {b, c, d, e} is replaced by cluster-node x. C ) and D) a further example of original graph G and coarsened graph G′. Solving HAMWALK with parameters δ and µ We now consider the case when δ and µ are unspecified positive integers, we proceed as follows. Each ith cluster, Ci, will contain a set of shell nodes, Si, which are defined as being in Ci and either have a link to a node which is not in Ci, or lack a link to a node which is in Ci. When Ci > 2 · Si, we define another set of nodes, called second shell nodes, Ti, which are taken randomly from Ci \ Si so that Si = Ti (Si ≤ δ + 2µ). We call nodes which are in each detected cluster but which are neither shell nodes nor second shell nodes, good bulk nodes, GBi = Ci \ Si \ Ti. GBi is thus a clique; it is this simple structure we will exploit in the following. The set Ti is a device which will help simplify our proof. We now define a coarsened version of G, G′, in which, for each cluster with degree ≤ δ, and at most µ missing links and Ci > 2 · Si, all nodes in the good bulk are removed and substituted for a single node, called the coarsened good bulk node, bi, which is connected to all of the shell and second shell nodes in the cluster. We will later discuss coarsened walks: a walk on G is coarsened to a walk on G′ by identifying consecutive (or single) walker visits to nodes in GBi and substituting them for single visits to the coarsened good bulk node bi. The outline of our proof is as follows: we create a coarsened graph, G′, in which all nodes in each clique GBi are represented as single node bi and all other nodes are left untouched. We solve HAMWALK by a standard method on the coarsened graph. We show that, because of the simplicity of the cliques GBi and, noting the properties of the shell and second shell, that this walk can be converted into a solution to HAMWALK on the original graph in a time polynomial in n. The use of the two shells will allow us to avoid problems identified in the examples above. Claim 1: any Hamiltonian walk of G′ can, with resources polynomial in network size, be converted to a Hamiltonian walk of G′ that visits every coarsened good bulk node once and only once. Proof of Claim 1: It is easy to check whether a Hamiltonian walk of G′ visits every coarsened good bulk node once and only once. If this is not the case, we can repeatedly perform the following substitutions. Call b one of the coarsened good bulk nodes which is visited more than once. Consider any walk with a visit to b: it is either of the form a) sibsi or sibsj i 6= j, where si and sj are nodes in the shell of the cluster to which b belongs, or b) tibti or tibtj i 6= j, where ti and tj are second shell nodes, or c) sibtj (or tibsj), where si is a shell node and tj a second shell node. Now we can obtain another closed walk that still visits every node of G′ at least once, b included, as follows: a) replace sibsi by si, or replace sibsj by sitsj, where t is any node from the second shell; b) replace tibti by ti, or replace tibtj by titj; c) replace sibtj by sitj. In all cases, the length of the modified walk is not increased, that is, if the original is a Hamiltonian walk then the modified walk is still a Hamiltonian walk of G′. (cid:3) Given any Hamiltonian walk of G′ we can thus obtain a Hamiltonian walk of G′ having the property described in Claim 1. Denote its length by wG′. We can un-coarsen the walk into a closed walk on G by locally extending using a greedy approach at every good bulk node. What Claim 1 implies is that the extended walk has length wG′ + Pi(GBi − 1) (by exploiting the clique structure of GBi). Clearly, wG′ + Pi(GBi − 1) ≥ wG, where wG is 4 the length of Hamiltonian walks of G. Now, if this were an equality, we would have shown the following. Main claim: any solution to HAMWALK(G′) can, with resources polynomial in network size, be converted into solutions of HAMWALK(G). Claim 2: there is always a Hamiltonian walk of G which, when coarsened to a walk on G′, visits coarsened good bulk nodes once and only once. The Main claim is true provided that Claim 2 is true. This is because it would imply that wG′ + Pi(GBi − 1) is equal to wG (pick the Hamiltonian walk given by Claim 2 ; consider its coarsening on G′ whose length has to be wG − Pi(GBi − 1); but this is also a closed walk of G′ that visits every node of G′ at least once and thus is of length ≥ wG′. We know from Claim 1 that wG′ + Pi(GBi − 1) ≥ wG and hence the Main claim follows). Proof of Claim 2: Clusters are pairwise independent, so that we will only give a proof for Claim 2 with respect to a particular cluster C, with set of shell nodes S, set of second shell nodes T , and set of good bulk nodes GB. Among the Hamiltonian walks of G, consider one that makes distinct visits to nodes in GB the least number of times (a distinct visit to GB is a part of a walk containing a contiguous sequence of nodes in GB immediately preceded and followed by a visit to nodes not in GB). By contradiction suppose this walk contains repeated distinct visits to GB. Consider visits to T ∪ GB: because nodes outside C can connect to T ∪ GB only via the shell S, such a visit has to be of the form siwsj , where si and sj are shell nodes and w a walk in T ∪ GB. Denote by p the number of times T ∪ GB is visited: some thought shows that p is no greater than S and hence not greater than T . Now replace the first p − 1 visits to T ∪ GB keeping the same shell nodes but the walk in T ∪ GB is substituted for a random (chosen without reuse) second shell node: for instance, siwsj is substituted for sitksj with some tk ∈ T . Denote the last visit to T ∪ GB by skusl (this includes the p = 1 case) and substitute it for skvsl where v contains all nodes in T ∪ GB (except for those of T that have been used for the p − 1 previous visits) and v visits all nodes of GB contiguously. We now consider the result of these substitutions: clearly, this is still a closed walk that visits every node of G at least once, furthermore, its has the same length (or less) as the original walk before substitutions. In other words, we have obtained a Hamiltonian walk of G, but one that visits nodes in GB only once: a contradiction. (cid:3) Algorithm solving HAMWALK: given µ and δ (where either µ or δ, but not both, might be a function of n) take In the case that µ is fixed this takes a time nO(1)2O(δ) [11]. G on n nodes and create the graph G′ using [11]. Calculate the matrix of shortest paths for G′, and use the Held-Karp algorithm to find a solution to HAMWALK(G′) [18, 19]. Convert it into one having the property described in Claim 1. Locally extend this to a walk in G using a greedy substitution at every coarsened good bulk node. Return the latter as a solution to HAMWALK(G). Runtime: 2(2δ+4µ+1)nc+n′ + nO(1)2O(δ) where nc is the number of clusters with degree ≤ δ, at most µ missing links, and GB > 2 · S and n′ is the number of nodes which are not in clusters with GB > 2 · S (note S ≤ δ + 2µ). (cid:3) A note on Clique-width: Clique-width is a quantity which has proved very popular in the area of parameterized complexity: it is related to a natural approach to assembling a graph [26]. We first define clique-width and then note some implications of our work (thereby illustrating its relevance in parameterized complexity). We suppose a k-graph has nodes with labels from the set {1, 2, ..., k}. We define a seed k-graph with one node and a label from this set. The clique-width of a graph G is the smallest integer k such that G can be composed by repeated use of four simple operations: a) generate: make a seed k-graph labeled by i, b) disjoint union: two distinct graphs are treated as disconnected components of the same graph, c) combine: linking all nodes with label j with nodes labeled i, d) relabel: all indices i replaced with j. This protocol can generate graphs which contain cliques. In this paper, clique-width can be connected to the case where there are no missing links inside the cliques identified (µ = 0). In this case, it can be proved fairly easily that the clique-width of the graph is ≤ k = (δnc + n′) and a corresponding protocol for constructing the graph using the above four operations can be provided (this witness protocol, demonstrating that the bound can be met, is called a k-expression). Given this protocol a number of Monadic Second Order Logic (MSOL) problems can be solved (see [27] and the numerous MSOL problems therein) including the classic problem 'Minimum Dominating Set' [28] in a time 2O(δnc+n′). This last follows from the recent observation that, given a k-expression for clique-width k, Minimum Dominating Set can be solved in a time 22k [29]. Thus our result for HAMWALK can be extended to other problems. Discussion and Conclusions: We have proved that it is possible to solve HAMWALK in time 2(2δ+4µ+1)nc+n′ + nO(1)2O(δ). Some care is required in the interpretation of this runtime. While δ and µ are parameters of the algorithm (with forms which can be specified independent of the graph) by contrast nc is a feature of the graph for a given δ and µ. Despite this, one can hope to construct graphs which have a given, nc, n′, δ and µ. To help the interpretation 5 of this result we thus consider the following graph family: all nodes are inside one and only one of nc clusters such that for each cluster, µ is constant, 2O(δ) = nO(1), ncδ ≤ O(1) log n (for this family n′ = 0) and each cluster is of size C > 2(δ + 2µ). This is a graph family composed of dense clusters in which links between the clusters and missing links inside the clusters are proportionately rare (an equivalent family with the roles of µ and δ reversed could also be considered): as graphs increase in size the number of clusters is relatively slow growing. HAMWALK can be solved on this family in time nO(1) (if the values of µ and δ are not known in advance, finding appropriate choices only yields a polynomial time overhead). In the intuitive case with µ and δ both constant, the number of clusters increases as the logarithm of the number of nodes. Our abstract complexity based argument can be used to inspire a class of empirical conjectures about optimal growing networks in Nature. Suppose that, in order to thrive, a network in the world has to solve HAMWALK on itself efficiently for larger and larger system sizes. Given the above, we might thus hypothesize that, if we have observations of the system at a variety of network sizes, we will find that the number of communities would increase like the logarithm of the number of nodes. While few natural systems are likely optimized to solve HAMWALK, this form of reasoning might allow us to relate the system-size scaling of structural features to the tasks networked-systems are optimized to solve. Why natural networks might show modular structure is a canonical question; beyond conjectured roles for communities like helping networked systems to control their dynamics, or to be more evolvable [15], we have provided a concrete setting in which community structure helps simplify optimization tasks. The family specified above was selected to share some similarities with real networks, while remaining mathemat- ically tractable: many real networks do have sets of densely connected nodes which are relatively isolated from the rest of the network. The bound, δ, gives some indication of the modular nature of the graph: for graphs with appro- priately small δ the clusters are more isolated from each other and it is easier to solve HAMWALK; for appropriately small µ again HAMWALK is easier to solve. If n′ ≪ n, indicating a graph with many nodes inside clusters, then again it is much easier to solve HAMWALK. The bound we proved is by construction: it might be possible to solve HAMWALK in faster time. We obtained our bound on HAMWALK by coarsening the graph on n nodes and solving problems on the reduced version. It is known that empirical networks have hierarchical community structure: dense regions embedded inside others. Authors have considered renormalization approaches to such networks [24]. How this hierarchical structure simplifies problems on graphs, and how repeated coarsenings of the full graph might help is open. In this setting, not only does modular structure constrain dynamics on graphs but it can also simplify problems on graphs. Many practical optimization problems are posed on real graphs with modular structure. The preceding gives a hint that some of the optimization problems we are interested in might allow heuristics which run in time scaling with the number of communities (and parameterizations of their isolation) rather than the number of nodes: this gives a strong justification for the exercise of developing community detection algorithms. Thanks to: Sumeet Agarwal and also to Sam Johnson, Iain Johnston and Simone Severini [1] P. Erdos and A. R´enyi, Publ. Math. Debrecen 6, 290 (1959); E.N. Gilbert, Ann. Math. Stat. 30, 1141 (1959) [2] M.E.J. Newman, Networks: An Introduction, (OUP, Oxford, 2010). [3] M.A. Porter, J.P. Onnela, P.J. Mucha, Not. Am. Math. Soc., 56, 1164 (2009); S. Fortunato Physics Reports 486, 75 (2010). [4] A. Lancichinetti, M. Kivela, J. Saramaki, Santo Fortunato PLoS ONE 5(8): e11976 (2010). [5] J. P. Onnela, et al, Phys. Rev. E, 86, 036104 (2012). [6] S. Agarwal, Ph.D. thesis, Oxford University, (2012). [7] I. Der´enyi, G. Palla, and T. Vicsek, Phys. Rev. Lett. 94, 160202 (2005); J. Reichardt and S. Bornholdt, Phys. Rev. Lett., 93, 218701 (2004); E.A. Leicht and M.E.J. Newman, Phys. Rev. Lett. 100, 118703 (2008). [8] U. Brandes, et al. IEEE Trans. KDE 20 172 (2008). [9] M. E. J. Newman, M. Girvan, Phys. Rev. E, 69, 026113 (2004). [10] B. H. Good, Y.-A. de Montjoye and A. Clauset Phys. Rev. E 81, 046106 (2010). [11] D. Lokshtanov and D. Marx, Inf. Comput. 222, 278 (2013). [12] A. Decelle, F. Krzakala, C. Moore, L. Zdeborova, Phys. Rev. Lett. 107, 065701 (2011); A. Decelle, F. Krzakala, C. Moore, L. Zdeborova Phys. Rev. E 84, 066106 (2011). [13] R.R. Nadakuditi, M.E.J. Newman, Phys. Rev. Lett. 108, 188701 (2012). [14] R. Lambiotte, J.-C. Delvenne and M. Barahona, arXiv:0812.1770 [15] H.A. Simon, Proc. Amer. Phil. Soc., 106, 467 (1962); D. Meunier, R. Lambiotte and E.T. Bullmore, Front. in Neurosci., 4 200 (2010). [16] G.B. West, J.H. Brown, B.J. Enquist, Science 276, 122 (1997); E. Katifori, G.J. Szollosi, M.O. Magnasco, Phys. Rev. Lett. 104, 048704 (2010). [17] R. G. Downey and M. R. Fellows Parameterized Complexity (Springer, New York 1999); R. Niedermeier, Invitation to 6 Fixed-Parameter Algorithms, (Oxford University Press, Oxford, 2006). [18] It is straightforward to recast HAMWALK as a travelling salesman problem which can be solved in time O(2n) [19]. [19] M. Held and R.M. Karp, J. Soc. Indust. Appl. Math. 10, 196 (1962). [20] A Hamiltonian Walk sometimes also means a covering walk which is strictly self avoiding. [21] S.E. Goodman, S.T. Hedetniemi. SIAM J. Comp. 3, 214 (1974). [22] N. Madras, G. Slade, The Self-Avoiding Walk (Birkhauser, Boston, 1996); R. van der Hofstad and W. Konig, J. Stat. Phys., 103 (2001). [23] M. M´ezard, A. Montanari Information, Physics, and Computation, (OUP, Oxford, 2009); C. Moore, S. Mertens Nature of Computation, (OUP, Oxford, 2011). [24] F. Radicchi, J. J. Ramasco, A. Barrat, S. Fortunato, Phys. Rev. Lett. 101, 148701 (2008). [25] A. Clauset, Phys. Rev. E 72, 026132 (2005). [26] B. Courcelle, S. Olariu, Discrete Appl. Math., 101, 77 (2000). [27] B. Courcelle, J. Engelfriet, Graph structure and monadic second-order logic, a language theoretic approach (CUP, Cam- bridge, 2012). [28] M.R. Garey, D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, (W. H. Freeman, New York, 1979) [29] H.L. Bodlaender et al. Mathematical Foundations of Computer Science, LNCS 6281, 174 (2010).
1901.09691
1
1901
2019-01-22T13:37:58
EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction
[ "cs.SI" ]
In this paper we present EvalNE, a Python toolbox for evaluating network embedding methods on link prediction tasks. Link prediction is one of the most popular choices for evaluating the quality of network embeddings. However, the complexity of this task requires a carefully designed evaluation pipeline in order to provide consistent, reproducible and comparable results. EvalNE simplifies this process by providing automation and abstraction of tasks such as hyper-parameter tuning and model validation, edge sampling and negative edge sampling, computation of edge embeddings from node embeddings, and evaluation metrics. The toolbox allows for the evaluation of any off-the-shelf embedding method without the need to write extra code. Moreover, it can also be used for evaluating any other link prediction method, and integrates several link prediction heuristics as baselines.
cs.SI
cs
EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction Alexandru Mara Jefrey Lijffijt Tijl De Bie IDLab, Dept. of Electronics and Information Systems Ghent University 9000 Ghent, Belgium Editor: Unknown alexandru.mara(at)ugent.be jefrey.lijffijt(at)ugent.be tijl.debie(at)ugent.be Abstract In this paper we present EvalNE, a Python toolbox for evaluating network embedding methods on link prediction tasks. Link prediction is one of the most popular choices for evaluating the quality of network embeddings. However, the complexity of this task requires a carefully designed evaluation pipeline in order to provide consistent, reproducible and comparable results. EvalNE simplifies this process by providing automation and abstraction of tasks such as hyper-parameter tuning and model validation, edge sampling and negative edge sampling, computation of edge embeddings from node embeddings, and evaluation metrics. The toolbox allows for the evaluation of any off-the-shelf embedding method without the need to write extra code. Moreover, it can also be used for evaluating any other link prediction method, and integrates several link prediction heuristics as baselines. Keywords: Network Embedding, Link Prediction, Evaluation, Edge Sampling, Graphs 1. Introduction Network Embedding (NE) methods aim at learning low-dimensional representations of net- work nodes as vectors, typically in Euclidean space. The quality of the resulting represen- tations is assessed through a variety of downstream prediction tasks, with link prediction (LP) one of the most common choices (e.g., Grover and Leskovec, 2016; Lai et al., 2017; Gao et al., 2018; Kang et al., 2019). LP amounts to estimating the likelihood of the existence of edges between pairs of nodes that are not connected in the input network. Such edges may be missing from the input network because of incomplete information, or sometimes because the input network is an earlier snapshot of an evolving network. The evaluation of LP methods is particularly challenging as it requires a number of additional steps and design choices which can confound the results, are prone to errors, and can harm reproducibility. First, one needs an (incomplete) training network along with a (more) complete version of that network for testing. It is relatively straightforward to define such training and testing networks whenever different snapshots of a dynamic network are available. For static networks, however, much research has been devoted to determining the best approach to generate these training networks (Lichtenwalter and Chawla, 2012; Yang et al., 2015; Garcia-Gasulla et al., 2015). In addition to train and test edges, also sets of 1 Mara, Lijffijt and De Bie train and test non-edges (also referred to as negative samples) are required for evaluating LP. Non-edges are pairs of nodes that are not connected in the input network. The relative sizes of these train and test edge sets as well as the sizes of the non-edge sets are user- defined parameters which vary between scientific works. Moreover, a challenge specific for NE-based methods for LP is that they usually only provide node embeddings, while the binary classifiers used to predict links require edge embeddings as their input. There are several approaches for deriving edge embeddings from node embeddings (Chen et al., 2018), the choice of which has a strong impact on the performance of different NE methods (Grover and Leskovec, 2016). Also the metrics used to report the accuracy of different methods vary substantially, from AUC-ROC (Kang et al., 2019) to precision and recall (Wei et al., 2017) or precision@k (Wang et al., 2016). Finally, it is not uncommon in recent literature to use recommended default settings for existing methods used as baselines, while tuning the hyper-parameters for the method being introduced. In this paper we propose EvalNE, a Python toolbox that addresses one of the critical issues in the evaluation of NE methods and in the field of machine learning in general: the reproducibility of results. The library can be used to replicate the experimental sections of the majority of papers evaluating NE methods on LP for both directed and undirected networks. A command line interface in combination with a configuration file allows users to evaluate any NE method on the LP task, without the need of new software code. This simplifies their model evaluation pipeline, and thus minimizes the risk of errors. Alterna- tively, EvalNE can be used as an API that provides implementations of most of the building blocks required for LP evaluation, from generating train/test splits to computing evaluation metrics. We note that, while a significant part of the functionality of EvalNE is geared towards NE methods, it is capable of evaluating also other kinds of LP methods. 2. Architecture EvalNE has been designed as a pipeline of interconnected and interchangeable building blocks. This modular structure, presented in Figure 1, allows for the evaluation of different types of methods and simplifies code maintenance and addition of new features. An evalu- ator class integrates all the building blocks and is the main object the user interacts with. The library also provides different levels of data encapsulation in order to reduce the risk of incorrect model evaluation. Next, we describe the core building blocks of EvalNE. Preprocessing The toolbox offers a variery of functions to load and store networks, to prune nodes based on their degrees, remove self-loops, relabel nodes, obtain sets of specific types of edges, restrict networks to their main connected components and obtain common network statistics. These functions can be used in combination with other methods provided by libraries such as NetworkX. Data Split In order to perform LP, sets of train and test edges need to be selected from the input networks. The training set is generally required to span all nodes in the network and induce a training network with a single connected component. EvalNE provides an edge set selection algorithm which satisfies these requirements, can generate edge sets of 2 EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction Figure 1: Diagram showing the types of methods that can be evaluated using EvalNE. The gray blocks represent modules provided by the library while the remaining ones are the methods to be evaluated and thus user-specified. The library allows for the evaluation of end-to-end prediction methods (several LP heuristics are included as baselines here), edge embedding methods, and node embedding methods. different sizes and is orders of magnitude faster than the naive approach currently used in practice (included in EvalNE for comparison). The library also offers choice of sampling the sets of non-edges required for LP under either the open world or the closed world assumption. This determines if the set of train non-edges does not overlap with the set of train edges (open world) or with both the sets of train and test edges (closed world). The sizes of these sets are tunable parameters. LP Heuristics EvalNE contains a set of heuristics which can be used as baselines for the LP task. These methods are: common neighbours, Jaccard coefficient, Adamic-Adar index, resource allocation index, preferential attachment and Katz. Additionally, the library includes a random prediction method. These baselines are also defined for directed networks by constraining the analysis to the in or out node neighborhoods. In order to perform LP, however, edge embeddings are required. Node to Edge embeddings Many NE methods only provide embeddings of the network nodes. In EvalNE we include several methods to compute edge embeddings from node embeddings. The user can select any, or a combination of, the following binary operators: average, hadamard, weighted L1 and weighted L2 (Grover and Leskovec, 2016). Binary Classification To predict the existence or absence of a link from a set of given edge embeddings, EvalNE uses, by default, regularized logistic regression with L2 penalty and 10-fold cross validation of the regularization parameter. The library, however, is flexible and allows for any other binary classifier (e.g. from Sklearn) to be used. Evaluation metrics EvalNE can evaluate the scalability and accuracy of embedding methods. The scalability is measured trough wall clock time and the LP accuracy using two types of metrics: fixed-threshold metrics and threshold curves. Fixed-threshold metrics summarize method performance to single values. The frame- work implements the following: confusion matrix (TP, FN, FP, TN), precision, recall, fall- out, miss, accuracy, F-score and AUC-ROC. Threshold curves present the performance of methods for a range of threshold values. EvalNE provides precision-recall curves (Licht- enwalter and Chawla, 2012) and ROC curves (Fawcett, 2004). The most suitable metrics based on the evaluation setup are recommended to the user. 3 Mara, Lijffijt and De Bie 3. Relation to other software To the best of our knowledge only two libraries for the evaluation of NE methods currently exist. OpenNE (github.com/thunlp/OpenNE) is a recently proposed Python toolbox which provides implementations of state-of-the-art embedding methods and evaluation on multi- label classification tasks. GEM (Chen et al., 2017) is a similar Python framework which also implements several embedding methods and includes basic functionality for evaluating multi-label classification, visualization, and LP. However, both these libraries require Python implementations of the NE methods eval- uated that comply with pre-defined interfaces. As these implementations are not always feasible or practical, we have designed EvalNE to evaluate any NE method written in any language by delegating the method execution to the system command line interface. More- over, EvalNE is the only currently available library which provides full automation of the method evaluation pipeline, parameter tuning, and edge sampling capabilities. Finally, no other open-source libraries include implementations of similar LP heuristics for both directed and undirected networks. 4. Source Code and Documentation The source code and documentation of EvalNE are available on Bitbucket1 and GitHub2 and are provided under the MIT free software license. The abovementioned platforms provide different mechanisms for the community to contribute to the project such as bug tracking, feedback submission and pull requests for adding new features. The code style complies with PEP 8 and the documentation follows the numpy docstring format. The toolbox is compatible with Python 2 and Python 3 and can be easily installed using pip. Supported platforms include Linux, Mac OS X, and Microsoft Windows. EvalNE only depends on a small number of popular open-source Python packages, and follows their coding guidelines: NumPy, SciPy, NetworkX, Scikit-learn and Matplotlib. Other packages such as OpenNE or GEM are recommended as they provide implementations of different NE methods. The toolbox documentation includes instructions on the installation and use both as an API and as a command line tool. Simple examples of the high-level use of the library are also included as well as more advanced examples of the low-level use and integration with existing Python code. Finally, the library contains pre-filled configuration files which reproduce the experimental sections of several influential papers on NE. Acknowledgements The research leading to these results has received funding from the European Research Council under the European Union's Seventh Framework Programme (FP7/2007-2013) / ERC Grant Agreement no. 615517, from the FWO (project no. G091017N, G0F9816N), and from the European Union's Horizon 2020 research and innovation programme and the FWO under the Marie Sklodowska-Curie Grant Agreement no. 665501. 1. EvalNE Bitbucket repository https://bitbucket.org/ghentdatascience/evalne/src/master/ 2. EvalNE GitHub repository https://github.com/Dru-Mara/EvalNE 4 EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction References Haochen Chen, Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. A tutorial on network embeddings, 2018. Siheng Chen, Sufeng Niu, Leman Akoglu, Jelena Kovacevic, and Christos Faloutsos. Fast, warped graph embedding: Unifying framework and one-click algorithm, 2017. Tom Fawcett. Roc graphs: Notes and practical considerations for researchers. Technical report, 2004. Ming Gao, Leihui Chen, Xiangnan He, and Aoying Zhou. BiNE: Bipartite network embed- ding. In Proc. of SIGIR, pages 715 -- 724, 2018. Dario Garcia-Gasulla, Claudio Ulises Cortes, Eduard Ayguade, and Jes´us Jos´e Labarta. Evaluating link prediction on large graphs. In Proc. of CAAI, pages 90 -- 99, 2015. Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks. In Proc. of KDD, pages 855 -- 864, 2016. Bo Kang, Jefrey Lijffijt, and Tijl De Bie. Conditional network embeddings. To appear in Proc. of ICLR, 2019. Yi-An Lai, Chin-Chi Hsu, Wen Hao Chen, Mi-Yen Yeh, and Shou-De Lin. Prune: Preserving proximity and global ranking for network embedding. In Proc. of NIPS, pages 5257 -- 5266. 2017. Ryan N. Lichtenwalter and N. V. Chawla. Link prediction: Fair and effective evaluation. In Proc. of ASONAM, pages 376 -- 383, 2012. Daixin Wang, Peng Cui, and Wenwu Zhu. Structural deep network embedding. In Proc. of KDD, pages 1225 -- 1234, 2016. Xiaokai Wei, Linchuan Xu, Bokai Cao, and Philip S. Yu. Cross view link prediction by learning noise-resilient representation consensus. In Proc. of WWW, pages 1611 -- 1619, 2017. Yang Yang, Ryan N. Lichtenwalter, and Nitesh V. Chawla. Evaluating link prediction methods. KAIS, 45(3):751 -- 782, 2015. 5
1708.03850
1
1708
2017-08-13T04:19:42
Structure in scientific networks: towards predictions of research dynamism
[ "cs.SI", "physics.soc-ph" ]
Certain areas of scientific research flourish while others lose advocates and attention. We are interested in whether structural patterns within citation networks correspond to the growth or decline of the research areas to which those networks belong. We focus on three topic areas within optical physics as a set of cases; those areas have developed along different trajectories: one continues to expand rapidly; another is on the wane after an earlier peak; the final area has re-emerged after a short waning period. These three areas have substantial overlaps in the types of equipment they use and general methodology; at the same time, their citation networks are largely independent of each other. For each of our three areas, we map the citation networks of the top-100 most-cited papers, published pre-1999. In order to quantify the structures of the selected articles' citation networks, we use a modified version of weak tie theory in tandem with entropy measures. Although the fortunes of a given research area are most obviously the result of accumulated innovations and impasses, our preliminary study provides evidence that these citation networks' emergent structures reflect those developments and may shape evolving conversations in the scholarly literature.
cs.SI
cs
1 Structure in scientific networks: towards predictions of research dynamism Benjamin W. Stewart1, Andy Rivas2, Luat T. Vuong3,4, 1 Expository Writing Program, New York University, New York, NY, USA 2 Conductor, Inc. New York, NY, USA 3 Department of Physics, Queens College of the City University of New York, Flushing, NY, USA 4 Department of Physics, The Graduate Center of the City University of New York, New York, NY, USA * [email protected] (LTV), [email protected] (BWS), [email protected] (AR) Abstract Certain areas of scientific research flourish while others lose advocates and attention. We are interested in whether structural patterns within citation networks correspond to the growth or decline of the research areas to which those networks belong. We focus on three topic areas within optical physics as a set of cases; those areas have developed along different trajectories: one continues to expand rapidly; another is on the wane after an earlier peak; the final area has re-emerged after a short waning period. These three areas have substantial overlaps in the types of equipment they use and general methodology; at the same time, their citation networks are largely independent of each other. For each of our three areas, we map the citation networks of the top-100 most-cited papers, published pre-1999. In order to quantify the structures of the selected articles' citation networks, we use a modified version of weak tie theory in tandem with entropy measures. Although the fortunes of a given research area are most obviously the result of accumulated innovations and impasses, our preliminary study provides evidence that these citation networks' emergent structures reflect those developments and may shape evolving conversations in the scholarly literature. Introduction Sociologists, geographers, and systems theorists have long analyzed how network structures shape the forces that pass across them [1–5]. Much of this work traces its roots back to the "strength of weak ties" theory, which Mark Granovetter developed as a way of linking "micro-level interactions to macro-level patterns" [3]. This theory asserts that weak social ties (friends-of-friends rather than close friends) are more likely to provide access to novel information than strong ties. Ronald Burt's structural hole theory [2] builds on Granovetter's work via its assertion that the strength of a tie is less important than its position in the structure. Burt places emphasis on the importance of non-redundant ties, which exist in cases where a social actor (ego) connects two other people who would otherwise have no tie (alters). Within that structure, ego has powerful brokerage opportunities. The insight of Burt's theory is that those opportunities emerge from a structural feature of social networks: nonredundant ties are tantamount to social 2 power; the egos that connect such ties together play an outsized role in the processes through which information and resources pass across those links in the social network. The question we ask of citation networks concerns the emergence and evolution of research areas: are there relations between an area's development and the shape of its citation network structures? As noted above, scholars in fields other than sociology have borrowed network theory's structural insights. For instance, Arbesman ,-in their work on innovation in cities-cite Granovetter to help them explain why larger cities tend to produce more innovations per capita than smaller ones [6]. Similarly, Peter Csermely, in looking at the importance of bridging structures in complex systems, identifies nodes that he refers to as "creative elements" [7]. Such nodes, Csermely argues, "seem[] to be a widespread feature of evolving systems" and he speculates that they "enable the survival of unprecedented challenges and play a key part in the development and evolvability of complex systems" [7]. Though Csermely's scientific research examines protein-protein interaction networks, he draws on structural hole theory to explain isomorphic phenomena in a range of situations: in "protein interaction networks, signaling networks, social networks and ecosystems, we can also identify highly similar creative elements" [7]. Burt has also linked structural holes to creativity, arguing that "good ideas are disproportionately in the hands of people whose networks span structural holes" [8]; this assertion squares with recent findings that scholarly performance strongly correlates with access to structural holes [9, 10]. However, citation networks are strikingly different from social networks. Whereas a scholar may actively broker ideas between peers who otherwise lack ties to each other, beyond the initial act of referencing, relations among articles are inert: citation networks only evolve as scholars add references to them. In what ways then, do the insights of social network theory still apply to citation networks? Co-citation analysis has long understood citations as representations of concepts [11–14]. To the extent that this is so, innovative development of scientific literature-guided by disciplinary training-can be understood as brokerage between concepts (or aspects of theories) that have yet to be connected to each other. Our study looks at the structural features that are the precipitates of such combination and asks whether citation networks exhibit structural patterns that correspond to the dynamism of the research areas to which those networks belong. Of the citation networks of particular articles, we ask about the relations between two properties: the number of articles connected to the network via a single link (i.e., nodes that, relative to a large percentage of the other nodes in the network, are weak ties), and the variety of pathways that tie the network's other nodes together (network entropy). In combination, these properties enable us to characterize both the breadth and diversity of networks as they emerge over time. We refer to the precipitates of that emergence as a citation ecology-i.e., a pattern of relations among references. Such patterns are important to our study in that they allow us to draw new connections between network theory and citation analysis. To see how this is so-and also to get a sense of the conceptual motivations behind our approach-it will help to understand a problem that emerged in the 1980s and 90's in citation analysis. Several scholars have presented excellent overviews of attempts, in those years, to establish what Wouters [15] describes, retrospectively, as a desire for "a definitive citation theory" [15–19]. Depending on who was calling for such a theory, it would have provided a framework with which to either a) coherently assess the value of citations as quantitative performance measures (the position affiliated with the Mertonian [20, 21], normative model of science [22–24]), or b) question the validity of the normative model's assumptions (the position most strongly associated with constructivist sociology, and Science and Technology Studies [25–27]). During this period, attempts to establish a normative theory of citation failed due both to the wide variety of citer motivations [22, 28–30], and to the disparate methodological approaches 3 to accounting for that variety, a problem well-summarized by Bornmann and Daniel [18]. Although the constructivist sociologists of science tended to see those problems as endemic to the project of using qualitative measures as assessments of scientific quality, scientometricians responded with approaches that justified normative science on grounds in line with what Van Raan characterizes as "bibliometric chemistry". This approach, rather than focusing on the idiosyncratic referencing behaviors of individual scholars, focuses on the statistical distributions that emerge within fields and sub-fields [17]. Wouters [15] characterizes such strategies as generating formalized rather than paradigmatic representations of science; he notes that the former have become the dominant mode of citation analysis. Our study constructs formalized representations of citation network structures in order to approach the citation behavior question from a different angle. We ask whether the patterns that emerge from aggregations of citation behaviors signal dynamics operating within the paradigmatic dimension of particular research areas. As such, we are interested in citation networks not for what they tell us about the articles they reference; rather, we use those cited articles as focal points through which to access and analyze the structural character of the networks connected to them. Those networks represent ongoing, scholarly conversations that establish avenues that scientists may add to as part of their future scholarship. Our methods characterize the structure of those conversations, an approach distinct from co-citation and co-word analysis [11, 31–34], and from those co-authorship analyses that have employed network theory in order to understand the kinds of positions and relations that are most advantageous to scholarly production and recognition [9, 10]. Whereas those studies seek to either, (a) isolate the significant networks of concepts that have emerged from scholarly conversations, or (b) focus on the advantages of particular structural positions within the social network, we look at citation network structure to see if patterns of referencing behavior correlate with the dynamism of areas of scientific research. We build and study citation networks of the leading papers in three research areas. In order to characterize those networks' citation ecologies, we focus on the relationships between two properties whose mutual growth-on multi-year time horizons-appears to be vital to continued network growth. Those two qualities are, first, the network's friends-of-friends (in this case, references to papers not already in the local citation network), and second, the diversity of network pathways as measured by Shannon entropy and normalized Shannon entropy. We see these properties as being particularly important components of our networks' citation ecologies due to their potential to move in opposite directions-i.e., spikes in the intensity of one property lead to drops in the normalized measure of the other. On the other hand, when these properties increase or decrease at more gradual rates, they often move in the same direction. By focusing on these measures, we begin to explore the extent to which patterns within a citation network correspond to the more general dynamics of the research area to which it belongs. Constructing citation networks in three areas of research We focus on three topic areas within optics: plasmonics1 (topic search: 'plasmon*'), the photorefractive effect2 (topic search: 'photorefractiv* NOT keratect*'3, and Brillouin 1Plasmons are coherent excitation of electrons on a surface or interface, generally a metal. 2Photorefractive effect: self-induced changes in refractive index due to photon-photon interaction in a material. 3Refractive keratectomy is unrelated to the physics principle of the photorefractive effect, the innovation channel isolated in this study. 4 Fig 1. Three topics within the field of optics that exhibit separate dynamics in research activity. The numbers of papers published per year from 1975 through 2015 show topics (A) 'plasmon*', an area that is growing (B) 'photorefract* NOT keratect*', whose topic association is waning, and (C) and 'Brillouin scatter*', whose topic is re-emerging. Venn diagrams with the number of papers published in the 'plasmon*' (green), 'photorefract* NOT keratect*' (brown), and 'Brillouin scatter*' (blue) fields (D) before and (E) after 1998. Note that the scale of the plasmon topic area shown in (A) is approximately an order of magnitude larger than the other two areas. scattering4 (topic search: 'brillouin scatter*'). Fig. 1 shows each topic's popularity since 1975: plasmonics continues to grow at a striking rate, with over 11,000 journal articles published within 2015; on the opposite trajectory, photorefractives are on the wane; finally, research related to Brillouin scattering, the smallest field surveyed here, re-emerged after having slowed in the late-1980s and early-90s. As of 2015, plasmon is the largest topic area (with over 62,000 papers) and its articles have attracted the most citations. Photorefractive is the second largest area, with about 8,000 papers. Brillouin scattering is the smallest area with approximately 6,000 papers. We refer to the three fields as plasmon (growing), Brillouin scattering (re-emerging) and photorefractive (waning). In the 1970s these three topic areas emerged out of the widespread availability of laboratory lasers. As such, there is substantial overlap in terms of the equipment and laboratory setup necessary to conduct research. All three topics involve both theorists and experimentalists; prior to 1998, all three were dominated by optical physicists. Research operates on a moderate scale for facilities-i.e., experiments typically do not require large collaborative networks or large accelerator facilities (e.g., those at CERN); while all are highly dependent on the development of materials (as the basis for 4Brillouin scattering refers to the photon response to self-induced distortions in atomic lattice. 0 2000 4000 6000 8000 10000 1975 1985 1995 2005 Thriving: Plasmon* 0 200 400 600 800 1975 1985 1995 2005 Waning: Photorefractive* -Kerat* 0 200 400 600 800 1975 1985 1995 2005 Re-emerging: Brillouin Scatter* (A) (B) (C) (D) 0 32 1 8 0 26 8 (E) Intersection until 1998 Intersection since 1998 7506 5,320 3,828 62,188 5,937 7,671 59 2015 2015 2015 5 experiments), the ease of production and the costs of the technologies vary widely; results from all three areas have led to the development of commercial technologies, although those applications lie in different domains. Among the three, there is almost no overlap in research interests or citation networks; as of 2014, only 60 papers connected photorefractives to plasmons, only 30 papers connected Brillouin Scattering to plasmons, and only 8 papers connected photorefractives to Brillouin scattering. The separation between these areas allows us to compare their network structures and also to consider the dynamics of each one in relative isolation from the others. For each topic area, we identify the 100-most cited articles with publication dates before 1999. Although 1998 is a somewhat arbitrary endpoint, it marks a time during which the use of scholarly databases-as well as the development of online, often open-source, scholarly publishing-was expanding [35]. Limiting the publication period of top-cited articles to pre-1999 allows us to reduce the effects of any catalyzation of publicity stemming from immediate online notification and access. Given their citational significance, we refer to each of our top-cited papers as a parent and create a database of each parent's family. Each of the 300 network families range in size from 800 to 20000 members and includes grandparents (papers referenced by the parent), descendants (papers that reference the parent), and the descendants' other references, some of which may already exist within the network as primary ties to the parent. We refer to those articles that cite the parent directly as endogenous nodes; by contrast, we refer to those articles that are two steps removed from the parent as exogenous nodes (i.e., nodes that, to a parent, are friends of friends). Although exogenous nodes have a range of potential relations to the scholarly conversation established by the parent, they don't explicitly participate in it. Our scraping process sweeps the citation network in three passes in order to produce a citation network. It gathers, first, the references for each parent (the grandparents); then the papers that cite the parents (descendants); finally, for each of these descendants, we collect their references to other papers (thus, no paper is located more than two vertices away from the parent). With this data, we construct a directed network for each parent wherein each node represents a paper and each edge a reference link between two nodes u → v indicates that paper u references paper v. Although we construct the networks out of directed pathways, we analyze them as undirected networks. Primarily, this approach stems from our disinterest in the citational capital with which citation networks endow significant articles5. We focus on how the commitments of a given parent network are structured, particularly in terms of the relations between its exogenous and endogenous nodes; structurally, the direction of commitment is not relevant. High citation reach and entropy marks growing and re-emerging research As each parent network grows, its shape emerges in part as a function of the descendants' reference distribution-i.e., the number of those descendant references that are endogenous and the number that are exogenous, as illustrated in Fig. 2. As discussed above, exogenous nodes are analogous to the social network model of friends-of-friends. One of our observations is that the parent papers of the growing [plasmon] and re-emerging [Brillouin] fields both exhibit network structures that more closely resemble Figs. 2(B) and (D) rather than structures of Figs. 2(A) and (C), even 5Another reason for this approach has to do with the way that citation indices are constructed in the direction opposite to the scholarly literature's emergence: references look backwards; citations look forward in time [15]. 6 though the re-emerging field is an order of magnitude smaller than the growing area. Figures 2(B,D) each have a larger network than (A,C) for the same number of citations; for (B,D), the new descendants (new nodes) that enter the network by citing the parent also cite endogenous rather than exogenous nodes. The networks of the parent papers in the growing and re-emerging areas have networks that exhibit higher entropy per citation (entropy grows quickly in a network whose new citations add large numbers of exogenous nodes). The growing and re-emerging areas' networks also have larger numbers of nodes per citation than the waning network; we refer to the nodes-per-citation measure as citation reach. Fig 2. The structure of parent-paper citation networks exhibit structural changes based on the citation practices of its descendants.6(A) represents a parent-paper network containing the basic network of 3 grandparents and 3 descendants; that network's structure changes significantly when (B) a new descendant introduces a cluster of 11 exogenous nodes. A subsequent descendant may cite the network's exogenous nodes, as in (C), or, alternatively and by contrast, add exogenous nodes to the parent citation network, as in (D). To measure of the number of nonredundant ties in the parent networks, we calculate those networks' citation reach. This concept is related to, though less precise than, reach efficiency, which measures "how much (nonredundant) secondary contact" a given 6Note that, in reality, it would be rare to have a citation network as small and as insular as Fig. 2 (A); that network is an ideal type designed to contrast with the other three networks. Likewise, (C) and (D) highlight extremes of network potential. (A)(D)(C)(B)012Citation Reach2345Entropy1.251.31.35Normalized Entropy(E)(F)(G)Citation ReachEntropyNormalized EntropyCitations Citations Citations (A)(B)(C)(D)(A)(B)(C)(D)(A)(B)(D)(C) 7 node has "for each unit of primary contact" [36]. In a similar manner, the citation reach, R, quantifies the number of exogenous nodes in the network per parent and descendant: R = N − C − G − 1 C + G + 1 (1) where N is the number of nodes in the network, C is the number of citations of the parent, G is the number of references by the parent or grandparents. As suggested above, this measure should not be understood as a property of the parent paper; rather, it's a property of the ecology of the network tied to the parent. While there exist other formulations for calculating the embedded relationship between players in a network [37], this study draws uses more basic measures to characterize simpler networks. Here, entropy and citation reach describe the parent citation networks that, containing only four levels, are not complex but can already be shown to be quite distinct. In fact, it is remarkable that such basic measures can differentiate structural patterns within these citation networks. In Figure 3(A), we show the citation reach R of each field's leading parent papers as a function of the parent-paper's year of publication. The radius of each circle is scaled to the number of citations of the parent paper. We observe that the growing and re-emerging fields [plasmon and Brillouin] exhibit higher R than the waning field [photorefractives]. The majority of the more highly-cited parent papers chosen for this study from each field were published between 1990 and 1998; however, the R for the growing and re-emerging areas is relatively uniform over time in spite of this nonuniform temporal introduction of parent papers. Whereas R measures the number of exogenous nodes per descendant, it does not describe the integration of those, and other, nodes into the network. Thus, in addition to R, we characterize another aspect of the parent papers' network ecologies, namely their Shannon entropy S = −(cid:80)N i pi log(pi) and normalized Shannon entropy H = S log N , where N is the number of papers or nodes in the secondary network, and pi is the fraction of citations related to paper i. The values of S and H provide measures of network growth and interconnectedness-characterizations of the diversity of the path structures of a given citation network. Within citation analysis, we are unaware of projects that use Shannon entropy in this way, though Leydesdorff [38] has used Shannon entropy to examine citation dynamics among scientific journals, and Li et al., [39] have used it to detect communities within citation networks. Outside of citation analysis, several studies have employed Shannon entropy with motivations similar to ours: in Balch's examination of robot behavior, entropy "provides a continuous, quantitative measure of robot team diversity" [40]; in Eagle's comparison of the entropy a population's communication behavior, higher communicative entropy exhibits positive correlations with higher socioeconomic rankings [41]; in Demetrius's comparison of the structure of a variety of network models, "network entropy is positively correlated with robustness" [42]. In our study, entropy characterizes the distribution of pathways among papers in a citation network. We observe that, as measured by Shannon entropy S, the three topic areas are structurally different from each other. In Fig. 3 (B), each marker (color-coded by topic area) indicates a parent paper's network entropy relative to its citations in 2015. That there is a positive correlation between these two variables is not surprising, since S rises when more nodes are added to a network. What is notable, though, is that parent networks in the growing and re-emerging fields exhibit more entropy per citation than the waning field. The distinction between the waning [photorefractive] topic area and the two other areas is distinctive. The inset charts the increase in individual paper-networks' entropy measures over time. Similar to those paper-networks' states in 2015, each topic area occupies relatively distinct portions of the graph. 8 Fig 3. The structure of the citation networks of the leading parent papers in each field may indicate the dynamics of the field. (A) Citation reach as a function of the year of publication for each of the 300 citation networks represented in this study, where the circle radius indicates the number of parent-paper citations. Parent-paper networks in the growing [plasmon] (green) and re-emerging [Brillouin] (blue) fields exhibit higher citation reach than those in the waning [photorefractive] (brown) field. (B) Parent-paper network entropy as a function of parent-paper citation at the end of 2015. Parent-paper networks in the growing [plasmon] (green) and re-emerging [Brillouin] (blue) fields exhibit higher entropy per citation than those in the waning [photorefractive] (brown) field. The three selected topics occupy relatively distinct areas of the figures. No obvious differences are observed between parent papers that are research articles (X's) and those that are review papers (circles). Inset: the evolution of each parent paper's network entropy is drawn as a function of its citations over time. Whereas Fig. 3 shows that citation reach and entropy per citation are higher in both growing [plasmon] and re-emerging [Brillouin] fields, Fig. 4 illustrates that citation reach and normalized entropy can move in opposite directions: often, as part of these citation networks' growth, citation reach increases sharply along with concomitant drops in normalized entropy; many of these punctuations are followed by a gradual rise in normalized entropy (with a correlate decrease in citation reach). A contrary mathematical relationship can be deduced by assuming a linear relationship between entropy and the logarithm of citations, which is visible in Fig. 3(B): a jump in the parent-paper network's nodes-per-citation value denotes a large introduction of exogenous nodes, a phenomenon that is associated with increased citation reach and a decrease in normalized entropy. Although they are pervasive in all three areas, these mirrored punctuations are most clearly visible in the growing (A and D) and re-emerging (C and F) areas. This phenomenon may have implications for further research. Reflections on the approach and future directions In this study, we have begun to analyze citation ecologies in relation to the dynamism of selected research areas; we have centered our analysis on simple measures that succinctly identify patterns of variation that lead to divergent outcomes. Our initial observations indicate that leading-paper citation networks carry signatures that correlate with the dynamism of the research areas to which they belong: network (2015) Growing [Plasmon] Article Growing [Plasmon] Review Waning [Photorefractive] Article Waning [Photorefractive] Review Re-emerging [Brillouin] Article Re-emerging [Brillouin] Review (Evolution) Citations Citations Year Published (A) (B) 9 Fig 4. Punctuated drops of citation network (A)-(C) Normalized Entropy accompany punctuated jumps in (D)-(F) Citation Reach, drawn as a function of year for growing [plasmon] (green), waning [photorefractive] (brown), and re-emerging [Brillouin] (blue) fields, respectively. The black dotted lines show the average values from each field's 100 parent paper networks. qualities, independent of the size of the citation network, correlate with the growth or waning of the field. These results are easily observed, though their significance is limited by our focus on only three areas within optics. Nevertheless, our results offer a place to begin to ask questions beyond those areas. Are correlations between network structure and dynamism visible across other topics of research? If so, are the correlations present in a manner analogous to our observations here, or do those properties' measures vary in different ways, perhaps depending on the type of research, or relative to the scholarly cultures conducting that research? Even within the case study conducted here, the variations may stem from a range of factors: the social conventions that cultivate or undermine scientific norms [43]; the material costs of research (a factor tied both to technological history and to funders' interest); advancements or deadlocks within research lines that open up or close down future paths for exploration. Of these factors, research developments are easiest to identify and they offer ready explanations for our areas' divergent trajectories. In the growing [plasmon] area, advances in surface-enhanced Raman scattering [44–46] and demonstrations of single-molecule detection [47] resulted in an explosion of biomedical applications that significantly expanded the area's interdisciplinarity. Similarly, in the 90s, work in the re-emergent area [Brillouin scattering] on stimulated Brillouin scattering dynamics [48–50] may have contributed to the renewed interest and a range of optical applications [51–53]. By contrast, the inflection point of the waning [photorefractive] area coincided with the disruptive development of organic photorefractive materials [54–57], which may have shifted the attention from physics to chemistry and materials science7. While our network measures retrospectively mark the divergences among our three areas, a question for future research is whether or not these methods can be adapted to capture research dynamics as they emerge. If so, focusing on citation ecologies could fill 7It should be noted that the photorefractive effect describes materials that are used in holography, but few papers in holography today use the word "photorefractive"-an interesting subject in topic identification in itself. (A) (E) (D) (B) (C) (F) 10 a gap between assessments that focus on individual scholars' publication records [58–61], and those concerned with the research programs of larger-scale entities-such as institutions [60, 62], innovation networks [63], or nations [64–66]. That is, by clustering together measures of the structures of individual networks, projects that characterize citation ecologies have the potential to clarify the links between the micro level of individual papers, and their relations to the larger, macro-structures to which they contribute. Currently, there is a trend towards employing enormous data sets and sophisticated machine learning methods that, with a similar objective, seek to draw predictions from network structures. Our efforts aim to discern patterns of citation networks rather than social networks, and to identify research trends; we believe we are among the first to successfully correlate the structure of citation networks with the dynamics of research topics by strategic selection of comparable data sets. This initial effort, with three disjoint research areas, does not yet provide broad statistical claims about the utility of our approach. However, this case study is novel in the way that it introduces an ecological perspective to the project of using leading papers in a field to embody the trends of the whole. Our results may indicate that, over the long term, diversity within citation networks is vital to the continued growth of topic areas. There are similarities between this ecological focus and some work in patent analysts-studies that may be instructive for future research. For instance, Wang et al., [67] have shown that strong brokerage positions in patent networks predict for patent renewal. In a slightly different vein, Yoon et al., have used subject-action-object (SAO) analysis to bring together multiple variables in the production of dynamic patent maps that point to "hotspots" and "vacuums" in the patent landscape [68]. Yet though this work is closely related to ours, the conventions of academic scholarship are different from those of patent citation (which are driven by potential profit). Indeed, there is increasing evidence that the scholarly, scientific inputs that culminate in innovative patents do not necessarily correlate with successful scholarship-to such an extent that the most prominent scientific papers are negatively correlated with patent innovations [69]. In future work, one could use this approach to studying leaders in a field, but move the theory forward by refining the citation ecology concept, particularly as it relates to the importance of novelty in research to citation networks. Novelty, as we mean it here, refers not to the emergence of a new idea, but to citations that are new to a particular network. Given their frequency, the punctuations exhibited in Fig. 4 may suggest that periodic infusions of exogenous nodes, as well as those nodes' later integration, are vital to the dynamism of citation networks. Understood in this way, those punctuations show a compelling similarity to the results of Tria et al., [70], in which the emergence of novelty corresponds to similar drops in system entropy. In between drops, normalized entropy grows as gaps in the network are filled. In citation networks, those punctuations may signal different kinds of network growth: on one hand, they may represent new contributions to the parent article's line of research; on the other hand, they may represent an emerging interdisciplinarity related to the parent article's conceptual concerns. As markers of such developments, those punctuations–in combination with analyses that account for the roles of exogenous nodes–may offer a ground for predicting the future developments in the growth and decline of topic areas. Methods and author contributions The data for this citation study have been obtained from Thomson Reuters' Web of Science. For each entry, we compile a list containing authors, source, volume, issue, title, 11 pages, and publisher in order to merge duplicate entries8. After unique entries are identified, we increase the scraping efficiency and remove bias by assigning a unique parent ID to each publication. This ID is separately stored: all data analyses are carried out in a manner that is blind to the publication-specific information such as author, title, year of publication, and journal name. AR collected, compiled, and organized all data. BWS provided research context and motivation. LTV analyzed data, made figures, and managed project. BWS and LTV both wrote the manuscript. Acknowledgments LTV graciously acknowledges NSF DMR 115-1783 for broader-impact support and Prof. Alex Gaeta, who seeded discussions on the informal processes of scientific research among his students more than a decade ago. The authors are also grateful for helpful discussions with Prof. Larry Liebovitch and Dana Weinburg. References 1. Bettencourt LMA, Lobo J, Helbing D, Kuehnert C, West GB. Growth, innovation, scaling, and the pace of life in cities. Proceedings of the National Academy of Sciences of the United States of America. 2007 APR 24;104(17):7301–7306. 2. Burt RS. Structural Holes. Harvard University Press; 1995. 3. Granovetter MS. The Strength of Weak Ties. American Journal of Sociology. 1973;78(6):1360–1380. 4. Putnam RD. Bowling Alone: The Collapse and Revival of American Community. Simon and Schuster; 2001. 5. Weng L, Flammini A, Vespignani A, Menczer F. Competition among memes in a world with limited attention. Scientific Reports. 2012;2:335. 6. Arbesman S, Kleinberg JM, Strogatz SH. Superlinear scaling for innovation in cities. Physical Review E. 2009;79(1):016115. 7. Csermely P. Creative elements: network-based predictions of active centres in proteins and cellular and social networks. Trends in Biochemical Sciences. 2008;33(12):569–576. 8. Burt RS. Structural holes and good ideas 1. 2004;110(2):349–399. 9. Thieme J. Perspective: The world's top innovation management scholars and their social capital. Journal of Product Innovation Management. 2007;24(3):214–229. 10. Abbasi A, Chung KSK, Hossain L. Egocentric analysis of co-authorship network structure, position and performance. Information Processing & Management. 2012;48(4):671–679. 8Even at this time, all citation indices contain some typos or inconsistencies, which are corrected on a case-by-case basis. We observe that, month-to-month, the number of papers pinned to a topic shifts within a percent. This results in significant data cleaning being necessary, which is the reason for the limited case study. 12 11. Small HG. Cited documents as concept symbols. Social studies of science. 1978;8(3):327–340. 12. Small H. Co-citation context analysis and the structure of paradigms. Journal of Documentation. 1980;36(3):183–196. 13. Braam RR, Moed HF, Van Raan AF. Mapping of science by combined co-citation and word analysis. I. Structural aspects. Journal of the American Society for Information Science. 1991;42(4):233. 14. Small H. Visualizing science by citation mapping. Journal of the Association for Information Science and Technology. 1999;50(9):799. 15. Wouters P. The Citation Culture. University of Amsterdam, Amsterdam; 1999. 16. Leydesdorff L. Theories of citation? Scientometrics. 1998 SEP;43(1):5–25. 17. Van Raan AF. In matters of quantitative studies of science the fault of theorists is offering too little and asking too much. Scientometrics. 1998;43(1):129–139. 18. Bornmann L, Daniel HD. What do citation counts measure? A review of studies on citing behavior. Journal of Documentation. 2008;64(1):45–80. 19. Moed HF. Citation Analysis in Research Evaluation. vol. 9. Springer Science & Business Media; 2006. 20. Merton RK. A Note on Science and Democracy. Journal of Legal and Political Sociology. 1942;1:115–126. 21. Merton RK. The Matthew Effect in Science, II: Cumulative advantage and the symbolism of intellectual property. Isis. 1988;p. 606–623. 22. Cronin B. Agreement and divergence on referencing practice. Journal of Information Science. 1981;3(1):27–33. 23. Cronin B. The need for a theory of citing. Journal of Documentation. 1981;37(1):16–24. 24. Cole JR, Cole S. Social stratification in science. Chicago: The University of Chicago Press; 1973. 25. Cozzens SE. What do citations count? The rhetoric-first model. Scientometrics. 1989;15(5-6):437–447. 26. Edge D. Why I am not a co-citationist. Society for Social Studies of Science Newsletter. 1977;2:13–19. 27. Edge D. Quantitative measures of communication in science: A critical review. History of Science. 1979;17(2):102–134. 28. Cronin B. The Hand of Science: Academic Writing and Its Rewards. Scarecrow Press; 2005. 29. Moravcsik MJ, Murugesan P. Citation patterns in scientific revolutions. Scientometrics. 1979;1(2):161–169. 30. Krampen G, Becker R, Wahner U, Montada L. On the validity of citation counting in science evaluation: Content analyses of references and citations in psychological publications. Scientometrics. 2007;71(2):191–202. 13 31. Small H, Griffith BC. The structure of scientific literatures I: Identifying and graphing specialties. Science studies. 1974;4(1):17–40. 32. Osareh F. Bibliometrics, citation analysis and co-citation analysis: A review of literature I. Libri. 1996;46(3):149–158. 33. He Y, Hui SC. Mining a web citation database for author co-citation analysis. Information Processing & Management. 2002;38(4):491–508. 34. Bertin M, Atanassova I, Sugimoto CR, Lariviere V. The linguistic patterns and rhetorical structure of citation context: an approach using n-grams. Scientometrics. 2016;109(3):1417–1434. 35. de Sompel HV, Lagoze C. The Santa Fe Convention of the Open Archives Initiative. D-Lib Magazine. 2000 feb;6(2). Available from: http://dx.doi.org/10.1045/february2000-vandesompel-oai. 36. Scott J, Carrington PJ. The Sage Handbook of Social Network Analysis. Sage Publications; 2011. 37. Backstrom L, Kleinberg J. Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook. In: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM; 2014. p. 831–841. 38. Leydesdorff L. Indicators of structural change in the dynamics of science: Entropy statistics of the SCI Journal Citation Reports. Scientometrics. 2002;53(1):131–159. 39. Li Y, Zhang G, Feng Y, Wu C. An entropy-based social network community detecting method and its application to scientometrics. Scientometrics. 2015;102(1):1003–1017. 40. Balch T. Hierarchic social entropy: An information theoretic measure of robot group diversity. Autonomous robots. 2000;8(3):209–238. 41. Eagle N, Macy M, Claxton R. Network diversity and economic development. Science. 2010;328(5981):1029–1031. 42. Demetrius L, Manke T. Robustness and network evolution-an entropic principle. Physica A: Statistical Mechanics and its Applications. 2005;346(3):682–696. 43. Smaldino PE, McElreath R. The natural selection of bad science. Royal Society Open Science. 2016;3(9). Available from: http://rsos.royalsocietypublishing.org/content/3/9/160384. 44. Jeanmaire DL, Van Duyne RP. Surface Raman spectroelectrochemistry: Part I. Heterocyclic, aromatic, and aliphatic amines adsorbed on the anodized silver electrode. Journal of Electroanalytical Chemistry and Interfacial Electrochemistry. 1977;84(1):1–20. 45. Moskovits M, Suh J. Surface selection rules for surface-enhanced Raman spectroscopy: calculations and application to the surface-enhanced Raman spectrum of phthalazine on silver. Journal of Physical Chemistry. 1984;88(23):5526–5530. 46. Otto A, Mrozek I, Grabhorn H, Akemann W. Surface-enhanced Raman scattering. Journal of Physics: Condensed Matter. 1992;4(5):1143–1212. 14 47. Kneipp K, Wang Y, Kneipp H, Perelman L, Itzkan I, Dasari R, et al. Single molecule detection using surface-enhanced Raman scattering (SERS). Physical Review Letters. 1997 MAR 3;78(9):1667–1670. 48. Boyd RW, Rzaewski K, Narum P. Noise initiation of stimulated Brillouin scattering. Physical Review A. 1990;42(9):5514–5521. 49. Kurashima T, Horiguchi T, Tateda M. Distributed-temperature sensing using stimulated Brillouin scattering in optical silica fibers. Optics Letters. 1990;15(18):1038–1040. 50. Smith S, Zarinetchi F, Ezekiel S. Narrow-linewidth stimulated Brillouin fiber laser and applications. Optics Letters. 1991;16:393–395. 51. Okawachi Y, Bigelow MS, Sharping JE, Zhu Z, Schweinsberg A, Gauthier DJ, et al. Tunable all-optical delays via Brillouin slow light in an optical fiber. Physical Review Letters. 2005;94(15):153902. 52. Li J, Lee H, Chen T, Vahala KJ. Characterization of a high coherence, Brillouin microcavity laser on silicon. Opt Express. 2012 Aug;20(18):20170–20180. Available from: http://www.opticsexpress.org/abstract.cfm?URI=oe-20-18-20170. 53. Grattan K, Sun T. Fiber optic sensor technology: an overview. Sensors and Actuators A: Physical. 2000;82(1):40–61. 54. Wang Q, Wang L, Yu L. Development of fully functionalized photorefractive polymers. Macromolecular Rapid Communications. 2000;21(11):723–745. 55. Ducharme S, Scott J, Twieg R, Moerner W. Observation of the photorefractive effect in a polymer. Physical Review Letters. 1991;66:1846–1849. 56. Moerner W, Silence SM. Polymeric photorefractive materials. Chemical Reviews. 1994;94(1):127–155. 57. Marder S, Kippelen B, Jen A, Peyghambarian N. Design and synthesis of chromophores and polymers for electro-optic and photorefractive applications [Review]. Nature. 1997 AUG 28;388(6645):845–851. 58. Hirsch J. An index to quantify an individual's scientific research output. In: Proceedings of the National Academy of Science. vol. 102; 2005. p. 16569–16572. 59. Sidiropoulos A, Katsaros D, Manolopoulos Y. Generalized Hirsch h-index for disclosing latent facts in citation networks. Scientometrics. 2007;72(2):253–280. 60. Moed HF. New developments in the use of citation analysis in research evaluation. Archivum Immunologiae et Therapiae Experimentalis. 2009;57(1):13. 61. Yao L, Wei T, Zeng A, Fan Y, Di Z. Ranking scientific publications: the effect of nonlinearity. Scientific Reports. 2014;4:6663. 62. Narin F. Evaluative Bibliometrics: The Use of Publication and Citation Analysis in the Evaluation of Scientific Activity. Computer Horizons Washington, D.C; 1976. 63. Acemoglu D, Akcigit U, Kerr WR. Innovation network. Proceedings of the National Academy of Sciences of the United States of America. 2016 OCT 11;113(41):11483–11488. 15 64. Leydesdorff L. The science citation index and the measurement of national performance in terms of numbers of scientific publications. Scientometrics. 1989;17(1-2):111–120. 65. Moed H, De Bruin R, Van Leeuwen TN. New bibliometric tools for the assessment of national research performance: Database description, overview of indicators and first applications. Scientometrics. 1995;33(3):381–422. 66. Guan J, Ma N. China's emerging presence in nanoscience and nanotechnology: A comparative bibliometric study of several nanoscience 'giants'. Research Policy. 2007;36(6):880–886. 67. Wang JC, Chiang Ch, Lin SW. Network structure of innovation: can brokerage or closure predict patent quality? Scientometrics. 2010 SEP;84(3):735–748. 68. Yoon J, Park H, Kim K. Identifying technological competition trends for R&D planning using dynamic patent maps: SAO-based content analysis. Scientometrics. 2013 JAN;94(1):313–331. 69. Gittelman M, Kogut B. Does good science lead to valuable knowledge? Biotechnology firms and the evolutionary logic of citation patterns. Management Science. 2003 APR;49(4):366–382. 70. Tria F, Loreto V, Servedio V, Strogatz S. The dynamics of correlated novelties. Scientific Reports. 2014;4:5890.
1210.4860
1
1210
2012-10-16T17:38:22
Spectral Estimation of Conditional Random Graph Models for Large-Scale Network Data
[ "cs.SI", "cs.LG", "physics.soc-ph", "stat.ML" ]
Generative models for graphs have been typically committed to strong prior assumptions concerning the form of the modeled distributions. Moreover, the vast majority of currently available models are either only suitable for characterizing some particular network properties (such as degree distribution or clustering coefficient), or they are aimed at estimating joint probability distributions, which is often intractable in large-scale networks. In this paper, we first propose a novel network statistic, based on the Laplacian spectrum of graphs, which allows to dispense with any parametric assumption concerning the modeled network properties. Second, we use the defined statistic to develop the Fiedler random graph model, switching the focus from the estimation of joint probability distributions to a more tractable conditional estimation setting. After analyzing the dependence structure characterizing Fiedler random graphs, we evaluate them experimentally in edge prediction over several real-world networks, showing that they allow to reach a much higher prediction accuracy than various alternative statistical models.
cs.SI
cs
Spectral Estimation of Conditional Random Graph Models for Large-Scale Network Data Mikaela Keller∗ Marc Tommasi∗ Antonino Freno Gemma C. Garriga INRIA Lille – Nord Europe, Villeneuve d’Ascq (France) {antonino.freno, mikaela.keller, gemma.garriga, marc.tommasi}@inria.fr Abstract Generative models for graphs have been typ- ically committed to strong prior assumptions concerning the form of the modeled distribu- tions. Moreover, the vast ma jority of cur- rently available models are either only suit- able for characterizing some particular net- work properties (such as degree distribution or clustering coefficient), or they are aimed at estimating joint probability distributions, which is often intractable in large-scale net- works. In this paper, we first propose a novel network statistic, based on the Lapla- cian spectrum of graphs, which allows to dis- pense with any parametric assumption con- cerning the modeled network properties. Sec- ond, we use the defined statistic to develop the Fied ler random graph model, switching the focus from the estimation of joint prob- ability distributions to a more tractable con- ditional estimation setting. After analyz- ing the dependence structure characterizing Fiedler random graphs, we evaluate them ex- perimentally in edge prediction over several real-world networks, showing that they allow to reach a much higher prediction accuracy than various alternative statistical models. 1 INTRODUCTION Arising from domains as diverse as bioinformatics and web mining, large-scale data exhibiting network struc- ture are becoming increasingly available. Network models are commonly used to represent the relations among data units and their structural interactions. Recent studies, especially targeted at social network modeling, have focused on random graph models of ∗ Universit´e Charles de Gaulle – Lille 3, Villeneuve d’Ascq (France). those networks. In the simplest form, a social net- work is a configuration of binary random variables Xuv such that the value of Xuv stands for the pres- ence or absence of a link between nodes u and v in the network. The general idea underlying random graph modeling is that network configurations are generated by a stochastic process governed by specific probability laws, so that different models correspond to different families of distributions over graphs. The simplest random graph model is the Erdos-R´enyi (ER) model [Erdos and R´enyi, 1959], which assumes that the probability of observing a link between two nodes in a given graph is constant for any pair of nodes in that graph, and it is independent of which other edges are being observed. In preferential attachment models [Barab´asi and Albert, 1999], the probability of linking to any specified node is proportional to the degree of the node in the graph, leading to “rich get richer” effects. Small-world models [Watts and Stro- gatz, 1998] try to capture instead some phenomena often observed in real networks such as high clustering coefficients and small diameters [Newman, 2010]. A sophisticated attempt to model complex dependences between edges in the form of Gibbs-Boltzmann distri- butions is made by exponential random graph (ERG) models [Snijders et al., 2006], which subsume the ER model as a special case. Finally, a recent attempt at modeling real networks through a stochastic genera- tive process is made by Kronecker graphs [Leskovec et al., 2010], which try to capture phenomena such as heavy-tailed degree distributions and shrinking diam- eter properties while paying attention to the temporal dynamics of network growth. While some of these models behave better than oth- ers in terms of computational tractability, one basic limitation affecting all of them is what we may call a parametric assumption concerning the probability laws underlying the observed network properties. In other words, currently available models of network struc- ture assume that the probability distribution gener- ating the network can be expressed through a partic- ular parametric form P (G θ ), where G is the observed graph and θ is a parameter vector. For example, typ- ical formulations of exponential random graph mod- els assume that the building blocks of real networks are given by such structures as k -stars and k -triangles, with different weights assigned to different structures, whereas Kronecker graphs assume that the number of edges and the number of nodes in a given network are related by a densification power law with a suit- able densification parameter. In such frameworks, es- timating the model from data reduces to fitting the model parameters, whereas the model structure re- mains fixed from the very beginning. The problem is that, in order for a parametric model to deliver an accurate estimate of the distribution at hand, its prior assumption concerning the form of the modeled distri- bution must be satisfied by the given data, which is something that we can rarely assess a priori. To date, the knowledge we have concerning real-world network phenomena does not allow to assume that any particu- lar parametric assumption is really capturing in depth any network-generating law, although some observed properties may happen to be modeled fairly well. The aim of this paper is twofold. On the one hand, we take a first step toward nonparametric modeling of random networks by developing a novel network statistic, which we call the Fied ler delta statistic. The Fiedler delta function allows to model different graph properties at once in an extremely compact form. This statistic is based on the spectral analysis of the graph Laplacian. In particular, it is based on the smallest non-zero eigenvalue of the Laplacian matrix, which is known as Fiedler value [Fiedler, 1973, Mohar, 1991]. On the other hand, we systematically adopt a con- ditional approach to random graph modeling, i.e. we focus on the conditional distribution of edges given some neighboring portion of the network, while set- ting aside the problem of estimating joint distribu- tions. The resulting conditional random graph model is what we call Fied ler random graph (FRG). Roughly speaking, to model the conditional distribution of an edge variable Xuv with respect to its neighborhood, we compute the difference in Fiedler values for the vicin- ity subgraph including or excluding the edge {u, v}. The underlying intuition is that the variations encap- sulated in the Fiedler delta for each particular edge will give a measure of the role of that edge in deter- mining the algebraic connectivity of its neighborhood. As part of our contributions, we theoretically prove that FRGs capture edge dependencies at any distance within a given neighborhood, hence defining a fairly general class of conditional probability distributions over graphs. Experiments on the estimation of (conditional) link distributions in large-scale networks show that FRGs are well suited for estimation problems on very large networks, especially small-world and scale-free net- works. Our results reveal that the FRG model su- persedes other approaches in terms of edge prediction accuracy, while allowing for efficient computation in the large-scale setting. In particular, it is known that the computation of the Fiedler delta scales polynomi- ally in the size of the analyzed neighborhood [Bai et al., 2000]. And the experiments show that even for small sizes of neighborhoods (which allow for extremely fast computation), our model regularly outperforms the al- ternative ones—which we reformulate here in terms of conditional models so as to allow for transparent com- parison. The paper is organized as follows. Sec. 2 reviews some preliminary notions concerning the Laplacian spec- trum of graphs. The FRG model is presented in Sec. 3, where we also show how to estimate FRGs from data, and we analyze the dependence structures involved in FRGs. In Sec. 4 we review (and to some extent de- velop) a few alternative conditional approaches to ran- dom graph estimation, starting from some well-known generative models. All considered models are then evaluated experimentally in Sec. 5, while Sec. 6 draws some conclusions and sketches a few directions for fur- ther work. 2 GRAPHS, LAPLACIANS, AND EIGENVALUES Let G = (V , E ) be an undirected graph with n nodes. In the following we assume that the graph is un- weighted with adjacency matrix A. For each (un- ordered) pair of nodes {u, v} such that u 6= v , we take Xuv to denote a binary random variable such that Xuv = 1 if {u, v} ∈ E , and Xuv = 0 otherwise. Since the graph is undirected, Xuv = Xvu . The degree du of a node u ∈ V is defined as the number of connections of u to other nodes, that is du = {v : {u, v} ∈ E }. Accordingly, the degree ma- trix D of a graph G corresponds to the diagonal ma- trix with the vertex degrees d1 , . . . , dn on the diago- nal. The main tools exploited by the random graph model proposed here are the graph Laplacian matri- ces. Different graph Laplacians have been identified in the literature [von Luxburg, 2007]. In this paper, we use consistently the unnormalized graph Laplacian, defined as L = D − A. The basic facts related to the unnormalized Laplacian matrix can be summarized as follows: Proposition 1 (Mohar [1991]). The unnormalized graph Laplacian L of an undirected graph G with n nodes has the fol lowing properties: (i) L is symmetric and positive semi-definite; (ii) L has n non-negative, real-valued eigenvalues 0 = λ1 (G ) ≤ . . . ≤ λn (G ); (iii) the multiplicity of the eigenvalue 0 of L equals the number of connected components in the graph, that is, λ2 (G ) > 0 if and only if G is connected. In the following, the (algebraic) multiplicity of an eigenvalue λ will be denoted by M (λ, G ). If the graph has one single connected component, then M (0, G ) = 1, and the second smallest eigenvalue λ2 (G ) > 0 is called Fied ler eigenvalue. The Fiedler eigenvalue pro- vides insight into several graph properties: when there is a nontrivial spectral gap, i.e. λ2 (G ) is clearly sepa- rated from 0, the graph has good expansion proper- ties, stronger connectivity, and rapid convergence of random walks in the graph [Mohar, 1991]. For ex- ample, it is known that λ2 (G ) ≤ µ(G ), where µ(G ) is the edge connectivity of the graph (i.e. the size of the smallest edge cut whose removal makes the graph dis- connected). Notice that if the graph has more than one connected component, then λ2 (G ) will be also equal to zero, thus implying that the graph is not connected. Without loss of generality, we abuse the term Fiedler eigenvalue to denote the smallest eigenvalue different from zero, regardless of the number of connected com- ponents. In this paper, by Fiedler value we will mean the eigenvalue λk+1 (G ), where k = M (0, G ). For any pair of nodes u and v in a graph G = (V , E ), we define two corresponding graphs G+ and G− in the following way: G+ = (V , E ∪ {{u, v}}), and G− = (V , E \ {{u, v}}). Clearly, we have that either G+ = G or G− = G . A basic property concerning the Lapla- cian eigenvalues of G+ and G− is the following [Mohar, 1991, Anderson and Morley, 1985, Cvetkovi´c et al., 1979]: Lemma 1. If G+ and G− are two graphs with n nodes, such that {u, v} ⊆ V , G+ = (V , E ∪ {{u, v}}), and G− = (V , E \ {{u, v}}), then we have that: 1. Pn i=1 λi (G+ ) − λi (G− ) = 2; 2. λi (G+ ) ≤ λi (G− ) for any i such that 1 ≤ i ≤ n. 3 FIEDLER RANDOM GRAPHS Fiedler random graphs are defined in Sec. 3.1, while in Secs. 3.2 and 3.3 we deal with the problems of estimat- ing them from data and characterizing their statistical dependence structure respectively. 3.1 CONDITIONAL DISTRIBUTIONS Given the notions reviewed above, we introduce the Fiedler delta function ∆λ2 , which is defined as follows. (1) Let k = M (0, G+ ). Then, ∆λ2 (u, v , G ) = λk+1 (G+ ) − λk+1 (G− ) In other words, for any pair of nodes u and v in graph G , the Fiedler delta value of the pair {u, v} in G is the (absolute) variation in the Fiedler eigenvalue of the graph Laplacian that would result from removing edge {u, v} from G+ . Lemma 1 immediately implies the following proposi- tion: Proposition 2. For any graph G = (V , E ) and any pair of nodes u and v such that {u, v} ∈ E , we have that 0 ≤ ∆λ2 (u, v , G ) ≤ 2. Proof. Let G− = (V , E \ {{u, v}}) and k = M (0, G ). The theorem follows straightforwardly from Lemma 1, given that ∆λ2 (u, v , G ) = λk+1 (G ) − λk+1 (G− ). Using the Fiedler delta statistic, we can proceed to define a Fiedler random graph. Given G = (V , E ), let X (G ) denote the set of random variables defined on G , that is X (G ) = {Xuv : u 6= v ∧ {u, v} ⊆ V }. Then: Definition 1. Given a graph G = (V , E ), suppose we associate a subgraph Guv of G to each variable Xuv ∈ X (G ). We say that G is a Fiedler random graph if, for any Xuv ∈ X (G ), we have that P (Xuv X (Guv ) \ {Xuv }) = P (Xuv ∆λ2 (u, v , Guv )). Concerning Definition 1, we stress the importance of two points. First, the key intuition motivating FRGs is to treat the Fiedler delta function as a real-valued ran- dom variable defined over graph configurations, and to exploit this random variable as a compact representa- tion of those configurations. Second, FRGs are condi- tional models, i.e. they only define conditional distri- butions of edges in a random graph given the possible configurations of other edges. The model definition does not specify whether and how the considered con- ditional distributions can be combined to obtain a con- sistent factorization of the joint distribution of X (G ). In order to obtain that result, the model should take into account the global dependence structure of X (G ), but this goal is not pursued by FRG modeling. Two interesting questions that can be raised on the nature of the FRG model are then the following. First, how does the Fiedler delta statistic behave with respect to the Markov dependence property [Besag, 1974, Frank and Strauss, 1986]? Second, how useful can be the information enclosed in the Fiedler delta statistic for learning and mining applications over large-scale net- works? One basic result related to the first question is presented in Sec. 3.3, whereas Sec. 5 will address the second point. 3.2 MODEL ESTIMATION The goal of estimating a FRG from data is to obtain an estimate of the conditional distribution P (Xuv X (Guv ) \ {Xuv }), defined over subgraphs Guv of G . Starting from Definition 1, this quantity can be manipulated as follows: = P (Xuv X (Guv ) \ {Xuv }) = P (Xuv ∆λ2 (u, v , Guv )) p(∆λ2 (u, v , Guv ) Xuv )P (Xuv ) = p(∆λ2 (u, v , Guv )) p(∆λ2 (u, v , Guv ) Xuv )P (Xuv ) Pxuv p(∆λ2 (u, v , Guv ) xuv )P (xuv ) (2) In Eq. 2, P (Xuv ) is the prior probability of observ- ing an edge between any two nodes u and v , whereas p(∆λ2 (u, v , Guv ) Xuv ) is the conditional density of the Fiedler delta ∆λ2 (u, v , Guv ) given the value of Xuv . Suppose we have a network G = (V , E ), and that our training sample is a dataset D, defined as D = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xun vn , Gun vn )(cid:9). In other words, the training data are n observations of node pairs {ui , vi } such that, for each one of them, we know both the value of Xui vi and the configuration of Gui vi in G . A simple estimate for P (Xuv ) can then be ob- tained by computing the proportion of linked/unlinked node pairs {ui , vi } in D. Let Dxuv denote the set (cid:8){ui , vi }: (xui vi , Gui vi ) ∈ D ∧ xui vi = xuv (cid:9). Then, n (cid:12)(cid:12)Dxuv (cid:12)(cid:12). On the other hand, bP (xuv ) = 1 in order to estimate p(∆λ2 (u, v , Guv ) Xuv ), we need to make a choice concerning the form of the modeled density function. In the lack of prior knowledge concerning the form of the density, a reasonable choice is to adopt a nonparametric estimation technique. In particular, we use a kernel density estimator [Rosenblatt, 1956, Parzen, 1962], defined as follows: p(∆λ2 (u, v , Guv ) xuv ) = Dxuv X{ui ,vi }∈Dxuv K∆λ2 (cid:0){u, v}, {ui , vi }(cid:1) 1 (3) = 11 (t), where 1y (x) = 1 if x ≤ y , where and 1y (x) = 0 otherwise. The Epanechnikov kernel K∆λ2 (cid:0){u, v}, {ui, vi }(cid:1) = (cid:19) (4) K (cid:18) ∆λ2 (u, v , Guv ) − ∆λ2 (ui , vi , Gui vi ) 1 = h h and K is a kernel function with bandwidth h [Silver- man, 1986]. In our implementation of FRGs, we use the Epanechnikov kernel [Epanechnikov, 1969], namely 4 (cid:0)1 − t2 (cid:1) K (t) = 3 is more appealing than other possible functions (such as the Gaussian kernel) because of its computational convenience. At the same time, it displays analogous properties in terms of statistical consistency [Silver- man, 1986]. 3.3 DEPENDENCE STRUCTURE In order to illustrate the behavior of FRGs with re- spect to conditional independence, we first recall the definition of Markov dependence for random graph models [Frank and Strauss, 1986]. Let N (Xuv ) de- note the set {Xwz : {w, z } ∈ E ∧ {w, z } ∩ {u, v} = 1}. A Markov random graph is then defined as follows: Definition 2. A random graph G is said to be a Markov graph (or to have a Markov dependence structure) if, for any pair of variables Xuv and Xwz in G such that {u, v} ∩ {w, z } = ∅, we have that P (Xuv Xwz , N (Xuv )) = P (Xuv N (Xuv )). Based on Definition 2, we say that the dependence structure of a random graph G is non-Markovian for disjoint pairs of nodes {u, v} and {w, z }, if, it does not imply that P (Xuv Xwz , N (Xuv )) = P (Xuv N (Xuv )), i.e. if it is consistent with the in- equality P (Xuv Xwz , N (Xuv )) 6= P (Xuv N (Xuv )). We can then prove the following proposition: Proposition 3. There exist Fied ler random graphs with non-Markovian dependence structure. Proof. To prove the proposition, we make use of the following equalities [Fiedler, 1973]: if graphs G1 and G2 are, respectively, a path and a cir- then λ2 (G1 ) = 2 (1 − cos(π/n)) cuit of size n, and λ2 (G2 ) = 2 (1 − cos(2π/n)). Consider a graph G = (V , E ) such that V = {u, v , w, z } and E = {{u, v}, {v , w}, {w, z }, {u, z }}, and let Guv = (Vuv , Euv ) be the subgraph of G incident to Euv = E \{{w, z }}. If G is a Markov graph, it must be the case that P (Xuv Xwz , Xvw , Xuz ) = P (Xuv Xvw , Xuz ). Now, suppose that G is a FRG. In this case, we have that P (Xuv Xwz , Xvw , Xuz ) = P (Xuv X (G ) \ {Xuv }) p(∆λ2 (u, v , G ) Xuv )P (Xuv ) = p(∆λ2 (u, v , G )) (5) and, similarly, P (Xuv Xvw , Xuz ) = p(∆λ2 (u, v , Guv ) Xuv )P (Xuv ) p(∆λ2 (u, v , Guv )) (6) Eqs. 5–6 imply that, if the dependence structure of G is Markovian, then the following equality must hold: p(∆λ2 (u, v , G ) Xuv ) p(∆λ2 (u, v , G )) = p(∆λ2 (u, v , Guv ) Xuv ) p(∆λ2 (u, v , Guv )) (7) Since the configuration of G and Guv is given by a cir- cuit and a path respectively, where both have size 4, we know that λ2 (G ) = 2 (1 − cos(π/2)) and λ2 (Guv ) = 2 (1 − cos(π/4)). Also, if G− = (V , E \ {{u, v}}) and G− uv = (Vuv , Euv \ {{u, v}}), notice that λ2 (G− ) = λ2 (Guv ), since G− is also a path of size 4, and that M (0, G− uv ) = M (0, Guv ) + 1, since G− uv has one more connected component than Guv . Therefore, we have that ∆λ2 (u, v , G ) = 2 cos(π/4) and ∆λ2 (u, v , Guv ) = 2 (1−cos(π/4)), i.e. ∆λ2 (u, v , G ) 6= ∆λ2 (u, v , Guv ). Be- cause of this inequality, there will exist parameteriza- tions of p which do not satisfy Eq. 7, which means that the dependence structure of G is non-Markovian. Note that the proof of Proposition 3 can be straight- forwardly generalized to the dependence between Xuv and Xwz in circuits/paths of arbitrary size n, since the expression used for the Fiedler eigenvalues of such graphs holds for any n. In fact, suppose that the 4-nodes circuit G used in the proof is replaced with a circuit G ∗ = (V ∗ , E ∗ ) of size n, where V ∗ = V ∪ {s1 , . . . , s1 , . . . , sm , t1 , . . . , tm} and E ∗ is obtained from E by replacing {u, z } and {v , w}, respectively, with a path from u to z going through s1 , . . . , sm and a path from v to w going through t1 , . . . , tm , so that In this case, if G ∗ n = 2m + 4. uv is the subgraph of uv = E ∗ \ {{w, z }}, we have again G ∗ incident to E ∗ that ∆λ2 (u, v , G ∗ ) 6= ∆λ2 (u, v , G ∗ uv ), which means that there exist FRGs such that p(∆λ2 (u,v,G∗ ) Xuv ) 6= p(∆λ2 (u,v,G∗ )) p(∆λ2 (u,v,G∗ uv ) Xuv ) . p(∆λ2 (u,v,G∗ uv )) 4 OTHER CONDITIONAL RANDOM NETWORKS In this section, we adapt three families of ran- dom graph models—namely the ERG, Watts- Strogatz (WS), and Barab´asi-Albert (BA) models respectively—to the task of conditional estimation of edge distributions, and we also review the entailed dependence structures. This will allow for a clear comparison of such models to FRGs in Sec. 5. Kro- necker graphs are not considered here because it is not straightforward how they could be turned into condi- tional estimators. 4.1 EXPONENTIAL RANDOM GRAPH MODELS Let G(V ) be the set of all possible (undirected) graphs G with fixed vertex set V , where G(V ) = √2V 2−V . Suppose that Φ denotes a collection of potential func- tions ϕi over graphs, where each ϕi (G ) is a graph statistic such as the number of edges or the number of triangles in G . Then, an ERG with parameter vec- 1 Z (θ ) tor θ = (θ1 , . . . , θΦ ) defines the following Boltzmann distribution [Robins et al., 2007]: θiϕi (G )) exp ( ΦXi=1 P (X (G ) θ ) = where each θi is a real-valued parameter associated to the potential function ϕi , and Z (θ ) denotes the par- tition function [Koller and Friedman, 2009], given by i=1 θiϕi (Gj )(cid:9). Computing Z (θ ) = PGj ∈G(V ) exp (cid:8) PΦ the partition function exactly is clearly intractable for graphs with more than a few nodes, which makes it quite expensive to compute joint probabilities in large networks using ERGs. (8) P (Xuv X (G ) \ {Xuv }; θ ) = ERGs entail a simple form for the conditional distri- bution of edges given the remainder of the graph: exp (cid:26) ΦPi=1 θiϕi (G )(cid:27) exp (cid:26) ΦPi=1 θiϕi (Gxuv )(cid:27) Pxuv (9) where Gxuv denotes the configuration of G that we ob- tain by clamping the value of Xuv to xuv . Therefore, if we want to estimate the parameters of an ERG so as to maximize the model log-likelihood with respect to a data sample D = (cid:8)(xu1 v1 , GS1 ), . . . , (xun vn , GSn )(cid:9), we can optimize each parameter θi by taking the deriva- ∂ θi Pn tive ∂ j=1 log P (xuj vj X (GSj ) \ {Xuv }; θ ) and ap- plying any gradient-based optimization technique. 4.1.1 Markov Random Graphs Given a graph G = (V , E ), define a k -star (for k ≥ 2) as a set ESk ⊆ E such that ESk = k and, for any {u, v} and {w, z } in ESk , {u, v} ∩ {w, z } = let a k -triangle (for k ≥ 1) be a set 1. Also, ETk ⊆ E of size 2k + 1 such that the elements of ETk are edges {u, v}, {u, w1}, {v , w1}, . . . , {u, wk }, {v , wk }, where wi 6= wj for any i and j such that 1 ≤ i, j ≤ k . If we use E (G ), Sk (G ), and Tk (G ) to denote, respec- tively, the number of edges, the number of k -stars, and the number of k -triangles in G , then an exponential Markov random graph (MRG) model with parameter vector θ is defined by the following probability distri- bution [Frank and Strauss, 1986]: σk Sk (G ) + τ T (G )) exp (η E (G ) + KXk=2 (10) where K is the maximum value that we want to consider for k in the k -star statistics, θ = (η , σ2 , . . . , σK , τ ), and T (G ) = T1 (G ) is simply the number of triangles in G . That is to say, a MRG de- fines a Boltzmann distribution over graphs, with pa- rameters corresponding to edge, k -star, and triangle P (G θ ) = 1 Z statistics. Interestingly, the ER model can be charac- terized as a special case of MRG, where all the param- eters except for η are set to zero. MRGs are known to satisfy Definition 2 [Robins et al., 2007]. Therefore, under the probability model defined by Eq. 10, we have that, for any pair of nodes {u, v} and any subgraph sample GS from G , P (Xuv X (GS ) \ {Xuv }; θ ) = P (Xuv NS (Xuv ); θ ), where NS (Xuv ) is the set of all variables Xwz from GS such that {w, z } ∩ {u, v} = 1. Note that while Definition 2 specifies a general class of random graph models, MRGs in the strict sense refer to the class of ERGs defined above. 4.1.2 Higher-Order Models Higher-order ERG models (HRGs) are readily ob- tained from MRGs by adding k -triangle counts (for k ≥ 1) to the Boltzmann distribution of Eq. 10 [Robins et al., 2007]. Moreover, in order to avoid fixing in ad- vance the maximum value of the k parameter, a gen- eral formulation has been proposed for HRGs through the alternating k-star and the alternating k-triangle statistics [Snijders et al., 2006], obtaining the follow- ing probability model: 1 Z exp {η E (G ) + σ S ∗ (G ) + τ T ∗(G )} (11) P (G θ ) = where, if n is the number of nodes in G and Sk and Tk are the usual k -stars and k -triangle counts, S ∗ (G ) and T ∗(G ) are defined as S ∗(G ) = Pn−1 k=2 (−1)k Sk ρk−2 and T ∗(G ) = Pn−2 k=2 (−1)k Tk ρk−2 (with ρ ≥ 1 acting as a sort of regularization parameter). It is known that, under the distribution given by Eq. 11, P (Xuv X (GS ) \ {Xuv }; θ ) = P (Xuv N ∗ S (Xuv ); θ ) [Robins et al., 2007], where N ∗ S (Xuv ) is the set containing any Xwz from G such that Xwz 6= Xuv and, for at least one edge {s, t}, we have that {s, t} ∩ {u, v} = 1 and {s, t} ∩ {w, z } 6= ∅. Clearly, NS (Xuv ) ⊆ N ∗ S (Xuv ), which is why HRGs are ‘higher-order’ than MRGs. 4.2 WATTS-STROGATZ MODEL The WS network model [Watts and Strogatz, 1998] defines a random network as a regular ring lattice which is randomly ‘rewired’ so as to introduce a cer- tain amount of disorder, which typically leads to small- world phenomena. Given nodes u1 , . . . , un , a WS net- work is generated by constructing a regular ring lattice such that each node is connected to exactly 2 δ other nodes. Network edges are then scanned sequentially, and each one of them is rewired with probability β , where, if i < j , rewiring an edge {ui , uj } means to replace it with another edge {ui , uk } such that k 6= i and uk is chosen uniformly at random from the set of all nodes that are not already linked to ui . P (k) = Interestingly, the degree distribution corresponding to a WS network G with parameters δ and β takes the following form [Barrat and Weigt, 2000], for any degree k ≥ δ : IXi=0 (cid:18)δ i(cid:19) (1 − β )i β δ−i (δ β )k−δ−i exp(−β δ) (k − δ − i)! (12) where I = min{k − δ, δ}. Given Eq. 12, we model the conditional distribution of a variable Xuv given the remainder of G through the following quantity: P (du (G )) P (dv (G )) Pxuv P (du (Gxuv )) P (dv (Gxuv )) (13) where du (G ) denotes the degree of node u in G , and each P is implicitly conditional on the values of δ and β . We refer to the conditional random graph model specified in Eq. 13 as the conditional Watts-Strogatz (CWS) model. P (Xuv X (G ) \ {Xuv }) = For the CWS model, the following proposition follows straightforwardly from Eq. 13: Proposition 4. The dependence structure of CWS models is Markovian. A simple estimate of the δ parameter for a data sample D = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xun vn , Gun vn )(cid:9) is the follow- ing: nXi=1 1 δ = dui (GSi ) + dvi (Gui vi ) (14) 2 n On the other hand, a simple strategy for estimating the rewiring probability by a maximum likelihood ap- proach consists in parameterizing it as a sigmoid func- 1 1+exp(−θβ ) , where θβ can be optimized by ex- tion β = ∂ θβ Pn ploiting the derivative ∂ i=1 log P (xui vi X (Gui vi )\ {Xuv }; δ, θβ ). 4.3 BARAB ´ASI-ALBERT MODEL The BA model was originally proposed for explain- ing the scale-free degree distributions often observed in real-world networks [Barab´asi and Albert, 1999]. In the BA model, the probability P (u) of linking to any particular node u in a network G = (V , E ) takes du (G )α Pv∈V dv (G )α [Albert and Barab´asi, the form P (u) = 2002], where α is a real-valued parameter affecting the shape of the degree distribution. Given P (u), we can use the following expression to characterize the con- ditional probability of observing edge {u, v} given the P (Xuv = 1 X (G ) \ {Xuv }; α) = remainder of G [Newman, 2001, Barab´asi et al., 2002]: du (G )α dv (G )α (cid:0)Pw∈V dw (G )α (cid:1)2 (15) We refer to the random graph model of Eq. 15 as the conditional Barab´asi-Albert (CBA) model. The α parameter can be optimized straightforwardly by gradient-based methods, so as to maximize the ob- jective Pn i=1 log P (xui vi X (Gui vi ) \ {Xuv }; α) over an observed sample of size n. The following property holds for CBA networks: Proposition 5. The dependence structure of CBA models is non-Markovian. Proof. Consider a CBA network G = (V , E ), where {u, v} and {w, z } are edges in E such that {u, v} ∩ {w, z } = ∅. G is a Markov graph if and only if P (Xuv Xwz , N (Xuv )) = P (Xuv N (Xuv )). Let G1 and G2 be the same as defined in the proof of Proposition 4. Although du (G2 ) = du (G1 ) and dv (G2 ) = dv (G1 ), we have that Pw∈V dw (G2 )α > Pw∈V dw (G1 )α . Therefore, P (Xuv Xwz , N (Xuv )) = P (Xuv X (G2 ) \ {Xuv }) du (G1 )α dv (G1 )α du (G2 )α dv (G2 )α (cid:0)Pw∈V dw (G2 )α (cid:1)2 6= = (cid:0)Pw∈V dw (G1 )α (cid:1)2 = P (Xuv X (G1 ) \ {Xuv }) = P (Xuv N (Xuv )) (16) 5 EXPERIMENTAL EVALUATION In order to assess experimentally the accuracy of FRGs as models of conditional edge distributions in large- scale networks, we test them in the following link pre- diction setting. First, we take a network G = (V , E ), with a number of nodes ranging from a few thousands to a couple of millions, and a number of edges going up to several millions. We then sample n training pairs {ui , vi} uniformly at random from V , with ui 6= vi . For each sampled pair of nodes {ui , vi }, we recover the subgraph Gui vi induced on G by the vertex set Vui vi = {ui , vi}∪{wi : {ui , wi } ∈ E ∨{vi , wi } ∈ E }, so as to get a training set D = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xun vn , Gun vn )(cid:9). We then estimate from D each one of the condi- tional random graph models described in the previ- ous sections, using the respective learning techniques. Given the estimated models, we sample a test set T = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xum vm , Gum vm )(cid:9) from G such that T ∩ D = ∅, where each element of T is sampled through the same technique used for D. For each es- timated model, we assess its accuracy by first using it to compute the conditional probability of observ- ing a link for each pair of nodes {uj , vj } in T , and then calculating the area under the ROC curve (AUC) for the predictions delivered on T . Since the problem of predicting the presence of edges in real-world net- 2 (cid:0)V 2 − V (cid:1), works is severely unbalanced, i.e. E ≪ 1 the ROC curve is a particularly appropriate evalua- tion measure [Fawcett, 2006]. Also, in order to as- sess the sensitivity of each model to the size of the training sample, we ran some preliminary experiments with several different values of D. The result of this preliminary investigation was that, provided that the training sample contains at least a few pairs of linked nodes (in the order of ten or twenty), then the behav- ior of the different models is not significantly affected by increasing sample sizes. Table 1: General statistics for the network datasets used in the experiments. CCG and DG denote the average clustering coefficient and the network diameter respectively. V Network 18,772 AstroPh 5,242 GrQc 12,008 HepPh 9,877 HepTh Enron 36,692 RoadCA 1,965,206 RoadTX 1,379,917 E CCG DG 14 0.63 396,160 17 28,980 0.52 13 0.61 237,010 17 0.47 51,971 12 0.49 367,662 0.04 5,533,214 850 0.04 1,049 3,843,320 We compare the performance of the MRG, HRG, CWS, CBA, and FRG models on seven different net- works, drawn from the arXiv e-print repository, the Enron email corpus, and the US road network respec- tively [Leskovec et al., 2007, 2009]. The ER model is not considered in these experiments, since the involved independence assumption makes that model simply unusable for conditional estimation tasks. Some rep- resentative network statistics for the used datasets are summarized in Table 1. For the arXiv datasets (i.e. the AstroPh, GrQc, HepPh, and HepTh net- works), we report results for a choice of 10, 000 node pairs both for the training and the test set, whereas for the Enron and US road (RoadCA and RoadTX) networks we have D = T = 100, 000 and D = T = 10, 000, 000 respectively. However, notice that nearly identical results can be obtained in each case after reducing the number of training samples down to even 20%–40% of the indicated size (as discovered through preliminary analysis). ROC curves for the de- scribed datasets are plotted in Figs. 1–3, whereas the corresponding AUC values are given in Table 2. As a general remark, we point out that AUC values less 1 0.8 0.6 0.4 0.2 CBA CWS FRG HRG MRG 1 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T CBA CWS FRG HRG MRG 0 0 0.2 0.4 0.6 False positive rate (a) 0.8 1 0 0 0.2 0.4 0.6 False positive rate (b) 0.8 1 1 0.8 0.6 0.4 0.2 CBA CWS FRG HRG MRG 1 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T CBA CWS FRG HRG MRG e t a r e v i t i s o p e u r T e t a r e v i t i s o p e u r T 0 0 0.2 0.4 0.6 False positive rate (c) 0.8 1 0 0 0.2 0.4 0.6 False positive rate (d) 0.8 1 Figure 1: ROC curves for the AstroPh (a), GrQc (b), HepPh (c), and HepTh (d) networks. than 0.5 (as recorded for some models) do not necessar- ily mean that prediction accuracy is being worse than random guessing. In fact, recent studies show that, depending on signal strength and stratification errors between training and test sets, random guessing can drop to AUC values even lower than 0.3 [Parker et al., 2007]. Therefore, AUC values less than 0.5 should be considered simply as no better than random guessing, rather than worse than random. FRGs significantly outperform all other models both in the arXiv and in the Enron networks. Such networks are generally characterized by power law degree distri- butions, contrary to the road networks, which exhibit instead a regular topology, with degree distribution peaked around its mean. This explains the better be- havior of the CBA model with respect to the remaining options in most of the scale-free networks. Interest- ingly, this trend is reverted for the HepPh data, where not only CWS outperforms CBA, but we also observe that HRG behaves much better than it does on the Table 2: AUC values for the ROC curves plotted in Figs. 1–3. CCG and DG denote the average clustering coefficient and the network diameter respectively. AUC (%) Network CBA CWS FRG HRG MRG AstroPh 46.04 32.39 91.66 28.69 14.78 22.32 66.22 50.86 94.90 27.10 GrQc 15.02 40.04 50.84 92.73 65.62 HepPh 32.36 53.21 42.47 79.34 32.82 HepTh Enron 48.45 49.03 85.92 19.94 11.23 81.12 RoadCA 30.84 91.21 66.70 77.90 RoadTX 34.67 93.01 63.75 62.51 68.36 other scale-free networks. The fact that, in this partic- ular case, FRGs remain the best available option pro- vides evidence for their higher stability (i.e. robustness to variation in the underlying network properties) with 1 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T CBA CWS FRG HRG MRG 1 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T 0 0 0.2 0.4 0.6 False positive rate 0.8 1 0 0 0.2 CBA CWS FRG HRG MRG 0.4 0.6 False positive rate (a) 0.8 1 CBA CWS FRG HRG MRG 1 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T Figure 2: ROC curves for the Enron network. respect to the other models. On the other hand, for the US road networks we observe a completely differ- ent pattern of results. This time, the FRG model per- forms worse than the CWS model or the two variants of ERG. The reason is related to the lattice-shaped regularity exhibited by such graphs. This is not sur- prising, as the WS model subsumes regular lattices as special case scenarios. A natural explanation for the superiority of the CWS model on the road networks lies in the fact that their parametric assumption con- cerning the observed degree distribution happens to be satisfied for such data, while it is clearly violated by the scale-free networks, which is exactly the opposite of what happens for the CBA model. It is worth not- ing, however, that FRGs are again performing signifi- cantly better than the CBA model. Therefore, FRGs appear to be a more stable class of conditional ran- dom network models, since their predictions ensure a regularly accurate behavior across networks displaying significantly different statistical properties. Overall, the presented results encourage the hypothesis that a genuinely nonparametric approach to conditional ran- dom graph modeling can offer dramatic advantages over parametric approaches. 6 CONCLUSION The work presented in this paper started from two mo- tivations. On the one hand, we remarked that statisti- cal modeling of networks cries for nonparametric esti- mation, because of the inaccuracy often resulting from fallacious parametric assumptions. In this respect, we showed that statistics derived from the Laplacian spec- trum of graphs (such as the Fiedler delta function) offer practical ways of developing nonparametric esti- mators. On the other hand, we suggested that a condi- tional approach to random graph modeling can be very 0 0 0.2 0.4 0.6 False positive rate (b) 0.8 1 Figure 3: ROC curves for the RoadCA (a) and RoadTX (b) networks. effective in the large-scale setting, since it allows e.g. to dispense with the intractable partition functions often involved in joint distributions. With respect to this point, we showed how FRGs allow us to tackle very large datasets, processing effectively even millions of queries over networks with millions of nodes and edges. Interesting options for future work consist in analyz- ing the effect of the subgraph sampling mechanism in determining the distribution of the Fiedler delta, as well as investigating alternative ways of exploiting the information enclosed in the graph spectrum. Acknowledgements This work has been supported by the French National Research Agency (ANR-09-EMER-007). The authors are grateful to Romaric Gaudel, R´emi Gilleron, and Michal Valko for their suggestions and comments con- cerning this work. Absence of Large Well-Defined Clusters. Mathematics, 6(1):29–123, 2009. Internet Jure Leskovec, Deepayan Chakrabarti, Jon Klein- berg, Christos Faloutsos, and Zoubin Ghahramani. Kronecker graphs: An approach to modeling net- works. Journal of Machine Learning Research, 11: 985–1042, 2010. Bo jan Mohar. The Laplacian Spectrum of Graphs. In Y. Alavi, G. Chartrand, O. R. Oellermann, and A. J. Schwenk, editors, Graph Theory, Combinatorics, and Applications, pages 871–898. Wiley, 1991. Mark E.J. Newman. Clustering and preferential at- tachment in growing networks. Physical Review E, 64:025102, 2001. Mark E.J. Newman. Networks. An Introduction. Ox- ford University Press, New York (NY), 2010. Brian J. Parker, Simon Gunter, and Justin Bedo. Stratification bias in low signal microarray studies. BMC Bioinformatics, 8, 2007. Emanuel Parzen. On Estimation of a Probability Den- sity Function and Mode. Annals of Mathematical Statistics, 33:1065–1076, 1962. Garry L. Robins, Tom Snijders, Peng Wang, Mark S. Handcock, and Philippa E. Pattison. Recent devel- opments in exponential random graph (p∗ ) models for social networks. Social Networks, 29:192–215, 2007. Murray Rosenblatt. Remarks on Some Nonparametric Estimates of a Density Function. The Annals of Mathematical Statistics, 27(3):832–837, 1956. Bernard W. Silverman. Density Estimation for Statis- tics and Data Analysis. Chapman and Hall, 1986. Tom A. B. Snijders, Philippa E. Pattison, Garry L. Robins, and Mark S. Handcock. New Specifications for Exponential Random Graph Models. Sociological Methodology, 36:99–153, 2006. Ulrike von Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17:395–416, 2007. Duncan J. Watts and Steven H. Strogatz. Collective dynamics of ‘small-world’ networks. Nature, 393: 440–442, 1998. References R´eka Albert and Albert-L´aszl´o Barab´asi. Statistical mechanics of complex networks. Reviews of Modern Physics, 74:47–97, 2002. William N. Anderson and Thomas D. Morley. Eigen- values of the Laplacian of a graph. Linear and Mul- tilinear Algebra, 18:141–145, 1985. Zhao jun Bai, James Demmel, Jack Dongarra, Axel Ruhe, and Henk van der Vorst, editors. Templates for the Solution of Algebraic Eigenvalue Problems: A Practical Guide. SIAM, Philadelphia (PA), 2000. A.L. Barab´asi, H. Jeong, Z. N´eda, E. Ravasz, A. Schu- bert, and T. Vicsek. Evolution of the social network of scientic collaborations. Physica A, 311:590–614, 2002. Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence of scaling in random networks. Science, 286:509– 512, 1999. A. Barrat and M. Weigt. On the properties of small- world network models. The European Physical Jour- nal B, 13:547–560, 2000. Julian Besag. Spatial Interaction and the Statistical Analysis of Lattice Systems. Journal of the Royal Statistical Society. Series B, 36:192–236, 1974. Dragos M. Cvetkovi´c, Michael Doob, and Horst Sachs, editors. Spectra of Graphs: Theory and Application. Academic Press, New York (NY), 1979. V.A. Epanechnikov. Nonparametric Estimation of a Multidimensional Probability Density. Theory of Probability and its Applications, 14:153–158, 1969. P. Erdos and A. R´enyi. On Random Graphs, I. Pub- licationes Mathematicae Debrecen, 6:290–297, 1959. Tom Fawcett. An introduction to ROC analaysis. Pat- tern Recognition Letters, 27:861–874, 2006. Miroslav Fiedler. Algebraic connectivity of graphs. Czechoslovak Mathematical Journal, 23:298–305, 1973. Ove Frank and David Strauss. Markov Graphs. Jour- nal of the American Statistical Association, 81:832– 842, 1986. Daphne Koller and Nir Friedman. Probabilistic Graph- ical Models: Principles and Techniques. MIT Press, Cambridge (MA), 2009. Jure Leskovec, Jon M. Kleinberg, and Christos Falout- sos. Graph evolution: Densification and shrinking diameters. Transactions on Know ledge Discovery from Data, 1(1), 2007. Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney. Community Structure in Large Networks: Natural Cluster Sizes and the
1809.08523
1
1809
2018-09-23T03:45:02
Evolution of Threats in the Global Risk Network
[ "cs.SI", "physics.soc-ph" ]
With a steadily growing population and rapid advancements in technology, the global economy is increasing in size and complexity. This growth exacerbates global vulnerabilities and may lead to unforeseen consequences such as global pandemics fueled by air travel, cyberspace attacks, and cascading failures caused by the weakest link in a supply chain. Hence, a quantitative understanding of the mechanisms driving global network vulnerabilities is urgently needed. Developing methods for efficiently monitoring evolution of the global economy is essential to such understanding. Each year the World Economic Forum publishes an authoritative report on the state of the global economy and identifies risks that are likely to be active, impactful or contagious. Using a Cascading Alternating Renewal Process approach to model the dynamics of the global risk network, we are able to answer critical questions regarding the evolution of this network. To fully trace the evolution of the network we analyze the asymptotic state of risks (risk levels which would be reached in the long term if the risks were left unabated) given a snapshot in time, this elucidates the various challenges faced by the world community at each point in time. We also investigate the influence exerted by each risk on others. Results presented here are obtained through either quantitative analysis or computational simulations.
cs.SI
cs
Evolution of Threats in the Global Risk Network Xiang Niu1,2+ · Alaa Moussawi1,3 · Gyorgy Korniss1,3 · Boleslaw K. Szymanski1,2+∗ 8 1 0 2 p e S 3 2 ] I S . s c [ 1 v 3 2 5 8 0 . 9 0 8 1 : v i X r a Abstract With a steadily growing population and rapid advancements in technology, the global economy is increasing in size and complexity. This growth exacerbates global vulnerabilities and may lead to unforeseen consequences such as global pan- demics fueled by air travel, cyberspace attacks, and cascading failures caused by the weakest link in a supply chain. Hence, a quantitative understanding of the mecha- nisms driving global network vulnerabilities is urgently needed. Developing methods for efficiently monitoring evolution of the global economy is essential to such un- derstanding. Each year the World Economic Forum publishes an authoritative report on the state of the global economy and identifies risks that are likely to be active, impactful or contagious. Using a Cascading Alternating Renewal Process approach to model the dynamics of the global risk network, we are able to answer critical questions regarding the evolution of this network. To fully trace the evolution of the network we analyze the asymptotic state of risks (risk levels which would be reached in the long term if the risks were left unabated) given a snapshot in time; this eluci- dates the various challenges faced by the world community at each point in time. We also investigate the influence exerted by each risk on others. Results presented here are obtained through either quantitative analysis or computational simulations. Keywords Global Risk Network · Cascading Failures · Cascades Alternating Renewal Processes · Network Evolution · Mean-field Steady State Introduction Recently, cascading failures have been extensively studied, with most studies on in- frastructure systems [1, 2], financial institutions [3, 4, 5], and the Internet [6, 7]. In [1], the authors analyze cascading failures in power grid networks. In real and synthetic Boleslaw K. Szymanski 1Network Science and Technology Center, Rensselaer Polytechnic Institute (RPI), Troy, NY 12180, USA. ∗Correspondence: [email protected] +Equal contributors 2 Xiang Niu1,2+ et al. spatial systems, they study properties of failures and strategies to reduce the corre- sponding damages. In either single-node or multi-nodes cases, the damage caused by attacks is weakly correlated with network properties, such as node degree or initial state load. They also test different mitigation strategies and various combinations of node failures. Knowing in advance a set of failing nodes and damage incurred by every single-node failure, they are able to predict the damage caused by sets of multi- node failures. That is because, in the multi-node failure, the node with the highest damage dominates the entire multi-node cascading failure. Authors in [2] also focus on blackout cascading failure mechanisms. Studying the real blackouts from a few countries, they find that frequencies of blackouts exhibit a power-law distribution in agreement with the scale-free property of complex networks. The authors' power system model suggests that the real power system gradually reaches a critical point. In the area of financial institutions, authors in [3] discuss the failures of banking ecosystems. Inspired by models from food webs and disease networks, the authors apply an analogous model in financial networks to reduce risks. In [4], the authors study the contagion in the financial market. They mainly focus on the robustness of asset market liquidity. With a novel model based on the Poisson random graph in the banking system, they find that high average degree of nodes increases both the prob- ability of transmission and the speed of contagion. Using the feedback-centrality, the authors in [5] propose a DebtRank to find the critical nodes that play the most impor- tant role in the systemic failure of financial networks. They studied a real dataset from Fed emergency loans program and detected 22 institutions that were critical to 2008- 2010 crises. They also find that some small institutions can be important because of their high centralities in the network. Unlike here, the authors do not even attempt to match the model with historical data. In [8, 9, 10, 11], the authors observe historical correlations between stock prices and build stock dependency networks. They also consider events that may affect the stock market such as "tsunami in Japan". In their node failure analysis, they mainly focus on the failure of one industry and test the system tolerance of such failure. In summary, the research in the above papers targets the cascade failures in the global financial market. Some other analyses are related to the cascade failure of the Internet. In [6], the authors analyze the fault-tolerance of Internet service. They establish that Internet failures are mainly caused by operator errors and suggest the use of extensive online testing to reduce the failure rates. In [7], the authors find that the latent errors are likely to accumulate within the Internet services and cause chain reaction cascades. In [12], the authors analyze spontaneous recovery from cascading failures of econ- omy. In their model, a node can fail independently or by external causes. All nodes have the same internal failure probability so the authors can solve the model using mean-field equation. Only a few of studies discussed above focus on the cascades of global risks [13, 14]. Yet, the global risks impact highly global economy and lives of countless people. Hence, there is an urgent need to study and understand global risk network. Here, we model such network using a Cascading Alternating Renewal Processes (CARP) [13, 14, 15]. In the model, a system alternates between active and passive states, denoted by 1 and 0 respectively. An active risk represents a failed node, while a passive risk corresponds to a fully operational node. State transitions are instantaneous. They are Evolution of Threats in the Global Risk Network 3 triggered by non-homogeneous Poisson processes [13]. Given the complexity of real- world network interactions and node specific dynamics, the processes causing state transitions may be observable, or latent. The latent processes are not directly ob- servable, only their combined effect, a state transition, is. In the global risk model, the latent processes are categorized as endogenous (caused internally at the node) or exogenous (caused by neighboring active risk node) Poisson processes. Their param- eters are recovered by maximum likelihood estimation from the records of historical events. The risks listed in the WEF Global Risk Reports [16, 17, 18, 19, 20] constantly change; new risks arise and are added to the network, while existing active risks either continue to be a threat and remain in the network, or, thanks to the response of threatened governments and industry, decline in importance and are removed. This evolution causes continuous changes in the global risks and their probabilities, and leads to an annual revision of the list of risks present in the network. However, if left unabated, the global risk network would approach the steady state, in which some risk will be active much more frequently making their threats much more pronounced than in the initial state. These considerations motivate us not to compare the states of the global risk network at fixed points in time. Instead, we compare the steady states to which these initial states would evolve if no changes to the system had been introduced. Looking at the steady states accentuates the different challenges that the well-being and stability of the global risks network has faced at each reported point in the time. The CARP model has been successfully applied to analyze cascading failures of global risks in [13] by taking into account the interconnectivity and interdependence among risks. This model is also used here to analyze the evolution of the global risk network. Furthermore, in [14], the authors investigate the asymptotic normality of the MLE procedure used to find the most likely model parameters in CARP. They demonstrate that this property is preserved in the presence of latent processes caus- ing state transitions. We use this property here to bind the error of model parameter recovery in the global risk network. In the following sections of the paper we analyze evolution of risks over the years 2013-2017. Some of these results were presented in [21] but they were limited to two points in time, year 2013 and year 2017. Hence, the number of the results and points of evolution presented here more than doubled. Consequently, all the analyses and evaluations were expanded accordingly. In particular, we first present the annual evo- lution of the risk network itself from 2013 to 2017. We also show how the definitions of risks themselves change and how we deal with these changes. Finally, we present and discuss how steady states of risks evolve annually. Models CARP The CARP model for the global risk network contains two primary types of Poisson processes: two latent passive risk activation processes and a directly observable active 4 Xiang Niu1,2+ et al. risk continuation process. Here, we further subdivide the passive risk activation type into internal activation and external activation. We assume that the active risk contin- uation process is always triggered internally. The corresponding Poisson processes are defined as follows [13]. -- Passive risk with internal activation: a passive risk i is activated internally with i = . The Poisson probability of transition over one time unit is pint i intensity λint 1 − e−λint . i -- Passive risk with external activation: a passive risk i is activated externally by the . The corresponding Poisson proba- neighboring active risk j with intensity λext ji bility is pext ji = 1 − e−λext ji . -- Active risk continuation: an active risk i continues its activity for the next time i = denotes probability of recovery in a time unit . The corresponding Poisson probability is pcon unit internally with intensity λcon 1 − e−λcon , where prec i = 1 − prec i from an active risk i. i i Using the likelihood li for each risk i provided by experts in the WEF Global Risk Reports [16, 17, 18, 19, 20], we obtain a normalized likelihood Li, which indicates how likely a risk i is to be active by logarithmic transformation λint i = −αln(1 − Li), λext i = −γln(1 − Li) [13] getting: ji = −β ln(1 − Li), λcon i = 1 − (1 − Li)α pint ji = 1 − (1 − Li)β pext i = 1 − (1 − Li)γ. pcon (1) The advantage of Eq. 1 is that the probabilities of the three Poisson processes are defined only by a normalized likelihood Li and model parameters α,β,γ. These pa- rameters are needed because while humans can often adequately estimate relative probabilities by crowd sourcing, they usually are less precise in predicting absolute probabilities. By providing a mapping from likelihood to probabilities based on the most likely values of the model parameters obtained through MLE procedure [22] they model over historical data, we account for expert biases that may render the ab- solute probabilities inaccurate, while extracting relevant information from the relative estimations of the likelihoods. After combining the probabilities of all possible transitions of the Poisson pro- cesses in the risk network, we obtain the state transition probabilities [13] as Pi(t)0→1 = 1 − (1 − pint i ) ∏ j∈Ni (1 − pext ji ) Pi(t)1→0 = prec i . (2) where Pi(t)s1→s2 represents the probability of a state transition from state s1 to state s2 for risk i at time t, while Ni represents the set of neighbors of risk i that were active at time t − 1. The specific state transition probability of all risks over one time unit is −−→ S(t) = i=1 Pi(t)si(t)→si(t+1), where we sum over all R risks. The likelihood of the sequence i=1 Pi(t)si(t)→si(t+1), ∏R of state transition of all risks is L( −−→ S(T )) = ∏T −1 −−→ S(2), ..., −−→ S(1), t=1 ∏R Evolution of Threats in the Global Risk Network 5 where T represents the number of time steps during the entire observed or predicted evolution [13]. The corresponding log-likelihood is −−→ S(1), ln L( −−→ S(2), ..., −−→ S(T )) = T −1 ∑ t=1 R ∑ i=1 ln Pi(t)si(t)→si(t+1). (3) We compute the most likely values of model parameters α,β, and γ by maxi- mizing the log-likelihood (Eq. 3) of the observed state transitions over the historical data [23, 22]. With these most likely values, we simulate the system evolution to iden- tify the mean-field steady state evolution of the global risk network at any particular point in time. Given the state of the global risk network at time t we ask to what state the network will evolve as t → ∞ if it is not further influenced by external actors. We simulate the system evolution as t → ∞ training on historical data till time t, and relying only on learned model dynamics past time t. We approximate the asymptotic state at a finite time at which activity frequencies for all risks stabilize. Related Works The CARP model for global risk network was first proposed and analyzed in detail in [13]. Through the study of 2013 network, the authors calculate the contagion po- tentials of risks, risk persistence and risk failure cascade survival probability caused by a single risk failure. The risk persistence is calculated as the fraction of time steps during which a risk is active. The contagion potential is not positively correlated with internal activation probability, but is mainly defined by external activation and re- covery probabilities. Ranked by their contagion potentials, the top three risks are: "Severe income disparity", "Chronic fiscal imbalances", and "Rising greenhouse gas emissions". The results show that about 80% of the time, the number of active risks is between 8 and 19. By setting internal activation probabilities of risks to zero, the au- thors found cascade survival probability initiated by a single risk decreases exponen- tially with time. To validate the choice of the model, the authors compared it with 60 alternative models, including disconnected model (β = 0, so only internal activation is acting), expert data based model (α = 1,β = 0, internal activation is equal to like- lihood Li), uniform model (likelihood Li is ignored), weighted network model (edges are assigned different weights depending on the number of experts listing them) and combinations of them. The CARP model outperforms all other models with at least 95% statistical confidence interval because it takes into account the interconnectivity and interdependence among risks. The precision of predictability is likely to depend on the quality and amount of historical ground truth data. Thus, in [14], the authors proposed an artificial model of fire propagation among houses to establish the limits of model predictability. The authors use simulations of CARP model to generate data with arbitrary lengths (from 100 to 6400 time steps) and arbitrary number of variants of model execution. The authors use these variants as alternative historical ground truth data. They measure the prediction precision between variants at different length of alternative historical data, and study how the prediction precision changes over time. The authors conclude that 6 Xiang Niu1,2+ et al. Table 1 Indices and descriptions of global risks from the year 2013 to 2017. To compare related risks in different years, we give them same numerical code but different alphabetical indices here. In the World Economic Forum (WEF) Global Risk Reports, experts define risks in 5 categories: economic (blue), envi- ronmental (green), geopolitical (orange), societal (red) and technological (purple). Risk index 01 02 03 04 05a 05b 06a 06b 07a 07b 07c 07d 08 09 10 11 12 13 14a 14b 14c 15a 15b 15c 15d 16 17 18 19 20 21a 21b 21c 22a 22b 23 24 25 26 27 28 29a 29b 29c 30 31 32 33 34 35 36 37 38 39 40a 40b 40c 40d 40e 40f 41 42 Risk description Fiscal crises in key economies High structural unemployment or underemployment Failure of a major financial mechanism or institution Failure/shortfall of critical infrastructure Severe energy price shock Extreme volatility in energy and agriculture prices Asset bubble in a major economy Liquidity crises Deflation in a major economy Unmanageable inflation Unmanageable inflation or deflation Decline of importance of the US dollar as a major currency Severe income disparity Unforeseen negative consequences of regulation Hard landing of an emerging economy Extreme weather events Failure of climate-change mitigation and adaptation Major biodiversity loss and ecosystem collapse Major natural catastrophes Unprecedented geophysical destruction Vulnerability to geomagnetic storms Man-made environmental catastrophes Irremediable pollution Land and waterway use mismanagement Rising greenhouse gas emissions Antibiotic-resistant bacteria State collapse or crisis Weapons of mass destruction Interstate conflict with regional consequences Large-scale terrorist attacks Illicit trade Entrenched organized crime Major escalation in organized crime and illicit trade Failure of national governance Pervasive entrenched corruption Failure of global governance Unilateral resource nationalization Militarization of space Failure of urban planning Food crises Water crises Rapid and massive spread of infectious diseases Rising rates of chronic disease Vulnerability to pandemics Large-scale involuntary migration Profound political and social instability Backlash against globalization Ineffective illicit drug policies Mismanagement of population aging Rising religious fanaticism Unsustainable population growth Breakdown of critical information infrastructure and networks Large-scale cyberattacks Massive incident of data fraud/theft Adverse consequences of technological advances Massive digital misinformation Proliferation of orbital debris Unforeseen consequences of climate change mitigation Unforeseen consequences of nanotechnology Unforeseen consequences of new life science technologies Failure of intellectual property regime Mineral resource supply vulnerability 2013 index 01 02 05 06 - 03 - 07 - - 10 - 08 09 04 16 12 18 - 19 20 - 13 14 17 11 21 22 24 28 30 23 - - 27 25 29 26 15 32 40 - 35 39 37 - 31 33 34 36 38 41 42 45 - 44 47 48 49 50 43 46 2014 index 2015 index 2016 index 01 04 02 06 05 - - 03 - - - 07 25 - - 08 13 11 09 - - 10 - - - 26 15 19 20 18 - - 17 - 16 14 21 - 27 22 12 - 24 23 - 28 - - - - - 29 30 31 - - - - - - - - 06 07 04 05 03 - 01 - 02 08 - - - - - 09 10 11 12 - - 13 - - - - 17 18 15 16 - - - 14 - - - - 19 20 24 23 - - 21 22 - - - - - 25 26 27 28 - - - - - - - 05 06 03 04 08 - 01 - 02 09 - - - - - 10 11 12 13 - - 14 - - - - 18 19 16 17 07 - - 15 - - - - 20 21 25 24 - - 22 23 - - - - - 27 28 29 26 - - - - - - - 2017 index 05 06 03 04 08 - 01 - 02 09 - - - - - 10 11 12 13 - - 14 - - - - 19 20 17 18 07 - - 15 - 16 - - 21 22 26 25 - - 23 24 - - - - - 28 29 30 27 - - - - - - - Evolution of Threats in the Global Risk Network 7 the average relative error of parameter recovery decays according to the power law of the size of historical data and ultimately tends to zero when the length of historical data tends to infinity. These results demonstrate that the asymptotic normality of MLE holds also in the presence of latent Poisson processes. There are some similarities between the CARP model [15] and epidemic models, such as SIS [24], if we consider risks as a population undergoing infection with the activation pathogen. Yet deeper comparison reveals that the CARP model is more complex by including latent exogenous (becoming sick by infection) and directly observable endogenous (becoming sick without or not through contact with infected nodes) activation. Thus, finding model parameters matching historical data is more complex in CARP model than in epidemic model. Another significant difference is the evolution of transition probabilities and risk population, as new threats arise, old ones die, and some existing risks change their probability to activate as a result of the increasing resilience developed by threatened governments, organizations, and people. Risk Network Evolution In the World Economic Forum (WEF) Global Risk Reports [16, 17, 18, 19, 20], ex- perts define risks in five categories: economic, environmental, geopolitical, societal and technological. The list of risks is shown in Table 1. We use five different colors to differentiate between risk categories and to aid the understanding of the WEF net- work, because each year the risks are categorized slightly differently. To track related risks, we give them identical numerical codes. The categories of risks vary over the years as well. For example, risk 21a "Illicit trade" is in the geopolitical category in 2013 and 2014 when experts felt illicit activity and crime were probable risks. In 2016 and 2017 this risk is categorized as economic, considering that such trade im- pacts more the global economy than geopolitical factors. In the 2013 risk network, the risks are uniformly distributed over the five categories. From 2014 to 2017, the economic risks category is the largest and contains around eight risks; the environ- mental, geopolitical and societal categories contain approximately six risks, and the technological category is the smallest with mostly four risks. Fig. 1 and 2 show how the global risk network and it's properties have changed over time. In Fig. 1, each node represents different risk from Table 1. Each undirected unweighted link of two endpoints represents that the two risks are related in opinion of some WEF experts. For the WEF report, each of the experts was asked to answer the question: "Global risks are not isolated and it is important to assess their intercon- nections. In your view, which are the most strongly connected global risks? Please select three to six pairs of global risks." Then the interconnection wi j between risks i and j is calculated as: wi j =s ∑N n=1 pairi j,n pairmax N ∑ pairmax = max ( n=1 i j pairi j,n) (4) 8 Xiang Niu1,2+ et al. 20 18 17 19 24 25 23 22b 21a 21b 12 11 16 14b 13 14c 15b 15c 15d 18 17 19 20 24 22b 23 21c 2013: 04 02 01 03 06b 08 10 09 05b 07c 2014: 02 01 03 04 08 06b 05a 07d 14a 16 15a 12 11 13 31 27 26 28 29b 29c 2015: 02 01 06a 04 03 05a 07a 07b 2016: 02 01 06a 04 03 05a 07a 07b 2017: 02 01 06a 04 03 05a 07a 07b 22a 20 18 17 19 12 11 14a 15a 13 27 26 28 31 29a 30 18 17 22a 20 19 21a 12 11 14a 15a 13 27 26 28 31 29a 30 18 17 22a 20 19 23 21a 12 11 14a 15a 13 27 26 28 31 29a 30 42 38 37 40b 39 40c 41 40d 40e 40f 27 26 28 29b 29c 30 33 35 36 34 32 38 37 39 40a 38 37 39 40a 38 37 39 40a 38 37 39 Fig. 1 The evolution of risk networks over five years from 2013 to 2017. Although the number of risks vary over the years, the five groups of risk remain unchanged. We use the same layout for each year network and fix the relative positions of risks with the same index over the years. The risks are in five color groups and five location groups. A color group is the category of a risk in a certain year labeled by experts, while locations of the groups are labeled by us and remain unchanged over the years. The groups are as follows: economic, with mostly blue nodes placed leftmost of the network and including risks 01-10; environmental, with mostly green nodes placed the second to the left and at the bottom part of the figure with risk 11-16; geopolitical, with mostly orange nodes placed the middle and at the top of the figure with risk 17-25; societal, with mostly red nodes placed the second to the right and at the bottom of the figure with risk 26-36; technological, with purple nodes placed at the rightmost of the figure with risk 37-42. Evolution of Threats in the Global Risk Network 9 number of nodes number of edges density 60 50 40 30 20 10 0 25 20 15 10 5 0 5 4 3 2 1 0 13 14 15 Year 16 17 average degree 13 14 15 Year 16 17 diameter 13 14 15 Year 16 17 600 500 400 300 200 100 0 -0.5 -0.4 -0.3 -0.2 -0.1 0 2 1.5 1 0.5 0 13 14 15 Year 16 17 degree assortativity coefficient 13 14 15 Year 16 17 average shortest path length 13 14 15 Year 16 17 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 20 15 10 5 0 13 14 15 Year 16 17 average clustering coefficient 13 14 15 Year 16 17 max clique size 13 14 15 Year 16 17 Fig. 2 The evolving risk network properties over five years from 2013 to 2017. The 2013 network is the largest and also contains most edges. However, it is not the one with the highest density, since 2015 and 2017 networks are much smaller and with a large number of edges. Generally, 2013, 2015 and 2017 networks have relatively high average degrees, degree assortativity coefficients, average clustering coeffi- cients, and max clique sizes and relatively low diameters and average shortest path lengths. where pairi j,n is 1 if the risks i and j are interconnected from the perspective of expert n, otherwise it is 0 [20]. In paper [13], the authors report on testing whether the model with weighted edges outperforms the one used here which has unweighted edges and current model was statistically significantly better than the weighted edge alternative. By definition, these edges represent risk relationships, thus they act as transmission channels for risk propagation through the external activation process. The 2013 risk network is the largest, with the greatest average degree. Despite this, due to the smaller size of the 2017 network, its risks have greater interconnectivity, a larger mean clustering coefficient, and a smaller diameter. Most subfigures in Fig. 2 show that the 2013, 2015, and 2017 networks are denser than the 2014 and 2016 networks. Historical Events We utilize and update the event dataset created for [13], which included news, aca- demic articles, Wikipedia entries, etc. from Jan. 2000 to Dec. 2012, and from which we collected 13x12x50=7,800 data points for the 2013 risk network. For the 2014 to the 2017 risk networks, we relabel prior events and collect new events dated from Jan. 2013 to Dec. 2016. Thus the total number of data points is now 17x12x62=12,648, 10 Xiang Niu1,2+ et al. for 62 risks in Table 1. Each data point indicates if a risk is active or passive in a cer- tain month. By maximizing the log-likelihood defined by Eq. 3 for the observed state transitions [23, 22], we obtain the most likely values of model parameters α,β,γ for each year. Fig. 3 shows the timeline of historical events. Among economic risks, activation of some events is recorded directly based on the corresponding Wikipedia articles, such as "European debt crisis", "Subprime mortgage crisis" and "Air travel disrup- tion after the 2010 Eyjafjallajokull eruption". Activation of other events is identified through human processing of the online statistical data. "U.S. high unemployment rate" is recorded when the United States (U.S.) unemployment rate is above 7.5%, "EU high unemployment rate" is recognized when the European Union (EU) unem- ployment rate is above 9.5%. The "Oil price shock" is recognized when the yearly change of oil price per barrel exceeds $40 which happened during 2008 and 2009, and during 2011 and 2012. "U.S. housing bubble burst" is recorded when the average new house purchase price in the U.S., reaches above $280,000. "EU deflation" is rec- ognized when the inflation rate is below 0% in the EU, "Global inflation" is recorded when major economic regions such as the U.S. and the EU have the inflation rate above 2%. "U.S. severe income disparity" is recognized when U.S. top 1% of U.S. richest people own more than 20% of total incomes. Most of the economic risk events activated at around 2008 but then became passive after 2014. There is also a chain re- action among them, "U.S. housing bubble" caused "Subprime mortgage crisis", then led to "U.S. and EU high unemployment rate" and "European debt crisis". Among environmental risks, "Hurricane seasons" is identified according to the yearly Atlantic and Pacific hurricane seasons, which happen regularly every year, starting from May and ending in December. Risk 12 "Failure of climate-change mit- igation and adaptation" is recognized when there are tremendous damages caused by climate change such as hurricanes Allison, Dean, and Alex. We consider damage as tremendous when the cost is above $1 billion. Risk 13 "loss of biodiversity" is recognized when common bird index drops below 100. Risk 14 "Major natural catas- trophes" are identified by deadliest earthquakes, avalanches, wildfires, heat waves, solar storms, etc. Those events also happen naturally, but last shorter than extreme weather events. "Deforestation of the Amazon Rainforest" is recorded when yearly deforestation rate is above 15,000 km2 which happened from 2000 to 2005. "Deepwa- ter Horizon oil spill" happened in 2010, "Beijing air pollution soars to hazard level" was observed in 2012. Unlike economic risk events, those events usually last up to a year. "Rising greenhouse gas emissions" is recorded when Annual Greenhouse Gas Index (AGGI) exceeds 1.2. Among geopolitical risks, Risk 17 "State collapse or crisis" is recognized by all coups d'´etat and coup attempts. Most of them ends within a month. Among few events related to Risk 18 "Weapons of mass destruction", we list "Destruction of Syria's chemical weapons" in 2013 and several "North Korean nuclear test" started in 2006. Risk 19 "Interstate conflict" activation list includes major global conflicts from 2000: "War on Terror", "Second Congo War", "Syrian Civil War", "Iraqi Civil War", and "Cold War II". The "War on Terror" was triggered by "911 attack" in 2001 and includes the wars in Afghanistan, Iraqi, Syria, etc. We consider it ended in 2007 when British government abandoned the use of the term. But the conflicts between Evolution of Threats in the Global Risk Network 11 2000s recession European debt crisis U.S. and EU high unemployment rate Subprime mortgage crisis Travel disruption after Eyjafjallajokull eruption The 2008 oil price shock U.S. housing bubble burst EU inflation rate below 0% Global inflation rate above 2% U.S. top 1% riches have 20% income shares Hurricane seasons, floods, storms, etc Allison Dean Biodiversity loss Alex Earthquakes Deforestation of the Amazon Rainforest Oil leak Coups detat and coup attempts Greenhouse Gas 911 Nuclear tests Organized crime Conflicts Illicide trade Failure of global governance National corruption Export bans Urbanization World food price crisis SARS Water conflicts H1N1 Ebola U.S. and EU migration burst Protests Religious mania Ageing population Submarine cable disruption Cyber attacks Data breaches Egypt blackout Dyn cyberattack PRISM 01 02 03 04 05a 05b 06a 06b 07a 07b 07c 07d 08 09 10 11 12 13 14a 14b 14c 15a 15b 15c 15d 16 17 18 19 20 21a 21b 21c 22a 22b 23 24 25 26 27 28 29a 29b 29c 30 31 32 33 34 35 36 37 38 39 40a 40b 40c 40d 40e 40f 41 42 Dec 99 Dec 00 Dec 01 Dec 02 Dec 03 Dec 04 Dec 05 Dec 06 Dec 07 Dec 08 Dec 09 Dec 10 Dec 11 Dec 12 Dec 13 Dec 14 Dec 15 Dec 16 Dec 17 Fig. 3 The historical risk events from 2000 to 2017. We searched thousands of events online over 18 years and selected hundreds from them as risk-related events. We label the events based on the description of risks in each year WEF Global Risk Report. The events are also grouped into five categories. 12 Xiang Niu1,2+ et al. nations and terrorists continue to happen. The "Second Congo War" from 1998 to 2003 involved nine nations and often is referred to as "Africa's World War". The "Syrian Civil War" from 2011 and the "Iraqi Civil War" from 2014 are sometimes described as "proto-world war". "Cold War II" refers to the political tension between two opposing geopolitical sides, with one led by Russia and China, and the other led by the United States and NATO. It starts at the same time with the "Ukraine crisis" event activation in 2013. The events related to Risk 20 "Large-scale terrorist attack" are selected from the worldwide worst terrorist strikes each of which caused at least 300 injuries, 100 fatalities or 20 fatalities among children. Illicit financial flows from developing countries are above $1 trillion per year from 2011. We consider activation of Risk 22b "Pervasive entrenched corruption" occurs when there is at least one country in the world with the Corruption Perceptions Index below 10% (small index represents high corruption). The scope of Risk 23 "Failure of global governance" is close to Risk 19 "Interstate conflict", since it includes the inability to resolve issues of terrorism, wars, political and economic tensions between countries. The geopolitical risks are closely related and share similar activity scope: 2001-2006 and 2012-2016. We can see correlation between events related to those risks. These events started with "911" followed by the increase of the number and damages of terrorist attacks. Among the societal risks, there were two major world food price crises during 2007-2008 and 2010-2014, flagged by the rise of the FAO deflated food price index above 150. The peak of the number of "water conflicts" was reached during 2012- 2014 (above 15 conflicts per year) in the Middle East, which is most likely caused by the geopolitical risks. Risk 29a "Rapid and massive spread of infectious diseases" includes infectious diseases that cause more than thousands death and had worldwide impact, such as "SARS", "H1N1" and "Ebola". The new disease occurs every several years and it also last takes several years before it stops spreading. Risk 30 "Large- scale involuntary migration" includes migration crises in the U.S. and the EU. In "U.S. migration crisis", tens of thousands of women and children from El Salvador, Guatemala, and Honduras migrated to the United States in 2014. In "EU migration crisis", more than 50,000 refugees were arriving in EU each month in 2015. The refugees mainly come from Eritrea, Nigeria, Somalia, Syria, and Afghanistan. Risk 31 "Profound political and social instability" includes major global protests. Risk 34 "Mismanagement of population ageing" mostly activates in developing countries such as China and India. Risk 35 "Rising religious fanaticism" mostly materializes in the Middle East. Among technological risks, Risk 37 "Breakdown of critical information infras- tructure and networks" materializes every several years. But each time it lasts a short period. The source of the risk could be natural or human-made incidents, such as "Submarine cable disruption", government control or social instability, such as "Egypt blackout" during the Egyptian revolution, or cyberattacks, such as "Dyn cy- berattack". Risk 38 "Large-scale cyberattacks" includes "Indiscriminate attacks", "Destructive attacks", "Cyberwarfare", "Government espionage", "Corporate espi- onage", "Stolen e-mail addresses and login credentials", "Stolen credit card and fi- nancial data", and "Stolen medical-related data". Some of the cyberattacks are caused by geopolitical risks, such as "Cyberattacks during the Russo-Georgian War". Some Evolution of Threats in the Global Risk Network 13 are related to social instabilities. Some are possibly caused by economic risks, such as "2014 JPMorgan Chase data breach". It is also part of Risk 39 "Massive inci- dent of data fraud/theft", which includes major incidents of data breaches. One of the most significant data theft events is "Global surveillance disclosure" in 2013. Cyber- attack and Data theft become significant during 2013 and 2014. Most of the other technological risks are unforeseen consequences of technological advances and may materialize in the future. For a particular month, there are four different reasons to label a risk as being active. One is monthly statistical data, such as "unemployment rate", "oil price", "housing price", "deflation rate", and "food price index". They are recorded month by month, which can be directly used to label a risk. Another reason is yearly statisti- cal data, such as "yearly deforestation rate", "annual greenhouse gas index", "corrup- tion perceptions index", and "number of water conflicts per year". They are recorded year by year. Thus, we use one years single data point to estimate a risk status for twelve months. The third one is the record of daily events, such as "air travel disrup- tion", "oil spill", "nuclear test", "terrorist attack", "blackout", and "cyber attacks". Within a certain month, if at least predefined number of events occurs, we consider the corresponding risk as active for the whole month. The last reason is the record of continuous events, such as "European debt crisis", "subprime mortgage crisis", "hur- ricane seasons", "civil war", "spread of disease", "migration", and "data breaches". Since those events usually last several months, we consider corresponding risks as active from the beginning to the end of the event. Of the five categories, economic and geopolitical risks have strong intra-dependence, environmental risks happens quite regularly and are relatively independent from each other, while societal and technological risks are affected by and have strong inter- dependence with geopolitical and economic risks. Mean-field Steady State Points Simulation With the fitted parameters α,β,γ, and the activation and recovery probabilities, we can perform Monte Carlo simulations of the cascades of global risks. Fig. 4 shows the frequency of a risk being active at each time step t during the simulation of the 2017 risk network with all risks initially inactive. With different initial states, the risk trajectories differ but eventually reach the same steady state. The frequency of risk i being active at time t is the ratio of the number of simulation months during which risk i is active to the total number of simulation months t. The frequency distributions of risks being active mainly change from 10 to 1000 steps, and generally saturate afterward. In the steady state, the frequencies of risks being active varies a lot even for risks in the same category. By denoting the probability of risk i being active at time t as pi(t), we define such frequencies to be stable when pi(t) ≈ pi(t + 1). By plugging in the state transition probabilities from Eq. 2, we have [1 − pi(t)]Pi(t)0→1 + pi(t)[1 − Pi(t)1→0] = pi(t + 1) = pi(t). (5) 14 Xiang Niu1,2+ et al. (a) Economic (b) Environmental (c) Geopolitical y c n e u q e r f 1 0.8 0.6 0.4 0.2 0 1 2 3 4 5 6 7 8 9 0 1 10 102103104105 inf time step y c n e u q e r f 1 0.8 0.6 0.4 0.2 0 10 11 12 13 14 0 1 10 102103104105 inf time step y c n e u q e r f 1 0.8 0.6 0.4 0.2 0 15 16 17 18 19 20 0 1 10 102103104105 inf time step (d) Societal (e) Technological y c n e u q e r f 1 0.8 0.6 0.4 0.2 0 21 22 23 24 25 26 0 1 10 102103104105 inf time step y c n e u q e r f 1 0.8 0.6 0.4 0.2 0 27 28 29 30 0 1 10 102103104105 inf time step Fig. 4 Asymptotic mean-field steady state frequencies of selected risks being active are shown for the 2017 risk network. Each frequency value is averaged over 1000 runs. For time denoted on the x-axis as "inf", the frequencies are calculated by Eq. 6. The environmental group of risks is most frequently active in this year, but the general level of risk activities is quite low. Thus, pi = P0→1 i + P1→0 i P0→1 i = 1 − (1 − Li)α+β ∑ j∈Ni p j 1 − (1 − Li)α+β∑ j∈Ni p j + (1 − Li)γ , (6) where pi is the steady state probability of risk i being active, computed with a suc- cessive approximation method. The results are plotted in Fig. 5. Risk Evolution Fig. 5 shows the evolution of the global risks networks and their mean-field steady state points. To see the changes in risks, we display related risks and their indices in the five networks side by side. In Table 1 from 2013 to 2017 five risk categories remain the same, while around 20 risks vanish or merge into other risks. Risk 05b "Extreme volatility in energy and agriculture prices" is changed to Risk 05a "Severe energy price shock" after 2014. The extreme volatility in agriculture prices is merged into Risk 27 "Food crises". Risk 07c "Unmanageable inflation or deflation" splits into risk 07a "Deflation in a major economy" and 07b "Unmanageable inflation". Risk 08 "Severe income disparity", 09 "Unforeseen negative consequences of regulation", and 10 "Hard landing of an emerging economy" are not discussed since/after 2014, because of the recovery of the global economy. Risk 14b "Unprecedented geophysi- cal destruction" and 14c "Vulnerability to geomagnetic storms" are merged into 14a Evolution of Threats in the Global Risk Network 15 2013 2014 2015 2016 2017 .2 .4 .6 .8 1 .2 .4 .6 .8 1 .2 .4 .6 .8 1 .2 .4 .6 .8 1 .2 .4 .6 .8 1 01.Fiscal crises 02.Unemployment 05.Financial system failure 06.Infrastructure failure 03.Energy & Agri. price 01.Fiscal crises 04.Unemployment 02.Financial system failure 06.Infrastructure failure 05.Oil price shock 06.Fiscal crises 07.Unemployment 04.Financial system failure 05.Infrastructure failure 03.Energy price shock 05.Fiscal crises 06.Unemployment 03.Financial system failure 04.Infrastructure failure 08.Energy price shock 05.Fiscal crises 06.Unemployment 03.Financial system failure 04.Infrastructure failure 08.Energy price shock 07.Liquidity crises 03.Liquidity crises 01.Asset bubbles 01.Asset bubbles 01.Asset bubbles 02.Deflation in major economy 08.Unmanageable inflation 02.Deflation in major economy 09.Unmanageable inflation 02.Deflation in major economy 09.Unmanageable inflation 07.Decline of Impt. of US dollar 25.Income Ineq. 08.Weather 13.Climate Adpt. 11.Ecosystem 09.Nature catastrophes 09.Weather 10.Climate Adpt. 11.Ecosystem collapse 12.Natural catastrophes 10.Weather 11.Climate adaptation 12.Ecosystem collapse 13.Nature Disasters 10.Weather 11.Climate adaptation 12.Ecosystem collapse 13.Nature Disasters 10.Manmade damage 13.Manmade damage 14.Manmade damage 14.Manmade damage 26.Antibiotic−Resis. bacteria 15.Nation collapse 19.Weapons of mass destruction 20.Interstate conflict 18.Terrorist attacks 17.State collapse 18.Weapons of mass destruction 15.Conflict 16.Terrorist attacks 18.State collapse 19.Weapons of mass destruction 16.Interstate conflict 17.Terrorist attacks 07.Illicit trade 19.State collapse 20.Weapons of mass destruction 17.Interstate conflict 18.Terrorism 07.Illicit trade 17.Crime and illicit trade 16.Corruption 14.Global governance 21.Resource nationalization 27.Urbanization 22.Food crises 12.Water crises 24.Chronic diseases 23.Pandemic outbreak 28.Social instability 14.National Gov. 15.National Gov. 15.National Gov. 16.Global Governance 19.Urban planning 20.Food crises 24.Water crises 23.Infectious diseases 20.Urban planning 21.Food crises 25.Water crises 24.Infectious diseases 21.Urban planning 22.Food crises 26.Water crises 25.Infectious diseases 21.Involuntary migration 22.Social instability 22.Migration 23.Social instability 23.Migration 24.Social instability 10.Inflation or deflation 8.Income Ineq. 09.Cons. of Regulation 04.Hard landing of Econ. 16.Extreme weather 12.Climate Adpt. 18.Species overexploitation 19.Geophysical destruction 20.Geomagnetic storms 13.Pollution 14.Land and waterway 17.Greenhouse 11.Antibiotic−Resis. bacteria 21.Fragile states 22.Weapons of mass Destr. 24.Interstate conflict 28.Terrorism 30.Illicit trade 23.Organized crime 27.Corruption 25.Global Gov. 29.Resource nationalization 26.Militarization of space 15.Urbanization 32.Food crises 40.Water crises 35.Chronic disease 39.Pandemics 37.Unmanaged migration 31.Backlash to globalization 33.Illicit drug 34.Population aging 36.Religious fanaticism 38.Population growth 41.Information systems failure 42.Cyber attacks 45.Data fraud 29.Information systems failure 30.Cyberattacks 31.Data fraud 25.Information systems failure 26.Cyberattacks 27.Incident of data fraud 28.Misuse of technologies 27.Information systems failure 28.Cyberattacks 29.Incident of data fraud 26.Cons. of Teth. advances 28.Information systems failure 29.Cyberattacks 30.Data fraud 27.Cons. of Teth. advances 44.Digital misinformation 47.Orbital debris 48.Cons. of geoengineering 49.Cons. of nanotechnology 50.Cons. of new life science 43.Intellectual property regime 46.Mineral resource supply Fig. 5 The mean-field steady state probabilities of risks being active for each network from 2013 to 2017. To see the changes in risks, we display related risks and their indices in the five networks side by side. In Table 1 from 2013 to 2017 five risk categories remain the same, while around 20 risks vanish or merge into other risks. Visual inspection reveals that in 2013 the dominant risk was economical. It continued its dominance to 2014 but in that year the environmental group became also more active than the other groups. In year 2015 and in the following years, the economic risks drop their activity level, while environmental risk maintain significant level of activity in this period. In years 2016 social risks increase their activity levels, but weakened them in the following year. 16 Xiang Niu1,2+ et al. Fiscal Crisis Unemployment Energy Price Shock y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Failure of Financial Institution 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Failure of Infrastructure 13 14 15 16 17 Year y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Asset Bubbles 13 14 15 16 17 Year Fig. 6 The mean-field steady state probabilities of economic risks being active for each of the networks from 2013 to 2017. Fiscal crisis significantly decreases from 2014, unemployment risk peaks in 2014, energy price shock peaks in 2013, while other risks vary minimally over the five years. "Major natural catastrophes". Risk 15b "Irremediable pollution", 15c "Land and wa- terway use mismanagement" and 15d "Rising greenhouse gas emissions" are merged into 15a "Man-made environmental catastrophes". Risk 16 "Antibiotic-resistant bac- teria" is not discussed after 2014. Risk 21a "Illicit trade" is changed from geopolitical to economic and not described in 2015. Risk 26 "Failure of urban planning" changes from an environmental to a geopolitical. Risk 30 "Large-scale involuntary migration" is not described in 2014. Risk 31 "Profound social instability" is newly proposed in 2014 while risks 32-36 are removed because of their low likelihoods and impacts. Finally, risks 40b-42 are excluded because most of them describe unforeseen conse- quences of advanced technologies and have not yet occurred. Comparing the mean-field steady state probabilities of risks from 2013 to 2017 in Fig. 6, 7, 8, 9, 10, 11, we find that the probabilities of economic risks widely de- creased, reflecting a gradual global recovery from the 2008 economic crisis. Only "State collapse", "Large-scale terrorist attacks", "Illicit trade" and "Large-scale in- voluntary migration" significantly increased in the category of geopolitical and soci- etal risks, respectively. This reveals the downside of "Failure of global governance". Considering environmental risks, we find that man-made risks decreased, while only natural risks "Extreme weather events" and "Major natural disasters" increased. The ability of the public to prevent environmental degradation improved. In the techno- logical risks category, "Massive incident of data fraud/theft" increases due to the boom of private data in the Internet era. The global risks transfer from economic to geopolitical and societal, as technological risks become heightened. Evolution of Threats in the Global Risk Network 17 Failure of Climate Adaptation 1 y t i l i b a b o r P 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 Manmade Damage Ecosystem Collapse y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year 13 14 15 16 17 Year Extream Weather Nature Catastrophes y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Fig. 7 The mean-field steady state probabilities of environmental risks being active for each of the net- works from 2013 to 2017. Man-made problems ("Failure of climate adaptation", "Ecosystem collapse") gradually decrease from 2013 to 2017, while natural disasters ("Extreme weather", "Natural catastrophes") gradually increase from 2013 to 2017. State Collapse Weapons of Mass Destruction 1 y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 Interstate Conflict 13 14 15 16 17 Year Illicit Trade 13 14 15 16 17 Year 1 0.8 0.6 0.4 0.2 0 y t i l i b a b o r P y t i l i b a b o r P y t i l i b a b o r P y t i l i b a b o r P 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Terrorist Attacks 13 14 15 16 17 Year 13 14 15 16 17 Year Failure of National Governance 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Fig. 8 The mean-field steady state probabilities of geopolitical risks being active for each of the networks from 2013 to 2017. "State collapse" and "Failure of national governance" have very similar behavior, since both of them describe risks inside nations and reflect the instability of their governments. Together with interstate conflicts, those risks significantly increase in 2015, and gradually decrease afterward. They may be caused by ISIS and the Ukraine crisis in 2014. Terrorist attacks happen more frequently in 2017, while growing illicit trade elevated levels of risk starting in 2016. This may be an affect of high risks of "State collapse", "Interstate conflict" and "National governance failure" during 2015. Risks associated with weapons of mass destruction remain low over the 5 year span. 18 Xiang Niu1,2+ et al. Urbanization Food Crises Migration y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Infectious Diseases 13 14 15 16 17 Year y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Water Crises 13 14 15 16 17 Year y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Social Instability 13 14 15 16 17 Year Fig. 9 The mean-field steady state probabilities of societal risks being active for each network from 2013 to 2017. "Failure of urban planning" greatly decreases after 2014. Food and water crises gradually decrease with the global effort to address them. "Large-scale involuntary migration" drastically increases in 2016, due to the 2015 European Union migration crisis. It is largely affected by high risk of "State collapse", "Interstate conflict" and "National governance failure" in 2015. "Profound political and social instability" gradually increases from 2014 to 2016 as a consequence of rising "Interstate conflict", while "Rapid and massive spread of infectious diseases" maintains a steady and low risk level. Breakdown of Information Infrastructure Cyberattack y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Data Fraud 13 14 15 16 17 Year y t i l i b a b o r P y t i l i b a b o r P 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 13 14 15 16 17 Year Misuse of Technologies 13 14 15 16 17 Year Fig. 10 The mean-field steady state probabilities of technological risks being active for each network from 2013 to 2017. The peak of "Large-scale cyberattacks" and "Massive incident of data fraud/theft" in 2014 might be triggered by "Global surveillance disclosures" in the latter half of 2013. "Breakdown of critical information infrastructure and networks" and "Adverse consequences of technological advances" pose very little risk. Moreover, with fast-paced advancements in technology, all risks in this category gradually rise. Evolution of Threats in the Global Risk Network 19 l e u a v e g a r e v A l e u a v m u m x a M i 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 Economic Environmental Geopolitical Societal Technological 13 14 15 16 17 13 14 15 16 17 13 14 15 16 17 13 14 15 16 17 13 14 15 16 17 Year 13 14 15 16 17 13 14 15 16 17 13 14 15 16 17 13 14 15 16 17 13 14 15 16 17 Year Fig. 11 The mean-field steady state probabilities of risk activity in all categories for each of the networks from 2013 to 2017. In agreement with the results presented earlier, the economic risks drastically decrease from 2014 and maintain a low level afterward. Environmental risks occur regularly, with the exception of "Extreme weather" during 2014. The geopolitical risks have a small increase in 2015, during which interstate conflicts increase. The average values of societal risks experience a steady rise, but the maximum values have a high variance. That is because the Risk 08 "Severe income disparity" is put into societal risks in 2014, and because "Large-scale involuntary migration" drastically increases in 2016. Technological risks gradually increase with an anomalous spike encountered during 2014. Analytic Probabilities and Empirical Observations Fig. 5 shows the analytic probabilities of risk being active at steady state over years. Fig. 3 depicts the time periods at which specific risk activities were observed and recorded. The analytic probabilities are smoother than the observations because they provide a real numbers instead of a binary signal. Empirical observations contain more detailed information than analytic probabilities. Although there are some dif- ferences, their main results are very consistent. Both results show the economic risks becoming inactive after year 2014. The environmental risks happen regularly every year. The geopolitical risks are highly interconnected. The risks "State collapse", "Interstate conflict" and "Failure of national governance" have similar activity time scope. "Terrorist attacks" and "Illicit trade" are becoming important recently. The risk "Migration" had active start from year 2016. The activity of technological risks gradually increases over years. Model Validations Parameter Recovery Precision To test the accuracy of parameter recovery process for each year, we first take the learned α,β,γ as ground truth parameters, then use them to generate 125 test datasets with the same time steps of the historical data. From 125 test dataset, we learned 20 Xiang Niu1,2+ et al. Table 2 Relative error bounds of activation and recovery parameters of global risks from the year 2013 to 2017. Clearly activation bounds are higher, up to 2.5 times higher than corresponding recovery bounds. The former peak at 20% in 2016, while the latter peak at 12% in 2015. activation bound recovery bound 2013 0.181 0.087 2014 0.125 0.104 2015 0.174 0.119 2016 0.200 0.077 2017 0.188 0.071 125 sets of new parameters that we use as sets of as test parameters. We consider activation parameter as aα + bβ, where a, b is the average fraction of internal and external activation in a dataset. The recovery parameter equals to γ. From 125 sets test parameters, we first filter out 33.3% outliers with the largest KS distance, defined by Eq. 7, to the ground truth parameters, then determine the relative activation bound and recovery bound in the rest 66.6% of the sets. We call those sets validation dataset and we refer to the corresponding parameters as validation parameters. KS(v1, v2) = max (v1[i]/v2[i] − 1) i (7) In this experiment, v1 of Eq. 7 is a vector of validation parameters, while v2 is a vector of ground truth parameters. Each vector contains two variables, activation parameter and recovery parameter. Table 2 shows the bounds of activation and recovery param- eters for each year network. In 2013, recovery bound 0.087 represents that within the validation parameters, the largest absolute relative error of recovery parameter to the ground truth recovery parameter is 0.087. For all risk networks, the relative error bound of activation parameter is less than 20%, the relative error bound of recovery parameter is around 10%. Furthermore, we use the set of ground truth parameters and each set of validation parameters to generate another 12 months of data after the end of ground truth his- torical data. In this test, we run 100 realizations and calculate the average frequency of risk being active and risk activation for each set of parameters and the results are plotted in Fig. 12. The average frequencies of risk being active are the sum of number of risks being active in each month averaged over R risks and 12 months. The average frequencies of risk activation are the number of times of any of the risks was activated over the entire simulation averaged over R risks. In both tests of all risk networks, the average results of ground truth and validation data are very close. The absolute rela- tive error of results in the worst simulation in validation data to the average results in ground truth data is around 20%. Network Effects We compare the simulation results by CARP model with and without network ef- fect in Fig. 13. This test is based on 2013 network and dataset from [13]. The net- work model is the simulation of the 2013 network in Fig. 1, while the independent model ignores network effects by disregarding all edges. In general, compared with the independent model, the accuracy of the network model is significantly higher as evidenced by having the mean simulated activity closer to historical data than in- dependent model does and by requiring 47% smaller multiple of standard deviation Evolution of Threats in the Global Risk Network 21 risk active y c n e u q e r f e g a r e v a y c n e u q e r f e g a r e v a 0.5 0.4 0.3 0.2 0.1 0 2013 0.05 0.04 0.03 0.02 0.01 0 2013 2014 2015 2016 2017 network (year) risk activation 2014 2015 2016 2017 network (year) average real average simulation worst simulation + worst simulation - average real average simulation worst simulation + worst simulation - Fig. 12 Error bounds of average frequencies of risk being active and of risk activation from the year 2013 to 2017. Average real represents the average results in the test of ground truth dataset. Average simulation represents the average results in the test of validation dataset. Worst simulation represents the maximum or minimum results in the test of validation dataset. bound to cover all historical data than the independent model needs. Some other net- work effect analyses were presented in [21]. The results show that the isolated risks (nodes with low degrees) have extremely low external activation fractions and thus are unlikely to be influenced by other risks in the network. Sensitivity Tests In this subsection, we consider another two important factors: likelihood and histor- ical data. Fig. 14 shows the sensitivity test by changing the likelihood or historical data of single or all risks. The probability of a risk being active at steady state is sen- sitive to both likelihood and historical data. In the likelihood test, a risk is sensitive to the change of its single likelihood but tolerant to the change of all risks likelihoods. In the historical data test, on the contrary, a risk is tolerant to the change of its single historical activity but sensitive to the change of all risks historical activity. 22 Xiang Niu1,2+ et al. Data Mean activity from network model Mean activity from independent model Activity boundaries from network model Activity boundaries from independent model μ+2.67 σ μ +1.82 σ μ -1.82 σ μ -2.67 σ Fig. 13 The average number of risk activations at each time step, measured over 100 runs, plotted as a function of time for the models with (red line) and without network effects (blue line). For comparison, the black curve represents the number of times risk activation was observed in the historical data. The purple and orange curves demonstrate what multiple of standard deviation is needed to get curves above and below the mean so the cover all points of historical data, for network model and independent model, respectively. This multiple is significantly lower, 1.82, for network model than for independent model (2.67). Thus, the extreme historical data point among 156 such points has probability of 3.4% to appear in network model, which is highly likely, but only 0.38% for the independent model, which in contrast is unlikely to appear with this number of historical data, demonstrating poor match between historical data and the independent model. External Activation Transition Fractions With the steady state probability of a risk being active, we can compute the probabil- ity of three different transition processes: -- internal activation: Aint i = (1 − pi)pint i being triggered internally pint . i is the probability of inactive risk i (1 − pi) -- external activation: Aext i = (1 − pi)[1 − (1 − pext ji )∑ j∈Ni p j ] is the probability of in- active risk i (1 − pi) being triggered externally 1 − (1 − pext ji )∑ j∈Ni p j . is the probability of active risk i ( pi) recovering -- internal recovery: Arec i = pi prec i prec i . For simplicity, we ignore the probability of a risk being activated both internally and p j ] (the value is negligible). externally with probability (1 − pi)pint i Thus, the three transition processes can be treated as independent variables. With the probabilities of transition processes, we can get the fraction of one transition process to all possible transitions for each risk by setting aint i = [1 − (1 − pext ji )∑ j∈Ni i = , aext Aint i Aint i +Aext i +Arec i Aext i Aint i +Aext i +Arec i , arec i = Arec i Aint i +Aext i +Arec i . Evolution of Threats in the Global Risk Network 23 no change change the likelihood of single target risk change the historical data of single target risk change the likelihoods of all risks change the historical data of all risks 2013 2014 2015 2016 2017 11 2013 21 2013 31 2013 41 2013 1 2014 11 2014 21 2014 1 2015 11 2015 risks 21 2015 1 2016 11 2016 21 2016 1 2017 11 2017 21 2017 y t i l i b a b o r p 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 1 2013 Fig. 14 The comparison of the probability of risks being active at steady state by changing risk likelihood and historical data. The horizontal axis is the list of all risks grouped by different year and sorted by their probability. The baseline is the probability of risks without any change. The four other tests include reducing only: 1. the normalized likelihood of the single target risk by 10%; 2. the frequency of the single target risk being active in the historical data by 10%; 3. the normalized likelihoods of all risks by 10%; 4. the frequencies of all risks being active in the historical data by 10%. Risk Influence In this section, we calculate the influence exerted by one risk on others. In the exper- iments, we first disable a risk i by setting its normalized likelihood Li = 0, and then calculate the new external activation frequency of risk j as aext j−i ( j 6= i). We obtain Ii→ j = aext j − aext j−i, (8) where Ii→ j is an indicator of the influence that risk i exerts on risk j, quantifying the external activation effects of risk i onto risk j. Fig. 15 shows the influence of a category of risks on other categories, which dis- cerns between cause and correlation of risks. From 2013 to 2017, the most significant changes in risk influence categories are observed for economic and technological risks. The economic risks used to be the most influential risks and had the highest impact on other risks. However, as of 2017 their influence decreased. Instead, the in- fluence of geopolitical and societal risks increased. In 2013, technological risks were the least vulnerable risks and had very limited influence on others. Although they are still the least influential risks in 2017, we can see an increasing trend in their influ- ence. As shown in Fig. 1 and 2, the 2014 and 2016 risk networks are sparser than the others. In a sparse risk network, risks have a higher tendency to connect with 24 Xiang Niu1,2+ et al. e c r u o S e c r u o S e c r u o S e c r u o S e c r u o S Economic 0.63 Environmental 0.43 Geopolitical 0.49 Societal 0.43 Technological 0.04 (a) 2013 network 0.61 0.39 0.61 0.45 0.16 0.62 0.49 0.50 0.47 0.08 0.62 0.58 0.49 0.48 0.12 0.64 0.57 0.59 0.59 0.29 Economic Environmental Geopolitical Societal Technological Economic 0.84 Environmental 0.35 Geopolitical 0.58 Societal 0.52 Technological 0.62 Target (b) 2014 network 0.64 0.47 0.71 0.65 0.60 0.54 0.61 0.45 0.76 0.23 0.25 0.99 0.46 0.58 0.07 0.71 0.28 0.68 0.46 1.00 Economic Environmental Geopolitical Societal Technological Economic 0.56 Environmental 0.38 Geopolitical 0.66 Societal 0.47 Technological 0.22 Target (c) 2015 network 0.42 0.32 0.74 0.55 0.45 0.33 0.68 0.66 0.63 0.15 0.20 0.74 0.43 0.65 0.06 0.20 0.30 0.66 0.34 0.64 Economic Environmental Geopolitical Societal Technological Economic 0.53 Environmental 0.30 Geopolitical 0.47 Societal 0.46 Technological 0.27 Target (d) 2016 network 0.37 0.19 0.68 0.56 0.36 0.29 0.66 0.50 0.67 0.14 0.17 0.74 0.25 0.64 0.00 0.30 0.32 0.43 0.36 0.63 Economic Environmental Geopolitical Societal Technological Economic 0.31 Environmental 0.26 Geopolitical 0.39 Societal 0.30 Technological 0.27 Target (e) 2017 network 0.30 0.28 0.45 0.38 0.38 0.21 0.52 0.38 0.41 0.07 0.12 0.55 0.24 0.42 0.08 0.24 0.25 0.42 0.10 0.46 Economic Environmental Geopolitical Societal Technological Target e c n e u l f n I d e z i l a m r o N 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 e c n e u l f n I d e z i l a m r o N 0 1 0.8 0.6 0.4 0.2 e c n e u l f n I d e z i l a m r o N 0 1 0.8 0.6 0.4 0.2 e c n e u l f n I d e z i l a m r o N 0 1 0.8 0.6 0.4 0.2 0 e c n e u l f n I d e z i l a m r o N Fig. 15 Influence among risk categories, normalized using a logarithmic scale. With the unity-based nor- malization of the influences, we find that most categories have large self-influence (diagonal elements). Evolution of Threats in the Global Risk Network 25 ones in the same category. Thus, the risk categories in 2014 and 2016 have largest self-influence in Fig. 15. Conclusions Here, we use the CARP model to simulate cascades in the global risk networks. With the most likely model parameters obtained through MLE (maximum likelihood esti- mation) and applied to a real event dataset, we compute the mean-field steady state probabilities of risks being active for each year from 2013 to 2017. The results ob- tained for the annual risk networks from 2013 to 2017 show significant changes in the asymptotic mean-field probabilities of risk activation. Applying the approach to finding bounds on recovery in CARP model presented in [14] to the global risk net- work, we measure the error of model parameter recovery and find that it is bounded by ±20% of the values obtained with historical data for years from 2013 to 2017. The corresponding error of the risk activity is smaller but of similar magnitude. Since the range of values for critical risks reported above was much larger, we can conclude that we have enough historical data to support the conclusions of our paper. Finally, by computing the difference of external activation frequencies of risk j with enabled and disabled risk i, we define the influence Ii→ j that risk i exerts on risk j. The results for the annual risk networks from 2013 to 2017 demonstrate that the influence among risks changes significantly over the years. With the CARP model, we first compare yearly risks and then measure the quan- titative changes of risks that provide an interesting view on evolution of the global economy and its risks. The activation probabilities and influences of economic risks are dramatically reduced as a result of economic recovery since 2014. The increase in activation probability of state collapse, terrorist attacks, illicit trade and migration show the negative effects of the failure of global governance, especially inaction of certain international bodies, like the Security Council of the United Nations. Tech- nological risks are becoming more influential as well due to the increase of private data leaks. In each year from 2013 to 2017, the significance of economic threats de- creases, while geopolitical and societal risks become more detrimental. All those an- alytic results are consistent with empirical observations. The quantitative analysis of our method creates a basis for developing tools for predictions of future risk network evolution and for guidance how to reduce damages caused by future risk cascades. Abbreviations AGGI: Annual greenhouse gas index, CARP: Cascading alternating renewal pro- cesses, CTA: Collaborative Technology Alliance, DTRA: Defense Threat Reduction Agency, EU: European Union, FAO: Food and Agriculture Organization, ISIS: Is- lamic State in Iraq and Syria, KS: Kolmogorov-Smirnov, MLE: Maximum likelihood estimation, NATO: North Atlantic Treaty Organization, RPI: Rensselaer Polytech- nic Institute, SIS: Susceptible-Infectious-Susceptible, U.S.: the United States, WEF: World Economic Forum 26 Xiang Niu1,2+ et al. Availability of data and material Data are available online via WEF website, see bibliography. Funding This work was supported in part by the Army Research Laboratory under Cooperative Agreement Number W911NF-09-2-0053 (the Network Science CTA), by the Army Research Office grant no. W911NF-16-1-0524, and by DTRA Award No. HDTRA1- 09-1-0049. The views and conclusions contained in this document are those of the authors. Competing interests The authors declare that they have no competing interests. Author's contributions Designed research: X.N., B.K.S., G.K., A.M.; Performed research: X.N., B.K.S.; An- alyzed data: X.N., B.K.S., G.K., A.M.; Wrote and edited the paper: X.N., A.M., G.K., B.K.S. Acknowledgments The authors thank Dr. Noemi Derzsy for helpful discussion of this work in its prelim- inary stages. Author details 1Network Science and Technology Center, Rensselaer Polytechnic Institute (RPI), 110 Eighth Street, NY 12180 Troy, USA. 2Department of Computer Science, Rensse- laer Polytechnic Institute (RPI), 110 Eighth Street, NY 12180 Troy, USA. 3Department of Physics, Rensselaer Polytechnic Institute (RPI), 110 Eighth Street, NY 12180 Troy, USA. References 1. Moussawi, A., Derzsy, N., Lin, X., Szymanski, B.K., Korniss, G.: Limits of predictability of cascading overload failures in spatially-embedded networks with distributed flows. Sci. Rep. 7(11729) (2017) 2. Dobson, I., Carreras, B.A., Lynch, V.E., Newman, D.E.: Complex systems analysis of series of black- outs: Cascading failure, critical points, and self-organization. Chaos 17(2), 026103 (2007) 3. Haldane, A.G., May, R.M.: Systemic risk in banking ecosystems. Nature 469(7330), 351 (2011) Evolution of Threats in the Global Risk Network 27 4. Gai, P., Kapadia, S.: Contagion in financial networks. In: P. R. Soc. A, vol. 466. London, United Kingdom, pp. 2401 -- 2423 (2010). The Royal Society 5. Battiston, S., Puliga, M., Kaushik, R., Tasca, P., Caldarelli, G.: Debtrank: Too central to fail? financial networks, the fed and systemic risk. Sci. Rep. 2(541) (2012) 6. Oppenheimer, D., Ganapathi, A., Patterson, D.A.: Why do internet services fail, and what can be done about it? In: USENIX Symposium on Internet Technologies and Systems, vol. 67. Berkeley, CA. (2003). USENIX 7. Brown, A., Patterson, D.A.: Embracing failure: A case for recovery-oriented computing (ROC). In: High Performance Transaction Processing Symposium, vol. 10. Berkeley, CA, pp. 3 -- 8 (2001). USENIX 8. Kenett, D.Y., Huang, X., Vodenska, I., Havlin, S., Stanley, H.E.: Partial correlation analysis: Applica- tions for financial markets. Quan. Fin. 15(4), 569 -- 578 (2015) 9. Kenett, D.Y., Preis, T., Gur-Gershgoren, G., Ben-Jacob, E.: Dependency network and node influence: Application to the study of financial markets. Int. J. Bifurcation Chaos 22(07), 1250181 (2012) 10. Raddant, M., Kenett, D.Y.: Interconnectedness in the global financial market (16-09), 1 -- 37 (2016). Office of Financial Research 11. Havlin, S., Kenett, D.Y.: Cascading failures in interdependent economic networks. In: Proceedings of the International Conference on Social Modeling and Simulation, Plus Econophysics Colloquium 2014, Berlin, Germany, pp. 87 -- 97 (2015). Springer 12. Majdandzic, A., Podobnik, B., Buldyrev, S.V., Kenett, D.Y., Havlin, S., Stanley, H.E.: Spontaneous recovery in dynamical networks. Nat. Phys. 10(1), 34 (2014) 13. Szymanski, B.K., Lin, X., Asztalos, A., Sreenivasan, S.: Failure dynamics of the global risk network. Sci. Rep. 5(10998) (2015) 14. Lin, X., Moussawi, A., Korniss, G., Bakdash, J.Z., Szymanski, B.K.: Limits of risk predictability in a cascading alternating renewal process model. Sci. Rep. 7(6699) (2017) 15. Cox, D.R., Miller, H.D.: The Theory of Stochastic Processes. CRC Press, Florida (1977) 16. World Economic Forum Global Risks Report. (2013). Accessed: 2018-07-23 17. World Economic Forum Global Risks Report. (2014). Accessed: 2018-07-23 18. World Economic Forum Global Risks Report. (2015). Accessed: 2018-07-23 19. World Economic Forum Global Risks Report. (2016). Accessed: 2018-07-23 20. World Economic Forum Global Risks Report. (2017). Accessed: 2018-07-23 21. Niu, X., Moussawi, A., Derzsy, N., Lin, X., Korniss, G., Szymanski, B.K.: Evolution of the global risk network mean-field stability point. In: International Workshop on Complex Networks and Their Applications, pp. 1124 -- 1134 (2017). Springer 22. Pawitan, Y.: In All Likelihood: Statistical Modelling and Inference Using Likelihood. Oxford Univer- sity Press, Oxford (2001) 23. Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the EM Algorithm. J. R. Stat. Soc. B 39(1), 1 -- 38 (1977) 24. R., P.-S., C., C., P., M., A., V.: Epidemic processes in complex networks. Rev. Mod. Phys. 87(925), 141 -- 153 (2015)
1706.01143
1
1706
2017-06-04T20:30:31
Graphons: A Nonparametric Method to Model, Estimate, and Design Algorithms for Massive Networks
[ "cs.SI", "physics.soc-ph" ]
Many social and economic systems are naturally represented as networks, from off-line and on-line social networks, to bipartite networks, like Netflix and Amazon, between consumers and products. Graphons, developed as limits of graphs, form a natural, nonparametric method to describe and estimate large networks like Facebook and LinkedIn. Here we describe the development of the theory of graphons, for both dense and sparse networks, over the last decade. We also review theorems showing that we can consistently estimate graphons from massive networks in a wide variety of models. Finally, we show how to use graphons to estimate missing links in a sparse network, which has applications from estimating social and information networks in development economics, to rigorously and efficiently doing collaborative filtering with applications to movie recommendations in Netflix and product suggestions in Amazon.
cs.SI
cs
Graphons: A Nonparametric Method to Model, Estimate, and Design Algorithms for Massive Networks∗ CHRISTIAN BORGS, Microso(cid:137) Research JENNIFER CHAYES, Microso(cid:137) Research Many social and economic systems are naturally represented as networks, from o(cid:130)-line and on-line social networks, to bipartite networks, like Net(cid:131)ix and Amazon, between consumers and products. Graphons, developed as limits of graphs, form a natural, nonparametric method to describe and estimate large networks like Facebook and LinkedIn. Here we describe the development of the theory of graphons, for both dense and sparse networks, over the last decade. We also review theorems showing that we can consistently estimate graphons from massive networks in a wide variety of models. Finally, we show how to use graphons to estimate missing links in a sparse network, which has applications from estimating social and information networks in development economics, to rigorously and e(cid:129)ciently doing collaborative (cid:128)ltering with applications to movie recommendations in Net(cid:131)ix and product suggestions in Amazon. Additional Key Words and Phrases: Networks; graphons; graph convergence; nonparametric estimation; collaborative (cid:128)ltering; network completion Networks are the natural framework to describe social and economic systems with pairwise interactions. (cid:140)is includes not only social networks among individuals, like Facebook and LinkedIn, but also bipartite networks between di(cid:130)erent types of entities, like the Net(cid:131)ix movie-user network and the Amazon consumer-product network. Graphons, developed as limits of sequences of graphs, form a natural, non-parametric method to model and estimate large networks. Here we informally describe some of the development of the theory of graphons over the last dozen years, and provide an application of graphons to the completion of noisily, sparsely sampled massive networks. 1 GRAPH LIMITS (cid:140)e theory of limits of sequences of dense graphs (i.e., graphs in which the number of edges scale as the square of the number of vertices) was developed over roughly a decade starting around 2006 [19–21, 37]. Of course, it is always possible to a de(cid:128)ne a limit of a graph sequence – if we make the notion too weak, then every sequence trivially converges to the same point; if we make it too strong, each sequence could converge to a di(cid:130)erent point. (cid:140)e key was to (cid:128)nd a notion that was "just right." (cid:140)is was done in a series of papers with Lov´asz, Sos and Vestergombi [20, 21]. In [19] we de(cid:128)ne a metric to allow us to compare graphs of di(cid:130)erent sizes. For this, we rescale two graphs to be of the same size by creating copies of each vertex so that the two graphs then have the same number of vertices. Speci(cid:128)cally, if the two graphs have n1 and n2 vertices, and k1 and k2 are the smallest numbers such that k1n1 = k2n2, we "blow up" each vertex in the (cid:128)rst graph by k1, ∗(cid:140)is extended abstract summarizes the content of an invited keynote talk delivered by Jennifer Chayes at the eighteenth ACM Conference on Economics and Computation (ACM EC'17). Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation on the (cid:128)rst page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a fee. Request permissions from [email protected]. © 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM. XXXX-XXXX/2017/1-ART1 $15.00 DOI: h(cid:138)p://dx.doi.org/10.1145/3033274.3084097 Christian Borgs and Jennifer Chayes Fig. 1. The half-graph and a random graph, their empirical graphons, and their limits. and each one in the second by k2. We then replace each edge in the original graphs by complete bipartite graphs between the blown-up vertices. We look at the Frieze-Kannan cut distance [29] of the di(cid:130)erence between the two blown-up graphs, where the cut distance is basically the value of the cut between a set and its complement, taking the sup over all sets. Finally, since vertex labels should not ma(cid:138)er, we take the minimum over all relabelings of the vertices. (cid:140)e resulting metric is called the cut metric. Our (cid:128)rst notion of convergence [19, 20] is what we call metric convergence, which means simply that the sequence of graphs is Cauchy in the cut metric. (cid:140)e fact that a limit exists was established by Lov´asz and Szegedy [37] using a weak version of the Szemer´edi Regularity Lemma [29] and a martingale argument. (cid:140)e limit is a two-variable symmetric function, called a graphon, o(cid:137)en denoted by W (x, y), which is basically a continuous version of the adjacency matrix of a graph on [0, 1]2. In [12], we show that the limit is unique up to measure-preserving transformations of the underlying feature space. Note that a graph on n vertices can be represented as a piecewise constant graphon by dividing the unit square [0, 1]2 into n 2 small squares of side length 1/n, and representing the presence of an edge between vertices i and j by a 1 on the squares ij and ji, and its absence by a 0. (cid:140)is representation is called the empirical graphon of the graph. If we visualize a 0 in the empirical graphon as a small white square, and a 1 as a small black square, graph convergence can be seen as convergence of the these black and white empirical graphons to a gray-scale limiting graphon. See Figure 1 for an illustration for the half-graph and an Erdos-Reny´ı random graph. (cid:140)ere is a natural local notion of convergence in dense graphs. We can ask that all induced (cid:128)nite subgraph densities (e.g., the edge density, triangle density, Peterson graph density, ...) converge simultaneously. We prove that a sequence of dense graphs converges in metric if and only if it is subgraph convergent [20]. We also introduce several "global" notions of convergence [10, 21]. We have one notion which corresponds to convergence of all (cid:128)nite two-body statistical physics models in the microcanonical ~~ Christian Borgs and Jennifer Chayes ensemble (the ensemble in which each species of vertex represents a (cid:128)xed percentage of all vertices). We have another notion which corresponds to all multi-way cuts and bisections converging. We show that a sequence of dense graphs converges according to these and a few other global notions if and only if it converges in metric [21]. More recently, a notion of large deviations convergence was de(cid:128)ned [10], which is also equivalent with the other global and local notions for dense graphs. Sparse graphs of bounded degree are much more fragile. Here we have no notion of metric convergence. (cid:140)e natural notion of local convergence is convergence of a graph rooted at a random point, known as Benjamini-Schramm convergence [5]. Benjamini-Schramm convergence is equivalent to subgraph convergence [11], but global notions of convergence are stronger [10]. (cid:140)e most interesting case is that of sparse graphs of unbounded average degree, like the power- law networks in Facebook and LinkedIn. (cid:140)ese cases were much more complicated due to the fact that much of the necessary graph theory (e.g., the relevant case of the weak Regularity Lemma) had not yet been developed. Over the past (cid:128)ve years, we have developed two ways to generalize the theory. (cid:140)e (cid:128)rst way is by rescaling the empirical graphon function, dividing it by the edge density ρ of the graph sequence (which is tending to zero in the case of sparse graphs). (cid:140)is was done by Bollob´as and Riordan in the case when the graphs had no "dense spots," corresponding to the graphon being a bounded function [8]. In collaboration with Cohn and Zhao [15, 16], we develop a theory of "uniformly upper regular" sparse graphs of unbounded average degree; we show that these converge to graphons in Lp spaces, corresponding to growing sequences with power-law tails. In the process of doing this, we formulate and prove a weak form of the Regularity Lemma for sparse graphs corresponding to graphons of unbounded degree. (cid:140)e second way to get graph limits for graphs of unbounded average degree, again graphs with very long tails, is by "stretching" the empirical graphon (and its domain) by 1/√ ρ so that the integral of the graphon is again unity. (cid:140)is leads to a limit de(cid:128)ned on the positive quadrant rather than the unit square, and hence these graphons provide a good description of networks where the underlying features cannot be restricted to bounded domains. See Figure 2 for a comparison of this with the rescaling approach. In work with Cohn and Holden [17], we develop a theory of sparse graphs of unbounded degree with "uniformly regular tails," show how to construct limits for sequences obeying this regularity condition, and prove many properties of the these graphons. Finally, we show that any graph sequence which satis(cid:128)es both the conditions of uniform upper regularity and uniformly regular tails must be dense; so dense graphs are the only overlap of our two theories of sparse graphs of unbounded degree. 2 MODELING LARGE NETWORKS (cid:140)e classic way to model large networks uses the so-called stochastic block model [32], which is a generalization of the Erdos-Reny´ı random graph to k species of vertices, with (cid:128)xed densities of each species of vertex, and (cid:128)xed probabilities that any two species connect to each other, including a (cid:128)xed probability of intra-species connection, which is in general di(cid:130)erent within each species. As graphs get larger and larger, reasonable descriptions have the number of species scale with the number of vertices: k = k(n), which tends to lead to over(cid:128)(cid:138)ing. Instead, starting over a decade ago [31], researchers began to model large networks non-parametrically by choosing n points randomly from some feature space, x1, x2, · · · , xn ∈ Ω, and a two-variable, bounded symmetric function W (xi , xj) : Ω× Ω → [0, 1]. A random graph consistent with this function is then generated by saying that i is connected to j with probability W (xi , xj). Christian Borgs and Jennifer Chayes Fig. 2. Three graphons associated with the same simple graph G on five vertices: the emprical graphon used in theory of dense graph convergence, the rescaled a version used in the uniformly upper regular theory of sparse graph convergence, and the stretched version used in the theory for sparse graphs with uniformly regular tails. (cid:140)e graphs generated in this way can easily be seen to be dense, whereas real life networks tend to be sparse. But our two methods for constructing graph limits for sequences of random sparse graphs of unbounded degree naturally yield random models of massive sparse networks. Our (cid:128)rst method [15] chooses features x1, x2, · · · , xn from some compact feature space, and generates random graphs with long tails corresponding to unbounded graphons W , connecting vertices with features xi and xj with probability min{1, ρW (xi , xj)}, where ρ is the desired target density of our graph. Our second method [17] is more complex: It chooses features x1, x2, · · · from an unbounded feature space according to a Poisson process with an intensity which scales linearly with time. At time t, the process connects vertices i and j born up to time t with probability W (xi , xj). (cid:140)e resulting graph at time t retains only those vertices which have been connected to at least one other vertex by that time, leading to a graph with a (cid:128)nite number of vertices at any (cid:128)nite time. We show that this kind of model is quite natural by proving a generalization of the celebrated Aldous-Hoover (cid:140)eorem [3, 33] to sparse graphs. In our se(cid:138)ing, it says that under suitable regularity conditions, any family of graphs with vertices labeled by their birth time that is invariant under measure-preserving transformations of time must be of the above form. Our model generalizes the work of Caron and Fox [22], and is very similar to a model introduced simultaneously by Veitch and Roy [41]. 3 LEARNING SPARSE GRAPHS How does one learn a network from a single sample, e.g., allowing us to predict how the network might look when it's twice its current size? (cid:140)e traditional approach is to assume that the network is a stochastic block model with k types of vertices, cluster the vertices according to type, and then use this clustering to estimate the parameters of the model (the densities of each of the k types, plus the k(k + 1)/2 connection probabilities within and between types) and then use that estimated stochastic block model to make predictions about the network [4, 9, 24, 26–28, 32, 34, 38, 40, 42, 43]. See [1, 2] for recent work with rigorous consistency guarantees for sparse graphs. approach [6, 7, 25, 35, 39]. Here the idea is to get an estimate,(cid:98)W for the graphon W representing As we discussed above, for very large networks, it is o(cid:137)en be(cid:138)er to take a non-parametric the network, and then generate realizations from that estimation. For bounded graphons, it had been shown that this leads to consistent estimation for both dense and sparse graphs, see, e.g., [23, 30, 36, 44], to name a few of the more recent papers on the subject. In collaboration with Christian Borgs and Jennifer Chayes Cohn and Ganguly [14], we showed that this leads to consistent estimation for sparse massive networks if, e.g., W ∈ L 2, provided that the average degree diverges. Hence one can use graphons for statistically consistent estimation for power-law graphs. In collaboration with Smith [13], we showed that, for sparse graphs corresponding to bounded W , it is possible to consistently estimate while maintaining edge di(cid:130)erential privacy. 4 NETWORK COMPLETION AND COLLABORATIVE FILTERING ON SPARSE GRAPHS An area of some interest in economics is how to "complete" sparsely, noisily sampled networks. For example, in development economics, one sometimes has measurements representing sparsely and noisily sampled connections among individuals. How sparsely can we sample and still get an accurate estimate of the missing links? Similarly, in bipartite networks like the Net(cid:131)ix user-movie network or the Amazon consumer-product network, can we show that we can complete the network even if it is very sparsely sampled with some general noise? Here we follow a collaborative (cid:128)ltering approach, which however must be modi(cid:128)ed to account for the sparsity of the sample. What if the sampling is so sparse that two people for whom we are trying to estimate the probability of a connection have no connections in common? Or what if there are no sets of movies in common between a given individual and another on the Net(cid:131)ix network? In collaboration with Lee and Shah [18], we used the "expanded neighborhood" approach of Abbe and Sandon [1, 2], who study estimation for stochastic block models. (cid:140)e idea is to look not just at individuals who share a common connection, but instead expand the neighborhood until a common connection is found. Similarly, we expand the bipartite user-movie-user-movie-· · · neighborhood until there an overlap. Here we treat graphons as operators in the expansion and need to do estimates to control the variance. Assume there are n individuals on the network, each described by features in a d-dimensional space. We show that, if the underlying graphon describing this network is Lipshitz, then the mean square error of our estimated graphon tends to zero provided that we sample the network with density p = ω(d n−1). For high-dimensional latent spaces, which tend to be the appropriate descriptions for most real-world networks, this is a signi(cid:128)cant improvement over the best previous result, that of Cha(cid:138)erjee [23], who showed that the mean square error of the estimated graphon tends to zero provided that the network is sampled with density p = ω(n−2/(d +2)). 2 REFERENCES [1] E. Abbe and C. Sandon. 2015. Community detection in general stochastic block models: fundamental limits and e(cid:129)cient recovery algorithms. In Proceedings of the 56th Annual Symposium on Foundations of Computer Science (FOCS'15). 670–688. [2] E. Abbe and C. Sandon. 2015. Recovering communities in the general stochastic block model without knowing the parameters. In Advances in Neural Information Processing Systems 28 (NIPS'15). 676–684. [3] D. Aldous. 1981. Representations for partially exchangeable arrays of random variables. J. Multivar. Anal. 11 (1981), 581–598. [4] A. Anandkumar, R. Ge, D. Hsu, and S. M. Kakade. 2014. A tensor approach to learning mixed membership community models. Journal of Machine Learning Research 15 (2014), 2239–2312. [5] I Benjamini and O Schramm. 2001. Recurrence of distributional limits of (cid:128)nite planar graphs. Electronic Journal of Probability 23 (2001), 1–13. [6] P. J. Bickel and A. Chen. 2009. A nonparametric view of network models and Newman-Girvan and other modularities. Proceedings of the National Academy of Sciences of the United States of America 106 (2009), 21068–21073. [7] P. J. Bickel, A. Chen, and E. Levina. 2011. (cid:140)e method of moments and degree distributions for network models. Annals of Statistics 39 (2011), 2280–2301. [8] B. Bollob´as and O. Riordan. 2009. Metrics for sparse graphs. In Surveys in combinatorics 2009 (eds. S. Huczynska, J. D. Mitchell, and C. M. Roney-Dougal), London Math. Soc. Lecture Note Ser. 365, Cambridge University Press. London Math. Soc. Lecture Note Ser. 365, Cambridge University Press, 211–287. Christian Borgs and Jennifer Chayes 177–214. [9] R. B. Boppana. 1987. Eigenvalues and graph bisection: an average-case analysis. In 28th Annual Symposium on Foundations of Computer Science. 280–285. [10] C. Borgs, J. Chayes, and D Gamarnik. 2013. Convergent sequences of sparse graphs: A large deviations approach. preprint, arXiv:1302.4615. To appear in Random Structures Algorithms (2013). [11] C. Borgs, J. Chayes, J Kahn, and L. Lov´asz. 2013. Le(cid:137) and right convergence of graphs with bounded degree. Random Structures Algorithms 42 (2013), 1–28. [12] C. Borgs, J. Chayes, and L. Lov´asz. 2010. Moments of two-variable functions and the uniqueness of graph limits. Geometric And Functional Analysis 19, 6 (2010), 1597–1619. [13] C. Borgs, J.T. Chayes, and A. Smith. 2015. Private graphon estimation for sparse graphs. In Advances in Neural [14] C Borgs, J. T. Chayes, H Cohn, and S Ganguly. 2015. Consistent nonparametric estimation for heavy-tailed sparse Information Processing Systems 28. 1369–1377. graphs. preprint, arXiv:1508.6675 (2015). [15] C. Borgs, J. T. Chayes, H. Cohn, and Y. Zhao. 2014. An Lp theory of sparse graph convergence I: limits, sparse random graph models, and power law distributions. preprint, arXiv:1401.2906 (2014). [16] C. Borgs, J. T. Chayes, H. Cohn, and Y. Zhao. 2014. An Lp theory of sparse graph convergence II: LD convergence, quotients, and right convergence. preprint, arXiv:1408.0744 (2014). [17] C Borgs, J. T. Chayes, and N Cohn, H andd Holden. 2016. Sparse exchangeable graphs and their limits via graphon processes. preprint, arXiv:1601.07134. To appear in Journal of Machine Learning Research (2016). [18] C Borgs, J. T. Chayes, C. E Lee, and D. Shah. 2017. Sparse graphon Estimation via Neighbor Method. preprint (2017). [19] C. Borgs, J. T. Chayes, L. Lov´asz, V. S´os, and K. Vesztergombi. 2006. Counting graph homomorphisms. In Topics in discrete mathematics (eds. M. Klazar, J. Kratochv´ıl, M. Loebl, J. Matousek, R. (cid:138)omas, and P. Valtr), Springer. Springer, 315–371. [20] C. Borgs, J. T. Chayes, L. Lov´asz, V. S´os, and K. Vesztergombi. 2008. Convergent graph sequences I: subgraph frequencies, metric properties, and testing. Advances in Math. 219 (2008), 1801–1851. [21] C. Borgs, J. T. Chayes, L. Lov´asz, V. S´os, and K. Vesztergombi. 2012. Convergent graph sequences II: multiway cuts and statistical physics. Ann. of Math. 176 (2012), 151–219. [22] F. Caron and E. B Fox. 2014. Sparse graphs using exchangeable random measures. preprint, arXiv:1401.1137 (2014). [23] S. Cha(cid:138)erjee. 2015. Matrix estimation by universal singular value thresholding. Annals of Statistics 43, 1 (2015), [24] Kamalika Chaudhuri, Fan Chung, and Alexander Tsiatas. 2012. Spectral clustering of graphs with general degrees in the extended planted partition model. In Proceedings of the 25th Annual Conference on Learning Theory (JMLR Workshop and Conference Proceedings Volume 23). 35.1–35.23. h(cid:138)p://www.jmlr.org/proceedings/papers/v23/chaudhuri12/chaudhuri12. pdf [25] D. S. Choi, P. J. Wolfe, and E. M. Airoldi. 2012. Stochastic blockmodels with a growing number of classes. Biometrika 99 (2012), 273–284. 227–284. [26] A. Coja-Oghlan. 2010. Graph partitioning via adaptive spectral techniques. Combin. Probab. Comput. 19 (2010), [27] A. Dasgupta, J. Hopcro(cid:137), R. Kannan, and P. Mitra. 2006. Spectral clustering by recursive partitioning. In Algorithms – ESA 2006 (Lecture Notes in Computer Science), Y. Azar and T. Erlebach (Eds.), Vol. 4168. Springer, 256–267. h(cid:138)p: //dx.doi.org/10.1007/11841036 25 [28] S.E. Fienberg, M.M. Meyer, and S.S. Wasserman. 1985. Statistical analysis of multiple sociometric relations. Journal of the American Statistical Association 80 (1985), 51–67. [29] A. Frieze and R. Kannan. 1999. (cid:139)ick approximation to matrices and applications. Combinatorica 19 (1999), 175–220. [30] C. Gao, Y. Lu, and H. H. Zhou. 2015. Rate-optimal graphon estimation. Annals of Statististics 43 (2015), 2624–2652. [31] P. D. Ho(cid:130), A. E. Ra(cid:137)ery, and M. S. Handcock. 2002. Latent space approaches to social network analysis. J. Amer. Statist. Assoc. 97, 460 (2002), 1090–1098. [32] P.W. Holland, K.B. Laskey, and S. Leinhardt. 1983. Stochastic blockmodels: (cid:128)rst steps. Social Networks 5 (1983), [33] D. Hoover. 1979. Relations on probability spaces and arrays of random variables. preprint, Institute for Advanced Study, 109–137. Princeton, NJ (1979). (1998), 155–175. [34] Mark Jerrum and Gregory B. Sorkin. 1998. (cid:140)e Metropolis algorithm for graph bisection. Discrete Appl. Math. 82 [35] O. Kallenberg. 1999. Multivariate sampling and the estimation problem for exchangeable arrays. Journal of (cid:138)eoretical [36] Olga Klopp, Alexandre B. Tsybakov, and Nicolas Verzelen. 2017. Oracle inequalities for network models and sparse Probability 12 (1999), 859–883. graphon estimation. Ann. Statist. 45 (2017), 316–354. 933–957. Foundations of Computer Science. 529–537. Statist. 39 (2011), 1878–1915. [38] F. McSherry. 2001. Spectral partitioning of random graphs. In Proceedings of the 42nd Annual IEEE Symposium on [39] K. Rohe, S. Cha(cid:138)erjee, and B. Yu. 2011. Spectral clustering and the high-dimensional stochastic blockmodel. Ann. [40] T. A. B. Snijders and K. Nowicki. 1997. Estimation and prediction for stochastic blockmodels for graphs with latent block structure. Journal of Classi(cid:128)cation 14 (1997), 75–100. [41] V. Veitch and D. M Roy. 2015. (cid:140)e class of random graphs arising from exchangeable random measures. preprint, Christian Borgs and Jennifer Chayes [37] L. Lov´asz and B. Szegedy. 2006. Limits of dense graph sequences. Journal of Combinatorial (cid:138)eory, Series B 96 (2006), arXiv:1512.03099 (2015). Statistical Association 82 (1987), 8–19. [42] Yuchung J. Wang and George Y. Wong. 1987. Stochastic blockmodels for directed graphs. Journal of the American [43] H.C. White, S.A. Boorman, and R.L. Breiger. 1976. Social structure from multiple networks. I. Blockmodels of roles and positions. American Journal of Sociology 80 (1976), 730(cid:128)(cid:147)780. [44] P. J. Wolfe and S. C. Olhede. 2013. Nonparametric graphon estimation. preprint, arXiv:1309.5936 (2013).
1509.03503
1
1509
2015-09-04T14:57:08
NoSPaM Manual - A Tool for Node-Specific Triad Pattern Mining
[ "cs.SI", "cs.CV", "cs.DS", "physics.data-an", "physics.soc-ph" ]
The detection of triadic subgraph motifs is a common methodology in complex-networks research. The procedure usually applied in order to detect motifs evaluates whether a certain subgraph pattern is overrepresented in a network as a whole. However, motifs do not necessarily appear frequently in every region of a graph. For this reason, we recently introduced the framework of Node-Specific Pattern Mining (NoSPaM). This work is a manual for an implementation of NoSPaM which can be downloaded from www.mwinkler.eu.
cs.SI
cs
NoSPaM Manual A Tool for Node-Specific Triad Pattern Mining Marco Winkler∗ October 10, 2018 Abstract The detection of triadic subgraph motifs is a common methodology in complex- networks research. The procedure usually applied in order to detect motifs eval- uates whether a certain subgraph pattern is overrepresented in a network as a whole. However, motifs do not necessarily appear frequently in every region of a graph. For this reason, we recently introduced the framework of Node-Specific Pattern Mining (NoSPaM) [9, 11]. This work is a manual for an implementation of NoSPaM which can be downloaded from www.mwinkler.eu. Contents 1 Introduction 2 How to use NoSPaM 2.1 Download and Installation . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Running NoSPaM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Output File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Algorithms 3.1 Randomization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Counting of Node-Specific Triad Patterns . . . . . . . . . . . . . . . . . . 3.3 Node-Specific Triad Pattern Mining . . . . . . . . . . . . . . . . . . . . . References 2 4 4 4 5 6 6 6 8 9 ∗Institute for Theoretical Physics, University of Würzburg, Am Hubland, 97074 Würzburg, Germany, [email protected] 1 Figure 1: All 13 possible non-isomorphic connected triadic subgraphs (subgraph patterns) in directed unweighted networks. 1 Introduction Analyzing networks in terms of their local substructure is a well-established methodol- ogy in complex-network science [1, 3, 4, 6 -- 8]. Particularly triadic subgraph structures have been studied intensively over the last 15 years [2, 4, 6, 10]. Apart from node permutations, there are 13 connected triadic subgraph patterns in directed unweighted networks (see Fig. 1). Those patterns that are significantly overrepresented in a graph structure are referred to as motifs [6]. In order to evaluate the extent of an over- or underrepresentation, for each pattern i, the framework commonly used compares its frequency of occurrence in the original network under investigation, Noriginal,i, to the expected frequency of occurrence in an ensemble of random networks with the same degree distribution and the same number of unidirectional and bidirectional links as the original network, hNrand,ii. Over- and underrepresentation of pattern i is then quantified through a Z score (1) Zi = Noriginal,i − hNrand,ii σrand,i where σrand,i represents the standard deviation of Nrand,i in the ensemble of the null model. Hence, every network can be assigned a vector ~Z whose components comprise the Z scores of all possible triad patterns of Fig. 1. However, this approach does not account for potentially existing heterogeneities in , is overrepresented in a graph structures. Suppose, e.g., the feed-forward loop (FFL), certain area of a graph, but, at the same time, highly underrepresented in another part of the graph. On the global network level, the effects may cancel out such that the Z score will be close to zero and possibly relevant structural information will be lost. Therefore, we recently suggested the methodology of Node-Specific Pattern Mining (NoSPaM) [9, 11]. Instead of mining frequent subgraphs on the system level, NoSPaM investigates I.e., for every node α, NoSPaM the neighborhood of every single node separately. considers only those triads in which α participates in. Since the position of node α in the triadic subgraphs matters now, the symmetry of most patterns shown in Fig. 1 is broken and the number of connected node-specific triad patterns increases from 13 to 30. These are shown in Fig. 2. To understand the increase in the number of patterns, . From the perspective of one particular node, it splits consider the ordinary subgraph into the three node-specific triad patterns 14, 16, and 23 in Fig. 2. Furthermore, some patterns are included in others, e.g. pattern 1 is a subset of pattern 3. In order to avoid biased results, it is not double counted, i.e. an observation of pattern 3 will only increase its corresponding count and not the one associated with pattern 1 [9, 11]. 2 Figure 2: All possible connected, nonisomorphic triadic subgraph patterns in terms of a distinct node (here: lower node). For every node α in a graph, NoSPaM will compute Z scores for each of the 30 node-specific patterns i shown in Fig. 2, i = N αoriginal,i −D Z α σαrand,i E N αrand,i . (2) N αrand,i N αoriginal,i is the number of appearances of pattern i in the triads node α participates in. E is the expected frequency of pattern i in the triads node α is part of Accordingly,D in the ensemble of graphs with the same degree distribution and the same number of both unidirectional and bidirectional links. σαrand,i is the corresponding standard deviation. The following section of this manual provides for information on how to download and run an implementation of NoSPaM. In Section 3, details of the applied algorithms are discussed. 3 123456789101112131415161718192021222324252627282930 2 How to use NoSPaM 2.1 Download and Installation • Requirements: make sure to have a recent Java version installed (version 1.7 or higher) • Download: NoSPaM can be downloaded from www.mwinkler.eu following the Supplementary Material link. • Extract the nospam.zip file to whereever you prefer to store NoSPaM. • Go to the command line terminal and navigate to the nospam directory. • Generate executable class files by typing: javac *.java • ∗In case of problems with the compilation process make sure that the PATH vari- able includes the JDK, e.g. 'C:\Program Files\Java\jdk1.7.0_11\bin' • Start a test run by typing: java nospam exampleNetwork.txt 2000 1500 2.2 Running NoSPaM Input data must be stored in the followig format: <source node 1><tab><target node 1> <source node 2><tab><target node 2> ... <source node M><tab><target node M> Every line represents an edge of the network. The identities of the node must be repre- sented by integer values. Any additional entries in a line (e.g. an edge weight) will be ignored by the algorithm. The file type is arbitrary and can be, e.g., .txt, .dat, .csv, etc... The general command line syntax is as follows: java nospam <filePath> <samples> <switching attempts> • if the network file to be analyzed is already in the nospam directory (e.g. the file exampleNetwork.txt), the variable <filePath> can simply be set to the value <fileName>.<fileType> • the variable <samples> specifies the number of instances from the randomized ensemble to be used for estimating the average values,D E, and the standard N αrand,i deviations, σαrand,i. • the variable <switching attempts> specifies the number of microscopic rewiring steps. It should be chosen proportionally to the number of edges, E, in the graph and not smaller than E (see Section 3 and References [5] and [9] for details). 4 Figure 3: Example output file. The first column indicates the ids of the nodes. The following 30 columns correspond to the node-specific patterns shown in Fig. 2 (in the same order). For every node, there are four lines: the first one indicates the total number of occurrences in the original network, N αoriginal,i; the second line indicates the mean number of occurrences in the randomized ensemble,D deviation in the randomized ensemble, σαrand,i; the fourth line indicates the node-specific Z scores which can be obtained from the other three measures. E; the third line indicates the standard N αrand,i 2.3 Output File The output of NoSPaM is written in a separate file of the same type as the input file. Fig. 3 gives an example of such an output file. After the header lines, the evaluated data D is stored. For each node (indicated by the ids in the first column), the values of N αoriginal,i, i are stored in the columns corresponding to the patterns i in N αrand,i Fig. 2. E, σαrand,i, and Z α ) has appeared 16 times in the network under investigation. For the output file shown in Fig. 3, e.g., from the perspective of the node with id 1, pattern 1 ( In the randomized ensemble it appeared 15.42 times on average with a standard deviation of 2.15 resulting in a Z score, Z α=1 i=1 of 0.27 indicating a non-significant overrepresentation ) has appeard 5 times in the neighborhood of node of the pattern. Further, pattern 2 ( 1, while in the randomized ensemble it occurred 10.39 times on average with a standard i=2 = −1.51 indicating an underrepresentation deviation of 3.58 yielding a Z score of Z α=1 of the pattern. 5 (a) (b) Figure 4: Microscopic link-switchings performed to generate the randomized ensembles. (a) Pair switch and loop switch for unidirectional links. (b) Pair switch for bidirectional links. 3 Algorithms 3.1 Randomization The generation of the random null model with the same degree distribution and the same number of unidirectional and bidirectional links adjacent to each vertex as in the network under investigation is realized by a link-swapping algorithm. The microscopic switching rules are illustrated in Fig. 4. The number of microscopic switching attempts is the only parameter of the random- ization that needs to be specified in advance. The entire randomization procedure is displayed in Algorithm 1. The Markov chain generated by successive link swappings obeys detailed balance and coverges towards a uniform distribution of the networks in the ensemble serving as the null model, i.e. every valid network is sampled with equal probability. This fact is elaborated in depth in [9]. The number of switching attempts should be chosen proportionally to the number of edges in the graph [5]. 3.2 Counting of Node-Specific Triad Patterns For counting the frequencies in which the distinct node-specific triad patterns occur, an iteration over all connected triads is necessary. The procedure is illustrated in Algo- rithm 2. Because it is computationally expensive to test all triads in the system (the complexity is of order O (N 3)), we rather iterate over pairs of adjacent edges in the graph. Since real-world networks are usually sparse, this is much more efficient [9]. 6 Algorithm 1 Degree-preserving randomization of a graph function Randomize(Graph G (V, E), no. of required steps) s = 0 while s < number of required rewiring steps do pick a random link e1 ∈ E if e1 is unidirectional then else pick a 2nd unidirectional link e2 ∈ E at random pick a 2nd bidirectional link e2 ∈ E at random if e1 and e2 do not share a node then rewire according to the pair-switch rules in Fig. 4 if one of the new links already exists then undo the rewiring end if else if e1 and e2 participate in a loop then rewire according to the loop-switch rule in Fig.4(a) end if end if s++ end while return randomized instance of G end function Algorithm 2 Counting of node-specific triad patterns function NspPatternCounter(Graph G(V, E)) N : N × 30-dimensional array storing the pattern counts for every node of G for every edge e ∈ E do i, j ← IDs of e's nodes with i < j C ← {} be list of candidate nodes to form triad patterns comprising e C ← all neighbors of i C ← all neighbors of j for all c ∈ C do if i + j < sum of IDs of all other connected dyads in triad (ijc) then increase the counts in N for i, j, and c for their respective node-specific patterns end if end for end for return N end function 7 3.3 Node-Specific Triad Pattern Mining The evaluation of the node-specific Z scores is performed by Algorithm 3. For a more detailed discussion of the algorithms including considerations of the compuational effort see References [9, 11]. Algorithm 3 Node-specific triad pattern mining (NoSPaM) function NoSPaM(Graph G, # required rewiring steps, # randomized instances) Noriginal ← NspPatternCounter(G) Nrand ← {} Nsq,rand ← {} for # randomized instances do G ← Randomize(G, # required rewiring steps) counts ← NspPatternCounter(G) Nrand ← Nrand+ counts Nsq,rand ← Nsq,rand+ counts ∗ counts end for Nrand ← Nrand/(#randomized instances) Nsq,rand ← Nsq,rand/(#randomized instances) Z ← (Noriginal − Nrand)/σrand return Z end function σrand ←qNsq,rand − (Nrand ∗ Nrand) 8 References [1] I. Albert and R. Albert. Conserved network motifs allow protein-protein interaction prediction. Bioinformatics (Oxford, England), 20(18):3346 -- 52, Dec. 2004. [2] U. Alon. Network motifs: theory and experimental approaches. Nature reviews. Genetics, 8(6):450 -- 61, June 2007. [3] M. Berlingerio, F. Bonchi, B. Bringmann, and A. Gionis. Mining graph evolution rules. In Machine learning and knowledge discovery in databases, pages 115 -- 130. Springer, 2009. [4] R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. Shen-Orr, I. Ayzenshtat, M. Shef- Science, Superfamilies of evolved and designed networks. fer, and U. Alon. 303(5663):1538 -- 42, Mar. 2004. [5] R. Milo, N. Kashtan, S. Itzkovitz, M. Newman, and U. Alon. On the uniform generation of random graphs with prescribed degree sequences. arXiv preprint cond-mat/0312028, 2004. [6] R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Network motifs: simple building blocks of complex networks. Science, 298(5594):824 -- 7, Oct. 2002. [7] M. Rahman, M. Bhuiyan, and M. Hasan. Graft: An efficient graphlet counting method for large graph analysis. 2014. [8] O. Sporns and R. Kötter. Motifs in Brain Networks. PLoS Biology, 2(11):e369, 2004. [9] M. Winkler. On the Role of Triadic Substructures in Complex Networks. epubli GmbH, Berlin, 2015. [10] M. Winkler and J. Reichardt. Motifs in triadic random graphs based on Steiner triple systems. Phys. Rev. E, 88(2):022805, Aug. 2013. [11] M. Winkler and J. Reichardt. Node-specific triad pattern mining for complex- In IEEE International Conference on Data Mining Workshop network analysis. (ICDMW), pages 605 -- 612, Dec 2014. 9
1706.00941
1
1706
2017-06-03T12:23:28
DANI: A Fast Diffusion Aware Network Inference Algorithm
[ "cs.SI" ]
The fast growth of social networks and their privacy requirements in recent years, has lead to increasing difficulty in obtaining complete topology of these networks. However, diffusion information over these networks is available and many algorithms have been proposed to infer the underlying networks by using this information. The previously proposed algorithms only focus on inferring more links and do not pay attention to the important characteristics of the underlying social networks In this paper, we propose a novel algorithm, called DANI, to infer the underlying network structure while preserving its properties by using the diffusion information. Moreover, the running time of the proposed method is considerably lower than the previous methods. We applied the proposed method to both real and synthetic networks. The experimental results showed that DANI has higher accuracy and lower run time compared to well-known network inference methods.
cs.SI
cs
A DANI: A Fast Diffusion Aware Network Inference Algorithm MARYAM RAMEZANI, Sharif University of Technology HAMID R. RABIEE, Sharif University of Technology MARYAM TAHANI, Sharif University of Technology AREZOO RAJABI, Sharif University of Technology The fast growth of social networks and their privacy requirements in recent years, has lead to increasing difficulty in obtaining complete topology of these networks. However, diffusion information over these net- works is available and many algorithms have been proposed to infer the underlying networks by using this information. The previously proposed algorithms only focus on inferring more links and do not pay atten- tion to the important characteristics of the underlying social networks In this paper, we propose a novel algorithm, called DANI, to infer the underlying network structure while preserving its properties by using the diffusion information. Moreover, the running time of the proposed method is considerably lower than the previous methods. We applied the proposed method to both real and synthetic networks. The experi- mental results showed that DANI has higher accuracy and lower run time compared to well-known network inference methods. Categories and Subject Descriptors: G.2.2 [Graph Theory]: Graph algorithms; H.3.3 [Information Stor- age and Retrieval]: Information Filtering, Information Search and Retrieval General Terms: Algorithms; Experimentation; Performance Additional Key Words and Phrases: Social Networks, Network Inference, Diffusion Information, Community Structure, Random Process Model ACM Reference Format: Maryam Ramezani, Hamid R. Rabiee, Maryam Tahani and Arezoo Rajabi, 2014. DANI: A Fast Community- Preserving, Diffusion Aware Network Inference Algorithm. ACM Transaction on Intelligent Systems and Technology. ACM V, N, Article A (January YYYY), 27 pages. DOI:http://dx.doi.org/10.1145/0000000.0000000 1. INTRODUCTION Online Social Networks (OSNs) that play an important role in the exchange of infor- mation between people, have grown noticeably in the last few years. Diffusion is a fundamental process over these networks by which information, ideas and new behav- iors, namely contagion, disseminate over the network [Gomez Rodriguez et al. 2010]. Propagation of a contagion over a network creates a trace that is called cascade (Fig. 1) [Gomez Rodriguez et al. 2010]. These cascades represent the diffusion behavior that convey valuable information about the underlying network. Some previous studies indicate that diffusion behavior and network structure are tightly related [Easley and Kleinberg 2010; Eftekhar et al. 2013; Barbieri et al. 2013a; 2013b]. In other words, actions of users do not only emanate from their individual Author's addresses: M. Ramezani (m [email protected]), H. R. Rabiee ([email protected]), M. Tahani ([email protected]) and A. Rajabi ([email protected]), Department of Computer Engineering, Sharif University of Technology, Tehran, Iran. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is per- mitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or [email protected]. c(cid:13) YYYY ACM 0000-0000/YYYY/01-ARTA $15.00 DOI:http://dx.doi.org/10.1145/0000000.0000000 ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:2 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi interests but also depend on the interaction pattern between them. Understanding this relation can result in a more accurate analysis of social networks and the processes taking place over them (e.g. diffusion). One of the most important features of OSNs is their modular structure. Each module in the network is a dense sub-graph called a community. In other words, a community is a set of nodes which are densely connected to each other, and sparsely to the rest of nodes. Nodes in a same community have common interests and similar actions [Chen 2011; Fortunato 2010]. For example, strongly connected communities of global web networks often have pages with common topics [Fortunato 2010]. In many situations, the underlying network topology (nodes and the links between them) may not be achievable for different reasons: 1)Rapid changes in the structure of networks over time caused by the arrival and departure of members and alteration in their friendships, and 2)Limited access to data due to the policy of OSNs and pri- vacy of user profiles. Network topology inference is a solution to surmount the above difficulties. As mentioned before, the diffusion process is influenced by structure of the latent underlying network which includes its community structure. Thus, observing the dif- fusion behavior of nodes can help us to gain insight into the networks community structure. In most cases, the only available observation is the time when a contagion reaches a node, namely the infection time of a node [Gomez Rodriguez et al. 2010; My- ers and Leskovec 2010; Eslami et al. 2011; Gomez-Rodriguez et al. 2011; Alpay et al. 2011; Gomez-Rodriguez and Scholkopf 2012]. Network inference includes a class of studies, which aim to discover the latent network by utilizing these infection times in different contagions. Several network inference algorithms have been proposed, but most of them do not preserve the community structure during the inference process. Despite their acceptable accuracy on detecting network links, the community structure of the inferred network does not match with the original network. Many community-based services are provided on OSNs. Since gathering information about the entire network topology is often impossible, usually inferred networks from the set of observations are being used. By considering community structures during network inference, the community-based services such as optimizing search engines [Zhong et al. 2008], visualizing large social networks [Heer and Boyd 2005], improving recommendation systems [Sahebi and Cohen 2011], compressing network data [Boldi and Santini 2010], and viral marketing [Leskovec et al. 2007] can be applied on the inferred network, and lead to comparable results with the original underlying network. In this paper, we propose a new Diffusion Aware Network Inference algorithm, called DANI, which is intended to infer social networks from diffusion information while per- severing the community structures. We consider the infection time of nodes in different contagions as observations, and apply community detection algorithms on the inferred network. Moreover, by comparing the detected communities of the actual network with the inferred ones, we show that communities are detected successfully. The main contributions of this paper are: - Inferring networks while preserving their properties: Since it is not feasible to obtain the real network structure, different structural based methods such as community detection algorithms may use the inferred networks as an alternative. The previ- ous network inferring works do not consider the density of edges and their degree distributions in the underlying network. Consequently using community detection methods on them deviates from community detection on the original network. How- ever, other structural properties such as degree distribution and clustering coefficient will be different from the ground truth. In this way, the ranking of nodes will be dis- ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:3 tributed based on their influence role. The proposed method overcomes this problem by preserving the community structure while inferring the networks. - Inferring networks with more connected nodes: Network nodes in inference problems are the active nodes participating in at least one observed cascades. Hence, any active node must have at least one connected link providing the required infrastructure for cascades to spread through that link. Compared to the previous works, the proposed method can produce an inferred network with more connected links for each node as existed in the underlying network. In other words, our method produces less isolated nodes compared to the previous methods. - More scalability: The proposed method offers lower run time compared to the state of the art methods while maintaining high precision. This property leads our work to have more scalability that is a main limitation of the pervious works. - Good performance independent of the network structure: Many of the state of the art previous works such as [Gomez Rodriguez et al. 2010; Gomez-Rodriguez et al. 2011; Gomez-Rodriguez and Scholkopf 2012] have good performance on the tree-based net- works [Alpay et al. 2011], while the performance of the proposed method is not lim- ited to any type of structure. The rest of this paper is organized as follows. In Section 2, we introduce the prelimi- naries on the concepts of community and diffusion and explain their interdependencies in order to ascertain our concerns about preserving community structures during the inference process. Related works are studied in Section 3. In Section 4, we define nota- tions, formalize our problem and explain the proposed method. Experimental results on synthetic and real datasets are presented in Section 5. Finally, we conclude the paper and discuss future works in Section 6. 2. PRELIMINARIES ON COMMUNITIES AND DIFFUSION A social network is usually represented by a graph G(V, E). Nodes (V ) and links (E) of these graphs stand for people and their interactions, respectively. The role that differ- ent nodes and links play in the network processes such as diffusion, varies and can be described as [Chen et al. 2007; Xie et al. 2013; Fortunato 2010]: - Intra-community links that connect nodes in the same community. Such nodes inter- act frequently; therefore, these links are known as strong ties. Nodes that only have links to other nodes in their own community are called core nodes. The core nodes mostly affect their cohorts in a community more than other members of the network. - Inter-community links that connect nodes of different communities. Due to low inter- actions between such nodes, they are called weak ties. Nodes, which have at least one inter-community link, are called boundary nodes. Such nodes play an important role in information dissemination over different communities. Analyzing the interactions between community members is an important issue in social networking [Chen 2011]. In fact, the probability that a person would reject or accept a contagion depends on the decision of his neighbors about that contagion. At the same time, this probability affects the future decisions of neighborhood nodes in the same community [Scripps et al. 2007]. By strong intra-community links, members in a community are exposed to a contagion during a small interval from several paths. In contrast, due to weak inter-community links between communities, propagation of a contagion among them takes place with lower probability and pace. Another interesting finding is that in many cases the impact of weak ties on a net- work process (i.e. acceptance rate of a new product) is more powerful than strong ties [Bakshy et al. 2012; Goldenberg et al. 2001]. We try to explain the above facts through an example. A network with three communities is illustrated in Fig. 1. Suppose that ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:4 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi Fig. 1. (Color online) Three communities are separated by rectangles around them. Strong ties (blue solid undirected lines) form a community, and weak ties (green undirected dash lines) act as bridges between different communities. Core nodes (green circles: {A, C, D, F, G, H, L}), and boundary nodes (orange circles: {B, E, I, K, M, N, O}) are shown. The directed path (red directed lines and bold nodes) shows a typical cascade over the network. node D gets infected by a contagion. Other nodes in the community of node D will be exposed to this contagion and become infected with high probability due to similar interests and actions among them. Thus, the rate and extent of diffusion can be high within a community. But how does the contagion disseminate over the network? For this purpose, the contagion must spread out of the community by a boundary node such as B, and infect another boundary node like K from a neighboring community, and this only happens if there exists at least one inter-community link such as (B, I) or (B, K). Therefore, weak ties have a critical role in the diffusion process over the network. Since interaction on weak ties happens with lower probability, the diffusion process may stop. In other words, diffusion and community may act against each other. Communities may prevent a cascade, and in most cases when a cascade stops, a com- munity can be detected [Easley and Kleinberg 2010; Barbieri et al. 2013a]. Therefore, it is necessary to understand the relation between the community struc- ture and diffusion behavior of nodes in a network in order to infer the network cor- rectly. 3. RELATED WORK As discussed in the previous sections, we would like to infer a network by utilizing dif- fusion information while taking into account its community structure. Consequently, the most related research areas to our work are: - Diffusion aware network inference: The methods that infer networks by observing - Diffusion aware community detection: The methods that utilize the diffusion process the diffusion network. during community detection. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. B D A C G H L M N O F E K I DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:5 In this section, we will survey and explain the state of the art methods in each research area. 3.1. Diffusion based Network Inference This category of research tries to infer the edges of a network by using cascade in- formation, which in most cases is the infection time of nodes in different cascades [Gomez Rodriguez et al. 2010; Myers and Leskovec 2010; Eslami et al. 2011; Gomez- Rodriguez et al. 2011; Alpay et al. 2011; Gomez-Rodriguez and Scholkopf 2012]. [Guille et al. 2013] introduces a comprehensive survey on previous works in this area. In the following, we describe some of the most important works in this category. NETINF models each cascade as a tree on the network and uses an iterative al- gorithm to infer the network from these trees by optimizing a sub-modular function [Gomez Rodriguez et al. 2010]. Despite its high inference accuracy, it suffers from high runtime which is a serious problem in real datasets. In addition, the performance of NETINF decreases when the structure of the network being studied is not consistent with the tree model [Alpay et al. 2011]. NETRATE is an improvement over NETINF. It assumes that cascades occur at dif- ferent rates and temporally infers heterogeneous interactions with different transmis- sion rates, which is closer to reality [Gomez-Rodriguez et al. 2011]. CoNNIE improves NETINF by adding an optimal and robust approach which uses prior probabilistic knowledge about the relation between infection times [Myers and Leskovec 2010]. Similar to NETINF, MultiTree models cascades with the trees, but considers all the possible trees. By this approach, its accuracy is higher than NETINF, NETRATE and CoNNIE when low number of cascades is available. Although, its running time is several orders lower than other tree-based algorithms, but still it is not scalable. [Gomez-Rodriguez and Scholkopf 2012]. DNE models diffusion as a Markov random walk and tries to define a weight for each link according to the difference between the infection times of connected nodes in different cascades [Eslami et al. 2011]. Its approach is independent of diffusion models. FastINF is another method which uses the same approach to define the weight of links [Alpay et al. 2011]. Both of these algorithms have a low runtime and work well on the networks that do not have meaningful community structures. The overall goal in such studies is to obtain the maximal number of edges of the underlying network. The main drawbacks of this category of studies are as follows. Algorithms like NETINF and others based on it, which use a spanning tree ap- proach, maintain the structures, but are too slow. These methods have low performance on networks with non-tree structures. Others like DNE and FastINF distinguish no preference between different types of the extracted edges. Despite their high accuracy, they do not consider the network community structure. Running community detection algorithms on the output of these methods leads to different communities from underlying network, because they do not recover some weak inter-community or strong intra-community links. Therefore, few large communities or many single members are seen in the networks inferred by them. Our goal is to infer the network by utilizing cascade information such that the com- munity structure of underlying network is preserved. In this regard, we desire to maintain network community structure through the inference process by finding more intra-community links to recognize relatively dense communities in the network. 3.2. Diffusion based Community Detection Many community detection algorithms have been proposed in recent years. The main assumption of these algorithms is the availability of the underlying network topology ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:6 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi (nodes and links between them). However, in many cases, the network topology (i.e. friends, followers or following of users) is latent which causes the accuracy of tradi- tional community detection algorithms to reduce. Different interpretations of diffusion are used in community detection algorithms. The most prevalent definitions are described in the following. 1) Artificial diffusion: It is mainly produced by well-known diffusion models [Kempe et al. 2003] such as Independent Cascade (IC) model [Saito et al. 2008] and Linear Threshold (LT) model [Chen et al. 2010]. Moreover, some studies have introduced new behaviors for diffusion [Shen et al. 2010]. 2) Real diffusion: It corresponds to a foreign traceable process on the network that appears as part of a dataset information. For example, in news cascade over Twitter (http://twitter.com), if user u tweets a post, his follower node v will see this action on his page. In general, we say node v is exposed to a contagion, and can retweet. Another example is voting stories in Digg (http://digg.com) which allows users to post news that can propagate according to the rating of users. We categorize community detection algorithms according to their diffusion type as follows: Detecting communities by artificial diffusion: These studies create artificial diffusion over the network and offer a community detection algorithm that uses this diffusion as part of its procedure. In multi-agent approaches, information such as color, is ex- changed between nodes via the edges according to different diffusion models. At the end, nodes with the same colors are detected as a community [Yang et al. 2009a]. Some works use label propagation in order to define communities. Nodes adopt the maximum label of their neighbors in an iterative process, and at last nodes with iden- tical labels form communities [RAGHAVAN et al. 2007; Costa 2004; Leung et al. 2009]. In another research, the number of common neighbors between nodes is used to define the weight of edges as a similarity measure [Chen 2011]. By considering this assump- tion, another work introduces a new comportment named diffusion, which combines weighted edges in a hierarchical method to detect communities [Shen et al. 2010]. Detecting communities by real diffusion: The only major work in this category pro- poses a stochastic generative model named CCN that uses both the complete network topology and diffusion information to extract communities [Barbieri et al. 2013a]. This model does not consider any special assumption about link formation, arrival proba- bility of a contagion at each node, cascades models over the network, and rather tries to model them with a random process. Despite good features such as overlapping com- munity detection, this method suffers from high running time complexity. In [Barbieri et al. 2013b], the authors expand CCN by considering that the underlying network is not available. This method adopts a mathematical model similar to CCN, and uses an independent cascade assumption to introduce a model called C-IC, and also uses NE- TRATE to introduce a model called C-Rate. The output of this method is the network communities without producing the links of network. In general, low performance in the absence of network topology and being restricted to undirected networks are the main drawbacks of previous community detection algo- rithms. In contrast to prior algorithms, our method assumes the network topology to be latent, and aims to infer the network utilizing infection time of nodes, which is avail- able in most realistic cases. In addition, our method performs well for both directed and undirected networks. Network inference is the main goal of this article which is more related to works explained in the 3.1 category. Community detection algorithms that are based on dif- fusion concepts are not relevant to the proposed method in this paper, because they assume that the complete network topology is accessible. On the other hand, [Barbieri et al. 2013b] which is the only community detection work that does not consider the ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:7 aforementioned assumption, utilizes a network inference approach ([Gomez-Rodriguez et al. 2011]). 4. PROPOSED METHOD In this section, we first present the notations used in this paper, and then introduce the proposed algorithm. 4.1. Notations and Definitions Let G = (V, E) represent a network where V contains the set of nodes, and E contains the directed or undirected links between nodes. We assume k = E (number of links) is known, while no more information about the links is available. We assume to have a set of different contagions as different cascades, C = {c1, c2, . . . , cM}. For each cascade ci, we observe the infection time of nodes and have pairs of node ID and infection time, ci = {(v0, t0), (v1, t1), . . . , (vn, tn)}. During the spread of a contagion some nodes may not get infected. An infinity infection time is assigned to such nodes. The propagation path of a contagion is hidden. In other words, we do not know by which node, a node gets exposed to a contagion. It is assumed that a node can get infected with a certain contagion just by one other node. In general, infection times form a continuous sample space which makes their in- terpretation somewhat difficult. In addition, the range of infection time may vary for each contagion. For example, the order of infection time maybe in seconds for cascade Ca, but in order of hours for another cascade Cb. Therefore, if we use the real value of the infection times, we will not infer the links that Cb spreads over the network; since the time differences in Cb are much larger than Ca, the information obtained from Cb would be ignored. To overcome this problem, we define a function that maps these continuous values to a set of discrete values and refer to the corresponding random variable as infection label. Here, our goal is to discover the links of a static network structure from the observed cascades. We do not consider the speed of cascades and expect two different cascades to spread in the same manner for a same path on the graph. We also ignore the impact of cascades on each others. Therefore, instead of time of propagation, the sequence of propagation is important and we achieve this repre- sentation by mapping time values to infection sequence order per each cascade. The proposed infection time transformation can be described as follows. (1) For each cascade cm, sort the elements according to their infection time (tu) in an ascending order. The resulting sorted set is named Sm. Elements with infinity infection time are omitted from Sm. (2) For each node u, assign a label equal to its position in Sm, and replace its infection time with that label. (cid:26) index(Sm(tu)) if (tu ≺ ∞) 0 else L(tu) = (1) This way, each cascade cm is a vector containing pairs of nodes and infection labels that are sorted in an ascending order according to their infection labels, as depicted in Eq. (2). From now on, we call this vector the cascade vector, CVm: CVm = {(v0, L(t0)), (v1, L(t1)), . . . , (vn, L(tn))} (2) For simplicity we may use L(ti) and L(vi), interchangeably. 4.2. Problem Formulation We assume, the underlying network G = (V, E) is unknown, and the only observation is the set of cascades (C). If each node of network participates in at least one cascade, ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:8 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi the set of nodes V can be extracted from the observation. By considering all the links between any pairs of these nodes {(u, v)u, v ∈ V }, we have a complete graph G. Our goal is to obtain a weighted adjacency matrix A = {αuvu, v ∈ V, u (cid:54)= v} for graph G such that each element αuv ≥ 0 of A is calculated considering the community structure preservation property. We utilize the same assumptions and maximum likelihood esti- mation as in [Gomez Rodriguez et al. 2010; Gomez-Rodriguez et al. 2011; Alpay et al. 2011; Gomez-Rodriguez and Scholkopf 2012]. These assumptions are used in the fol- lowing to simplify the maximization process. We would like to assign weight for each edge of complete graph G that maximizes the following likelihood function. (cid:48) G = arg max G P (CG) (3) (cid:48) Then, we extract a sub-graph G∗ of G that has the k most weighted edges as proba- ble edges of the latent network (k is the number of underlying network links which is given as input). For simplicity, we assume the spread probability of cascades to be independent and identically distributed (i.i.d) over the graph. Therefore, the probability of observing the cascade set over the networks is: P (CG) = P (ciG) (4) Graph G is composed of set of edges (u, v), and we assume that all edges are mutually independent: P (G) = P (u, v) (5) i=m(cid:89) i=1 (cid:89) (u,v)∈G Therefore, the probability that cascade ci spreads over graph G is given by Eq. (6), assuming that the joint probability of edges are conditionally independent: P (ciG) = P (ci{(u, v)}(u,v)∈E) = P ({(u, v)}(u,v)∈Eci) × P (ci) (cid:81) P ({(u, v)}(u,v)∈E) P ((u, v)ci) × P (ci) P (u, v) P (ci(u,v))P (u,v) × P (ci) = (u,v)∈E (cid:81) (cid:81) → P (ciG) = P (ci)−(E−1) × (cid:89) (cid:81) (u,v)∈E (u,v)∈E (u,v)∈E P (ci) = P (u, v) (u,v)∈E P (ci(u, v)) (6) Where P (ci) is the prior probability for cascade formation, and we assume it is con- stant for all cascades. Therefore, we can approximate the probability of cascade ci propagating over G by Eq. (7): P (ciG) ∝ (cid:89) (u,v)∈G P (ci(u, v)) (7) ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. (u,v)∈G i=1 P (CG) ∝ i=m(cid:89) ∝ (cid:89) log(P (CG)) ∝ (cid:88) (u,v)∈G (cid:89) i=m(cid:89) (cid:88) i=1 P (ci(u, v)) P (ci(u, v)) (8) (9) DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:9 hence, by using Eq. (7), we can rewrite Eq. (4) as: Applying log function on both sides of Eq. (8), yields: log(P (ci(u, v)) (u,v)∈G ci∈C where P (ci(u, v)) represents the probability that cascade ci spreads through edge (u, v). We try to define the probability P (ci(u, v)) in terms of observed information from the hidden network structure. We interpret log(P (ci(u, v))) as the weight of edge (u, v), and call it αci. We try to estimate this weight for each presumable link in the net- work. In the rest of paper, we introduce the DANI algorithm in which αci is computed according to the relations between community structure and diffusion information. 4.3. The DANI Algorithm As mentioned before, our goal is to define a weight P (u, v) for each edge (u, v) that rep- resents its existence probability in the underlying network. For this purpose, DANI first utilizes diffusion information and estimates the weight of all potential edges. At the second step, DANI considers the relation between community structures and dif- fusion behavior and assigns another weight according to the joint behavior of nodes. Finally, both of these weights are taken into account simultaneously, and the existence probability of each edge is computed. In summary, we follow three steps: using infor- mation diffusion network, maintaining the community structure, and the combination of these steps. Diffusion Information: From each cascade vector CVm we can construct a probable directed graph. Each node u in this graph can get infected by a node v, if L(v) ≺ L(u). The probability of existence of edge (u, v) in this graph depends on the difference between the infection label of u and v, such that more difference between the infection labels of these nodes in CVm, decreases the participation probability of link (u, v) in the contagion [Gomez Rodriguez et al. 2010]: P (u, v) ∝ 1 ∆(L(u), L(v)) (10) Fig. 2(a) illustrates a typical network and two of its distinct contagions. Their cas- cade vectors and corresponding probable graphs (simply referred to as graph) are shown in Fig. 2(b) and Fig. 2(c), respectively. Each cascade vector CVm can be modeled as a discrete time stochastic process where nodes stand for independent states and the sequence of nodes in the cascade vector CVm represent the state of the process at discrete times. The transition probability between different states (nodes), or in other words, the contagion transmission proba- bility from a node to another node is equivalent to the weighted link between them. At the present time the contagion transmission probability of each node (state) de- pends on probability of being at its neighboring node in the immediate preceding pe- riod, and is independent of its pervious time states or the traversed nodes. This prop- erty is called the Markov Property. Hence, it can be thought that the states of former ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:10 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi Fig. 2. (Color online) (a) A network topology. (b) Cascades over network: a bipartite graph with network members in one side and contagions on the other. Infection of each user with a contagion is represented by an edge from it to that contagion, where the infection time is the edge label. The cascade vector calculated by the proposed method is also considered. (c) Markov chain and matrix for each cascade: probable directed graph with the DANI algorithm. Edge probabilities are marked with thick and thin lines. The Markov transition matrix per cascade is obtained from these graphs as shown here. times are all accounted by incorporating the state of the last immediate time t. Assum- ing the First Order Markov Property to hold, we have: P r[Xt+1 = xt+1Xt = xt, Xt−1 = xt−1, . . . , X0 = x0] = P r[Xt+1 = xt+1Xt = xt] (11) This stochastic process that exhibits the Markov property is called a Markov Chain (MC). The number of states in our Markov chain is equal to the number of nodes, and each cascade vector CVm is a finite Markov chain [Levin et al. 2009]. In order to define the Markov chain, we must compute its transition matrix. Each element of this matrix represents the existence probability of an edge in the network. As shown in Fig. 2(c), our goal is to find the transition matrix for each chain by utilizing the corresponding cascade information. At this point, we need to find the relation between the difference of the infection labels of two nodes, and the probability that an edge exists between them. As discussed before, this probability has an inverse relation with the difference of their infection labels. Two approximations are used in the previous works: (1) The probability of an edge only depends on the difference of the infection label of nodes connected by it. In other words, for all pairs of nodes with the same values of infection label difference, the existence probability is the same [Gomez Rodriguez et al. 2010]. (2) Consider a cascade vector such that there exists a set of nodes (D), before v in this vector. The probability that u infected v when D = {u}, is higher than the situation where D (cid:31) 2, because a node z ∈ D with tz ≺ tv may have infected v. This will reduce the probability that v has been infected by u. Moreover, the authors in [Eslami et al. 2011] proved that in addition to the difference of infection times, the number of infected nodes before node v, namely D, also affects the edge weights. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. (a) (b) (c) 20000000000000000000000000000bcbdcdebecedfbfcfdfegbgcgdgegfghhbhchdhehfrrrrrrPrrrrrrrrrrrrrrr1000000000000000abadaeafbdbebfdedfefrrrrrrrPrrr DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:11 Considering the above points, the existence probability of an edge between nodes u and v in the cascade vector (L(v) (cid:31) L(u)), using the infection label is: du,v = 1 L(v) × (L(v) − L(u)) (12) We use du,v to construct the transition matrix. The transition matrix P , is a stochas- tic random matrix with the following features: (1) Each element in P satisfies the following condition: i, j = 1, 2, ..., n 0 ≤ Pij (2) The sum of each row is equal to one: ∀i : j=n(cid:88) Pij = 1 To satisfy these conditions, the two-dimensional probability matrix should be nor- malized. Dividing each element of this matrix by the sum of its corresponding row, the Markov chain transition matrix (Pci), for cascade (ci) is obtained: j=1 Pci (u, v) = du = (cid:88) y∈V du,v du du,y (15) Community Structure Information: As previously mentioned, community mem- bers have similar interests and behaviors, and diffusion is more likely to spread among them [Easley and Kleinberg 2010; Eftekhar et al. 2013; Barbieri et al. 2013a; 2013b]. Intuitively, they appear in same cascades more than nodes which are in different com- munities. Thus the number of cascades passed between node u and v can be a sign of coherence between these nodes. If u and v are community members, they become infected jointly in more cascades compared to the cascades that only one of them has been infected. We use the participations of pairs of nodes in different cascade as a mark for finding the similarity in their behaviours. On the other hand, consider two boundary nodes that connect adjacent communities. These nodes may appear in same cascades due to the bridge role of weak ties in the diffusion process. However, the frequency of such cases is negligible compared to the number of cascades that every single one of them has participated in. According to the above justifications, and the goal of inferring the links for each pair of node (u, v), we define a function ψ (u, v) that assigns a weight to edge (u, v) by consid- ering the nodes behaviourals based on the cascades information. In other words, this weight is a node-node similarity based on the community structure that had impacted the diffusion information. The formula for ψ (u, v) is similar to the Jaccard index [Jac- card 1901]: (13) (14) (16) (17) where In(u) is the set of cascades that u has participated in: ψ (u, v) = In(u)(cid:84) In(v) In(u)(cid:83) In(v)  M(cid:83) {i} if (u ∈ CVi) ∅ else i=1 In(u) = ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:12 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi Fig. 3. The color map between any pair of nodes. (a) Community structure: If two nodes are in a commu- nity, the pixel is black, otherwise it is white. Each block represents a specific community. (b) Similarity: We measured similarity between any pair of nodes by Eq. (16). Dark pixels indicate more similarity. The pixel of similarity matrix is darker wherever the community matrix is black, leading to the conclusion that communities can be specified by using the node-node diffusion based similarity. For computing the numerator of Eq. (16), u should appear earlier than v when both participate in each CVi. The above node-node similarity can be used to detect the com- munities. The main idea of many structured-based community detection algorithms is grouping nodes based on the fact that when the similarity of two nodes is large, they have more chance to be in a community [Du et al. 2007; Weng et al. 2013]. We also provided a data driven study to show the relation between Eq. (16) and the aforemen- tioned concept of community. To this end, we utilized an LFR network with 1000 nodes, 7692 links, 28 communities and 20000 cascades (which is described and analyzed in Section 5). We changed the name of nodes such that nodes of a community are consec- utively listed. For each pair of nodes, the color map community matrix and similarity matrix in Fig. 3 show that nodes with more similarity are in the same community. Since overlapping nodes are highly influential nodes [Bhat and Abulaish 2013], this formula also works for overlapping communities. Because by using this equation, the overlap nodes will take part in more common cascades and consequently gain large values. Total Information: The probability of direct contagion propagation between two nodes would increase, if the difference of their infection times decreases. In other words, the existence probability of edge (u, v) has a direct relationship with Pci(u, v). From other perspective, larger values of ψ(u, v) correspond to more probability that u and v are cohorts, and hence indicating edge (u, v) to be an intra-community link. Therefore, direct impact of ψ(u, v) on the existence probability of edge (u, v) will lead to infer the intra-community links that are the important links in the community de- tection step. We define the probability weight of an edge at each cascade ci as: (18) where Pci (u, v), is the element (u, v) in the Markov transition matrix of the cascade ci. αci(u, v) = Pci(u, v) × ψ(u, v) To mathematically justify the above equation (Eq. (18)), let us consider the following definition. According to [Malmgren et al. 2008], independent cascades over the network are Poisson point processes that follow the exponential distribution [Gomez Rodriguez et al. 2010]: P (ci(u, v)) ∝ e −(tv−tu ) θu,v (19) ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. NodesNodes 0200400600800010020030040050060070080090000.10.20.30.40.50.60.70.80.91NodesNodes 0200400600800010020030040050060070080090000.050.10.150.20.250.30.350.40.450.5 DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:13 Then, the probability of cascade ci spreading over an edge (u, v) has an inverse rela- tion with the difference between infection times (infection labels) of node u and node v, and the parameter θu,v. According to discussion in the "Diffusion Information" section the authors in [Eslami et al. 2011] proved that a cascade spread over edge (u, v) does not only rely on the infection label difference of nodes u and v, but also the set of nodes (D) that has been infected before activation of node v. Therefore, P (ci(u, v)) is given by: (L(tv)(L(tv) − L(tu)))−1 × θu,v ) (20) By substituting Eq. (20) in Eq. (9) we obtain: P (ci(u, v)) ∝ exp( log (P (CG)) ∝ (cid:88) (cid:88) (u,v)∈G ci∈C −1 −1 log(exp( (L(tv)(L(tv) − L(tu)))−1 × θu,v )) (21) Considering the logarithm of maximum likelihood function arg max(P (CG)) for Eq. (21) we obtain: G∗ ∝ arg max( ∝ arg min( ∝ arg max( (u,v)∈G (cid:88) (cid:88) (cid:88) ci∈C (cid:88) (cid:88) (cid:88) (u,v)∈G ci∈C (u,v)∈G ci∈C −1 [L(tv)(L(tv) − L(tu))]−1 × θu,v )) ( 1 ( [L(tv)(L(tv) − L(tu))]−1 × θu,v ([L(tv)(L(tv) − L(tu))]−1 × θu,v)) )) (22) In Eq. (22), the first term is identical to relation we extracted from diffusion infor- mation, and the second term corresponds to the information about link that can map to the relation extracted from community structure information: G∗ ∝ arg max( ([L(tv)(L(tv) − L(tu))]−1 ) (23) (cid:123)(cid:122) Pci(u,v) (cid:125) × θu,v) (cid:124)(cid:123)(cid:122)(cid:125) ψ(u,v) Then, according to our model the Maximum Likelihood Estimator (MLE) is given by: G∗ ∝ arg max( Pci (u, v)] × ψ (u, v)) (cid:88) (u,v)∈G (cid:124) (cid:88) (cid:88) ci∈C [ (u,v)∈G ∝ arg max( (cid:88) (cid:88) ci∈C (u,v)∈G PC (u, v) × ψ (u, v)) (24) where PC is the sum of the transition matrix of all cascades, preserving the Markov matrix properties, and it stands for the total transition matrix of the Markov chain. The DANI pseudo-code is presented in Algorithm 1, where Ptemp is used to keep the sum of all transition matrices of cascade vectors. Then, Ptemp is normalized to obtain the stochastic transition matrix PC, based on the diffusion information. In the next step, by considering the community structures, ψ(u, v) is calculated and used along with PC to produce the inferred network adjacency matrix, A. The normalization in the process of computing PC keeps its stochastic transition property and its value within the limits of ψ(u, v) values, and hence their multiplication stays in a fix range for all the possible edges. Finally, we choose k edges of the inferred network with maximum weight to construct G∗. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:14 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi ALGORITHM 1: DANI Pseudo-Code Input: Set of cascades over network (C = {c1, c2, . . . cM}), Number of network links to be Output: Inferred network (G∗) for each cm = {(vi, ti)} ∈ C do inferred (K) Sm ← sort cm by ti; L (ti) = index (Sm (ti)); CVm = {(vi, L (ti))}; for each u ∈ CVm, v ∈ CVm do if (L(tu) < L(tv)) then end end for each (u, v) ∈ Pci do Pci (u, v) ← du.v(cid:80) ; y∈V du.y Compute du,v according to Eq. (12); Ptemp (u, v) ← Ptemp (u, v) + Pci (u, v); end end for each (u, v) ∈ Ptemp do (cid:80) Ptemp(u, v) ← Ptemp(u,v) Pc(u, v) ← Pc(u, v) + Ptemp(u, v); Ptemp(u,y) y∈V ; end for each (u, v) ∈ PC do Compute ψ(u, v) according to Eq. (16); A(u, v) = Pc(u, v) × ψ(u, v); end Gt ← sort A values; for i = 1 to K do G∗ ← G∗(cid:83){gi ∈ Gt} ; end Return G∗; (cid:18) ncm (cid:19) 2 Time complexity analysis: Consider a cascade cm with ncm infected nodes. Accord- ing to Algorithm 1, any sorting has the time complexity of O(ncmlog(ncm )). There are pair of nodes (u, v) for calculating du,v and other normalizations with the time complexity of O(ncm 2). Therefore, if we have M different cascades with average num- ber of nodes nc as the input, the DANI algorithm has a complexity of O(M × nc 2). It is worth to mention that the baselines works for the competing methods in our experi- mental analysis did not provide time complexity analysis for their algorithms, because their methods are heavily dependent to the network structure. Instead they just re- lied on experimental results for running times, which we also compare in the next section. MultiTree and Netinf use greedy hill climbing to maximize the corresponding sub-modular function through an iterative approach where an edge is inferred at each step if by adding the edge a marginal improvement is achieved. After finding K edges, their algorithms are terminated. In contrast, DANI is free of any iteration and thus outperforms MultiTree and Netinf in running time. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:15 5. EXPERIMENTAL EVALUATION In this section, first we introduce the evaluation criteria for two concepts of network in- ference and community structures detection. In order to evaluate the proposed method, we apply DANI to synthetic and real datasets and compare our results with other static works under the same conditions. Since the main goal of this paper is network inference while preserving the community structure, the community detection meth- ods should work better when used with the proposed method. Therefore, we have se- lected the state of the art inferring works for our comparison study instead of using different community detection methods which is not necessary and feasible in the con- text of this paper. The three selected methods for comparison include NETINF (as the first proposed method in this area), DNE (as the fastest method), and MultiTree (as the newest approach with superior performance over the previous tree-based methods based on accuracy and running time). 5.1. Evaluation metrics As mentioned before, previous methods focus on inferring network links with high accuracy and overlook network properties such as community structure. Moreover, most of these methods suffer from high running time. Considering the best practices, we utilize two types of analysis as follows. 5.1.1. Network inference:. The main goal of this area is to obtain the highest similarity between inferred and underlying networks. The most common and important issues in this regard are the number of discovered links, and inference process duration. To this end, the main criteria are as follows: F-measure:. Precision and recall are two frequently used metrics, and are defined as: (cid:84) EG∗ (cid:84) EG∗ EG∗ EG EG EG P recision = Recall = (25) (26) where EG and EG∗ represent the set of links in the original and inferred network, and EG is the cardinality of EG. There is an inverse relation between recall and precision. To consider both, their geometric mean, named F-measure (or F-score) is used [Makhoul et al. 1999]. F − measure = 2 × P recision × Recall P recision + Recall Running time:. Most of the previous methods require more time to gain high accu- racy. Therefore, running time is an important parameter to be considered in evaluation of these methods. Number of nodes:. The previous works only focus on the number of correct inferred links. Despite their high accuracy, no connected links maybe detected for some nodes. Hence, these nodes are omitted in the inferred network and consequently would not be assigned to any community. As a result, only a fraction of original nodes, that are presented in the inferred network, is used in evaluations. Other network properties:. Preserving the clustering coefficient and degree distribu- tion of nodes is another important concern. For each node, we calculate the relative error between the exact value of each measure in the ground truth and inferred net- work. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:16 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi 5.1.2. Preserving community structure:. As mentioned before, our goal is to propose a method to infer networks by preserving community structure of underlying network. In order to compare the methods in this regard, we extract communities of underlying and inferred networks by a well-known community detection algorithm and compare the communities of these two networks in two ways: - Comparing members of communities (NMI, PWF). These metrics evaluate the sim- ilarity of each pairs of communities in real and inferred networks. - Comparing properties of communities (density, conductance and number of commu- nities). The average of these criteria over all communities of a network is utilized to evaluate the differences of community structure for real and inferred networks. Hence, for each criterion Y , we compute (cid:52)(Avg(Yr), Avg(Yi)), in which Avg(Yr) and Avg(Yi) are average of criterion Y for all communities in real and inferred networks, respectively. Normalized Mutual Information (NMI):. NMI is a probabilistic information theo- retic metric that compares the similarity of two sets of communities [Manning et al. 2008], and is defined as: (cid:80)CB −2(cid:80)CA (cid:1) +(cid:80)CB i=1 Ni.log(cid:0) Ni. (cid:80)CA j=1 Nijlog i=1 N (cid:16) Nij N Ni.N.j (cid:17) (cid:16) N.j N j=1 N.jlog (cid:17) (27) N M I(A, B) = where N is a CA × CB matrix, and CA and CB are number of communities for original and inferred networks, respectively. Each element of N corresponds to the number of common memberships for each pair for communities. Ni. (N.j) is the row i (column j) summation, and N is the total number of nodes or the sum of all matrix elements [Duch and Arenas 2005]. The range of NMI values is between 0 and 1. Actually, NMI for the same communities reaches 1, and 0 represents the overall difference. However, for the overlapping communities this metric has been modified [McDaid et al. 2011; Lancichinetti et al. 2009]. Pairwise F-measure (PWF):. Let HG and HG∗ represent the sets of node pairs in the same community in the underlying network and the inferred network, respectively. PWF measures how many pairs of nodes in a community at original network are cohort in the communities of the inferred network [Yang et al. 2009b; Qi et al. 2012]. HG ∩ HG∗ P recision = HG ∩ HG∗ HG , Recall = HG∗ 2 × P recision × Recall P recision + Recall P W F = (28) (29) We considered PWF, because it is not enough to rely solely on NMI [Xie et al. 2013]. Moreover, recent studies have discovered modularity [Newman 2006a] is not a reli- able measurement [Duch and Arenas 2005]. In addition, because of sparsity in real networks, the obtained modularity values are often incorrect. Density:. Density indicates the ratio of actual intra-community links to all possible links in a community [Vasudevan and Deo 2010]: ES (cid:16)VS(VS−1) (cid:17) δ(S) = ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. 2 DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:17 Table I. LFR-benchmark characteristics. (N: #nodes, k: Avg degree, maxK: max degree, t1: minus exponent for the degree sequence, t2: minus exponent for the com- munity size distribution, minC: Min community sizes, maxC: Max community sizes). N 1000 k maxK t1 15 2 50 t2 minC maxC 1 20 50 where Vs and Es represent the set of nodes and links for the community S, respectively. Conductance:. This criterion presents the ratio between number of inter-community links (cS), and intra-community links (mS) as follows: [Leskovec et al. 2008b]. ∅ = cS (2mS + cS) (30) Density and conductance are complementary measures and are often considered to- gether. For instance, the density of a k-clique subgraph with many links to the rest of graph is high, while its conductance low. Therefore, these two criteria are often used together to evaluate the candid methods. In this paper, we desire to have more simi- larities in density and conductance among original and inferred networks. Number of communities:. A measure called "Accuracy in the number of communi- ties" was introduced in [Yang and Leskovec 2012] to determine whether the inferred network has the same number of communities as the original network: COG − COG∗ (31) where COG and COG∗ are the cardinality of the set of communities for original and inferred networks, respectively. The lower values of this metric indicate more similar- ity. COG N C = 5.2. Network data 5.2.1. Synthetic datasets. We utilize two types of synthetic networks: LFR-benchmark:. As mentioned before, one of the most important features of real social networks is their community structure. To study the impact of this property on the performance of algorithms, we used the LFR-benchmark [Lancichinetti and For- tunato 2009; Lancichinetti et al. 2008] which provides real networking charactristics, and its properties can be controlled to provide networks with build-in communities. The generated networks have 1000 nodes with the characteristics shown in Table I. An important attribute of these networks is a mixing parameter called µ, which rep- resents the network community structure. For each node, µ is a numeric value which is equal to the ratio of inter-community to entire links of that node. The value of µ can change between 0 and 1, and its alterations would change the community struc- ture of the network. Larger values of µ corresponds to less community structure in the network, while decreasing this parameter would improve the community struc- ture of the network. According to the experimental results, values over 0.5 for µ are not suitable for highlighting the community structures. Therefore, we evaluated the competing methods against various types of LFR-benchmark by using different values of µ in the range of [0.1, 0.2, 0.3, 0.4, 0.5]. Real structures:. We used the real co-authorship network of scientists dataset that inherently contains many community structures. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:18 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi Table II. Real networks and diffusion information over them. The specifications are for different months. Each network had been changed during the months in a year [Gomez-Rodriguez et al. 2013]. For each of these networks, we generated various artificial cascades by using the SNAP library [Leskovec 2014] with different models, and utilized the average behav- iors against different cascade models in our analysis to show independence of the pro- posed method from cascade models. 5.2.2. Real datasets. In this paper, we refer to a dataset as real, when its topology and corresponding diffusion are accessible. We utilized two real networks over different months for LinkedIn and News of the World sites; with community structures, nodes and links that change overtime. All the specifications are listed in Table II. These datasets have been gathered by using the MemeTracker from March 2011 to February 2012 [Leskovec et al. 2008a]. We split all the months into eleven intervals and discuss the performance of algorithms in these intervals. The network visualiza- tions available at [Gomez-Rodriguez et al. 2013; Leskovec 2013] maybe used to demon- strate the changes in structures and illustrate the communities for different months. 5.3. Results We analyzed the results of three types of qualified networks based on the evaluation metrics described above. The interpretation of the results are provided in the following subsections. 5.3.1. Network inference:. F-measure:. As Fig. 4 illustrates, the proposed algorithm (DANI) has a better per- formance in inferring underlying networks compared to the competing methods. As shown, DANI has a higher F-measure for LFR-benchmark networks with different community structures (different values of µ). In this figure, X-axis represents the num- ber of cascades in the network. For various community structures (mixing parameters) and number of cascades, DANI outperformed DNE and MultiTree. When µ changes from 0.1 to 0.3, DANI achieves higher F-measures in lower running time than NETINF. As the community structure fades away (µ (cid:31) 0.3), F-measure for DANI is four times better than DNE, and two times better than MultiTree. When ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. a)LinkedInMonth1234567891011#Node203306509552536490586560541464497#Edge426831204328582248207133953011277015501760#Cascade671409694917946223987663915622906776987336937964930129737172940378AvgCascadeLength1.682.112.372.412.442.502.582.432.452.472.26#Community1013161423252430263023AvgCommunitysize16.7020.2330.0637.5722.3919.8424.7518.620.4214.120.17AvgDensity0.50740.503110.40790.44280.44610.53860.42500.48100.42040.5430.5055AvgConductance0.01140.04490.14620.15190.16110.17440.21910.22020.16580.14140.0889b)NewsoftheWorldMonth1234567891011#Node16131839241011881033843675517559594#Edge55915811786150214637739364537499804074807688#Cascade4902076104657042687428631382683133189412578541025146908798836215952824AvgCascadeLength1.872.402.512.362.402.432.422.552.622.602.58#Community918211943393032262528AvgCommunitysize15.8917.5018.7619.6329.1427.2622.0320.5823.8421.8215.89AvgDensity0.49160.50670.49630.52540.46920.44880.39340.57080.55400.52470.5859AvgConductance0.05870.12720.09380.08110.25370.20340.20170.17460.20450.13050.1789 DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:19 Fig. 4. network. Each part is for a special mixing parameter (µ). Figures show averages over 10 runs. (Color online) F-measure and running time against different number of cascades in LFR-benchmark the number of cascades over the network becomes more than the number of links ((cid:31) 7692), F-measure for NETINF is 0.1 more than the F-measure for DANI, while the time complexity of NETINF was much more than DANI. For the same case, MultiTree achieved the same F-measure as NETINF, while its running time was better than NETINF, but higher than DANI. For the NetScience dataset (Fig. 5), F-measure of DANI was consistently more than DNE. For small number of cascades, DANI had higher F-measure than NETINF and MultiTree. Therefore, when the number of cascades are higher than the number of the links ((cid:31) 2742), NETINF and MultiTree infer the links accurately, but they require considerably higher running time compared to DNE and DANI. For the real datasets, we display the results for 11 different months (Figs. 6 and 7). It can be seen that DANI with higher F-measure retrieves more network links. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. 00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.1NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.2NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.3NETINFDNEMultiTreeDANI02004006008001000120002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.1NETINFMultiTreeDNEDANI020040060080010001200140016001800200002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.2NETINFMultiTreeDNEDANI05001000150020002500300002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.3NETINFMultiTreeDNEDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.4NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.5NETINFDNEMultiTreeDANI050010001500200025003000350002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.4NETINFMultiTreeDNEDANI050010001500200025003000350002000400060008000100001200014000160001800020000Time (sec)#Cascadesμ=0.5NETINFMultiTreeDNEDANI A:20 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi Fig. 5. (Color online) Test of the algorithms on a real network with the NetScience [Newman 2006b] artifi- cial cascade; 1590 nodes, 2742 edges, and 191 communities. The communities are detected by the OSLOM al- gorithm [Lancichinetti et al. 2011]. Results are shown for the inferring scope: a) F-measure, and b) Running Time, and the community detection scope: c) Pairwise F-measure, and d) Normalized Mutual Information. Figures show averages over 10 runs. Fig. 6. (Color online) Tests of the algorithms on LinkedIn dataset in 11 consecutive interval months. Investigations show that most of the cascades over real networks are short, and the number of long diffusion processes are small [Leskovec et al. 2006]. A major contagion over networks usually does not have one seed user, and broadcasts in several different locations on the network. Each cascade motion from different users is being seen as a separated cascade. Furthermore, the wide spread of a contagion may situate on a network, but inevitably does not occur during a long cascade. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. 00.10.20.30.40.50.60.70.80.910500100015002000250030003500400045005000F-measure# CascadesNETINFDNEMultiTreeDANI(a)0123456780500100015002000250030003500400045005000Time (sec)# CascadesNETINFMultiTreeDNEDANI(b)00.10.20.30.40.50.60.70.80.910500100015002000250030003500400045005000Pairwise F-measure (PWF)# CascadesNETINFMultiTreeDNEDANI(c)00.10.20.30.40.50.60.70.80.910500100015002000250030003500400F-measure# Cascades00.10.20.30.40.50.60.70.80.91501003005001000150020002500300040005000Normalized Mutual Information (NMI) # CascadesDNEMultiTreeNETINFDANI(d)00.050.10.150.20.250.30.350.40.450.51234567891011F-measureMonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.451234567891011Normalized Mutual Information (NMI) MonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.451234567891011pairwised F-measure (PWF)MonthsMultiTreeDNENETINFDANI010020030040050060070080090010002.86E+081.29E+092.29E+093.29E+09Time (sec) #Edges*#Cascades NETINFMultiTreeDANIDNE DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:21 Fig. 7. months. (Color online) Tests of the algorithms on News of the World dataset in 11 consecutive interval By checking the number and the length of cascades in these datasets, we concluded that the lengths of cascades are short in every month (Table II). Based on our experi- ments on a real network with artificial set of cascades (Fig. 8), NETINF and MultiTree accuracy are low in short cascade lengths, and their dependency on the length of cas- cades is greater than DANI. However, MultiTree serves better than NETINF in short cascades, and therefore performs better in real networks. On average, in LinkedIn network, DANI has 35.1% improvement in F-measure ver- sus NETINF, 34.3% versus MultiTree, and 10.0% versus DNE. Moreover, in News of the World network, this improvement is 77.91% against NETINF, 74.40% against Mul- tiTree, and 42.26% against DNE. Number of nodes:. Table III displays the behavior of these algorithms for the num- ber of detected nodes of the inferred networks. DNE can just retrieve a few set of nodes, and most of the links of the networks are not inferred. Although, NETINF and Multi- Tree are better than DNE in this regard, but their loss error is more than 20%. DANI infers the nodes with an accuracy close to 90%. In other words, DANI infers maximum number of nodes compare to the other methods. The results show that DANI is more capable in detecting nodes in the inference process, which has not been considered in prior works. Other network properties:. The relative error of network properties between the inferred and underlying network is illustrated in Table III. In most cases, DANI has much less error than baseline methods in term of nodes degree. In addition, the clus- tering coefficient metric is better maintained by DANI. Running time:. In order to have a fair comparison, we used the available C++ im- plementations in SNAP library [Leskovec 2014] for all prior algorithms, and imple- mented DANI in the same framework. We compared runtimes in the LFR-benchmark (Fig. 4) that showed DANI was several order of magnitude faster. In the NetScience dataset for different number of cascades, the run time is shown in Fig. 5. For running time in real data sets, similar to the approach used in [Alpay et al. 2011], we measured time versus number of cascades and links as shown in Figs. 6 and 7. On average, ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. 00.10.20.30.40.50.61234567891011F-measureMonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.450.51234567891011Normalized Mutual Information (NMI) MonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.450.51234567891011pairwised F-measure (PWF)MonthsMultiTreeDNENETINFDANI010002000300040005000600070002.86E+081.29E+092.29E+093.29E+09Time (sec) #Edges*#Cascades NETINFMultiTreeDANIDNE A:22 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi (Color online) The F-measure across different cascade lengths (in 350 cascades) for the Football dataset [Girvan and Newman 2002], with 115 nodes and 615 links. Fig. 8. DANI is 85.35% faster than NETINF, and 84.11% faster than Multitree. In general, the running time of algorithms is ordered as tN ET IN F (cid:31) tM ultiT ree (cid:31) tDAN I (cid:31) tDN E. In all cases, our method has lower run time than tree-based algorithms, and its speed is close to DNE. The running time performance must be analyzed against inference accuracy and preserving community structures. As illustrated, DANI achieves acceptable results with low running times, while other algorithms require higher running times to infer the networks with high accuracy. Evaluating the scalability:. As we already mentioned the time complexity of DANI depends on the number of users involved in cascades (nodes of network) which could be extremely large. Here, we demonstrate the scalability of DANI against the competing methods by showing the results on a real large scale network. In addition, parallel methods such as MapReduce can be used for making DANI even more scal- able, but to observe fairness, we did not utilized any of them here. We studied a large Twitter network that sampled public tweets from the Twitter streaming API in the range of 24 March to 25 April at 2012 [Weng et al. 2013]. By utilizing the follower network and hashtag retweeting, we did some preprocessing by: 1) Considering any unique pair of hashtag and source ID as a separate cascade, 2) Keeping links that were being involved in at least one cascade, 3) Choosing users taking part in more than 2 cascades, and 4) Removing nodes of cascade that were not a member of network nodes. The result was a network of 124023 nodes, 182783 links, and 213875 cascades with an average length of 2.29. While DANI correctly inferred 79.64% of the links in terms of F-measure during 1 hour and 4 minutes, the other three competing methods did not yield any reasonable results during this time period. 5.3.2. Preserving community structure:. One of the important properties of social net- works is their community structure and our goal in this paper is to preserve this prop- erty during the network inference process. To achieve this goal, the inferred network must have the same community structure as the underlying network. Therefore, the properties such as density, conductance, community size and number of communities are some important characteristics, which we considered in our evaluations. To detect communities in real and inferred networks, we reviewed different com- munity detection algorithms to find an algorithm which can work with a variety of networks such as directed and undirected, support overlapping communities, detect communities with high accuracy, not require prior knowledge about the number of output communities, and require low memory and time for a sparse graph. Finally, the OSLOM algorithm was chosen which meets the above requirements. OSLOM is ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. 0.30.40.50.60.70.80.9101234567891011F-measure Cascades Length NETINFDNEMultiTreeDANI DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:23 Fig. 9. numbers of cascades in the LFR-benchmark. Figures show averages over 10 runs. (Color online) Normalized mutual information versus different community structures for various the first algorithm that uses statistical features to identify the communities. To as- sess the accuracy, OSLOM uses local modularity measurement to avoid global errors [Lancichinetti et al. 2011]. NMI:. Fig. 9 illustrates the values of NMI on each inferred LFR-benchmark network with varying values for µ, and different number of cascades. As it can be observed, specially for fewer number of cascades, DANI performs perfectly. For higher number of cascades, the NMI values for DANI is closer to NMI of NETINF and MultiTree, while DNE has lower NMI values in all cases. Figs. 6 and 7 show the NMI values of all algorithms for real datasets. As illustrated in Fig. 5, for Netscience with artificial cascades, the running time of DANI is much lower, while its NMI is equal or more than NETINF. For the LinkedIn dataset, as a real network, on average DANI performs 24.09%, 89.98% and 23.89% better than NETINF, MultiTree and DNE, respectively. Our im- provements in News of the World dataset against NETINF, MultiTree, and DNE was ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. 00.010.020.030.040.050.060.070.080.090.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=100NETINFDNEMultiTreeDANI00.050.10.150.20.250.30.350.40.450.50.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=500NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=1000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.90.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=3000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.90.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=4000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.90.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=5000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=7000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=10000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=12000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=15000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=20000NETINFDNEMultiTreeDANI A:24 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi Table III. Difference of metrics between communities at inferred and original networks for real datasets. Values are averaged over different number of cascades for the NetScience dataset, and over different months for LinkedIn and News of the World. Variances are shown in parentheses. Dataset NetScience LinkedIn News of the World Total Metrics #Node Degree Clusteringcoeff Density #Community Conductance #Node Degree Clusteringcoeff Density #Community Conductance #Node Degree Clusteringcoeff Density #Community Conductance DNE 453.77 (210502.3) 0.583 (0.0498) 0.457 (0.0395) 0.0403 (0.0004) 0.477 (0.060) 0.00515 (0.00002) 109.73 (399.42) 0.747 (0.003) 0.0416 (0.0006) 0.24 (0.01) 0.21 (0.02) 0.04 (0.0007) 67.73 (2024.22) 0.888 (0.024) 0.12 (0.004) 0.315 (0.0193) 0.17 (0.01) 0.035 (0.0006) NETINF 445.41 (217805) 0.575 (0.0645) 0.487 (0.0418) 0.0401 (0.0003) 0.460 (0.076) 0.00703 (0.00004) 53.64 (79.25) 0.807 (0.001) 0.0757 (0.0018) 0.10 (0.006) 0.45 (0.30) 0.03 (0.0003) 25.64 (305.25) 0.925 (0.016) 0.09 (0.004) 0.124 (0.005) 0.29 (0.02) 0.029 (0.0007) DANI 445.41 (217805) 0.529 (0.0714) 0.359 (0.0733) 0.0232 (0.0002) 0.404 (0.093) 0.00786 (0.00006) 8.91 (19.70) 0.712 (0.002) 0.0643 (0.0004) 0.05 (0.002) 0.30 (0.08) 0.02 (0.0004) 3.91 (11.49) 0.688 (0.007) 0.09 (0.001) 0.107 (0.003) 0.16 (0.01) 0.029 (0.0006) MultiTree 445.41 (217805) 0.569 (0.064) 0.478 (0.0418) 0.0433 (0.0006) 0.474 (0.069) 0.00511 (0.00003) 54.18 (95.36) 0.805 (0.001) 0.0772 (0.0018) 0.09 (0.003) 0.38 (0.03) 0.02 (0.0003) 26.00 (302) 0.918 (0.015) 0.09 (0.004) 0.134 (0.007) 0.30 (0.03) 0.038 (0.0012) 14.48%, 94.83%, and 15.84%, respectively. The differences between inferred and original networks, based on the criteria of Subsection 5.1 is listed in Table III. As the results show, DANI has the closest values to the original network which indicates its capabil- ity in preserving the community structures. PWF:. For the NetScience dataset, DANI achieves higher PWF compared to the other methods at all number of cascades smaller than 5000. For the LinkedIn network, on average DANI achieves 67.72%, 73.30% and 29.08% improvement in PWF against NETINF, MultiTree and DNE, respectively. Moreover, for News of the World, on aver- age DANI achieves 31.29%, 35.57% and 19.94% improvement against NETINF, Multi- Tree and DNE, respectively. Density:. The inferred network by DNE has a high density which is very differ- ent from the underlying network. However, NETINF, MultiTree and DANI achieve a density similar to the underlying network, while DANI performs better than the com- peting algorithms. Conductance:. The conductance of all competing algorithms are similar. Consider- ing the average and variance of all intervals in one year, DANI performs marginally better than other methods for all datasets. Number of communities:. For this metric, DANI achieved the best performance in detecting the number of communities for the inferred network compared to the original network. 6. CONCLUSION Many works have been done to infer networks by using information diffusion, but they often neglect preserving the features of underlying networks. Community structure is one of the most important features in social networks and community detection algorithms need the network topology to extract their communities. Therefore, these algorithms cannot be applied on networks derived by the previous proposed network inference methods. In this paper, we introduced a new algorithm to infer networks which maintains the community structure. To verify this claim, we applied the proposed (DANI), NET- ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:25 INF, DNE, and MultiTree methods to real and artificial networks, and compared the community structure of original and inferred networks with each other. Moreover, we utilized some of the main community structure metrics to evaluate the inferred net- works by different methods. The results showed that our algorithm accurately infers networks while preserving the community structures. In addition, DANI consumed less time to achieve the same or higher accuracy than the competing methods. Another advantage of the proposed method is the fact that its performance is independent of the length of cascades. As a future work, we are trying to detect communities just based on diffusion in- formation without the need for inferring networks. In other words, we try to find the community of each node only based on the diffusion process. REFERENCES Altan Alpay, Deniz Demir, and Jie Yang. 2011. FASTINF: A Fast Algorithm to Infer Social Networks from Cascades. (2011). http://snap.stanford.edu/class/cs224w-2011/proj/jieyang Finalwriteup v3.pdf Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012. The Role of Social Networks in Information Diffusion. In Proceedings of the 21st International Conference on World Wide Web (WWW '12). ACM, New York, NY, USA, 519–528. Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2013a. Cascade-based community detection. In WSDM, Stefano Leonardi, Alessandro Panconesi, Paolo Ferragina, and Aristides Gionis (Eds.). ACM, 33–42. Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2013b. Influence-Based Network-Oblivious Com- munity Detection. In ICDM. 955–960. S.Y. Bhat and M. Abulaish. 2013. Overlapping Social Network Communities and Viral Marketing. In Com- putational and Business Intelligence (ISCBI), 2013 International Symposium on. 243–246. Paolo Boldi and Massimo Santini. 2010. Compressing Social Networks by Community Detection. Technical Report RI-DSI 330-10. Dipartimento di Scienze dellInformazione. Weidong Chen. 2011. Discovering communities by information diffusion. In Fuzzy Systems and Knowledge Discovery (FSKD), 2011 Eighth International Conference on, Vol. 2. 1123–1132. Wei Chen, Yifei Yuan, and Li Zhang. 2010. Scalable influence maximization in social networks under the linear threshold model. In Data Mining (ICDM), 2010 IEEE 10th International Conference on. IEEE, 88–97. Xiaojie Chen, Feng Fu, and Long Wang. 2007. Prisoner's Dilemma on community networks. Physica A: Statistical Mechanics and its Applications 378, 2 (May 2007), 512–518. L. F. Costa. 2004. Hub-Based Community Finding. (2004). (unpublished). Nan Du, Bin Wu, Xin Pei, Bai Wang, and Liutong Xu. 2007. Community Detection in Large-scale Social Networks. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis (WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 16–25. J. Duch and A. Arenas. 2005. Community detection in complex networks using Extremal Optimization. D. Easley and J. Kleinberg. 2010. Networks, Crowds, and Markets: Reasoning About a Highly Connected Physical Review E 72 (2005), 027104. World. Cambridge University Press. Milad Eftekhar, Yashar Ganjali, and Nick Koudas. 2013. Information Cascade at Group Scale. In Proceed- ings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '13). ACM, New York, NY, USA, 401–409. Motahhare Eslami, Hamid R. Rabiee, and Mostafa Salehi. 2011. DNE: A Method for Extracting Cascaded Diffusion Networks from Social Networks. In SocialCom/PASSAT. IEEE, 41–48. Santo Fortunato. 2010. Community detection in graphs. Physics Reports 486 (2010), 75–174. M. Girvan and M. E. J. Newman. 2002. Community structure in social and biological networks. Proceedings of the National Academy of Sciences 99, 12 (2002), 7821–7826. Jacob Goldenberg, Barak Libai, and Eitan Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters 12 (2001), 211–223. Manuel Gomez-Rodriguez, David Balduzzi, and Bernhard Schlkopf. 2011. Uncovering the Temporal Dynam- ics of Diffusion Networks. In Twenty-eighth International Conference on Machine Learning, Bellevue, Washington, Lise Getoor and Tobias Scheffer (Eds.). Omnipress, 561–568. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. A:26 M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi Manuel Gomez Rodriguez, Jure Leskovec, and Andreas Krause. 2010. Inferring Networks of Diffusion and Influence. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '10). ACM, New York, NY, USA, 1019–1028. Manuel Gomez-Rodriguez, Jure Leskovec, and Bernhard Schlkopf. 2013. Structure and dynamics of infor- mation pathways in online media. In WSDM, Stefano Leonardi, Alessandro Panconesi, Paolo Ferragina, and Aristides Gionis (Eds.). ACM, 23–32. Manuel Gomez-Rodriguez and Bernhard Scholkopf. 2012. Submodular Inference of Diffusion Networks from Multiple Trees. In Proceedings of the 29th International Conference on Machine Learning. Omnipress, New York, NY, USA, 489–496. Adrien Guille, Hakim Hacid, Ccile Favre, and Djamel A. Zighed. 2013. Information diffusion in online social networks: a survey. SIGMOD Record 42, 2 (2013), 17–28. Jeffrey Heer and Danah Boyd. 2005. Vizster: Visualizing Online Social Networks. In INFOVIS '05: Proceed- ings of the Proceedings of the 2005 IEEE Symposium on Information Visualization. IEEE Computer Society, Washington, DC, USA, 5. Paul Jaccard. 1901. ´Etude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin del la Soci´et´e Vaudoise des Sciences Naturelles 37 (1901), 547–579. David Kempe, Jon Kleinberg, and Eva Tardos. 2003. Maximizing the spread of influence through a social network. In KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM Press, 137–146. Andrea Lancichinetti and Santo Fortunato. 2009. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Physical Review E 80, 1 (jul 2009), 016118. Andrea Lancichinetti, Santo Fortunato, and J´anos Kert´esz. 2009. Detecting the overlapping and hierarchical community structure in complex networks. New Journal of Physics 11 (mar 2009), 033015. Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark graphs for testing commu- nity detection algorithms. Physical Review E 78, 4 (2008), 046110. Andrea Lancichinetti, Filippo Radicchi, Jos´e J Ramasco, and Santo Fortunato. 2011. Finding statistically significant communities in networks. PloS one 6, 4 (2011), e18961. Jure Leskovec. 2013. INFOPATH supporting website. (2013). http://snap.stanford.edu/infopath/graphs.html Jure Leskovec. 2014. SNAP: A general purpose network analysis and graph mining library in C++. (2014). http://snap.stanford.edu/snap/ Jure Leskovec, Lada A. Adamic, and Bernardo A. Huberman. 2007. The Dynamics of Viral Marketing. ACM Transactions on the Web (TWEB) 1, 1 (2007), 5. Jure Leskovec, Lars Backstrom, and Jon Kleinberg. 2008a. MemeTracker: tracking news phrases over the web. (2008). http://memetracker.org/ Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney. 2008b. Statistical properties of community structure in large social and information networks. In WWW '08: Proceeding of the 17th international conference on World Wide Web. ACM, New York, NY, USA, 695–704. Jure Leskovec, Ajit Singh, and Jon Kleinberg. 2006. Patterns of Influence in a Recommendation Network. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Springer Berlin Heidel- berg, 380–389. Ian XY Leung, Pan Hui, Pietro Lio, and Jon Crowcroft. 2009. Towards real-time community detection in large networks. Physical Review E 79, 6 (2009), 066107. David Asher Levin, Yuval Peres, and Elizabeth Lee Wilmer. 2009. Markov chains and mixing times. Ameri- can Mathematical Soc. J. Makhoul, F. Kubala, R. Schwartz, and R. Weischedel. 1999. Performance Measures For Information Ex- traction. In Proceedings of the DARPA Broadcast News Workshop. 249–252. R. Dean Malmgren, Daniel B. Stouffer, Adilson E. Motter, and Lu´ıs A. N. Amaral. 2008. A Poissonian expla- nation for heavy tails in e-mail communication. Proceedings of the National Academy of Sciences 105, 47 (Nov 2008), 18153–18158. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schtze. 2008. Introduction to Information Re- trieval. Cambridge University Press, Cambridge, UK. Aaron F. McDaid, Derek Greene, and Neil J. Hurley. 2011. Normalized Mutual Information to evaluate overlapping community finding algorithms. CoRR abs/1110.2515 (2011). Seth A. Myers and Jure Leskovec. 2010. On the Convexity of Latent Social Network Inference. In NIPS, John D. Lafferty, Christopher K. I. Williams, John Shawe-Taylor, Richard S. Zemel, and Aron Culotta (Eds.). Curran Associates, Inc., 1741–1749. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY. DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm A:27 M E Newman. 2006a. Modularity and community structure in networks. Proc Natl Acad Sci U S A 103, 23 (Jun 2006), 8577–8582. M. E. J. Newman. 2006b. Finding community structure in networks using the eigenvectors of matrices. Physical Review E 74, 3 (2006), 036104. Guo-Jun Qi, Charu C. Aggarwal, and Thomas S. Huang. 2012. Community Detection with Edge Content in Social Media Networks. In ICDE, Anastasios Kementsietsidis and Marcos Antonio Vaz Salles (Eds.). IEEE Computer Society, 534–545. Usha Nandini RAGHAVAN, R´eka ALBERT, and Soundar KUMARA. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical Review. E, Statistical, nonlinear, and soft matter physics 76, 3 (2007). Shaghayegh Sahebi and William Cohen. 2011. Community-based recommendations: a solution to the cold start problem. In Workshop on Recommender Systems and the Social Web, RSWEB. Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. 2008. Prediction of Information Diffusion Probabili- ties for Independent Cascade Model. In KES (3), Ignac Lovrek, Robert J. Howlett, and Lakhmi C. Jain (Eds.), Vol. 5179. Springer, 67–75. Jerry Scripps, Pang-Ning Tan, and Abdol-Hossein Esfahanian. 2007. Node roles and community structure in networks. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis (WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 26–35. Keyi Shen, Li Song, Xiaokang Yang, and Wenjun Zhang. 2010. A Hierarchical Diffusion Algorithm for Com- munity Detection in Social Networks. 2013 International Conference on Cyber-Enabled Distributed Com- puting and Knowledge Discovery 0 (2010), 276–283. Mahadevan Vasudevan and Narsingh Deo. 2010. Community Identification Algorithm using Relative edge density measure. Congressus Numeratium 204 (2010), 147–160. Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. 2013. Virality prediction and community structure in social networks. Scientific reports 3 (2013). Jierui Xie, Stephen Kelley, and Boleslaw K. Szymanski. 2013. Overlapping Community Detection in Net- works: the State of the Art and Comparative Study. ACM Computing Surveys (CSUR) 45, 4 (2013), 43:1–43:35. Bo Yang, Jing Huang, Dayou Liu, and Jiming Liu. 2009a. A Multi-Agent Based Decentralized Algorithm for Social Network Community Mining. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 0 (2009), 78–82. Jaewon Yang and Jure Leskovec. 2012. Community-Affiliation Graph Model for Overlapping Network Com- munity Detection. In ICDM, Mohammed Javeed Zaki, Arno Siebes, Jeffrey Xu Yu, Bart Goethals, Geof- frey I. Webb, and Xindong Wu (Eds.). IEEE Computer Society, 1170–1175. Tianbao Yang, Rong Jin, Yun Chi, and Shenghuo Zhu. 2009b. A Bayesian Framework for Community De- tection Integrating Content and Link. In Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. 615–622. Ming Zhong, Cao Zhong, and others. 2008. TopSeer: A Novel Scholar Search Engine based on Community Detection in Citation Network. In 11th Joint International Conference on Information Sciences. Atlantis Press. ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
1804.03665
3
1804
2019-07-25T14:37:04
An information-theoretic, all-scales approach to comparing networks
[ "cs.SI", "cs.IT", "cs.IT", "physics.data-an", "physics.soc-ph" ]
As network research becomes more sophisticated, it is more common than ever for researchers to find themselves not studying a single network but needing to analyze sets of networks. An important task when working with sets of networks is network comparison, developing a similarity or distance measure between networks so that meaningful comparisons can be drawn. The best means to accomplish this task remains an open area of research. Here we introduce a new measure to compare networks, the Network Portrait Divergence, that is mathematically principled, incorporates the topological characteristics of networks at all structural scales, and is general-purpose and applicable to all types of networks. An important feature of our measure that enables many of its useful properties is that it is based on a graph invariant, the network portrait. We test our measure on both synthetic graphs and real world networks taken from protein interaction data, neuroscience, and computational social science applications. The Network Portrait Divergence reveals important characteristics of multilayer and temporal networks extracted from data.
cs.SI
cs
An information-theoretic, all-scales approach to comparing networks James P. Bagrow1,2,* and Erik M. Bollt3 1Department of Mathematics & Statistics, University of Vermont, Burlington, VT, United States 2Vermont Complex Systems Center, University of Vermont, Burlington, VT, United States 3Department of Mathematics, Clarkson University, Potsdam, NY, United States *Corresponding author. Email: [email protected], Homepage: bagrow.com July 25, 2019 Abstract As network research becomes more sophisticated, it is more common than ever for researchers to find themselves not studying a single network but needing to analyze sets of networks. An important task when working with sets of networks is network comparison, developing a sim- ilarity or distance measure between networks so that meaningful comparisons can be drawn. The best means to accomplish this task remains an open area of research. Here we introduce a new measure to compare networks, the Network Portrait Divergence, that is mathematically principled, incorporates the topological characteristics of networks at all structural scales, and is general-purpose and applicable to all types of networks. An important feature of our measure that enables many of its useful properties is that it is based on a graph invariant, the network portrait. We test our measure on both synthetic graphs and real world networks taken from protein interaction data, neuroscience, and computational social science applications. The Network Portrait Divergence reveals important characteristics of multilayer and temporal networks extracted from data. Keywords -- network comparison; graph similarity; multilayer networks; temporal networks; weighted networks; network portraits; GitHub; Arabidopsis; C. Elegans connectome. Code -- https://github.com/bagrow/network-portrait-divergence 1 Introduction Recent years have seen an explosion in the breadth and depth of network data across a variety of scientific domains [1, 2, 3]. This scope of data challenges researchers, and new tools and techniques are necessary 1 for evaluating and understanding networks. It is now increasingly common to deal with multiple networks at once, from brain networks taken from multiple subjects or across longitudinal studies [4], to multilayer networks extracted from high-throughput experiments [5], to rapidly evolving social network data [6, 7, 8]. A common task researchers working in these areas will face is comparing networks, quantifying the similarities and differences between networks in a meaningful manner. Applications for network comparison include comparing brain networks for different subjects, or the same subject before and after a treatment, studying the evolution of temporal networks [9], classifying proteins and other sequences [10, 11, 12], classifying online social networks [11], or evaluating the accuracy of statistical or generative network models [13]. Combined with a clustering algorithm, a network comparison measure can be used to aggregate networks in a meaningful way, for coarse-graining data and revealing redundancy in multilayer networks [5]. Treating a network comparison measure as an objective function, optimization methods can be used to fit network models to data. Approaches to network comparison can be roughly divided into two groups, those that consider or require two graphs defined on the same set of nodes, and those that do not. The former eliminates the need to discover a mapping between node sets, making comparison somewhat easier. Yet, two networks with identical topologies may have no nodes or edges in common simply because they are defined on different sets of nodes. While there are scenarios where assuming the same node sets is appropriate -- for example, when comparing the different layers of a multilayer network one wants to capture explicitly the correspondences of nodes between layers [5] -- here we wish to relax this assumption and allow for comparison without node correspondence, where no nodes are necessarily shared between the networks. A common approach for comparison without assuming node correspondence is to build a comparison measure using a graph invariant. Graph invariants are properties of a graph that hold for all isomorphs of the graph. Using an invariant mitigates any concerns with the encoding or structural representation of the graphs, and the comparison measure is instead focused entirely on the topology of the network. Graph invariants may be probability distributions. Suppose P and Q represent two graph-invariant distributions corresponding to graphs G1 and G2, respectively. Then, a common approach to comparing G1 and G2 is by comparing P and 2 Q. Information theory provides tools for comparing distributions, such as the Jensen-Shannon divergence: DJS(P, Q) = 1 2 KL(P M) + KL(Q M) 1 2 (1) where KL(P Q) is the Kullback-Leibler (KL) divergence (or relative entropy) between P and Q and M = (P + Q)/2 is the mixture distribution of P and Q. The Jensen-Shannon divergence has a number of nice properties, including that it is symmetric and normalized, making it a popular choice for applications such as ours [14, 15]. In this work, we introduce a novel graph-invariant distribution that is general and free of assumptions and we can then use common information-theoretic divergences such as Jensen-Shannon to compare networks via these graph invariants. The rest of this paper is organized as follows. In Sec. 2 we describe network portraits [16], a graph invariant matrix representation of a network that is useful for visualization purposes but also capable of comparing pairs of networks. Section 3 introduces Network Portrait Divergences, a principled information- theoretic measure for comparing networks, building graph-invariant distributions using the information contained within portraits. Network Portrait Divergence has a number of desirable properties for a network comparison measure. In Sec. 4 we apply this measure to both synthetic networks (random graph ensembles) and real-world datasets (multilayer biological and temporal social networks), demonstrating its effectiveness on practical problems of interest. Lastly, we conclude in Sec. 5 with a discussion of our results and future work. 2 Network portraits Network portraits were introduced in [16] as a way to visualize and encode many structural properties of a given network. Specifically, the network portrait B is the array with ((cid:96), k) elements B(cid:96),k ≡ the number of nodes who have k nodes at distance (cid:96) (2) 3 Figure 1: Example networks and their portraits. The random network is an Erdős-Rényi graph while the real network is the NCAA Division-I football network [17]. Colors denote the entries of the portrait matrix B (Eq. (2); white indicates B(cid:96),k = 0). for 0 ≤ (cid:96) ≤ d and 0 ≤ k ≤ N − 1, where distance is taken as the shortest path length and d is the graph's diameter 1. The elements of this array are computed using, e.g., Breadth-First Search. Crucially, no matter how a graph's nodes are ordered or labeled the portrait is identical. We draw several example networks and their corresponding portraits in Fig. 1. This matrix encodes many structural features of the graph. The zeroth row stores the number of nodes N in the graph: The first row captures the degree distribution P(k): B0,k = Nδk,1. B1,k = NP(k), 1Note that a distance (cid:96) = 0 is admissible, with two nodes i and j at distance 0 when i = j. This means that the matrix B so defined has a zeroth row. It also has a zeroth column, as there may be nodes that have zero nodes at some distance (cid:96). This occurs for nodes with eccentricity less than the graph diameter. 4 KentOhioStateMichiganWesternMichiganPennStateWisconsinBowlingGreenStateOhioPurdueMichiganStateNorthernIllinoisTempleNavyBallStateSyracuseVirginiaTechEasternMichiganBostonCollegeWestVirginiaNorthCarolinaMiamiOhioCentralMichiganMiamiFloridaMarshallAkronRutgersPittsburghBuffaloNorthwesternToledoIndianaIowaStateBrighamYoungSouthernMethodistFresnoStateHawaiiMiddleTennesseeStateConnecticutNorthCarolinaStateDukeCentralFloridaArmyCincinnatiMississippiMemphisLouisianaStateMississippiStateAlabamaBirminghamSouthernMississippiArkansasSouthCarolinaLouisvilleTennesseeKentuckyFloridaGeorgiaGeorgiaTechFloridaStateVirginiaClemsonWakeForestVanderbiltEastCarolinaMarylandAuburnLouisianaMonroeAlabamaHoustonTulaneNotreDameLouisianaTechTulsaMissouriIowaIllinoisMinnesotaTexasChristianColoradoNevadaNewMexicoSanDiegoStateColoradoStateUtahNebraskaTexasA&MTexasElPasoTexasTechNorthTexasOklahomaTexasUtahStateNevadaLasVegasBaylorKansasOklahomaStateBoiseStateWyomingRiceUCLAAirForceArkansasStateIdahoKansasStateSanJoseStateNewMexicoStateLouisianaLafayetteSouthernCaliforniaWashingtonStateArizonaStateStanfordArizonaOregonStateOregonWashingtonCalifornia as neighbors are at distance (cid:96) = 1. The second row captures the distribution of next-nearest neighbors, and so forth for higher rows. The number of edges M isN k=0 kB1,k = 2M. The graph diameter d is d = max{(cid:96) B(cid:96),k > 0 for k > 0}. N The shortest path distribution is also captured: the number of shortest paths of length (cid:96) is 1 k=0 kB(cid:96),k. 2 And the portraits of random graphs present very differently from highly ordered structures such as lattices (Fig. 1), demonstrating how dimensionality and regularity of the network is captured in the portrait [16]. One of the most important properties of portraits is that they are a graph invariant: Definition 2.1. A graph invariant is a property of a graph that is invariant under graph isomorphism, i.e., it is a function f such that f (G) = f (H) whenever G and H are isomorphic graphs. Theorem 2.1. The network portrait (Eq. (2)) is a graph invariant. Proof. Let f : VG → VH be a vertex bijection between two graphs G = (VG, EG) and H = (VH, EH) such that the number of edges between every pair of vertices (i, j) in G equals the number of edges between their images ( f (i), f (j)) in H. Then G and H are isomorphic. Let (cid:96)G(i, j) be the length of the shortest path between nodes i and j in G. For two isomorphic graphs G and H, (cid:96)G(i, j) = (cid:96)H( f (i), f (j)) for all i and j in G, since the shortest path tuples (i, . . . , j) in G and ( f (i), . . . , f (j)) in H are the same length. All elements in the matrix B(G) are computed by aggregating the values of (cid:96)G(i, j). Therefore, B(G) = B(H). (cid:3) Note that the converse is not necessarily true: that f (G) = f (H) does not imply that G and H are isomorphic. As a counter-example, the non-isomorphic distance-regular dodecahedral and Desargues graphs have equal portraits [16]. Portraits of weighted networks The original work defining network portraits [16] did not consider weighted networks, where a scalar quantity wi j is associated with each (i, j) ∈ E. An important consideration is that path lengths for weighted networks are generally computed by summing edge weights along a path, leading to path lengths (cid:96) ∈ R (typically) instead of path lengths (cid:96) ∈ Z. To address this, in the Appendix (App. A) we generalize the portrait to weighted networks, specifically accounting for how real-valued path lengths must change the definition of the matrix B. 5 k (cid:44) N j=0 j=0 2.1 Comparing networks by comparing portraits Given that a graph G admits a unique B-matrix makes these portraits a valuable tool for network comparison. Instead of directly comparing graphs G and G(cid:48), we may compute their portraits B and B(cid:48), respectively, and then compare these matrices. We review the comparison method in our previous work [16]. First, compute for each portrait B the matrix C consisting of row-wise cumulative distributions of B: C(cid:96),k = B(cid:96), j B(cid:96), j . (3) The row-wise Kolmogorov-Smirnov test statistic K(cid:96) between corresponding rows (cid:96) in C and C(cid:48): (cid:12)(cid:12)(cid:12)C(cid:96),k − C(cid:48) (cid:96),k (cid:12)(cid:12)(cid:12) K(cid:96) = max allows a metric-like graph comparison. This statistic defines a two-sample hypothesis test for whether or not the corresponding rows of the portraits are drawn from the same underlying, unspecified distribution. If the two graphs have different diameters, the portrait for the smaller diameter graph can be expanded to the same size as the larger diameter graph by defining empty shells (cid:96) > d as B(cid:96),k = Nδ0,k. Lastly, aggregate the test statistics for all pairs of rows using a weighted average to define the similarity ∆(G, G(cid:48)) between G and G(cid:48): ∆(G, G(cid:48)) ≡ ∆(B, B(cid:48)) = (cid:96) α(cid:96)K(cid:96) (cid:96) α(cid:96)   B(cid:96),k + B(cid:48) (cid:96),k k>0 where α(cid:96) = k>0 , (4) (5) is a weight chosen to increase the impact of the lower, more heavily occupied shells. While we did develop a metric-like quantity for comparing graphs based on the KS-statistics (Eqs. (4) and (5)), we did not emphasize the idea. Instead, the main focus of the original portraits paper was on the use of the portrait for visualization. In particular, Eq. (4) is somewhat ad hoc. Here we now propose a stronger means of comparison using network portraits that is interpretable and grounded in information theory. 6 3 An information-theoretic approach to network comparison Here we introduce a new way of comparing networks based on portraits. This measure is grounded in information theory, unlike the previous, ad hoc comparison measure, and has a number of other desirable attributes we discuss below. The rows of B may be interpreted as probability distributions: P(k (cid:96)) = 1 N B(cid:96),k (6) is the (empirical) probability that a randomly chosen node will have k nodes at distance (cid:96). This invites an immediate comparison per row for two portraits: KL(P(k (cid:96)) Q(k (cid:96))) = P(k (cid:96)) log P(k (cid:96)) Q(k (cid:96)), (7) k where KL(p q) is the Kullback-Liebler (KL) divergence between two distributions p and q, and Q is defined as per Eq. (6) for the second portrait (i.e., Q(k (cid:96)) = 1 (cid:96),k). The KL-divergence admits an information-theoretic interpretation that describes how many extra bits are needed to encode values drawn N(cid:48) B(cid:48) from the distribution P if we used the distribution Q to develop the encoding instead of P. However, while this seems like an appropriate starting point for defining a network comparison, Eq. (7) has some drawbacks: 1. KL(P(k) Q(k)) is undefined if there exists a value of k such that P(k) > 0 and Q(k) = 0. Given that rows of the portraits are computed from individual networks, which may have small numbers of nodes, this is likely to happen often in practical use. 2. The KL-divergence is not symmetric and does not define a distance. 3. Defining a divergence for each pair of rows of the two matrices gives max(d, d(cid:48)) + 1 separate divergences, where d and d(cid:48) are the diameters of G and G(cid:48), respectively. To define a scalar comparison value (a similarity or distance measure) requires an appropriate aggregation of these values, just like the original approach proposed in [16]; we return to this point below. The first two drawbacks can be addressed by moving away from the KL-divergence and instead using, e.g., the 7  c n2 N2 , c Jensen-Shannon divergence or Hellinger distance. However, the last concern, aggregating over max(d, d(cid:48))+1 difference quantities, remains for those measures as well. Given these concerns, we propose the following, utilizing the shortest path distribution encoded by the network portraits. Consider choosing two nodes uniformly at random with replacement. The probability that they are connected is where nc is the number of nodes within connected component c, the sum connected components, and the nc satisfy c runs over the number of c nc = N. Likewise, the probability the two nodes are at a c n2 (8) distance (cid:96) from one another is # paths of length (cid:96) # paths = 1(cid:0) c n2 c (cid:1) N k=0 kB(cid:96),k . Lastly, the probability that one of the two nodes has k − 1 other nodes at distance (cid:96) is given by  kB(cid:96),k k(cid:48) k(cid:48)B(cid:96),k(cid:48) . (9) (10) We propose to combine these probabilities into a single distribution that encompasses the distances between nodes weighted by the "masses" or prevalences of other nodes at those distance, giving us the probability for choosing a pair of nodes at distance (cid:96) and for one of the two randomly chosen nodes to have k nodes at that distance (cid:96): P(k, (cid:96)) =  c n2 N2 c  kB(cid:96),k k(cid:48) k(cid:48)B(cid:96),k(cid:48) = kB(cid:96),k N2 c c n2 k(cid:48) k(cid:48)B(cid:96),k(cid:48)   kB(cid:96),k =   n2 c (cid:44) N2 and likewise for Q(k, (cid:96)) using B(cid:48) instead of B. However, this distribution is not normalized (11) (12) unless the graph G is connected. It will be advantageous for this distribution to be normalized in all instances, k (cid:96) c 8 therefore, we condition this distribution on the two randomly chosen nodes being connected:   P(k, (cid:96)) =  k(cid:48) k(cid:48)B(cid:96),k(cid:48) c n2 c kB(cid:96),k k(cid:48) k(cid:48)B(cid:96),k(cid:48) = kB(cid:96),k c n2 c . (13) This now defines a single (joint) distribution P (Q) for all rows of B (B(cid:48)) which can then be used to define a single KL-divergence between two portraits: max(d,d(cid:48)) N KL(P(k, (cid:96)) Q(k, (cid:96))) = P(k, (cid:96)) log P(k, (cid:96)) Q(k, (cid:96)) (14) where the log is base 2. (cid:96)=0 k=0 Definition 3.1. The Network Portrait Divergence DJS(G, G(cid:48)) between two graphs G and G(cid:48) is the Jensen- Shannon divergence as follows, DJS(G, G(cid:48)) ≡ 1 2 KL(P M) + KL(Q M) 1 2 (15) 2 (P + Q) is the mixture distribution of P and Q. Here P and Q are defined by Eq. (13), and the where M = 1 KL(· ·) is given by Eq. (14). The Network Portrait Divergence 0 ≤ DJS ≤ 1 provides a single value to quantify the dissimilarity of the two networks by means of their distance distributions, with smaller DJS for more similar networks and larger DJS for less similar networks. Unlike the KL divergence, DJS is symmetric, DJS(G, G(cid:48)) = DJS(G(cid:48), G) and DJS is a metric [18]. √ The Network Portrait Divergence has a number of desirable properties2. It is grounded in information theory, which provides principled interpretation of the divergence measure. It compares networks based entirely on the structure of their respective topologies: the measure is independent of how the nodes in the network are indexed and, further, does not assume the networks are defined on the same set of nodes. Network Portrait Divergence is relatively computationally efficient; unlike graph edit distance measures, for example, because Network Portrait Divergence is based on a graph invariant and expensive optimizations such as "node matching" are not needed. Both undirected and directed networks are treated naturally, and 2Code implementing Network Portrait Divergence is available at https://github.com/bagrow/network-portrait-divergence. 9 disconnected networks can be handled without any special problems. Using the generalization of network portraits to weighted networks (see App. A), the Network Portrait Divergence can also be used to compare weighted networks. Lastly, all scales of structure within the two networks contribute simultaneously to the Network Portrait Divergence via the joint neighbor-shortest path length distribution (Eq. (13)), from local structure to motifs to the large scale connectivity patterns of the two networks. 4 Results Now we explore the use of the Network Portrait Divergence (Definition 3.1) to compare networks across a variety of applications. We study both synthetic example graphs, to benchmark the behavior of the comparison measure under idealized conditions. Then real world network examples are presented to better capture the types of comparison tasks researchers may encounter. 4.1 Synthetic networks To understand the performance of the Network Portrait Divergence, we begin here by examining how it relates different realizations of the following synthetic graphs: 1. Erdős-Rényi (ER) graphs G(N, p) [19], the random graph on N nodes where each possible edge exists independently with constant probability p; 2. Barabási-Albert (BA) graphs G(N, m) [20], where N nodes are added sequentially to a seed graph and each new node attaches to m existing nodes according to preferential attachment. Figure 2 shows the distributions of DJS for different realizations of ER and BA graphs with the same parameters, as well as the cross-comparison distribution using DJS to compare one realization of an ER graph with one realization of a BA graph where both graphs have the same average degree (cid:104)k(cid:105) but other parameters may vary. Overall we note that realizations drawn from the same ensemble have relatively small Network Portrait Divergence, with ER falling roughly in the range 0 < DJS < 0.5 and BA between 0.1 < DJS < 0.4 (both smaller than the max(DJS) = 1). In contrast, DJS is far higher when comparing one ER to one BA graph, with DJS > 0.6 in our simulations. The Network Portrait Divergence captures the smaller differences between different realizations of a single networks ensemble with correspondingly smaller values of DJS 10 Figure 2: Comparing network models. As a simple starting point, here we compare pairs of Erdős-Rényi (ER) realizations with the same parameters, pairs of Barabási-Albert (BA) realizations with the same parameters, and pairs of one ER graph versus one BA graph (but with the same number of nodes and average degree). For these examples, Network Portrait Divergence has high discriminative power. while the larger differences between networks from different ensembles are captured with larger values of DJS. 4.2 Measuring network perturbations with Network Portrait Divergence Next, we ask how well the Network Portrait Divergence measures the effects of network perturbations. We performed two kinds of rewiring perturbations to the links of a given graph G: (i) random rewiring, where each perturbation consists of deleting an existing link chosen uniformly at random and inserting a link between two nodes chosen uniformly at random; and (ii) degree-preserving rewirings [21], where each perturbation consists of removing a randomly chosen pair of links (i, j) and (u, v) and inserting links (i, u) and (j, v). The links (i, j) and (u, v) are chosen such that (i, u) (cid:60) E and (j, v) (cid:60) E, ensuring that the degrees of the nodes are constant under the rewiring. We expect that random rewirings will lead to a stronger change in the network than the degree-preserving rewiring. To test this, we generate an ER or BA graph G, apply a fixed number n of rewirings to a copy of G, and use the Network Portrait Divergence to compare the networks before and after rewirings. Figure 3 shows how DJS changes on average as a function of the number of rewirings, for both types of rewirings and both ER and BA graphs. The Network Portrait Divergence increases with n, as expected. Interestingly, below n ≈ 100 rewirings, the different types of rewirings are indistinguishable, but for n > 100 we see that 11 0.00.20.40.60.81.0Network Portrait Divergence DJS0246810121416Prob. densityCompare ER graphsCompare BA graphsER vs. BA graphs (same k) Figure 3: Expected Network Portrait Divergence between an unmodified graph and a copy perturbed by edge rewiring. (left) Erdős-Rényi graph (N = 300, p = 3/299); (right) Barabási-Albert graph (N = 300, m = 3). A random rewiring is the deletion of an edge chosen uniformly at random followed by the insertion of a new edge between two nodes chosen uniformly at random. Degree-preserving rewiring chooses a pair of edges (u, v) and (x, y) and rewires them across nodes to (u, x) and (v, y) such that the degrees of the chosen nodes remain unchanged [21]. Errorbars denote ± 1 s.d. random rewirings lead to a larger divergence from the original graph than degree-preserving rewirings. This is especially evident for BA graphs, where the scale-free degree distribution is more heavily impacted by the random rewiring than for ER graphs. The overall DJS is also higher in value for BA graphs than ER graphs. This is plausible because the ER graph is already maximally random, whereas many correlated structures exist in a random realization of the BA graph model that can be destroyed by perturbations [22]. 4.3 Comparing real networks We now apply the Network Portrait Divergence to real world networks, to evaluate its performance when used for several common network comparison tasks. Specifically, we study two real-world multiplex networks, using DJS to compare across the layers of these networks. We also apply DJS to a temporal network, measuring how the network changes over time. This last network has associated edge weights, and we consider it as both an unweighted and a weighted network. The datasets for the three real-world networks we study are as follows: Arabidopsis GPI network The Genetic and Protein Interaction (GPI) network of Arabidopsis Thaliana 12 100101102103Number of rewirings0.10.20.30.40.50.60.7DJSErdsRényiRandom rewiringDegree-preserving rewiring100101102103Number of rewiringsBarabásiAlbert taken from BioGRID 3.2.108 [23, 5]. This network consists of 6,980 nodes representing proteins and 18,654 links spread across seven multiplex layers. These layers represent different interaction modes from direct interaction of protein and physical associations of proteins within complexes to suppressive and synthetic genetic interactions. Full details of the interaction layers are described in [5]. C. elegans connectome The network taken from the nervous system of the nematode C. elegans. This multi- plex network consists of 279 nodes representing non-pharyngeal neurons and 5,863 links representing electrical junctions and chemical synapses. Links are spread across three layers: an electric junction layer (17.6% of links), a monadic chemical synapse layer (28.0% of links), and a polyadic chemical synapse layer (54.4% of links) [24, 25]. The first layer represents electrical coupling via gap junctions between neurons, while links in the other layers represent neurons coupled by neurotransmitters. C. elegans has many advantages as a model organism in general [26, 27], and its neuronal wiring diagram is completely mapped experimentally [27, 28], making its connectome an ideal test network dataset. Open source developer collaboration network This network represents the software developers working on open source projects hosted by IBM on GitHub (https://github.com/ibm). This network is temporal, evolving over the years 2013-2017, allowing us to compare its development across time. Aggregating all activity, this network consists of 679 nodes and 3,628 links. Each node represents a developer who has contributed to the source code of the project, as extracted from the git metadata logs [29, 30, 31]. Links occur between developers who have edited at least one source code file in common, a simple measure of collaboration. To study this network as a weighted network, we associate with each link (i, j) an integer weight wi j equal to the number of source files edited in common by developers i and j. For these data, the Network Portrait Divergence reveals several interesting facets of the multilayer structure of the Arabidopsis network (Fig. 4). First, both the direct interaction and physical association layers are the most different, both from each other and from the other layers, with the synthetic interactions layer being most different from the direct and physical layers. The remaining five layers show interesting relationships, with suppressive and synthetic genetic interactions being the most distinct pair (DJS = 0.553) among these five layers. The additive and suppressive layers were also distinct (DJS = 0.365). De Domenico et al. observed a similar distinction between the suppressive and synthetic layers [5]. 13 Figure 4: Using Network Portrait Divergence to compare across layers of multiplex networks. The (i, j) entry of each matrix illustrates the Network Portrait divergence between layer i and layer j of the corresponding multiplex network. Network Portrait Divergence can reveal similarities and differences across the different multiplex layers. The multilayer C. elegans network, consisting of only three layers, is easier to understand than Ara- bidopsis. Here we find that the electrical junction layer is more closely related to the monadic synapse layer than it is to the polyadic synapse layer, while the polyadic layer is more closely related to the monadic synapse layer than to the electrical junction layer. The C. elegans data aggregated all polyadic synapses together into one layer accounting for over half of the total links in the network, but it would be especially interesting to determine what patterns for dyadic, triadic, etc. synapses can be revealed with the Network Portrait Divergence. The third real-world network we investigate is a temporal network (Fig. 5). This network encodes the collaboration activities between software developers who have contributed to open source projects owned by IBM on GitHub.com. Here each node represents a developer and a links exist between two developers when they have both edited at least one file in common among the source code hosted on GitHub. This network is growing over time as more projects are open-sourced by IBM, and more developers join and contribute to those projects. We draw the IBM developer network for each year from 2013 to 2017 in Fig. 5A, while Fig. 5B shows the change in size of these networks over time. Lastly, Fig. 5C demonstrates how DJS captures patterns in the temporal evolution of the network, in particular revealing the structural similarity between 2015 and 2016, a period that showed a distinct slowdown in network growth compared with prior and 14 directphysicaladditivesuppressivesyntheticassociationcolocalizationdirectphysicaladditivesuppressivesyntheticassociationcolocalizationArabidopsis GPI networkElectrJMonoSynPolySynElectrJMonoSynPolySynC.elegans connectome0.00.20.40.60.81.0Network Portrait Divergence DJS0.00.20.40.60.81.0Network Portrait Divergence DJS Figure 5: Network Portrait Divergence and the temporal evolution of the IBM GitHub collaboration network. (A) The IBM collaboration networks, each one aggregated from a year of developer activity on IBM's GitHub projects. (B) Growth of the IBM network over time. The inset tracks the Network Portrait Divergence of the network away from the first year. (C) Network Portrait Divergences comparing networks across years. The decreased growth rate from 2015 to 2016 is captured by a very close divergence. Otherwise, the divergences are quite high, especially between the extreme years, demonstrating the dynamic changes the IBM collaboration underwent during the data window. Panel C treats the network as unweighted. subsequent years. Figure 6 shows the Network Portrait Divergence comparing different years of the IBM developer network, as per Fig. 5 but now accounting for edge weights. Shortest path lengths were found using Dijkstra's algorithm based on reciprocal edge weights (see App. A for details). The weighted portraits require binning the path length distributions (see App. A). Here we show four such binnings, based on quantiles of the weighted path length distributions, from b = 100 bins (each bin accounts for 1% of shortest paths) to b = 10 (each bin accounts for 10% of shortest paths). Note that each DJS is defined with its own portrait binning, as the quantiles of L = L(G)∪L(G(cid:48)) may vary across different pairs of networks, where L(G) = {(cid:96)i j i, j ∈ V ∧ (cid:96)i j < ∞} is the set of all unique shortest path lengths in G. Overall, the relationships between the different time periods 15 20132014201520162017ABC Figure 6: Weighted Network Portrait Divergence for comparing the IBM developer network over time. The weighted portraits depend on a choice of binning (see App. A); here we see that the pattern of similarities between networks is robust to changes in binning. of the network do not depend strongly on the choice of binning, and we capture patterns across time similar to, though not identical to, the patterns found analyzing the unweighted networks (shown in Fig. 5). 5 Conclusion In this paper we have introduced a measure, the Network Portrait Divergence, for comparing networks, and validated its performance on both synthetic and real-world network data. Network Portrait Divergence provides an information-theoretic interpretation that naturally encompasses all scales of structure within networks. It does not require the networks to be connected, nor does it make any assumptions as to how the two networks being compared are related, or indexed, or even that their node sets are equal. Further, Network Portrait Divergence can naturally handle both undirected and directed, unweighted networks, and we have introduced a generalization for weighted networks. The Network Portrait Divergence is based on a graph invariant, the network portrait. Comparison measures based on graph invariants are desirable as they will only be affected by the topology of the networks being studied, and not other externalities such as the format or order in which the networks are recorded or analyzed. The computational complexity of the Network Portrait Divergence compares favorably to many other graph comparison measures, particularly spectral measures, but it remains a computation that is quadratic in the number of nodes of the graph. To scale to very large networks will likely require further efficiency gains, probably from approximation strategies to efficiently infer the shortest path distributions [32]. Our approach bears superficial similarities with other methods. Graph distances and shortest path length 16 2013201420152016201720132014201520162017100 portrait bins201320142015201620172013201420152016201750 portrait bins201320142015201620172013201420152016201720 portrait bins201320142015201620172013201420152016201710 portrait bins0.00.20.40.60.81.0Network Portrait Divergence DJS distributions are components common to many network comparison methods, including our own, although the Network Portrait Divergences utilizes a unique composition of all the shortest path length distributions for the networks being compared. At the same time, other methods, including ours, use the Jensen-Shannon divergence to build comparison measures. For example, the recent work of Chen et al. [15] uses the Shannon entropy and Jensen-Shannon Divergence of a probability distribution computed by normalizing e A, the exponential of the adjacency matrix also known as the communicability matrix. This is an interesting approach, as are other approaches that examine powers of the adjacency matrix, but it suffers from a drawback: when comparing networks of different sizes, the underlying probability distributions must be modified in an ad hoc manner [15]. The Network Portrait Divergence, in contrast, does not need such modification. The Network Portrait Divergence, and other methods, is based upon the Jensen-Shannon divergence between graph-invariant probability distributions, but many other information-theoretic tools exist for com- paring distributions, including f -divergences such as the Hellinger distance or total variation distance, Bhattacharyya distance, and more. Using different measures for comparison may yield different interpreta- tions and insights, and thus it is fruitful to better understand their use across different network comparison problems. Network Portrait divergence lends itself well to developing statistical procedures when combined with suitable graph null models. For example, one could quantify the randomness of a structural property of a network by comparing the real network to a random model that controls for that property. Further, to estimate the strength or significance of an observed divergence between graphs G1 and G2, one could generate a large number of random graph null proxies for either G1 or G2 (or both) and compare the divergences found between those nulls with the divergence between the original graphs. These comparisons could be performed using a Z-test or other statistical procedure, as appropriate. Exploring this and other avenues for Network Portrait Divergence-based statistical procedures is a fruitful direction for future work. In general, because of the different potential interpretations and insights that researchers performing network comparison can focus on, the network comparison problem lacks quantitative benchmarks. These benchmarks are useful for comparing different approaches systematically. However, the comparison problem is not as narrowly defined as, for example, graph partitioning, and thus effective methods may highlight very different facets of comparison. While specific benchmarks can be introduced for specific facets, due to a 17 lack of standardized, systematic benchmarks, most researchers introducing new comparison measures focus on a few tasks of interest, as we do here. Bringing clarity to the literature by defining and validating an appropriate benchmarking suite would be a valuable contribution to the network comparison problem, but we consider this to be beyond the scope of our current work. Instead, we have focused our method on highlighting several areas, particularly within real world applications but also using some intuitive synthetic scenarios, where the method is effective. As network datasets increase in scope, network comparison becomes an increasingly common and important component of network data analysis. Measures such as the Network Portrait Divergence have the potential to help researchers better understand and explore the growing sets of networks within their possession. Abbreviations JSD, Jensen-Shannon Divergence; BA, Barabási-Albert; ER, Erdős-Rényi; KL, Kullback-Leibler; GPI, Genetic and Protein Interaction. A Portraits and Network Portrait Divergences for weighted networks The portrait matrix B (Eq. (2)) is most naturally defined for unweighted networks since the path lengths for unweighted networks count the number of edges traversed along the path to get from one node to another. Since the number of edges is always integer-valued, these lengths can be used to define the rows of B. For weighted networks, on the other hand, path lengths are generally computed by summing edge weights along a path and will generally be continuous rather than integer-valued. To generalize the portrait to weighted networks requires (i) using an algorithm for finding shortest paths accounting for edge weights (here we will use Dijkstra's algorithm [33]), and (ii) defining an appropriate aggregation strategy to group shortest paths by length to form the rows of B. The algorithm for finding shortest paths defines the complexity of computing the portrait: The single-source Dijkstra's algorithm with a Fibonacci heap runs in O(M + N log N) time [34] for a graph of V = N nodes and E = M edges. This is more costly than the single-source Breadth-First Search algorithm we use for unweighted graphs, which 18 runs in O(M + N) time. Computing B requires all pairs of shortest paths, therefore the total complexity for computing a weighted portrait is O(MN + N2 log N). This again is more costly than the total complexity for the unweighted portrait, O(MN + N2) , but this is unavoidable as finding minimum-cost paths is generically more computationally intensive than finding minimum-length paths. The simplest choice for aggregating shortest paths by length is to introduce a binning strategy for the continuous path lengths. Let d0 = 0 < d1 < · · · < db+1 = Lmax define a set of b intervals or bins, where Lmax is the length of the longest shortest path. Then the weighted portrait B can be defined such that Bi,k ≡ the number of nodes with k nodes at distances di ≤ (cid:96) < di+1. That is, the i-th row of the weighted portrait accounts for all shortest paths with lengths falling inside the i-th bin [di, di+1). (We also take the last bin to be inclusive on both sides, [db, Lmax]). To compute B using a binning requires determining the b + 1 bin edges. Here we consider a simple, adaptive binning based on quantiles of the shortest path distribution, but a researcher is free to adopt a different binning strategy as needed. Let L(G) = {(cid:96)i j i, j ∈ V ∧ (cid:96)i j < ∞} be the set of all unique shortest path lengths between connected pairs of nodes in graph G. We then define our binning to be the b contiguous intervals that partition L into subsets of (approximately) equal size. Taking b = 100, for example, ensures that each bin contains approximately 1% of the shortest path lengths. The number of bins b can be chosen by the researcher to suit her needs, or automatically using any of a number of histogram binning rules such as Freedman-Diaconis [35] or Sturges' Rule [36]. Figure 7 shows the portrait for a weighted network, in this case taken from the IBM developer collaboration network. Edge (i, j) in this network has associated non-negative edge weight wi j = the number of files edited in common by developers i and j. The network is the union of the networks shown in Fig. 5A; we draw the is (cid:96)i j =n giant connected component of this network in Fig. 7A. For this network, we consider shortest paths found using Dijkstra's algorithm with reciprocal edge weights, i.e., the "length" of a path (i = i0, i1, i2, . . . , in+1 = j) it,it +1, as larger edge weights define more closely related developers. However, this choice is not necessary in general. The cumulative distribution of shortest path lengths, which we computed on all t=0 w−1 components of the network, is shown in Fig. 7B. Lastly, Fig. 7C shows the portrait B for this network. For illustration, we draw the vertical positions of the rows in this matrix using the bin edges. These bin edges are highlighted on the cumulative distribution shown in Fig. 7B. 19 Figure 7: A weighted network and its portrait. (A) The network of developers contributing to IBM projects on GitHub. This is the giant connected component of the union of all graphs shown in Fig. 5A. The weight on edge (i, j) represents the number of source files edited in common by developers i and j. Node size is proportional to degree; node color is proportional to betweenness centrality. (B) The cumulative distribution of shortest path lengths (cid:96) computed using Dijkstra's algorithm with reciprocal edge weights. (C) The weighted network portrait. The vertical marks in panel B denote the path length binning used in C. With a new definition for B now in place for weighted networks, the Network Portrait Divergence can be computed exactly as before (Definition 3.1). However, to compare portraits for two graphs G and G(cid:48), it is important for the path length binning to be the same for both. We do this here by computing b bins as quantiles of L = L(G) ∪ L(G(cid:48)) and then compute B(G) and B(G(cid:48)) as before. This ensures the rows of B and B(cid:48) are compatible in the distributions used within Definition 3.1. Acknowledgments We thank Laurent Hébert-Dufresne for helpful comments. J.P.B. was supported by the National Science Foundation under Grant No. IIS-1447634. E.M.B. would like to thank the Army Research Office (N68164- EG) and the Office of Naval Research (N00014-15-1-2093), and also DARPA. 20 A References [1] J. S. Bader, A. Chaudhuri, J. M. Rothberg, and J. Chant, "Gaining confidence in high-throughput protein interaction networks," Nature Biotechnology, vol. 22, no. 1, p. 78, 2004. 1 [2] D. Lazer, A. S. Pentland, L. Adamic, S. Aral, A. L. Barabasi, D. Brewer, N. Christakis, N. Contractor, J. Fowler, M. Gutmann et al., "Life in the network: the coming age of computational social science," Science (New York, NY), vol. 323, no. 5915, p. 721, 2009. 1 [3] E. Landhuis, "Neuroscience: Big brain, big data," Nature, vol. 541, pp. 559 -- 561, 2017. 1 [4] R. Whelan, P. J. Conrod, J.-B. Poline, A. Lourdusamy, T. Banaschewski, G. J. Barker, M. A. Bellgrove, C. Büchel, M. Byrne, T. D. Cummins et al., "Adolescent impulsivity phenotypes characterized by distinct brain networks," Nature Neuroscience, vol. 15, no. 6, p. 920, 2012. 2 [5] M. De Domenico, V. Nicosia, A. Arenas, and V. Latora, "Structural reducibility of multilayer networks," Nature Communications, vol. 6, p. 6864, 2015. 2, 13 [6] G. Palla, A.-L. Barabási, and T. Vicsek, "Quantifying social group evolution," Nature, vol. 446, no. 7136, p. 664, 2007. 2 [7] M. Szell, R. Lambiotte, and S. Thurner, "Multirelational organization of large-scale social networks in an online world," Proc. Natl. Acad. Sci. U.S.A., vol. 107, no. 31, pp. 13 636 -- 13 641, 2010. 2 [8] J. P. Bagrow, D. Wang, and A.-L. Barabasi, "Collective response of human populations to large-scale emergencies," PLOS ONE, vol. 6, no. 3, p. e17680, 2011. 2 [9] P. Holme and J. Saramäki, "Temporal networks," Physics Reports, vol. 519, no. 3, pp. 97 -- 125, 2012. 2 [10] N. Shervashidze, S. Vishwanathan, T. Petri, K. Mehlhorn, and K. Borgwardt, "Efficient graphlet kernels for large graph comparison," in Artificial Intelligence and Statistics, 2009, pp. 488 -- 495. 2 [11] P. Yanardag and S. Vishwanathan, "Deep graph kernels," in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2015, pp. 1365 -- 1374. 2 [12] M. Niepert, M. Ahmed, and K. Kutzkov, "Learning convolutional neural networks for graphs," in International conference on machine learning, 2016, pp. 2014 -- 2023. 2 [13] D. R. Hunter, S. M. Goodreau, and M. S. Handcock, "Goodness of fit of social network models," Journal of the American Statistical Association, vol. 103, no. 481, pp. 248 -- 258, 2008. 2 [14] M. De Domenico and J. Biamonte, "Spectral entropies as information-theoretic tools for complex network comparison," Phys. Rev. X, vol. 6, p. 041062, Dec 2016. 3 [15] D. Chen, D.-D. Shi, M. Qin, S.-M. Xu, and G.-J. Pan, "Complex network comparison based on communicability sequence entropy," Physical Review E, vol. 98, no. 1, p. 012319, 2018. 3, 17 [16] J. P. Bagrow, E. M. Bollt, J. D. Skufca, and D. Ben-Avraham, "Portraits of complex networks," EPL (Europhysics Letters), vol. 81, no. 6, p. 68004, 2008. 3, 5, 6, 7 [17] J. Park and M. E. Newman, "A network-based ranking system for us college football," Journal of Statistical Mechanics: Theory and Experiment, vol. 2005, no. 10, p. P10014, 2005. 4 21 [18] D. M. Endres and J. E. Schindelin, "A new metric for probability distributions," IEEE Transactions on Information Theory, vol. 49, no. 7, pp. 1858 -- 1860, July 2003. 9 [19] P. Erdös and A. Rényi, "On random graphs, I," Publicationes Mathematicae (Debrecen), vol. 6, pp. 290 -- 297, 1959. 10 [20] A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509 -- 512, 1999. 10 [21] Z. Li, P. J. Mucha, and D. Taylor, "Network-ensemble comparisons with stochastic rewiring and von neumann entropy," arXiv preprint arXiv:1704.01053, 2017. 11, 12 [22] R. Albert and A.-L. Barabási, "Statistical mechanics of complex networks," Rev. Mod. Phys., vol. 74, no. 1, p. 47, 2002. 12 [23] C. Stark, B.-J. Breitkreutz, T. Reguly, L. Boucher, A. Breitkreutz, and M. Tyers, "BioGRID: a general repository for interaction datasets," Nucleic acids research, vol. 34, no. suppl_1, pp. D535 -- D539, 2006. 13 [24] B. L. Chen, D. H. Hall, and D. B. Chklovskii, "Wiring optimization can relate neuronal structure and function," Proc. Natl. Acad. Sci. U.S.A., vol. 103, no. 12, pp. 4723 -- 4728, 2006. 13 [25] M. De Domenico, M. A. Porter, and A. Arenas, "MuxViz: a tool for multilayer analysis and visualization of networks," Journal of Complex Networks, vol. 3, no. 2, pp. 159 -- 176, 2015. 13 [26] S. Brenner, "The genetics of caenorhabditis elegans," Genetics, vol. 77, no. 1, pp. 71 -- 94, 1974. 13 [27] J. G. White, E. Southgate, J. N. Thomson, and S. Brenner, "The structure of the nervous system of the nematode caenorhabditis elegans," Philos Trans R Soc Lond B Biol Sci, vol. 314, no. 1165, pp. 1 -- 340, 1986. 13 [28] D. H. Hall, Z. F. Altun et al., C. elegans Atlas. Cold Spring Harbor Laboratory Press, 2007. 13 [29] C. Bird, P. C. Rigby, E. T. Barr, D. J. Hamilton, D. M. German, and P. Devanbu, "The promises and perils of mining git," in Mining Software Repositories, 2009. MSR'09. 6th IEEE International Working Conference on. IEEE, 2009, pp. 1 -- 10. 13 [30] E. Kalliamvakou, G. Gousios, K. Blincoe, L. Singer, D. M. German, and D. Damian, "The promises and perils of mining github," in Proceedings of the 11th working conference on mining software repositories. ACM, 2014, pp. 92 -- 101. 13 [31] M. Klug and J. P. Bagrow, "Understanding the group dynamics and success of teams," Royal Society Open Science, vol. 3, no. 4, p. 160007, 2016. 13 [32] M. Potamias, F. Bonchi, C. Castillo, and A. Gionis, "Fast shortest path distance estimation in large networks," in Proceedings of the 18th ACM conference on Information and knowledge management. ACM, 2009, pp. 867 -- 876. 16 [33] E. W. Dijkstra, "A note on two problems in connexion with graphs," Numerische mathematik, vol. 1, no. 1, pp. 269 -- 271, 1959. 18 22 [34] M. L. Fredman and R. E. Tarjan, "Fibonacci heaps and their uses in improved network optimization algorithms," Journal of the ACM (JACM), vol. 34, no. 3, pp. 596 -- 615, 1987. 19 [35] D. Freedman and P. Diaconis, "On the histogram as a density estimator: L 2 theory," Zeitschrift für Wahrscheinlichkeitstheorie und verwandte Gebiete, vol. 57, no. 4, pp. 453 -- 476, 1981. 19 [36] H. A. Sturges, "The choice of a class interval," Journal of the American Statistical Association, vol. 21, no. 153, pp. 65 -- 66, 1926. 19 23
1509.02533
1
1509
2015-09-08T20:10:04
Absorbing random-walk centrality: Theory and algorithms
[ "cs.SI", "cs.DS" ]
We study a new notion of graph centrality based on absorbing random walks. Given a graph $G=(V,E)$ and a set of query nodes $Q\subseteq V$, we aim to identify the $k$ most central nodes in $G$ with respect to $Q$. Specifically, we consider central nodes to be absorbing for random walks that start at the query nodes $Q$. The goal is to find the set of $k$ central nodes that minimizes the expected length of a random walk until absorption. The proposed measure, which we call $k$ absorbing random-walk centrality, favors diverse sets, as it is beneficial to place the $k$ absorbing nodes in different parts of the graph so as to "intercept" random walks that start from different query nodes. Although similar problem definitions have been considered in the literature, e.g., in information-retrieval settings where the goal is to diversify web-search results, in this paper we study the problem formally and prove some of its properties. We show that the problem is NP-hard, while the objective function is monotone and supermodular, implying that a greedy algorithm provides solutions with an approximation guarantee. On the other hand, the greedy algorithm involves expensive matrix operations that make it prohibitive to employ on large datasets. To confront this challenge, we develop more efficient algorithms based on spectral clustering and on personalized PageRank.
cs.SI
cs
Absorbing random-walk centrality: Theory and algorithms Charalampos Mavroforakis Dept. of Computer Science Boston University Boston, U.S.A. [email protected] Michael Mathioudakis and Aristides Gionis Helsinki Institute for Information Technology HIIT Dept. of Computer Science, Aalto University Helsinki, Finland [email protected] 5 1 0 2 p e S 8 ] I S . s c [ 1 v 3 3 5 2 0 . 9 0 5 1 : v i X r a Abstract—We study a new notion of graph centrality based on absorbing random walks. Given a graph G = (V, E) and a set of query nodes Q ⊆ V , we aim to identify the k most central nodes in G with respect to Q. Specifically, we consider central nodes to be absorbing for random walks that start at the query nodes Q. The goal is to find the set of k central nodes that minimizes the expected length of a random walk until absorption. The proposed measure, which we call k absorbing random-walk centrality, favors diverse sets, as it is beneficial to place the k absorbing nodes in different parts of the graph so as to “intercept” random walks that start from different query nodes. Although similar problem definitions have been considered in the literature, e.g., in information-retrieval settings where the goal is to diversify web-search results, in this paper we study the problem formally and prove some of its properties. We show that the problem is NP-hard, while the objective function is monotone and supermodular, implying that a greedy algorithm provides solutions with an approximation guarantee. On the other hand, the greedy algorithm involves expensive matrix operations that make it prohibitive to employ on large datasets. To confront this challenge, we develop more efficient algorithms based on spectral clustering and on personalized PageRank. Keywords-graph mining; node centrality; random walks I. INTRODUCTION A fundamental problem in graph mining is to identify the most central nodes in a graph. Numerous centrality measures have been proposed, including degree centrality, closeness centrality [14], betweenness centrality [5], random-walk cen- trality [13], Katz centrality [9], and PageRank [4]. In the interest of robustness many centrality measures use random walks: while the shortest-path distance between two nodes can change dramatically by inserting or deleting a single edge, distances based on random walks account for multiple paths and offer a more global view of the connectivity between two nodes. In this spirit, the random-walk centrality of one node with respect to all nodes of the graph is defined as the expected time needed to come across this node in a random walk that starts in any other node of the graph [13]. In this paper, we consider a measure that generalizes random-walk centrality for a set of nodes C with respect to a set of query nodes Q. Our centrality measure is defined as the expected length of a random walk that starts from any node in Q until it reaches any node in C — at which point the random walk is “absorbed” by C. Moreover, to allow for adjustable importance of query nodes in the centrality measure, we consider random walks with restarts, that occur with a fixed probability α at each step of the random walk. The resulting computational problem is to find a set of k nodes C that optimizes this measure with respect to nodes Q, which are provided as input. We call this measure k absorbing random- walk centrality and the corresponding optimization problem k-ARW-CENTRALITY. To motivate the k-ARW-CENTRALITY problem, let us con- sider the scenario of searching the Web graph and summa- rizing the search results. In this scenario, nodes of the graph correspond to webpages, edges between nodes correspond to links between pages, and the set of query nodes Q consists of all nodes that match a user query, i.e., all webpages that satisfy a keyword search. Assuming that the size of Q is large, the goal is to find the k most central nodes with respect to Q, and present those to the user. Our key results in this paper are the following: we show that the k-ARW-CENTRALITY problem is NP-hard, and we show that the k absorbing random-walk centrality measure is monotone and supermodular. The latter property allows us to quantify the approximation guarantee obtained by a natural greedy algorithm, which has also been considered by previous work [18]. Furthermore, a naıve implementation of the greedy algorithm requires many expensive matrix inversions, which make the algorithm particularly slow. Part of our contribu- It is clear that ordering the nodes of the graph by their individual random-walk centrality scores and taking the top-k set does not solve the k-ARW-CENTRALITY problem, as these nodes may all be located in the same “neighborhood” of the graph, and thus, may not provide a good absorbing set for the query. On the other hand, as the goal is to minimize the expected absorption time for walks starting at Q, the optimal solution to the k-ARW-CENTRALITY problem will be a set of k, both centrally-placed and diverse, nodes. This observation has motivated researchers in the informa- tion-retrieval field to consider random walks with absorbing states in order to diversify web-search results [18]. However, despite the fact that similar problem definitions and algorithms have been considered earlier, the k-ARW-CENTRALITY prob- lem has not been formally studied and there has not been a theoretical analysis of its properties. tion is to show how to make use of the Sherman-Morrison inversion formula to implement the greedy algorithm with only one matrix inversion and more efficient matrix× vector multiplications. Moreover, we explore the performance of faster, heuristic algorithms, aiming to identify methods that are faster than the greedy approach without significant loss in the quality of results. The heuristic algorithms we consider include the per- sonalized PageRank algorithm [4], [10] as well as algorithms based on spectral clustering [17]. We find that, in practice, the personalized PageRank algorithm offers a very good trade-off between speed and quality. The rest of the paper is organized as follows. In Section II, we overview previous work and discuss how it compares to this paper. We define our problem in Section III and provide basic background results on absorbing random walks in Section IV. Our main technical contributions are given in Sections IV and V, where we characterize the complexity of the problem, and provide the details of the greedy algorithm and the heuristics we explore. We evaluate the performance of algorithms in Section VII, over a range of real-world graphs, and Section VIII is a short conclusion. Proofs for some of the theorems shown in the paper are provided in the Appendix. II. RELATED WORK Many works in the literature explore ways to quantify the notion of node centrality on graphs [3]. Some of the most commonly-used measures include the following: (i) degree centrality, where the centrality of a node is simply quantified by its degree; (ii) closeness centrality [11], [14], defined as the average distance of a node from all other nodes on the graph; (iii) betweenness centrality [5], defined as the number of shortest paths between pairs of nodes in the graph that pass through a given node; (iv) eigenvector centrality, defined as the stationary probability that a Markov chain on the graph visits a given node, with Katz centrality [9] and PageRank [4] being two well-studied variants; and (v) random- walk centrality [13], defined as the expected first passage time of a random walk from a given node, when it starts from a random node of the graph. The measure we study in this paper generalizes the notion of random-walk centrality to a set of absorbing nodes. Absorbing random walks have been used in previous work to select a diverse set of nodes from a graph. For example, an algorithm proposed by Zhu et al. [18] selects nodes in the following manner: (i) the first node is selected based on its PageRank value and is set as absorbing; (ii) the next node to be selected is the node that maximizes the expected first-passage time from the already selected absorbing nodes. Our problem definition differs considerably from the one considered in that work, as in our work the expected first-passage times are always computed from the set of query nodes that are provided in the input, and not from the nodes that participate in the solution so far. In this respect, the greedy method proposed by Zhu et al. is not associated with a crisp problem definition. Another conceptually related line of work aims to select a diverse subset of query results, mainly within the context of document retrieval [1], [2], [16]. The goal, there, is to select k query results to optimize a function that quantifies the trade-off between relevance and diversity. Our work is also remotely related to the problem studied by Leskovec et al. on cost-effective outbreak detection [12]. One of the problems discussed there is to select nodes in the network so that the detection time for a set of cascades is minimized. However, their work differs from ours on the fact that they consider as input a set of cascades, each one of finite size, while in our case the input consists of a set of query nodes and we consider a probabilistic model that generates random walk paths, of possibly infinite size. III. PROBLEM DEFINITION We are given a graph G = (V, E) over a set of nodes V and set of undirected edges E. The number of nodes V is denoted by n and the number of edges E by m. The input also includes a subset of nodes Q ⊆ V , to which we refer as the query nodes. As a special case, the set of query nodes Q may be equal to the whole set of nodes, i.e., Q = V . Our goal is to find a set C of k nodes that are central with respect to the query nodes Q. For some applications it makes sense to restrict the central nodes to be only among the query nodes, while in other cases, the central nodes may include any node in V . To model those different scenarios, we consider a set of candidate nodes D, and require that the k central nodes should belong in this candidate set, i.e., C ⊆ D. Some of the cases include D = Q, D = V , or D = V \Q, but it could also be that D is defined in some other way that does not involve Q. In general, we assume that D is given as input. The centrality of a set of nodes C with respect to query nodes Q is based on the notion of absorbing random-walks and their expected length. More specifically, let us consider a random walk on the nodes V of the graph, that proceeds at discrete steps: the walk starts from a node q ∈ Q and, at each step moves to a different node, following edges in G, until it arrives at some node in C. The starting node q of the walk is chosen according to a probability distribution s. When the walk arrives at a node c ∈ C for the first time, it terminates, and we say that the random walk is absorbed by that node c. In the interest of generality, and to allow for adjustable importance of query nodes in the centrality measure, we also allow the random walk to restart. Restarts occur with a probability α at each step of the random walk, where α is a parameter that is specified as input to the problem. When restarting, the walk proceeds to a query node selected randomly according to s. Intuitively, larger values of α favor nodes that are closer to nodes Q. We are interested in the expected length (i.e., number of steps) of the walk that starts from a query node q ∈ Q until it gets absorbed by some node in C, and we denote this expected (C). We then define the absorbing random-walk length by acq Q centrality of a set of nodes C with respect to query nodes Q, by that the random walk visits node j having started from node i is given by the (i, j)-entry of the T × T matrix ∞(cid:88) F = T T = (I − PT T ) P(cid:96) −1 , (3) (cid:88) q∈Q acQ(C) = s(q) acq Q (C). The problem we consider in this paper is the following. (cid:96)=0 Problem 1 (k-ARW-CENTRALITY) We are given a graph G = (V, E), a set of query nodes Q ⊆ V , a set of candidate nodes D ⊆ V , a starting probability distribution s over V such that s(v) = 0 if v ∈ V \ Q, a restart probability α, and an integer k. We ask to find a set of k nodes C ⊆ D that minimizes acQ(C), i.e., the expected length of a random walk that starts from Q and proceeds until it gets absorbed in some node in C. In cases where we have no reason to distinguish among the query nodes, we consider the uniform starting probability distribution s(q) = 1/Q. In fact, for simplicity of exposition, hereinafter we focus on the case of uniform distribution. However, we note that all our definitions and techniques generalize naturally, not only to general starting probability distributions s(q), but also to directed and weighted graphs. (cid:18) F (cid:19) which is known as the fundamental matrix of the absorbing random walk. Allowing the possibility to start the random walk at an absorbing node (and being absorbed immediately), we see that the expected length of a random walk that starts from node i and gets absorbed by the set C is given by the i-th element of the following n × 1 vector 0 1, L = LC = (4) where 1 is an T × 1 vector of all 1s. We write L = LC to emphasize the dependence on the set of absorbing nodes C. The expected number of steps when starting from a node in Q and until being absorbed by some node in C is then obtained by summing over all query nodes, i.e., acQ(C) = sT LC. (5) IV. ABSORBING RANDOM WALKS A. Efficient computation of absorbing centrality In this section we review some relevant background on absorbing random walks. Specifically, we discuss how to calculate the objective function acQ(C) for Problem 1. Let P be the transition matrix for a random walk, with P(i, j) expressing the probability that the random walk will move to node j given that it is currently at node i. Since random walks can only move to absorbing nodes C, but not away from them, we set P(c, c) = 1 and P(c, j) = 0, if j (cid:54)= c, for all absorbing nodes c ∈ C. The set T = V \ C of non- absorbing nodes is called transient. If N (i) are the neighbors of a node i ∈ T and di = N (i) its degree, the transition probabilities from node i to other nodes are (cid:26) α s(j) P(i, j) = (1 − α)/di + α s(j) if j ∈ Q \ N (i), if j ∈ N (i). (1) = sT Here, s represents the starting probability vector. For example, for the uniform distribution over query nodes we have s(i) = 1/Q if i ∈ Q and 0 otherwise. The transition matrix of the random walk can be written as follows = with (cid:18) PT T PT C (cid:19) 0 I P = . (2) Equation (5) pinpoints the difficulty of the problem we consider: even computing the objective function acQ(C) for a candidate solution C requires an expensive matrix inversion; −1. Furthermore, searching for the optimal set F = (I − PT T ) C involves an exponential number of candidate sets, while evaluating each one of them requires a matrix inversion. In practice, we find that we can compute acQ(C) much faster approximately, as shown in Algorithm 1. The algorithm follows from the infinite-sum expansion of Equation (5). acQ(C) = sT LC = sT 1 = sT (cid:19) (cid:18) F (cid:19) (cid:18) P(cid:96) 0 T T 0 1 = ∞(cid:88) (cid:96)=0 (cid:96)=0 P(cid:96) T T (cid:19) (cid:19)(cid:33) ∞(cid:88) (cid:96)=0 T T 0 0 sT (cid:18) (cid:80)∞ (cid:32) ∞(cid:88) (cid:18) P(cid:96) (cid:32) ∞(cid:88) (cid:33) (cid:18) PT T (cid:19) 1 = x(cid:96) (cid:96)=0 (cid:96)=0 1 1 x(cid:96)1, x0 = s T and x(cid:96)+1 = x(cid:96) (6) Note that computing each vector x(cid:96) requires time O(n2). Algorithm 1 terminates when the increase of the sum due to the latest term falls below a pre-defined threshold . 0 . V. PROBLEM CHARACTERIZATION We now study the k-ARW-CENTRALITY problem in more detail. In particular, we show that the function acQ is mono- tone and supermodular, a property that is used later to provide an approximation guarantee for the greedy algorithm. We also show that k-ARW-CENTRALITY is NP-hard. In the equation above, I is an (n − T) × (n − T) identity matrix and 0 a matrix with all its entries equal to 0; PT T is the T × T sub-matrix of P that contains the transition probabilities between transient nodes; and PT C is the T×C sub-matrix of P that contains the transition probabilities from transient to absorbing nodes. The probability of the walk being on node j at exactly (cid:96) steps having started at node i, is given by the (i, j)-entry of the matrix P(cid:96) T T . Therefore, the expected total number of times Algorithm 1 ApproximateAC T Input: Transition matrix PT T , threshold , starting probabilities s Output: Absorbing centrality acQ x0 ← s δ ← x0 · 1 ac ← δ (cid:96) ← 0 while δ <  do x(cid:96)+1 ← x(cid:96) δ ← x(cid:96)+1 · 1 ac ← ac + δ (cid:96) ← (cid:96) + 1 (cid:18) PT T (cid:19) 0 return ac Recall that a function f : 2V → R over subsets of a ground set V is submodular if it has the diminishing returns property f (Y ∪ {u}) − f (Y ) ≤ f (X ∪ {u}) − f (X), (7) for all X ⊆ Y ⊆ V and u (cid:54)∈ Y . The function f is super- modular if −f is submodular. Submodularity (and supermod- ularity) is a very useful property for designing algorithms. For instance, minimizing a submodular function is a polynomial- time solvable problem, while the maximization problem is typically amenable to approximation algorithms, the exact guarantee of which depends on other properties of the function and requirements of the problem, e.g., monotonicity, matroid constraints, etc. Even though the objective function acQ(C) is given in closed-form by Equation (5), to prove its properties we find it more convenient to work with its descriptive definition, namely, acQ(C) being the expected length for a random walk starting at nodes of Q before being absorbed at nodes of C. For the rest of this section we consider that the set of query nodes Q is fixed, and for simplicity we write ac = acQ. Proposition 1 (Monotonicity) For all X ⊆ Y ⊆ V it is ac(Y ) ≤ ac(X). The proposition states that absorption time decreases with Next we show that the absorbing random-walk centrality more absorbing nodes. The proof is given in the Appendix. measure ac(·) is supermodular. Proposition 2 (Supermodularity) For all sets X ⊆ Y ⊆ V and u (cid:54)∈ Y it is ac(X) − ac(X ∪ {u}) ≥ ac(Y ) − ac(Y ∪ {u}). (8) Proof: Given an instantiation of a random walk, we define the following propositions for any pair of nodes i, j ∈ V , non- negative integer (cid:96), and set of nodes Z: A(cid:96) i,j(Z): The random walk started at node i and visited node j after exactly (cid:96) steps, without visiting any node in set Z. B(cid:96) i,j(Z, u): The random walk started at node i and visited node j after exactly (cid:96) steps, having previously visited node u but without visiting any node in the set Z. It is easy to see that the set of random walks for which A(cid:96) i,j(Z) is true can be partitioned into those that visited u within the first (cid:96) steps and those that did not. Therefore, the probability that proposition A(cid:96) i,j(Z) is true for any instantiation of a random walk generated by our model is equal to i,j(Z)(cid:3) = Pr(cid:2)A(cid:96) i,j(Z ∪ {u})(cid:3) + Pr(cid:2)B(cid:96) i,j(Z, u)(cid:3) . Pr(cid:2)A(cid:96) (9) Now, let Λ(Z) be the number of steps for a random walk to reach the nodes in Z. Λ(Z) is a random variable and its expected value over all random walks generated by our model is equal to ac(Z). Note that the proposition Λ(Z) ≥ (cid:96) + 1 is true for a given instantiation of a random walk only if there is a pair of nodes q ∈ Q and j ∈ V \ Z, for which the proposition A(cid:96) q,j(Z) is true. Therefore, Pr [Λ(Z) ≥ (cid:96) + 1] = (cid:88) (cid:88) q∈Q j∈V \Z Pr(cid:2)A(cid:96) q,j(Z)(cid:3) . From the above, it is easy to calculate ac(Z) as ac(Z) = E[Λ(Z)] (cid:96)=0 ∞(cid:88) ∞(cid:88) ∞(cid:88) ∞(cid:88) (cid:96)=1 (cid:96)=0 = = = = (cid:96) Pr [Λ(Z) = (cid:96)] Pr [Λ(Z) ≥ (cid:96)] Pr [Λ(Z) ≥ (cid:96) + 1] (cid:88) (cid:88) Pr(cid:2)A(cid:96) q,j(Z)(cid:3) . (cid:96)=0 q∈Q j∈V \Z (10) (11) (12) The final property we will need is the observation that, for X ⊆ Y , B(cid:96) i,j(Y, u) implies B(cid:96) i,j(X, u) and thus i,j(Y, u)(cid:3) . By using Equation (11), the Inequality (8) can be rewritten as i,j(X, u)(cid:3) ≥ Pr(cid:2)B(cid:96) Pr(cid:2)B(cid:96) (cid:88) q,j(X)(cid:3)− Pr(cid:2)A(cid:96) (cid:88) ∞(cid:88) (cid:88) (cid:88) Pr(cid:2)A(cid:96) q,j(Y )(cid:3)− (cid:88) (cid:88) ∞(cid:88) j∈V \{X∪{u}} j∈V \X j∈V \Y q∈Q (cid:96)=0 (cid:96)=0 q∈Q j∈V \{Y ∪{u}} ∞(cid:88) (cid:88) q∈Q (cid:96)=0 ∞(cid:88) (cid:88) q∈Q (cid:96)=0 ≥ Pr(cid:2)A(cid:96) q,j(X ∪ {u})(cid:3) Pr(cid:2)A(cid:96) q,j(Y ∪ {u})(cid:3) . (13) j∈V \Y j∈V \X j∈V \X j∈V \{Y ∪{u}} j∈V \{X∪{u}} above inequality as Pr(cid:2)A(cid:96) Pr(cid:2)A(cid:96) We only need to show that the inequality holds for an arbitrary value of (cid:96) and q ∈ Q, that is (cid:88) Pr(cid:2)A(cid:96) (cid:88) Pr(cid:2)A(cid:96) Notice that Pr(cid:2)A(cid:96) (cid:88) Pr(cid:2)A(cid:96) (cid:88) Pr(cid:2)A(cid:96) q,j(X)(cid:3) − (cid:88) q,j(X ∪ {u})(cid:3) ≥ q,j(Y )(cid:3) − (cid:88) q,j(Y ∪ {u})(cid:3) . i,u(Y ∪ {u})(cid:3) = 0, so we can rewrite the q,j(X)(cid:3) − (cid:88) q,j(X ∪ {u})(cid:3) ≥ q,j(Y )(cid:3) − (cid:88) q,j(Y ∪ {u})(cid:3) . i,j(X)(cid:3) − (cid:88) Pr(cid:2)A(cid:96) Pr(cid:2)A(cid:96) (cid:88) i,j(X, u)(cid:3) Pr(cid:2)B(cid:96) ≥ (cid:88) i,j(Y, u)(cid:3) Pr(cid:2)B(cid:96) i,j(Y )(cid:3) − (cid:88) (cid:88) Pr(cid:2)A(cid:96) To show the latter inequality we start from the left hand side and use Inequality (12). We have i,j(Y ∪ {u})(cid:3) , i,j(X ∪ {u})(cid:3) Pr(cid:2)A(cid:96) Pr(cid:2)A(cid:96) Pr(cid:2)A(cid:96) (cid:88) j∈V \X = j∈V \X j∈V \X j∈V \Y j∈V \X (14) (15) j∈V \Y j∈V \Y = j∈V \Y j∈V \Y which completes the proof. Finally, we establish the hardness of k absorbing centrality, defined in Problem 1. Theorem 1 The k-ARW-CENTRALITY problem is NP-hard. Proof: We obtain a reduction from the VERTEXCOVER problem [6]. An instance of the VERTEXCOVER problem is specified by a graph G = (V, E) and an integer k, and asks whether there exists a set of nodes C ⊆ V such that C ≤ k and C is a vertex cover, (i.e., for every (i, j) ∈ E it is {i, j} ∩ C (cid:54)= ∅). Let V = n. Given an instance of the VERTEXCOVER problem, we construct an instance of the decision version of k-ARW- CENTRALITY by taking the same graph G = (V, E) with query nodes Q = V and asking whether there is a set of absorbing nodes C such that C ≤ k and acQ(C) ≤ 1 − k n. We will show that C is a solution for VERTEXCOVER if and only if acQ(C) ≤ 1 − k n. Assuming first that C is a vertex cover. Consider a random walk starting uniformly at random from a node v ∈ Q = V . If v ∈ C then the length of the walk will be 0, as the walk will be absorbed immediately. This happens with probability C/V = k/n. Otherwise, if v (cid:54)∈ C the length of the walk will be 1, as the walk will be absorbed in the next step (since C is a vertex cover all the neighbors of v need to belong in C). This happens with the rest of the probability 1 − k/n. Thus, the expected length of the random walk is = 1 − k n acQ (C) = 0 · k n 1 − k n + 1 · (cid:18) (cid:19) (16) Conversely, assume that C is not a vertex cover for G. Then, there should be an uncovered edge (u, v). A random walk that starts in u and then goes to v (or starts in v and then goes to u) will have length at least 2, and this happens with probability n2 . Then, following a similar reasoning as at least 2 n in the previous case, we have ≥ 2 dmax 1 ∞(cid:88) ∞(cid:88) (cid:18) k=1 k=0 (cid:19) acQ(C) = = ≥ k Pr (absorbed in exactly k steps) Pr (absorbed after at least k steps) 1 − k n + 2 n2 > 1 − k n . (17) VI. ALGORITHMS This section presents algorithms to solve the k-ARW- CENTRALITY problem. In all cases, the set of query nodes Q ⊆ V is given as input, along with a set of candidate nodes D ⊆ V and the restart probability α. A. Greedy approach The first algorithm is a standard greedy algorithm, denoted Greedy, which exploits the supermodularity of the absorbing random-walk centrality measure. It starts with the result set C equal to the empty set, and iteratively adds a node from the set of candidate nodes D, until k nodes are added. In each iteration the node added in the set C is the one that brings the largest improvement to acQ. As shown before, the objective function to be minimized, i.e., acQ, is supermodular and monotonically decreasing. The Greedy algorithm is not an approximation algorithm for this minimization problem. However, it can be shown to provide an approximation guarantee for maximizing the absorbing centrality gain measure, defined below. Definition 1 (Absorbing centrality gain) Given a graph G, a set of query nodes Q, and a set of candidate nodes D, the absorbing centrality gain of a set of nodes C ⊆ D is defined as acgQ(C) = mQ − acQ(C), where mQ = minv∈D{acQ({v})}. Justification of the gain function. The reason to define the absorbing centrality gain is to turn our problem into a submodular-maximization problem so that we can apply stan- dard approximation-theory results and show that the greedy algorithm provides a constant-factor approximation guarantee. The shift mQ quantifies the absorbing centrality of the best single node in the candidate set. Thus, the value of acgQ(C) expresses how much we gain in expected random-walk length Q is that acg(cid:48) when we use the set C as absorbing nodes compared to when we use the best single node. Our goal is to maximize this gain. Observe that the gain function acgQ is not non-negative ev- erywhere. Take for example any node u such that acQ({u}) > mQ. Then, acgQ({u}) < 0. Note also that we could have obtained a non-negative gain function by defining gain with respect to the worst single node, instead of the best. In other Q(C) = MQ − acQ(C), with words, the gain function acg(cid:48) MQ = maxv∈D{acQ({v})}, is non-negative everywhere. Nevertheless, the reason we use the gain function acgQ instead of acg(cid:48) Q takes much larger values than acgQ, and thus, a multiplicative approximation guarantee on acg(cid:48) Q is a weaker result than a multiplicative approximation guarantee on acgQ. On the other hand, our definition of acgQ creates a technical difficulty with the approximation guarantee, that is defined for non-negative functions. Luckily, this difficulty can be overcome easily by noting that, due to the monotonicity of acgQ, for any k > 1, the optimal solution of the function acgQ, as well as the solution returned by Greedy, are both non-negative. Approximation guarantee. The fact that the Greedy algo- rithm gives an approximation guarantee to the problem of maximizing absorbing centrality gain is a standard result from the theory of submodular functions. Proposition 3 The function acgQ is monotonically increasing, and submodular. Proposition 4 Let k > 1. For the problem of finding a set C ⊆ D with C ≤ k, such that acgQ(C) is maximized, the Greedy algorithm gives a(cid:0)1 − 1 (cid:1)-approximation guarantee. e We now discuss the complexity of the Greedy algorithm. A naıve implementation requires computing the absorbing centrality acQ(C) using Equation (5) for each set C that needs to be evaluated during the execution of the algorithm. However, applying Equation (5) involves a matrix inversion, which is a very expensive operation. Furthermore, the number of times that we need to evaluate acQ(C) is O(kD), as for each iteration of the greedy we need to evaluate the improvement over the current set of each of the O(D) candidates. The number of candidates can be very large, e.g., D = n, yielding an O(kn4) algorithm, which is prohibitively expensive. We can show, however, that we can execute Greedy sig- nificantly more efficiently. Specifically, we can prove the following two propositions. Proposition 5 Let Ci−1 be a set of i − 1 absorbing nodes, Pi−1 the corresponding transition matrix, and let Fi−1 = (I − Pi−1)−1. Let Ci = Ci−1 ∪ {u}. Given Fi−1 the value acQ(Ci) can be computed in O(n2). Proposition 6 Let C be a set of absorbing nodes, P the corresponding transition matrix, and F = (I − P)−1. Let C(cid:48) = C − {v} ∪ {u}, u, v ∈ C. Given F the value acQ(C(cid:48)) can be computed in time O(n2). The proofs of these two propositions can be found in the Ap- Algorithm 2 Greedy Input: graph G, query nodes Q, candidates D, k ≥ 1 Output: a set of k nodes C Compute acQ({v}) for arbitrary v ∈ D For each u ∈ (D − {v}), use Prop.6 to compute acQ(u) Select u1 ∈ D s.t. u1 ← arg maxu∈D acQ(u) Initialize solution C ← {u1} for i = 2..k do For each u ∈ D, use Prop.5 to compute acQ(C ∪ {u}) Select ui ∈ D s.t. ui ← arg maxui∈(D−C) acQ(C ∪{u}) Update solution C ← C ∪ {ui} return C pendix. Proposition 5 implies that in order to compute acQ(Ci) for absorbing nodes Ci in O(n2), it is enough to maintain the matrix Fi−1, computed in the previous step of the greedy al- gorithm for absorbing nodes Ci−1. Proposition 6, on the other hand, implies that we can compute the absorbing centrality of each set of absorbing nodes of a fixed size i in O(n2), given the matrix F, which is computed for one arbitrary set of absorbing nodes C of size i. Combined, the two propositions above yield a greedy algorithm that runs in O(kn3) and offers the approximation guarantee discussed above. We outline it as Algorithm 2. Practical speed-up. We found that the following heuristic lets us speed-up Greedy even further, with no significant loss in the quality of results. To select the first node for the solution set C (see Algorithm 2), we calculate the PageRank values of all nodes in D and evaluate acQ only for the t << k nodes with highest PageRank score, where t is a fixed parameter. In what follows, we will be using this heuristic version of Greedy, unless explicitly stated otherwise. B. Efficient heuristics Even though Greedy runs in polynomial time, it can be quite inefficient when employed on moderately sized datasets (more than some tens of thousands of nodes). We thus describe algorithms that we study as efficient heuristics for the problem. These algorithms do not offer guarantee for their performance. Spectral methods have been used extensively for the problem of graph partitioning. Motivated by the wide applicability of this family of algorithms, here we explore three spectral algorithms: SpectralQ, SpectralC, and SpectralD. We start by a brief overview of the spectral method; a comprehensive presentation can be found in the tutorial by von Luxburg [17]. the original graph into a low-dimensional Euclidean space so that distances between nodes in the graph correspond to Eu- clidean distances between the corresponding projected points. A standard spectral embedding method, proposed by Shi and Malik [15], uses the “random-walk” Laplacian matrix LG = I − D−1A of a graph G, where A is the adjacency matrix of the graph, and forms the matrix U = [u2, . . . , ud+1] whose columns are the eigenvectors of LG that correspond to The main idea of spectral approaches is to project the smallest eigenvalues λ2 ≤ . . . ≤ λd+1, with d being the target dimension of the projection. The spectral embedding is then defined by mapping the i-th node of the graph to a point in Rd, which is the i-row of the matrix U. The algorithms we explore are adaptations of the spectral method. They all start by computing the spectral embedding φ : V → Rd, as described above, and then, proceed as follows: SpectralQ performs k-means clustering on the embeddings of the query nodes, where k is the desired size of the result set. Subsequently, it selects candidate nodes that are close to the computed centroids. Specifically, if si is the size of the i-th cluster, then ki candidate nodes are selected whose embedding is the nearest to the i-th centroid. The number ki is selected so that ki ∝ si and(cid:80) ki = k. SpectralC is similar to SpectralQ, but it performs the k-means clustering on the embeddings of the candidate nodes, instead of the query nodes. SpectralD performs k-means clustering on the embeddings of the query nodes, where k is the desired result-set size. Then, it selects the k candidate nodes whose embeddings minimize the sum of squared (cid:96)2-distances from the centroids, with no consideration of the relative sizes of the clusters. Personalized Pagerank (PPR). This is the standard Pager- ank [4] algorithm with a damping factor equal to the restart probability α of the random walk and personalization prob- abilities equal to the start probabilities s(q). Algorithm PPR returns the k nodes with highest PageRank values. Degree and distance centrality. Finally, we consider the standard degree and distance centrality measures. Degree returns the k highest-degree nodes. Note that this baseline is oblivious to the query nodes. Distance returns the k nodes with highest distance centrality with respect to Q. The distance centrality of a node u is defined as dc(u) = (cid:16)(cid:80) (cid:17)−1 v∈Q d(u, v) . VII. EXPERIMENTAL EVALUATION A. Datasets We evaluate the algorithms described in Section VI on two sets of real graphs: one set of small graphs that allows us to compare the performance of the fast heuristics against the greedy approach; and one set of larger graphs, to compare the performance of the heuristics against each other on datasets of larger scale. Note that the bottleneck of the computation lies in the evaluation of centrality. Even though the technique we describe in Section IV-A allows it to scale to datasets of tens of thousands of nodes on a single processor, it is still prohibitively expensive for massive graphs. Still, our experimentation allows us to discover the traits of the different algorithms and understand what performance to anticipate when they are employed on graphs of massive size. The datasets are listed in Table I. Small graphs are obtained from Mark Newman’s repository1, larger graphs from SNAP.2 Dataset TABLE I: Dataset statistics E 78 159 254 425 613 2 891 4 141 14 496 25 998 13 932 23 409 karate dolphins lesmis adjnoun football kddCoauthors livejournal ca-GrQc ca-HepTh roadnet oregon-1 V 34 62 77 112 115 2 891 3 645 5 242 9 877 10 199 11 174 For kddCoauthors, livejournal, and roadnet we use samples of the original datasets. In the interest of repeatability, our code and datasets are made publicly available.3 B. Evaluation Methodology Each experiment in our evaluation framework is defined by a graph G, a set of query nodes Q, a set of candidate nodes D, and an algorithm to solve the problem. We evaluate all algorithms presented in Section VI. For the set of candidate nodes D, we consider two cases: it is equal to either the set of query nodes, i.e., D = Q, or the set of all nodes, i.e., D = V . Query nodes Q are selected randomly, using the following process: First, we select a set S of s seed nodes, uniformly at random among all nodes. Then, we select a ball B(v, r) of predetermined radius r = 2, around each seed v ∈ S.4 Finally, from all balls, we select a set of query nodes Q of predetermined size q, with q = 10 and q = 20, respectively, for the small and larger datasets. Selection is done uniformly at random. Finally, the restart probability α is set to α = 0.15 and the starting probabilities s are uniform over Q. C. Implementation All algorithms are implemented in Python using the Net- workX package [8], and were run on an Intel Xeon 2.83GHz with 32GB RAM. D. Results Figure 1 shows the centrality scores achieved by different algorithms on the small graphs for varying k (note: lower is better). We present two settings: on the left, the candidates are all nodes (D = V ), and on the right, the candidates are only the query nodes (D = Q). We observe that PPR tracks well the quality of solutions returned by Greedy, while Degree and Distance often come close to that. Spectral algorithms do not perform that well. Figure 2 is similar to Figure 1, but results on the larger datasets are shown, not including Greedy. When all nodes are candidates, PPR typically has the best performance, followed by Distance, while Degree is unreliable. The spectral algo- rithms typically perform worse than PPR. 1http://www-personal.umich.edu/%7Emejn/netdata/ 2http://snap.stanford.edu/data/index.html 3https://github.com/harrymvr/absorbing-centrality 4For the planar roadnet dataset we use r = 3. When only query nodes are candidates, all algorithms typically demonstrate similar performance, which is most worse than the performance of PPR (the best performing algorithm) in the previous setting. Both observations can be explained by the fact that the selection is very restricted by the requirement D = Q, and there is not much flexibility for the best performing algorithms to produce a better solution. In terms of running time on the larger graphs, Distance returns within a few minutes (with observed times between 15 seconds to 5 minutes) while Degree returns within seconds (all observed times were less than 1 minute). Finally, even though Greedy returns within 1-2 seconds for the small datasets, it does not scale well for the larger datasets (running time is orders of magnitude worse than the heuristics and not included in the experiments). Based on the above, we conclude that PPR offers the best trade-off of quality versus running time for datasets of at least moderate size (more than 10 k nodes). VIII. CONCLUSIONS In this paper, we have addressed the problem of finding central nodes in a graph with respect to a set of query nodes Q. Our measure is based on absorbing random walks: we seek to compute k nodes that minimize the expected number of steps that a random walk will need to reach at (and be “absorbed” by) when it starts from the query nodes. We have shown that the problem is NP-hard and described an O(kn3) greedy algorithm to solve it approximately. Moreover, we experimented with heuristic algorithms to solve the problem on large graphs. Our results show that, in practice, personalized PageRank offers a good combination of quality and speed. REFERENCES [1] R. Agrawal, S. Gollapudi, A. Halverson, and S. Ieong. Diversifying the Second ACM International search results. Conference on Web Search and Data Mining, pages 5–14. ACM, 2009. [2] A. Angel and N. Koudas. Efficient diversity-aware search. ACM, June In Proceedings of [3] P. Boldi and S. Vigna. Axioms for centrality. Internet Mathematics, 2011. 2014. [4] S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30, 1998. [5] L. Freeman. A set of measures of centrality based upon betweenness. Sociometry, 40, 1977. [6] M. Garey and D. Johnson. Computers and intractability; A guide to the theory of NP-completeness. W. H. Freeman & Co., 1990. [7] G. H. Golub and C. F. Van Loan. Matrix computations, volume 3. JHU Press, 2012. [8] A. A. Hagberg, D. A. Schult, and P. J. Swart. Exploring network structure, dynamics, and function using NetworkX. In SciPy, 2008. [9] L. Katz. A New Status Index Derived from Sociometric Index. Psychometrika, 1953. [10] A. N. Langville and C. D. Meyer. A survey of eigenvector methods for web information retrieval. SIAM review, 47(1):135–161, 2005. [11] H. J. Leavitt. Some effects of certain communication patterns on group performance. The Journal of Abnormal and Social Psychology, 1951. [12] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In SIGKDD. ACM, 2007. [13] J. D. Noh and H. Rieger. Random walks on complex networks. Phys. Rev. Lett., 92, 2004. [14] G. Sabidussi. The centrality index of a graph. Psychometrika, 31, 1966. [15] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE transactions on Pattern Analysis and Machine Intelligence, 22(8):888– 905, 2000. [16] M. R. Vieira, H. L. Razente, M. C. N. Barioni, M. Hadjieleftheriou, D. Srivastava, A. J. M. Traina, and V. J. Tsotras. On query result diver- sification. 2011 IEEE International Conference on Data Engineering, pages 1163–1174, 2011. [17] U. Von Luxburg. A tutorial on spectral clustering. Statistics and computing, 17(4):395–416, 2007. [18] X. Zhu, A. Goldberg, J. Van Gael, and D. Andrzejewski. Improving diversity in web search results re-ranking using absorbing random walks. In NAACL-HLT, 2007. APPENDIX A. Proposition 1 Proposition (Monotonicity) For all X ⊆ Y ⊆ V it ac(Y ) ≤ ac(X). is Proof: Write GX for the input graph G where the set X are absorbing nodes. Define GY similarly. Let Z = Y \ X. Consider a path p in GX drawn from the distribution induced by the random walks on GX. Let Pr [p] be the probability of the path and (cid:96)(p) its length. Let P(X) and P(Y ) be the set of paths on GX and GY . Finally, let P(Z, X) be the set of paths on GX that pass from Z, and P(Z, X) the set of paths on GX that do not pass from Z. We have ac(X) = (cid:88) (cid:88) ≥ (cid:88) = p∈P(X) p∈P(Y ) = ac(Y ), p∈P(Z,X) Pr [p] (cid:96)(p) Pr [p] (cid:96)(p) + (cid:88) p∈P(Z,X) Pr [p] (cid:96)(p) Pr [p] (cid:96)(p) where the inequality comes from the fact that a path in GX passing from Z and being absorbed by X corresponds to a shorter path in GY being absorbed by Y . B. Proposition 5 Proposition Let Ci−1 be a set of i − 1 absorbing nodes, Pi−1 the corresponding transition matrix, and Fi−1 = (I − Pi−1)−1. Let Ci = Ci−1 ∪ {u}. Given Fi−1, the centrality score acQ(Ci) can be computed in time O(n2). The proof makes use of the following lemma. Lemma 1 (Sherman-Morrison Formula [7]) Let M be a square n×n invertible matrix and M−1 its inverse. Moreover, let a and b be any two column vectors of size n. Then, the following equation holds (M + abT )−1 = M−1 − M−1abT M−1/(1 + bT M−1a). Proof: Without loss of generality, let the set of absorbing nodes be Ci−1 = {1, 2, . . . , i − 1}. As in Section VI, the expected number of steps before absorption is given by the formulas acQ(Ci−1) = sT Q Fi−11, Notice that  = 0(i−1)×n −pi,1 . . . − pi,n pi+1,0 . . . pi+1,n 0(n−i−1)×n A(cid:48) − A = (I − P(cid:48)) − (I − P) = P − P(cid:48)  = a2bT 2 − a1bT 1 where pi,j denotes the transition probability from node i to node j in a transition matrix P0 where neither node i or i + 1 is absorbing, and the column-vectors a1, b1, a2, b2 are defined as 0 . . . 0 1 0 a1 = [ b1 = [pi,1 . . . pi,n] i−1 (cid:122)(cid:125)(cid:124)(cid:123) (cid:122)(cid:125)(cid:124)(cid:123) i−1 0 . . . 0] n−i−1 (cid:122)(cid:125)(cid:124)(cid:123) (cid:122)(cid:125)(cid:124)(cid:123) n−i−1 0 . . . 0 0 1 a2 = [ 0 . . . 0] b2 = [pi+1,1 . . . pi+1,n]. By an argument similar with the one we made in the proof of Proposition 5, we can compute F(cid:48) in the following two steps from F, each costing O(n2) operations for the provided parenthesization Z = F − (Za2)(bT F(cid:48) = Z + (Fa1)(bT 2 Z)/(1 + bT 1 F)/(1 + bT 2 (Za2)), 1 (Fa1)). We have thus shown that, given F, we can compute F(cid:48), and therefore acQ(C(cid:48)) as well, in time O(n2). with Fi−1 = A−1 i−1 and Ai−1 = I − Pi−1. We proceed to show how to increase the set of absorbing nodes by one and calculate the new absorption time by updating Fi−1 in O(n2). Without loss of generality, suppose we add node i to the absorbing nodes Ci−1, so that Ci = Ci−1 ∪ {i} = {1, 2, . . . , i − 1, i}. Let Pi be the transition matrix over G with absorbing nodes Ci. Like before, the expected absorption time by nodes Ci is given by the formulas acQ(Ci) = sT Q Fi1, with Fi = A−1 i and Ai = I − Pi. Notice that Ai − Ai−1 = (I − Pi) − (I − Pi−1) = Pi−1 − Pi  0(i−1)×n pi,1 . . . pi,n 0(n−i)×n =  = abT where pi,j denotes the transition probability from node i to node j in transition matrix Pi−1, and the column-vectors a and b are defined as (cid:122)(cid:125)(cid:124)(cid:123) i−1 (cid:122)(cid:125)(cid:124)(cid:123) n−i 0 . . . 0], and 0 . . . 0 1 a = [ b = [pi,1 . . . pi,n]. By a direct application of Lemma 1, it is easy to see that we can compute Fi from Fi−1 with the following formula, at a cost of O(n2) operations. Fi = Fi−1 − (Fi−1a)(bT Fi−1)/(1 + bT (Fi−1a)) We have thus shown that, given Fi−1, we can compute Fi, and therefore acQ (Ci) as well, in O(n2). C. Proposition 6 Proposition Let C be a set of absorbing nodes, P the corresponding transition matrix, and F = (I − P)−1. Let C(cid:48) = C − {v} ∪ {u}, for u, v ∈ C. Given F, the centrality score acQ(C(cid:48)) can be computed in time O(n2). Proof: The proof is similar to the proof of Proposition 5. Without loss of generality, let the two sets of absorbing nodes be C = {1, 2, . . . , i − 1, i}, and C(cid:48) = {1, 2, . . . , i − 1, i + 1}. Let P(cid:48) be the transition matrix with absorbing nodes C(cid:48). The absorbing centrality for the two sets of absorbing nodes C and C(cid:48) is expressed as a function of the following two matrices F = A−1, with A = I − P, and F(cid:48) = A(cid:48)−1, with A(cid:48) = (I − P(cid:48)). (a) karate (b) dolphins (c) lesmis (d) adjnoun (e) football Fig. 1: Results on small datasets for varying k and s = 2. (a) ca-GrQc (b) ca-HepTh (c) livejournal (d) oregon-1 (e) roadnet (f) kddCoauthors Fig. 2: Results on large datasets for varying k and s = 5.
1210.3266
1
1210
2012-10-11T15:17:35
Detecting dense communities in large social and information networks with the Core & Peel algorithm
[ "cs.SI", "cs.DS", "physics.soc-ph" ]
Detecting and characterizing dense subgraphs (tight communities) in social and information networks is an important exploratory tool in social network analysis. Several approaches have been proposed that either (i) partition the whole network into clusters, even in low density region, or (ii) are aimed at finding a single densest community (and need to be iterated to find the next one). As social networks grow larger both approaches (i) and (ii) result in algorithms too slow to be practical, in particular when speed in analyzing the data is required. In this paper we propose an approach that aims at balancing efficiency of computation and expressiveness and manageability of the output community representation. We define the notion of a partial dense cover (PDC) of a graph. Intuitively a PDC of a graph is a collection of sets of nodes that (a) each set forms a disjoint dense induced subgraphs and (b) its removal leaves the residual graph without dense regions. Exact computation of PDC is an NP-complete problem, thus, we propose an efficient heuristic algorithms for computing a PDC which we christen Core and Peel. Moreover we propose a novel benchmarking technique that allows us to evaluate algorithms for computing PDC using the classical IR concepts of precision and recall even without a golden standard. Tests on 25 social and technological networks from the Stanford Large Network Dataset Collection confirm that Core and Peel is efficient and attains very high precison and recall.
cs.SI
cs
1 Detecting dense communities in large social and information networks with the Core & Peel algorithm Marco Pellegrini Filippo Geraci Institute for Informatics and Institute for Informatics and Institute for Informatics and Consiglio Nazionale delle Consiglio Nazionale delle Consiglio Nazionale delle Via Moruzzi 1, 56124 Pisa, Via Moruzzi 1, 56124 Pisa, Via Moruzzi 1, 56124 Pisa, Telematics Ricerche Italy Telematics Ricerche Italy Miriam Baglioni Telematics Ricerche Italy [email protected] [email protected] [email protected] ABSTRACT Detecting and characterizing dense subgraphs (tight com- munities) in social and information networks is an impor- tant exploratory tool in social network analysis. Several approaches have been proposed that either (i) partition the whole network into "clusters", even in low density region, or (ii) are aimed at finding a single densest community (and need to be iterated to find the next one). As social networks grow larger both approaches (i) and (ii) result in algorithms too slow to be practical, in particular when speed in ana- lyzing the data is required. In this paper we propose an approach that aims at balancing efficiency of computation and expressiveness/manageability of the output community representation. We define the notion of a partial dense cover (PDC) of a graph. Intuitively a PDC of a graph is a collec- tion of sets of nodes that (a) each set forms a disjoint dense induced subgraphs and (b) its removal leaves the residual graph without dense regions. Exact computation of PDC is an NP-complete problem, thus, we propose an efficient heuristic algorithms for computing a PDC which we christen Core & Peel. Moreover we propose a novel benchmarking technique that allows us to evaluate algorithms for comput- ing PDC using the classical IR concepts of precision and recall even without a golden standard. Tests on 25 social and technological networks from the Stanford Large Net- work Dataset Collection confirm that Core & Peel is efficient and attains very high precison and recall. 1. INTRODUCTION Finding dense sub-networks in complex (social, communi- cation, technological, biological) networks is a key exploratory tool in complex network analysis as often one can spot emerg- ing phenomena liked to these regions with an above-average level of activity. As we will use social networks as a key metaphor we will talk of dense communities of nodes. A brief taxonomy of approaches to community de- tection. The recent literature the detection of community structures in complex graphs can be roughly split into three trends. The fist approach has concentrated on partitioning the nodes of a graph into clusters (or modules) so to favor the formation of modules for which intra-modules connections are favored over inter-module connections (e.g. the classical algorithm of Girvan and Newman [19]). This approach uses a non-local definition of "density" and postulates that every node should belong to some community (or alternatively) that all communities even if a low density or hard to dis- tinguish from the background are of interest (approach A). Being a partition of the nodes, the communities found are disjoint. The second approach postulates that a connected com- munity maximizing the density should be sought [3, 8]. A collection of dense communities can be constructed by re- moving the community found from the input graph and iterating the method on the residual graph (approach B). Communities found in this way are disjoint. A third approach aims at enumerating all dense subgraphs within the graph, usually with a condition of maximality, but allowing overlaps among communities (see e.g. PalE- tAl05)(approach C). In the worst case, the size of the out- put of an algorithm listing all maximal cliques (or maximal dense subgraphs) can be exponentially larger than the size of the input. Any of the aforementioned approaches has its pros and cons. Very Large social networks currently available pose a challenge to community analysis approaches in terms of computation time, main memory storage and readability of the algorithms' results. So while approaches (A) and (C) may reveal a complex community landscape, they do so in a quite unfocussed man- ner, that implies slow computations, and/or high memory consumption, and an output that may need further anal- ysis/modelling/visualization to be of use. In contrast ap- proach (B) may be fast if appropriate heuristics are em- ployed, but reveals only a single community in an otherwise more complex landscape. A the simple solution consisting in iterating approach (B) over the residual graph obtained by removing the found densest community would be an over- shooting for this problem, taking us back to the problem of an excessive time complexity. 2 The fourth approach, which is advocated in this paper as well as in others (see e.g. [28], [12], [18] [9], [36]) is that of collecting in one go a collection of disjoint dense com- munities above a certain size and density thresholds. This approach is suitable for very large graphs since the output is easy to interpret, visualize, and feed to further filters and analytic tools, in particular it is often the method of choice for the web graphs because of their size. Our contribution. This paper presents two main contri- butions. The first is a formalization of the problem of (dis- joint) communities detection as that of computing a partial dense cover of a graph and an efficient algorithm (christened Core & Peel) for computing heuristically the partial dense covers of a graph. The second contribution is methodolog- ical and aims at improving our capability of measuring the quality of an heuristic algorithms for (disjoint) community detection. In particular we propose a scheme that allow us to measure performance by classical IR concepts of precision and recall or realistic (i.e. non-random) graphs even without using a golden standard. The Core & Peel algorithm. We present an heuris- tic algorithm for detecting all sufficiently dense subgraphs of a graph G whose removal produces a residual graph G′ without dense subgraphs. The main idea consists in visiting the nodes of a graph in an appropriate order and for each visited node (called a seed) we look in the neighborhood of the seed in order to isolate those nodes in the neighborhood that, together with the seed, can participate in an a suffi- ciently dense induced subgraph. The order of the visit of the node is chosen so to visit first those nodes more likely to contribute in a larger dense subgraph. Large and dense sub- graph must be detected only once so to avoid wasting time re-discovering the same subgraph multiple times (i.e. with by a single seed) thus once such dense subgraph is detected its component vertices are marked and cannot be used as seeds any more. The visit order is produced by computing first the core number of each node in the graph, which rep- resent an upper bound to the average degree of the largest clique (or quasi-clique) incident to a node. Once a suitable region around a seed is detected that is likely to hold a dense subgraph, we employ a variant of the peeling procedure de- scribed by Charikar in [8] to extract the dense subgraph. The key definitions and the algorithm is described in 4. Benchmarking methodology. In may areas of com- puter science the lack of a common benchmarking methodol- ogy is often recognized as one of the main obstacles towards speedy progress in solving the key problems of that area. The IR community has been one of the first success stories in setting up an effective benchmarking methodology codi- fied through the TREC conference series. For the problem of clique detection the TCS and OR communities established the DIMACS benchmark collection. While many methods for community detection have been proposed recently, there is still no accepted benchmarking methodology. Most pa- pers address the issue of algorithmic validation by planting a few dense subgraph in a random graph and comparing the predicted dense subgraph against the planted ones. This "standard" approach is however wanting in many respects. (a) First of all it is well known that the basic Erdos-R´enyi random graph model is not suitable for modelling complex (social, technological, etc..) networks, while on the other hand it is still an open area of research that of producing suitable generative graph models. At the moment no single model can cover the whole range of applications. (b) Secondly, the embedded communities should not skew too much the underlying graph distribution (e.g. the ver- tex degree distribution) so to avoid making the instances amenable to approach based on simple statistical filters. (c) Thirdly, the possible presence of native (non-planted) dense subgraphs complicates the assessment as any method since detecting such nodes cannot be considered a fault of the algorithm, and should be weighted positively rather than ignored. In section 5 we propose a method that copes with issues (a),(b) and (c) and results in a more stringent and realistic assessment for community detection algorithms. In particu- lar we are able to define both precision and recall measure- ments that are standard and well understood measures of quality in IR applications. 2. PREVIOUS WORK Most of the known results are for finding a single maxi- mum size dense subgraph (or clique). In [29] V.E. Lee et al. give a survey of the state of the art on algorithms for dense subgraph discovery. Here we recall the main known results. Densest subgraph detection. Dense subgraphs can be defined in a variety of ways: if we seek the subgraph H of G maximizing the average degree 2E(H)/V (H), then there is an exact polynomial algorithm based on max-flow/min- cut computations [16, 20]. A second exact polynomial time algorithm based on a reduction to LP is shown in [8]. A simple greedy (1/2)-approximation algorithm1 is also shown in [8]. If we look for the densest subgraph with exactly k-vertices (dks), which is an NP-complete problem, Feige et al. [14] gave an O(n−1/3+ǫ)-approximation algorithm, where n = V , and ǫ > 0 an arbitrarily small positive constant. The approximation coefficient has been later improved in [6] to O(n−1/4+ǫ). It is known that this problem does not admit a PTAS, unless some hard complexity hypothesis holds [25]. If we look for the densest subgraph with at least k-vertices (dalks) Andersen et al. [3] give an efficient (1/3)-approximation algorithm for this problem, based on core decomposition. In the same paper it is shown that the densest at most k prob- lem (damks) is as hard as dks. Somewhat more complex (still polynomial) algorithms (based on LP and/or max-flow) at- tain an approximation factor of 1/2 for dalks [2, 26]. A different notion of "density" is used in the definition of γ-quasi cliques. A graph G = (V, E) is a γ-quasi clique if every node in G is adjacent to at least γ(V − 1) nodes in G. The densest subgraph problem (with this notion of density) can be recast as the problem of finding the largest induced subgraph that is a γ-quasi clique, for a fixed value of γ. Heuristics for detecting quasi-cliques are developed in [30, 1]. A method for detecting quasi-cliques tailored for external memory computations is given in [38]. Since, for γ = 1 we obtain a clique, this problem is in general as hard as maximum clique detection. 1A ρ-approximation algorithm A for a maximization prob- lem, with 0 ≤ ρ ≤ 1 is an algorithm that, calling OPT the value of the objective function f (.) ≥ 0 for the optimal so- lution, returns a solution x, whose value of the objective function f (x) is such that ρOP T ≤ f (x) ≤ OP T . 3 When the subgraph sought are relatively large and dense, a sampling approach based on shingling by Gibson et al. [18] works well in practice. In [37] Wang et al. define dense subgraph by placing a lower bound on the number of common neighbors for each pair of adjacent nodes in the subgraph, and propose a method based on iterating an efficient triangle counting black-box algorithm. Maximum clique. The maximum clique problem for a graph G requires to find the the largest complete subgraph of G, and is a classical NP-complete problem. Since this problem is also hard to approximate [23] the research effort has been directed towards heuristic, or exact algorithms still exponential in the worst case, but able to be fast in practice over certain classes of input graphs (see [7] for a survey). Other graphs. In this paper we restrict ourselves to generic (undirected) graphs. There is also a vast literature which we do not touch here (and corresponding different definitions) for directed graphs, for bipartite graphs, and other generalizations or specializations of graphs. Dense subgraphs and communities in social net- works. In social graphs often communities are defined in terms of dense subgraphs (see [15, 19, 33, 27]. Also dense bi- partite subgraphs are important in some applications since web communities are often modeled a as bipartite subgraphs of hubs and authorities (see e.g. [28, 12]). Partial dense covers approaches. A work that has similar aims as ours is in [9], where a partial vertex cover with dense subgraphs is sought. In [36] wang et al. map the problem into a real geometric space and look for dense clusters of points in this space. Core Decomposition. Since we use heavily properties of the core decomposition of a graph, we survey some related results. The k-core of a graph G = (V, E) is defined in [34] as an induced subgraph H of G, of minimum degree at least k. The core number of a vertex v of G is the order of the largest k-core to which v belongs. The core decomposition of a graph is a partition of the nodes into equivalence classes by the core number of its vertices. The core number cn(G) of a a graph is the maximum core number of any vertex in v. A very efficient method (linear in the graph size O(V + E)) for computing the core decomposition of a graph was proposed in [5]. For a graph too large to fit in RAM memory a method in [10] allows to compute the core decomposition of a graph with O(cn(G)) scans of the data. Several applica- tions of core decomposition to the analysis of networks are listed in [10]. The core decomposition is used as a preliminary phase in the approximate algorithms in [3] for the densest at-least-k subgraph problem (dalk). 3. PRELIMINARIES Let G = (V, E ⊂ V × V ) be a simple (undirected) graph (no self-loops, no multiple edges). A subset Q ⊂ V induces a subgraph HQ = (Q, EQ), where EQ = {(a, b) ∈ Ea ∈ Q ∧ b ∈ Q}. A nice survey of concepts and algorithms related to local density of subgraphs is in [27]. We restrict ourselves to local density definitions, that are those for which the density of a subset Q is a function depending on Q only and EQ. For a graph G is average degree is: av(G) = 2E V , thus the ratio E/V is just half the average degree. Define as density of a graph D(G) the following ratio: D(G) = = 2E V (V − 1) , E (cid:0)V 2 (cid:1) which gives the ratio of the number of edges in G to the maximum possible number of edges in a complete graph with the same number of nodes. Cliques are subgraphs of density 1, and finding a maximum induced clique in a graph G is an NP-complete problem. Several relaxations of the notion of clique have been pro- posed (see [4]) for a survey), most of which also lead to NP-complete decision problems. In the data mining literature it ha emerged the concept of quasi-clique. Given a parameter γ ∈ [0..1], a γ-quasi clique is a graph G = (V, E) such that: ∀v ∈ V NG(v) ≥ γ(V − 1), where N (G(v) = {u ∈ V (v, u) ∈ E} is the set of neigh- bors of v in G. Note that a γ-quasi clique has density D(G) ≥ γ. In general however for a dense graph with density D(G) we cannot infer a bound on the value of γ for which it is a quasi-clique (except for the value D(G) = 1 that implies γ = 1, and those cases covered by Tur'an's and Dirac's theorems ([35, 11]. If we impose a lower bound to the number of nodes k of ver- tices in a subgraph, then the average degree and the den- sity depend only on the number of edges, and the attain maximum value for the same graph. Otherwise finding the subgraph of maximum average degree, or the subgraph of maximum density are quite different problems, the latter ad- mitting a polynomial time solution, the latter NP-complete. In this paper we aim at detecting dense-subgraphs with a lower bounds on the size of the graph and to its density. However the heuristic we propose is best understood by referring to the case of cliques and quasi-cliques. Isolated cliques and quasi-cliques have a regular structure for which it is easy to derive useful properties. When we look ad the induced cliques and induced quasi-cliques in a graph, we can- not guarantee that those properties are preserved, although they are in general rather robust with respect to the per- turbations produced by the other nodes, and thus are often preserved in real-life social graphs. 4. HEURISTIC FOR DENSE COVER 4.1 Partial dense cover of a graph In this paper we propose an alternative approach that aims at balancing efficiency of computation and expressive- ness/manageability of the output community representation. Our aim is to compute for a graph G = (V, E) and param- eters q ∈ [1, ..V ] and density parameter δ ∈ [0.0, ..1.0], a partial dense cover P DC(G) of G. We denote by D[G] the density of G, i.e the ratio of E and V (V − 1)/2. A partial dense cover P DG(G) is a collection of subsets of V , {C1, ..., Ck}. With the following properties 4 a ∀j ∈ [1..k], Cj ⊆ V b Node-disjointness: ∀j, h ∈ [1..k], j 6= h ⇒ Cj ∩Ck = ∅. c Large size and density. ∀j ∈ [1..k], Cj ≥ q, and ∀j ∈ [1..k], D[G[Cj ]] ≥ δ. d Internal maximality: The union of any two sets Ci, and Cj induces a subgraph satisfying the other condi- tions and of density lower than the minimum density of G[Ci] and G[Cj ]. e External maximality: The residual graph G[V \Sk i=1 Ci] does not contain any induced subgraph satisfying the other conditions. f Radius constraint: Each subgraph G[Ci] has radius 1 or 2. The best way to justify the notion of a partial dense cover is to consider it as a relaxation of the well known concept of a minimum clique partition (problem GT15 in [17]. A minimum clique partition of a graph G = (V, E) is a par- tition of the vertex set V into k disjoint subsets so that the graph induced in G by each subset is a clique. Com- puting a clique cover of minimum size (k) is a well known NP-complete problem [17], and it is hard to approximate [31]. In a clique cover every clique satisfies the radius constraint (f), as any clique has radius 1, however graphs of radius 1 are not cliques in general. The radius constraint to 1 or 2 is set in order to attain an efficient computation, but as we will see later, we will be able to cover a wide range of non-trivial communities. The cover we seek is partial since we do not insist that any vertex must belong to some covering set, however we ask in (e) that the residual graph must not contain a subgraph that may be part of the cover. Note that this condition (d) implies that the problem we define is still NP-hard. In particular, for the density parameter δ = 1.0, our problem reduces to assessing whether a graph contains no clique of size al least q, which is equivalent to the NP-complete max- imum clique problem. The internal maximality constraint (d) is not problematic from a computational point of view since it can always be enforces "a posteriori" in polynomial time starting from a cover that satisfies the other constraints. For δ = 1.0 and q = 1 the problem is reduced to that of computing a minimal clique cover, that is, a clique cover which cannot be improved by locally merge two sets in the cover. This extreme case can be solved polynomially, but, naturally it is different from the minimum cover problem. The size parameter q and density parameter δ ensure that we can focus the computational effort towards those part of the graph that are more interesting (i.e. of large size and high density) with the aim of attaining computational effi- ciency and controlling the amount of information gathered in a run of the algorithm. 4.2 An Algorithm to compute partial dense covers As noted above computing a partial dense cover PDC(G) of a graph is an NP complete problem. In this section we will give an efficient heuristic algorithm which is based on combining in a novel way several algorithms and procedure already present separately in literature. For each step we will give "hand weaving" arguments as to it role and an intu- itive reason as to why it contributes to solving the PDC(G) computation efficiently. 4.3 Heuristic Algorithm Core & Peel Phase I. Initially we compute the Core Decomposition of G ( denoted with CD(G)). Moreover we compute for each vertex v in G the Core Count of v , denoted with CC(v) , defined as the number of neighbors of v having core number at least as large as C(v). Next, we sort the vertices of V in decreasing lexicographic order of their core values C(v) and core count value CC(v). Phase II. In phase II we consider each node v in turn, in the order given by phase I. For each v we construct the set N r C(v)(v) of neighbors of v at distance r in G having core number at least C(v). If N r C(v)(v) < q we do not process this node any more. Otherwise we compute the density δ(v) of the induced subgraph G[N r C(v)(v)]. If this density is too small: δ(v) ≤ δlow, for a user defined threshold δlow we do not process this node any more. Nodes that pass the size and density tests go to phase III. Phase III. In this phase we take v and the induced sub- graph G[N r C(v)(v)] and we apply a variant of the peeling procedure described in [8], that iteratively removes modes if minim degree in the graph. The peeling procedure stops (and report failure) when the number of nodes drops below the threshold q. The peeling procedure stops (and reports success) when the density of the resulting subgraph is above or equal to the user defined threshold δ. The set of nodes returned by the successful peeling procedure is added to the output cover set, and its elements are marked so to be ex- cluded from further consideration. Phases II and III are executed interleaved so to (1) enforce that the covering sets produced are disjoint, and (2) avoid discovering multiple times the same dense subgraph. 4.4 Justifications of phase I The core decomposition of a graph G = (V, E) associates to any vertex v a number C(v) which is the largest number such that v has al least C(v) neighbors having core number at least C(v). Consider now a clique Kx if size x, for each node v in Kx its core number is x − 1. If Kx is an induced subgraph of G, then its core number can only be larger than x − 1, thus C(v) is an upper bound to the size of the largest induced clique incident to v. Consider a quasi-clique Kx,γ, for each node v in Kx its core number is at least γ(x − 1). If Kx,γ is an induced subgraph of G, then its core number can only be larger, thus thus C(v) is an upper bound to the size of the largest (in terms of average degree) quasi-clique incident to v. Thus if the upper bound provided by the core number is tight, examining the nodes in (decreasing) order of their core number allows us to home in first on the largest cliques (or quasi-cliques), and subsequently the smaller ones. In a clique Kx each node is a leader for the clique, meaning that it is at distance 1 to any other node in the clique. Thus the first node of Kx encountered in the order computed in phase I is always a leader. In the case of of quasi-cliques we just suppose the existence of at least one leader node. For an isolated quasi-clique the leader node will have the the maximum possible core count value, thus by sorting (in 5 the lexicographic order) on the core count value we push the leader node to be discovered first in the order (assuming all nodes in the quasi-clique have the same core number). For an induced quasi-clique the influence of other nodes may increase the value of the core count for any node, but, as- suming that the relative order between the leader and the other nodes does not change, we still obtain the effect of encountering the leader before the other nodes of the quasi- clique. The core number gives us an estimate of the largest (in terms of average degree) quasi-clique (or clique) a node can be incident to, thus it provides a very powerful filter. Also fortunately there is a very efficient algorithm of complex- ity O(V + E) that computes the core decomposition of a graph [5]. Also it has been observed empirically that in social graph often the core number and the core count of any node are much smaller than its degree (which is also an obvious upper bound on the size of the largest clique incident to v). Thus subsequent operations are intuitively less expensive when their complexity can be charged onto the core number or the core count values of a node and its neighbors. 4.5 Justification of phase II In Phase II we count the number of edges in the subgraph induced by the node v and its neighbours with equal or higher core value. Phase II is equivalent to computing a restricted local clustering coefficient of a node v, where the computation is restricted to the neighboring nodes of v of sufficiently high core number. Classical result of Turan and Dirac (see [35], [11]) guar- antee the existence of a clique (or a clique with a few edges missing) in graphs with sufficiently many edges. (approxi- mately above n2/4 for a graph of n nodes). Although it is possible to derive some thresholds from these classical re- sults, such threshold would give us only sufficient conditions but not necessary ones to the existence of a clique in the graph that is exhamined in phase II. Since the purpose of phase II is to trade off the number of invocations of phase III with the chance that phase III may find a sufficiently dense subgraph, we resort to a more ad-hoc strategy for selecting thresholds. We set δlow = δ/2, which did perform well in our experiments. 4.6 Justification of phase III The peeling procedure we use is similar to one described in [8]. It consists in an iterative procedure that remove a node of minimum degree (ties resolved arbitrarily) and all incident edges, then iterates on the residual graph. In [8] the graph of highest average degree constructed in this process is returned as output. We modify this procedure by returning the first subgraph generated that satisfies the density and size constraints. It is shown in [8] that this procedure is (1/2)-approximate for the average degree , i.e. it returns a subgraph whose av- erage degree is with a factor (1/2) of that of the subgraph of highest average degree. Empirically, we rely on the intu- ition that, in our setting, the input to the peeling procedure as produced after phase II is a superset of the output that is tight enough and dense enough so that the peeling pro- cedure converges quickly to isolating the embedded dense subgraph, in a typical situation. We also use a novel heuristic to solve cases of ties within the peeling algorithm in [8]. When two or more vertices are of minimum degree the original peeling procedure picks one arbitrarily. In our variant we compute the sum of degrees of the adjacent nodes D(v) = Pw∈N(v) d(w) and we select the vertex among those of minimum degree minimizing D(.). This secondary selection criterion is inspired by observations in [22], where the objective is to select an independent set by iteratively removing small degree nodes, which is a dual problem that of detecting cliques. 4.7 Influence of radii In our algorithm we assume that the dense community has radius r = 1 or r = 2. This technical restriction is needed in order to ensure that we can recover efficiently a superset of the community node set starting from a leader seed node. As we will argue below this restriction is not severe as it covers a wide range of cases of interest either precisely or with high probability. Case r = 1. As mentioned above in a clique Kn of n nodes every node is at distance 1 from any other node, thus every node is a center and the radius is r = 1. If we start re- moving edges from Kn we maintain the property r = 1 with certainty up to ⌊n/2⌋ − 1 edge removals, while the number of centers is reduced. If we look at the edge removal as a random uniform selection of a pair of nodes and we remove of the edge joining them (if still existing) we can model this process similarly to the well known Coupon collector problem [32] thus the expected number of edge deletions before all nodes are selected at least once is approximately (n/2) ln n. Thus even for a fair relaxation from the clique we retain the property with high probability of to this limit since the Coupon Collector number has a distribution highly concen- trated around the expected value. In certain applications a node that represents a center (re- alizes r = 1) in a dense subgraph can be interpreted as a "leader" of the group (since it has relationships with all the members of the group) and thus being a feature characteriz- ing the proper communities. In effect in many social graphs (e.g. Twitter graph) there is a natural leader-follower dy- namics. Case r = 2. If we remove edges but the degree of each node is at least ⌊n/2⌋ then by the pigeon hole principle each pair of nodes in the community will have a neighbor in com- mon, thus the radius of the subgraph is 2 and every node is a center (with r = 2). Thus the algorithm set with pa- rameters r = 2 is (potentially) able to recover in phase I a superset of any γ-quasi clique for γ ≥ 0.5. Consider the following random process. We take a set V of n vertices , for each v ∈ V we select its neighbor vertex set by picking vertices in V with probability p. The property that any two nodes have a non-empty neighbor intersection can be rephrased as the requirement that the corresponding intersection graph (see [24]) is complete. The threshold value of p so that this property holds with high probability is p = r 2 log n n Since the expected number of neighbors of any node v is pn, we have that the graph is an O(p)-quasi clique withe high probability. Thus we are able to retain the property r = 2 and the fact that all nodes are centers ever at a quite 6 low overall density. 5. TESTING EFFECTIVENESS 5.1 Testing methodology The quality of the heuristic proposed will be tested em- pirically by the planted solution methodology [13]. For a given input graph G and parameters δ, and q we implant randomly a certain number of subgraphs in G, by adding edges, so to force the presence of a subgraph of size ¯q ≥ q and density ¯δ ≥ δ. We call this graph G′ the planted graph. By measuring the number of such planted subgraphs that are found by running H −P DG blindly on the planted graph we can measure the effectiveness of H −P DG in finding such structures. In IR terms we can thus measure the recall of the method. Experiments on 12 data sets (not shown in this paper) indicate that using this simple methodology the performance is close to 100% in terms of recall for planted cliques of size equal to the average degree of the graph G. This methodology was adopted in [12]. In order to better assess the potential of the method how- ever we resort to a more taxing testing methodology. In particular we want to measure not only the algorithm's ca- pability of detecting planted dense subgraph, but also the property that no dense subgraphs are left in the residual graph after the application of the algorithm. 2, and we run H −P DG on G′ Thus we operate as follows. We take the input graph G and we apply the H − P DG algorithm, thus obtaining a set of dense subgraphs and a residual graph G1. We then apply a second time H − P DG to G1 possibly obtaining a few more communities and a second residual graph G2. Next we plant dense subgraphs in G2 obtaining the planted graph G′ 2. In the ideal case G2, being a residual graph after two applications of H − P DG is already empty of dense subgraphs, thus the all and only communities we should find are those we planed in G′ 2. Now we can define properly the notion of precision and recall of the algorithm. Each planted community that is not found reduces the recall, while each found community that was not planted reduces the precision. We can obviously also define the harmonic mean of the two measures that is known as F-measure which gives us a more synthetic measurement. Note that we apply H − P DG twice before generating the planting graph on which we measure precision and recall. In general one can try to increase the precision by iterating several time H − P DG on the residual graph resulting from the previous iteration. We chose to limit the iterations to a fixed and small number (two) for two orders of reasons, the first one is that the cost of the execution in terms of time increases2. The second and more important one is that even with two applications the precision already reaches values close to 1, while further iteration have no direct impact on the recall, thus the F-measure would not be much affected by further iterations. Choice of parameters. The choice of size and density of the planted communities is critical. If we plant communities too large and dense the degree of the selected nodes will be biased and even a simple 2This marginal cost could be kept under control by doing incremental updates of the data structures, rather than a re- computation from scratch and by examining only the nodes whose immediate neighborhood has been affected by the up- dates. minded approach can easily detect the nodes belonging to these communities. We choose the planted communities so that their average degree is equal to the half the average degree of the host graph (i.e roughly E/V ). Moreover we choose the number of planted communities so to modify no more than 1% of the total number of nodes. The searching algorithm is given as parameters (minimum size, density) exactly the parameters used for the plant- ing of the communities. The list of detected communities is matched with the list of embedded communities, and a planted community is marked as "detected" if its vertex set overlaps by more than 50% with a detected community. Pre- cision and recall are computed with respect to the commu- nities (not their node-sets). Note that one could improve the recall "by default" by performing the search with parameters of minimum size and minimum density slightly lower than those used for the gen- eration. In this case we are less likely to miss embedded nodes, and the embedded community would be a subset of a larger detected community without incurring in any penalty. In order to make a fair assessment of the proposed algorithm we will not use this option. In general, however, such strat- egy is beneficial when one sees H − P DG as a filter to be used to feed candidate communities (of much smaller size w.r.t the original graph G) to exact but computationally expensive methods, such as for example methods based on ILP developed in [4]. Other testing methodologies. In [9] the evaluation of the accuracy is done, for the case of non bipartite graphs, by generating random graphs with 100 nodes and 2000 edges that contains three dense subgraphs which cover 75% of the nodes of the graph. Precision and recall are computed with respect to the node-sets and the F-values obtained are close to 1. In [36] the evaluation of the accuracy is done by embed- ding four dense subgraphs (with 8 nodes each and density 70%) in a random sparser graph of total of 60 nodes. Also, in this case the planted communities cover more than 50% of the nodes of the graph. In [36] it is shown that all four dense subgraphs are detected using the CSV-plot. Although the results shown in [9, 36] are quite good for small random graphs with high community coverage, it is not clear if measurements obtained allows to infer similar performance in social graphs whose size, degree distribution and community structure are so different. For this reasons we decided to develop a new, more de- manding, testing methodology, which is closer to the ap- plicative scenarios where the targets are social and techno- logical graphs. 5.2 Benchmark data set The experiments are conducted on 25 graphs downloaded from the Stanford Large Network Dataset Collection [21]. This collection comprises several graph types including: In- ternet autonomous systems, Authors collaboration networks, Internet peer-to-peer networks, E-mail communication net- works, Citation networks, Web graphs, Trust networks, Road networks, and Product co-purchasing networks. Basic graph statistics are shown in Table 3, other measures are available at [21]. 5.3 Experiments 7 In Tables 1 and 2 we report average precision, average re- call and average F-measure over all 25 data sets, for density ranging from 100% to 50% and radius ranging from 1 to 2. Tables 4, 5, 6, and 7 report the precision, recall and fmea- sure of the method on each test file for varying radius and density values. In the first set of experiment we embed cliques (100% dense, radius 1) of size roughly E/V , data are reported in Table 4. Note that the recall is always quite high; it is above 90% in all 25 cases. Precision is slightly worse (above 90% in 22 cases out of 25). The combination though the F-measure however is above 90% in 23 cases out of 25, and never below 0.85. On average, precision is about 96% and recall about 99%. When we keep the radius to 1, but we re- duce the density to 70% (see 5), there is a reduction in preci- sion and recall, with recall above 90% in 11 tests, precision above 90% in 12 tests, with average precision about 83% and average recall about 84%. When we relax the radius constraint to radius=2 at 70% density, 14 test cases attain precision above 90%, 10 recall above 90%, and 8 F-measure above 90%, however while the average recall reduces to 78%, the average precision is maintained at 85%. Finally when we leave the radius to 2 and set the density to 50% we have very similar values for average precision and average recall. Thus, we conclude that the computation at radius 2 is not so sensitive to the density threshold. Tables 8, 9, 10, and 11 report on the time measurement on each test file, with data for each phase, for the total time spent, and the time spent per edge. The initial phase that consists in the core decomposition is linear in the size of the graph, while all other computations involve the local neighborhood of some node, thus it is interesting to measure the time spent per edge as a common criterion of comparison for different runs of the algorithm. One can observe that the time spend for edge is rather stable, in the region of 10−6 to 10−5 seconds for radius =1 (Tables 8, 9) and in the range 10−4 to 10−3 seconds for radius=2 (Tables 10, 11). Some slower runs for radius=1 are noticeable for some of the web- graphs (files 23, and 25). In the total time we include the cost of run 3 whose purpose is to measure the effectiveness of runs 1 and 2, thus, if this reliability measure is not needed, it can be skipped and the total time reduced by about 1/3. Since the experimental code has been developed in Python we expect that a factor 10 in timing can be easily gained by switching to an implementation in the C language. measure average precision average recall average fmeasure average precision average recall average fmeasure radius d=1 d=1 d=1 d=1 d=1 d=1 density 1.0 1.0 1.0 0.7 0.7 0.7 value 0.95429535884 0.98965535788 0.97020508204 0.83020137232 0.83947183728 0.82681618136 Table 1: Averages output quality statistics for ra- dius 1. 6. CONCLUSIONS 8 measure average precision average recall average fmeasure average precision average recall average fmeasure radius d=2 d=2 d=2 d=2 d=2 d=2 density 0.7 0.7 0.7 0.5 0.5 0.5 value 0.8557872834 0.780538866 0.78194706944 0.77783144912 0.82669275188 0.78456921128 Table 2: Averages output quality statistics for ra- dius 2. In this paper we have presented a method to quickly find dense sub-graphs (communities) in graphs. The novelty of the approach relies on the combination of existing methods to speed up the community discovery. The experiments con- ducted on various types of graphs show the effectiveness and the reliability of the method. 7. REFERENCES [1] J. Abello, M. G. C. Resende, and S. Sudarsky. Massive quasi-clique detection. In S. Rajsbaum, editor, LATIN, volume 2286 of Lecture Notes in Computer Science, pages 598 -- 612. Springer, 2002. [2] R. Andersen. Finding large and small dense subgraphs. CoRR, abs/cs/0702032, 2007. [3] R. Andersen and K. Chellapilla. Finding dense subgraphs with size bounds. In K. Avrachenkov, D. Donato, and N. Litvak, editors, WAW, volume 5427 of Lecture Notes in Computer Science, pages 25 -- 37. Springer, 2009. [4] B. Balasundaram. Graph Theoretic Generalizations Of Clique: Optimization And Extensions. PhD thesis, Texas A&M University, 2007. [5] V. Batagelj and M. Zaversnik. An O(m) algorithm for cores decomposition of networks. CoRR, cs.DS/0310049, 2003. [6] A. Bhaskara, M. Charikar, E. Chlamtac, U. Feige, and A. Vijayaraghavan. Detecting high log-densities: an o(n1/4) approximation for densest k-subgraph. In L. J. Schulman, editor, STOC, pages 201 -- 210. ACM, 2010. [7] I. M. Bomze, M. Budinich, P. M. Pardalos, and M. Pelillo. The maximum clique problem. In Handbook of Combinatorial Optimization, pages 1 -- 74. Kluwer Academic Publishers, 1999. [8] M. Charikar. Greedy approximation algorithms for finding dense components in a graph. In K. Jansen and S. Khuller, editors, APPROX, volume 1913 of Lecture Notes in Computer Science, pages 84 -- 95. Springer, 2000. [9] J. Chen and Y. Saad. Dense subgraph extraction with application to community detection. IEEE Transactions on Knowledge and Data Engineering, 24(7), 2012. [10] J. Cheng, Y. Ke, S. Chu, and M. T. Ozsu. Efficient core decomposition in massive networks. In S. Abiteboul, K. Bohm, C. Koch, and K.-L. Tan, editors, ICDE, pages 51 -- 62. IEEE Computer Society, 2011. [11] G. A. Dirac. Extensions of tur´an theorem on graphs. Acta Mathematica Academiae Scientiarum Hungaricae, 14:417 -- 422, 1963. [12] Y. Dourisboure, F. Geraci, and M. Pellegrini. Extraction and classification of dense implicit communities in the web graph. TWEB, 3(2), 2009. [13] U. Feige. Rigorous analysis of heuristics for np-hard problems. In SODA, page 927. SIAM, 2005. [14] U. Feige, D. Peleg, and G. Kortsarz. The dense k-subgraph problem. Algorithmica, 29(3):410 -- 421, 2001. [15] S. Fortunato. Community detection in graphs. Phys. Rep., 486:75 -- 174, 2010. [16] G. Gallo, M. D. Grigoriadis, and R. E. Tarjan. A fast parametric maximum flow algorithm and applications. SIAM J. Comput., 18(1):30 -- 55, 1989. [17] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. [18] D. Gibson, R. Kumar, and A. Tomkins. Discovering large dense subgraphs in massive graphs. In K. Bohm, C. S. Jensen, L. M. Haas, M. L. Kersten, P.-A. Larson, and B. C. Ooi, editors, VLDB, pages 721 -- 732. ACM, 2005. [19] M. Girvan and M. E. J. Newman. Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA, pages 7821 -- 7826, 2002. [20] A. V. Goldberg. Finding a maximum density subgraph. Technical Report UCB/CSD-84-171, EECS Department, University of California, Berkeley, 1984. [21] S. Graphs. http://snap.stanford.edu/data/. [22] M. M. Halld´orsson and J. Radhakrishnan. Greed is good: approximating independent sets in sparse and bounded-degree graphs. In F. T. Leighton and M. T. Goodrich, editors, STOC, pages 439 -- 448. ACM, 1994. [23] J. Hastad. Clique is hard to approximate within n1-epsilon. In FOCS, pages 627 -- 636. IEEE Computer Society, 1996. [24] M. Karo´nski, E. R. Scheinerman, and K. B. Singer-Cohen. On random intersection graphs: The subgraph problem. Comb. Probab. Comput., 8(1-2):131 -- 159, Jan. 1999. [25] S. Khot. Ruling out ptas for graph min-bisection, dense k-subgraph, and bipartite clique. SIAM J. Comput., 36(4):1025 -- 1071, 2006. [26] S. Khuller and B. Saha. On finding dense subgraphs. In S. Albers, A. Marchetti-Spaccamela, Y. Matias, S. E. Nikoletseas, and W. Thomas, editors, ICALP (1), volume 5555 of Lecture Notes in Computer Science, pages 597 -- 608. Springer, 2009. [27] S. Kosub. Local density. In U. Brandes and T. Erlebach, editors, Network Analysis, volume 3418 of Lecture Notes in Computer Science, pages 112 -- 142. Springer, 2004. [28] R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Trawling the web for emerging cyber-communities. Computer Networks, 31(11-16):1481 -- 1493, 1999. [29] V. E. Lee, N. Ruan, R. Jin, and C. Aggarwal. A survey of algorithms for dense subgraph discovery. In C. C. Aggarwal, H. Wang, and A. K. Elmagarmid, editors, Managing and Mining Graph Data, volume 40 of The Kluwer International Series on Advances in Database Systems, pages 303 -- 336. Springer US, 2010. [30] G. Liu and L. Wong. Effective pruning techniques for mining quasi-cliques. In W. Daelemans, B. Goethals, and K. Morik, editors, Machine Learning and Knowledge Discovery in Databases, volume 5212 of Lecture Notes in Computer Science, pages 33 -- 49. Springer Berlin / Heidelberg, 2008. [31] C. Lund and M. Yannakakis. On the hardness of approximating minimization problems. J. ACM, 41:960 -- 981, September 1994. [32] R. Motwani and P. Raghavan. Randomized Algorithms. Cambridge University Press, 1995. [33] M. Newman. The structure and function of complex networks. SIAM Review, 45(2):167 -- 256, 2003. [34] S. B. Seidman. Network structure and minimum degree. Social Networks, 5(3):269 -- 287, 1983. [35] P. Tur´an. On an extremal problem in graph theory. Math. Fiz. Lapok, 48:436 -- 452, 1941. [36] N. Wang, S. Parthasarathy, K.-L. Tan, and A. K. H. Tung. Csv: visualizing and mining cohesive subgraphs. In J. T.-L. Wang, editor, SIGMOD Conference, pages 445 -- 458. ACM, 2008. [37] N. Wang, J. Zhang, K.-L. Tan, and A. K. H. Tung. On triangulation-based dense neighborhood graphs discovery. PVLDB, 4(2):58 -- 68, 2010. [38] Z. Zeng, J. Wang, L. Zhou, and G. Karypis. Out-of-core coherent closed quasi-clique mining from large dense graph databases. ACM Trans. Database Syst., 32(2):13, 2007. 9 # Type 1. AutonomousSystemGraphs 2. AutonomousSystemGraphs 3. AutonomousSystemGraphs 4. AutonomousSystemGraphs 5. AutonomousSystemGraphs 6. CitationNetworks 7. CitationNetworks 8. CitationNetworks 9. CollaborationNetworks 10. CollaborationNetworks 11. CollaborationNetworks 12. CollaborationNetworks 13. CommunicationNetwork 14. 15. ProductCo-Purchasing 16. RoadNetworks 17. RoadNetworks 18. RoadNetworks 19. 20. 21. 22. 23. WebGraphs 24. WebGraphs 25. WebGraphs SignedNetworksP1 SignedNetworksP1 SocialNetwork SocialNetwork InternetPeerToPeer Graph Name as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh Email-Enron p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX soc-sign-Slashdot090221 wiki-Talk soc-Epinions1 soc-Slashdot0902 web-BerkStan web-Google web-Stanford # nodes # edges 105722 22190596 25144 46818 65460 841754 704570 33037894 186878 28968 236978 51946 367662 295784 4886816 5533214 3083796 3843320 1000962 9319130 811480 1008460 13298940 8644102 3985272 26389 1696415 6474 11174 11461 34546 27770 3774768 23133 5242 12008 9877 36692 62586 403394 1965206 1088092 1379917 82140 2394385 75879 82168 685230 875713 281903 E/V 4,0062905 13,08087703 3,883843065 4,189905137 5,711543495 24,36617843 25,37162405 8,75229789 8,078416116 5,526135063 19,73500999 5,259289258 10,02022239 4,726040968 12,11425058 2,815589816 2,834131673 2,785182007 12,18604821 3,892076671 10,69439502 12,2731477 19,4079944 9,870930316 14,13703295 Table 3: List of 25 graphs test from Stanford Large Network Dataset Collection with number of nodes, number of edges and ratio E/V . as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh # Graph Name 1. 2. 3. 4. 5. 6. 7. 8. 9 10 11 12 13 Email-Enron 14 15 16 17 18 19 20 wiki-Talk 21 22 23 web-BerkStan 24 web-Google 25 web-Stanford soc-Epinions1 soc-Slashdot0902 p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX soc-sign-Slashdot090221 # nodes 5 14 5 5 6 25 26 9 9 6 20 6 11 5 13 4 4 4 13 4 11 14 20 10 15 density 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 av. degree 4 13 4 4 5 24 25 8 8 5 19 5 10 4 12 3 3 3 12 34 10 13 19 9 14 precision 0,928571429 0,998351195 0,961538462 0,843137255 0,791666667 1 1 1 0,739130435 1 1 0,914285714 0,942857143 1 1 0,974968112 0,976884422 0,982360923 0,992063492 0,954465429 1 1 0,994186047 0,904260915 0,958656331 recall 0,99047619 0,999587288 1 0,977272727 1 1 1 1 1 1 1 1 1 1 1 0,933516525 0,938094582 0,944450484 0,992063492 0,996324451 1 1 0,998540146 0,981724729 0,989333333 F-measure 0,958525346 0,99896886 0,980392157 0,905263158 0,88372093 1 1 1 0,85 1 1 0,955223881 0,970588235 1 1 0,953792162 0,957096638 0,963032755 0,992063492 0,974945845 1 1 0,996358339 0,941401972 0,973753281 Num. Embedded 105 2423 25 44 38 27 21 8388 51 17 12 32 66 250 620 13101 7253 9199 126 11971 137 117 685 1751 375 Table 4: Experiments with embedding of communities of radius 1, 100% dense of average degree about E/V . We report the size of the communities embedded, the recall precision and f-measure of our algorithm. 10 as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh # Graph Name 1. 2. 3 . 4. 5. 6. 7. 8. 9 10. 11. 12. 13. Email-Enron 14. 15. 16. 17. 18. 19. 20. wiki-Talk 21 22 23 web-BerkStan 24 web-Google 25 web-Stanford soc-Epinions1 soc-Slashdot0902 p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX soc-sign-Slashdot090221 # nodes 7 20 7 7 8 35 37 12 12 8 28 8 15 7 18 4 4 4 18 5 15 20 28 14 21 density 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 av. degree 5 14 5 5 6 25 26 9 9 6 20 6 11 5 13 3 3 3 13 4 11 14 20 10 15 precision 0,905405405 0,940600522 0,857142857 0,783783784 0,631578947 1 0,8 0,972490988 0,444444444 0,866666667 0,3 0,75 0,612903226 1 0,965517241 1 1 0,999705623 0,984848485 0,923212253 0,775510204 0,971014493 0,872641509 0,576139089 0,821428571 recall 0,893333333 0,849646226 1 0,935483871 0,857142857 0,947368421 0,533333333 0,814814815 0,736842105 1 0,375 1 0,791666667 0,786516854 1 0,984225524 0,984375 0,984490506 0,714285714 0,931502558 0,752475248 0,817073171 0,756646217 0,768185452 0,77238806 F-measure 0,899328859 0,892812887 0,923076923 0,852941176 0,727272727 0,972972973 0,64 0,886697803 0,554455446 0,928571429 0,333333333 0,857142857 0,690909091 0,880503145 0,98245614 0,992050059 0,992125984 0,992039728 0,828025478 0,927338877 0,763819095 0,887417219 0,810514786 0,658444673 0,796153846 Num. Embedded 75 1696 18 31 28 19 15 6291 38 13 8 24 48 178 448 9826 5440 6899 91 9577 101 82 489 1251 268 Table 5: Experiments with embedding of communities of radius 1, 70% dense of average degree about E/V . We report the size of the communities embedded, the recall precision and f-measure of our algorithm. as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh # Graph Name 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. Email-Enron 14. 15. 16. 17. 18. 19. 20. wiki-Talk 21. 22. 23. web-BerkStan 24 web-Google 25. web-Stanford soc-Epinions1 soc-Slashdot0902 p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX soc-sign-Slashdot090221 # nodes 7 20 7 7 8 35 37 12 12 8 28 8 15 7 18 4 4 4 18 5 15 20 28 14 21 density 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 0,7 av. degree 5 14 5 5 6 25 26 9 9 6 20 6 11 5 13 3 3 3 13 4 11 14 20 10 15 precision 0,948717949 0,918563923 0,947368421 0,885714286 0,675 1 1 0,979404193 0,421875 0,666666667 0,583333333 0,8 0,634920635 1 0,991150442 0,99922179 0,999193873 0,99904943 0,925925926 0,922119447 0,788235294 0,923076923 0,884520885 0,64084507 0,859778598 recall 0,986666667 0,618514151 1 1 0,964285714 0,684210526 0,2 0,846606263 0,710526316 0,923076923 0,875 1 0,833333333 0,578651685 1 0,914716059 0,911397059 0,914045514 0,274725275 0,843165918 0,663366337 0,292682927 0,736196319 0,872901679 0,869402985 F-measure 0,967320261 0,739252995 0,972972973 0,939393939 0,794117647 0,8125 0,333333333 0,908176315 0,529411765 0,774193548 0,7 0,888888889 0,720720721 0,733096085 0,995555556 0,955103342 0,953278216 0,954658996 0,423728814 0,880877059 0,720430108 0,444444444 0,803571429 0,739086294 0,864564007 Num. Embedded 75 1696 18 31 28 19 15 6291 38 13 8 24 48 178 448 9826 5440 6899 91 9577 101 82 489 1251 268 Table 6: Experiments with embedding of communities of radius 2, 70% dense of average degree about E/V . We report the size of the communities embedded, the recall precision and f-measure of our algorithm. 11 as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh # Graph Name 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. Email-Enron 14. 15. 16. 17. 18. 19. 20. wiki-Talk 21. 22. 23. web-BerkStan 24. web-Google 25. web-Stanford soc-Epinions1 soc-Slashdot0902 p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX soc-sign-Slashdot090221 # nodes 10 28 10 10 12 50 52 18 18 12 40 12 22 10 26 6 6 6 26 8 22 28 40 20 30 density 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 av. degree 5 14 5 5 6 25 26 9 9 6 20 6 11 5 13 3 3 3 13 4 11 14 20 10 15 precision 0,894736842 0,770140429 0,8 0,846153846 0,464285714 1 0,714285714 0,873723104 0,46 0,727272727 0,25 0,842105263 0,5 1 0,987261146 0,99908383 0,99917287 0,999130435 0,942857143 0,941370768 0,776315789 0,962962963 0,62915601 0,374229346 0,691542289 recall 0,980769231 0,860445912 1 1 0,684210526 1 0,5 0,95851216 0,92 1 0,333333333 1 0,787878788 0,696 1 0,998931298 0,999448428 0,999347684 0,523809524 0,952380952 0,867647059 0,448275862 0,719298246 0,693714286 0,743315508 F-measure 0,935779817 0,812792512 0,888888889 0,916666667 0,553191489 1 0,588235294 0,91415577 0,613333333 0,842105263 0,285714286 0,914285714 0,611764706 0,820754717 0,993589744 0,999007558 0,99931063 0,999239048 0,673469388 0,946843854 0,819444444 0,611764706 0,671214188 0,48618342 0,716494845 Num. Embedded 52 1211 12 22 19 13 10 4194 25 8 6 16 33 125 310 6550 3626 4599 63 5985 68 58 342 875 187 Table 7: Experiments with embedding of communities of radius 2, 50% dense of average degree about E/V . We report the size of the communities embedded, the recall precision and f-measure of our algorithm. file name as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh num. 1 2 3 4 5 6 7 8 9 10 11 12 13 Email-Enron 14 15 16 17 18 19 20 wiki-Talk 21 22 23 web-BerkStan 24 web-Google 25 web-Stanford soc-Epinions1 soc-Slashdot0902 p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX soc-sign-Slashdot090221 numarcs 105722 22190596 25144 46818 65460 841754 704570 33037894 186878 28968 236978 51946 367662 295784 4886816 5533214 3083796 3843320 1000962 9319130 811480 1008460 13298940 8644102 3985272 time ph1 0.34 181.12 0.06 0.11 0.14 3.3 3.75 721.13 0.46 0.07 0.3 0.17 1.1 1.12 28.04 107.29 45.23 63.58 3.95 198.96 3.43 3.9 1066.51 61.88 91.5 time ph2 0.32 373.33 0.08 0.12 0.21 3.42 3.94 786 0.54 0.07 0.46 0.17 1.57 1.22 28.27 99.73 41.92 59.38 4.37 213.97 4.14 4.7 2897.22 75.49 106.75 time ph3 0.34 414.16 0.1 0.13 0.23 3.31 3.88 797.23 0.58 0.07 0.6 0.18 1.83 1.25 27.37 100.2 43.51 58.61 4.57 165.91 4.67 4.79 2890.32 82.16 268.76 total time 1 968.61 0.24 0.36 0.58 10.03 11.57 2304.36 1.58 0.21 1.36 0.52 4.5 3.59 83.68 307.22 130.66 181.57 12.89 578.84 12.24 13.39 6854.05 219.53 467.01 cost per arc 9.46e-06 4.36e-05 9.55e-06 7.69e-06 8.86e-06 1.19e-05 1.64e-05 6.97e-05 8.45e-06 7.25e-06 5.74e-06 1.00e-05 1.22e-05 1.21e-05 1.71e-05 5.55e-05 4.24e-05 4.72e-05 1.29e-05 6.21e-05 1.51e-05 1.33e-05 5.15e-04 2.54e-05 1.17e-04 Table 8: Experiments with embedding of communities of radius 1, 100% density. Timing of phase,1, 2 and 3 and total time (in seconds), and time pr arc. 12 file name as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh num. 1 2 3 4 5 6 7 8 9 10 11 12 13 Email-Enron 14 15 16 17 18 19 20 wiki-Talk 21 22 23 web-BerkStan 24 web-Google 25 web-Stanford soc-Epinions1 soc-Slashdot0902 p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX oc-sign-Slashdot090221 numarcs 105722 22190596 25144 46818 65460 841754 704570 33037894 186878 28968 236978 51946 367662 295784 4886816 5533214 3083796 3843320 1000962 9319130 811480 1008460 13298940 8644102 3985272 time ph1 0.3 159.25 0.06 0.11 0.14 2.08 1.84 702.65 0.4 0.06 0.29 0.14 0.84 1.08 23.04 103.42 45.93 60.25 3.4 128.42 2.31 3.32 65.43 56.76 43.93 time ph2 0.3 192.38 0.06 0.11 0.15 2.42 2.07 765.72 0.4 0.06 0.25 0.14 0.92 1.17 23.04 100.03 43.61 57.78 4.11 142.71 2.81 3.88 103.16 53.59 47.11 time ph3 0.33 203.75 0.06 0.12 0.16 2.45 2.53 786.36 0.44 0.06 0.27 0.15 0.98 1.22 22.56 99.82 44.2 58.66 4.23 154.92 3.37 3.96 99.81 54.02 60.47 total time 0.93 555.38 0.18 0.34 0.45 6.95 6.44 2254.73 1.24 0.18 0.81 0.43 2.74 3.47 68.64 303.27 133.74 176.69 11.74 426.05 8.49 11.16 268.4 164.37 151.51 cost per arc 8.80e-06 2.50e-05 7.16e-06 7.26e-06 6.87e-06 8.26e-06 9.14e-06 6.82e-05 6.64e-06 6.21e-06 3.42e-06 8.28e-06 7.45e-06 1.17e-05 1.40e-05 5.48e-05 4.34e-05 4.60e-05 1.17e-05 4.57e-05 1.05e-05 1.11e-05 2.02e-05 1.90e-05 3.80e-05 Table 9: Experiments with embedding of communities of radius 1, 70% density. Timing of phase,1, 2 and 3, total time (in seconds), and time per arc. file name as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh num. 1 2 3 4 5 6 7 8 9 10 11 12 13 Email-Enron 14 15 16 17 18 19 20 wiki-Talk 21 22 23 web-BerkStan 24 web-Google 25 web-Stanford soc-Epinions1 soc-Slashdot0902 p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX soc-sign-Slashdot090221 numarcs 105722 22190596 25144 46818 65460 841754 704570 33037894 186878 28968 236978 51946 367662 295784 4886816 5533214 3083796 3843320 1000962 9319130 811480 1008460 13298940 8644102 3985272 time ph1 2.94 10902.6 0.51 0.96 1.08 68.42 68.98 1796 5.53 0.48 3.26 1.44 13.42 9.48 322.33 237.53 120.03 152.14 359.46 14539.25 169.48 375.55 10322.09 241.02 2122.91 time ph2 18.64 19621.01 1.83 3.62 3.24 88.93 161.12 2077.75 6.72 0.75 9.68 1.78 23.38 9.6 317.33 234.08 117.52 149.46 418.74 15883.42 233.11 424.08 21415.46 445.79 3970.01 time ph3 20.17 25241.08 1.49 1.87 2.78 89.38 170.39 2150.96 7.02 0.76 11.01 1.75 40.11 9.62 310.45 227.45 115.2 145.01 428.14 6385.09 250.23 429.07 15577.4 510.39 3123.08 total time 41.75 55764.69 3.83 6.45 7.1 246.73 400.49 6024.71 19.27 1.99 23.95 4.97 76.91 28.7 950.11 699.06 352.75 446.61 1206.34 36807.76 652.82 1228.7 47314.95 1197.2 9216 cost per arc 3.95e-04 2.51e-03 1.52e-04 1.38e-04 1.08e-04 2.93e-04 5.68e-04 1.82e-04 1.03e-04 6.87e-05 1.01e-04 9.57e-05 2.09e-04 9.70e-05 1.94e-04 1.26e-04 1.14e-04 1.16e-04 1.21e-03 3.95e-03 8.04e-04 1.22e-03 3.56e-03 1.38e-04 2.31e-03 Table 10: Experiments with embedding of communities of radius 2, 70%. Timing of phase,1, 2 and 3 and total time (in seconds), and time per arc. 13 file name as-caida20071112 as-skitter as20000102 oregon1-010526 oregon2-010526 cit-HepPh cit-HepTh cit-Patents ca-CondMat ca-GrQc ca-HepPh ca-HepTh num. 1 2 3 4 5 6 7 8 9 10 11 12 13 Email-Enron 14 15 16 17 18 19 20 wiki-Talk 21 22 23 web-BerkStan 24 web-Google 25 web-Stanford p2p-Gnutella31 amazon0601 roadNet-CA roadNet-PA roadNet-TX oc-sign-Slashdot090221 soc-Epinions1 soc-Slashdot0902 numarcs 105722 22190596 25144 46818 65460 841754 704570 33037894 186878 28968 236978 51946 367662 295784 4886816 5533214 3083796 3843320 1000962 9319130 811480 1008460 13298940 8644102 3985272 time ph1 2.11 2212 0.44 0.74 0.82 44.63 35.52 1426.51 4.57 0.39 1.85 1.13 8.48 8.2 263.66 200.26 99.3 125.83 339.9 14793.02 93.41 341.68 5382.16 177.88 1133.52 time ph2 7.06 4198.62 0.57 1.28 1.25 73.97 83.87 1564.77 5.43 0.56 3.78 1.4 13.71 8.6 283.89 196.21 97.69 124.1 404.43 15704.76 158.88 404.75 5311.22 223.74 1859.58 time ph3 5.77 5365.61 0.6 1.29 1.31 72.63 124.16 1584.58 5.78 0.59 4.06 1.42 29.75 8.63 272.97 191.29 93.52 120.3 408.17 6636.37 261.85 412.42 5286.71 250.02 1889.28 total time 14.94 11776.23 1.61 3.31 3.38 191.23 243.55 4575.86 15.78 1.54 9.69 3.95 51.94 25.43 820.52 587.76 290.51 370.23 1152.5 37134.15 514.14 1158.85 15980.09 651.64 4882.38 cost per arc 1.41e-04 5.31e-04 6.40e-05 7.07e-05 5.16e-05 2.27e-04 3.46e-04 1.39e-04 8.44e-05 5.32e-05 4.09e-05 7.60e-05 1.41e-04 8.60e-05 1.68e-04 1.06e-04 9.42e-05 9.63e-05 1.15e-03 3.98e-03 6.34e-04 1.15e-03 1.20e-03 7.54e-05 1.23e-03 Table 11: Experiments with embedding of communities of radius 2, 50%. Timing of phase,1, 2 and 3 and total time (in seconds) and time per arc. 14
1109.1808
1
1109
2011-09-08T19:09:04
The use of microblogging for field-based scientific research
[ "cs.SI", "cs.DL", "physics.soc-ph" ]
Documenting the context in which data are collected is an integral part of the scientific research lifecycle. In field-based research, contextual information provides a detailed description of scientific practices and thus enables data interpretation and reuse. For field data, losing contextual information often means losing the data altogether. Yet, documenting the context of distributed, collaborative, field-based research can be a significant challenge due to the unpredictable nature of real-world settings and to the high degree of variability in data collection methods and scientific practices of different researchers. In this article, we propose the use of microblogging as a mechanism to support collection, ingestion, and publication of contextual information about the variegated digital artifacts that are produced in field research. We perform interviews with scholars involved in field-based environmental and urban sensing research, to determine the extent of adoption of Twitter and similar microblogging platforms and their potential use for field-specific research applications. Based on the results of these interviews as well as participant observation of field activities, we present the design, development, and pilot evaluation of a microblogging application integrated with an existing data collection platform on a handheld device. We investigate whether microblogging accommodates the variable and unpredictable nature of highly mobile research and whether it represents a suitable mechanism to document the context of field research data early in the scientific information lifecycle.
cs.SI
cs
The use of microblogging for field-based scientific research Alberto Pepe Center for Astrophysics & Institute for Quantitative Social Science Harvard University Cambridge, MA, USA [email protected] Matthew S. Mayernik NCAR Library National Center for Atmospheric Research Boulder, CO, USA [email protected] 1 1 0 2 p e S 8 ] I S . s c [ 1 v 8 0 8 1 . 9 0 1 1 : v i X r a Abstract—Documenting the context in which data are col- lected is an integral part of the scientific research lifecycle. In field-based research, contextual information provides a detailed description of scientific practices and thus enables data inter- pretation and reuse. For field data, losing contextual informa- tion often means losing the data altogether. Yet, documenting the context of distributed, collaborative, field-based research can be a significant challenge due to the unpredictable nature of real-world settings and to the high degree of variability in data collection methods and scientific practices of different researchers. In this article, we propose the use of microblogging as a mechanism to support collection, ingestion, and publication of contextual information about the variegated digital artifacts that are produced in field research. We perform interviews with scholars involved in field-based environmental and urban sensing research, to determine the extent of adoption of Twitter and similar microblogging platforms and their potential use for field-specific research applications. Based on the results of these interviews as well as participant observation of field activities, we present the design, development, and pilot evaluation of a microblogging application integrated with an existing data col- lection platform on a handheld device. We investigate whether microblogging accommodates the variable and unpredictable nature of highly mobile research and whether it represents a suitable mechanism to document the context of field research data early in the scientific information lifecycle. I . TH E CON TEX T O F FIE LD RE SEARCH DATA Digital technologies, such as sensor networks in the environmental sciences, social networking tools in the social sciences, and the digitization of cultural artifacts in the humanities, allow researchers to produce digital research products with volumes and complexities much greater than were possible in the past. This deluge of digital artifacts offers tremendous opportunity for new kinds of research [1]. The integration of many diverse data streams from numerous small-scale projects can enable synthesis and longitudinal studies of large-scale environmental phenomena such as climate change and species shifts. Similarly, the digital in- tegration of historical texts, photos, and maps from libraries and archives all over the world can enable comparative humanities projects that would otherwise be difficult or im- possible to conduct. But while the possibilities of these kinds of digital resources are exciting, they also present tremen- dous challenges. Scientific artifacts that originate in digital form exist in a wide array of genres, including manuscripts, publications, data, instrument laboratory and field notes, calibrations, preprints, grant proposals, talks, slides, patent applications, theses, and dissertations, among others. This ensemble of artifacts and the relationships among them can be conceptualized as a lifecycle [2]. Artifacts that originate for one purpose at a stage of the lifecycle may be sought later for other purposes and at other stages, or they may be in active use for some time and then lay dormant or be discarded. Increasingly, scientific artifacts such as data and articles are being produced in collaborative research settings. As research becomes more distributed and dependent on digital means for collection and dissemination of research prod- ucts, collections of digital resources, in order to be useful outside local settings, must be supplemented by information about the resources themselves. Understanding the context in which data and documents were produced, and the ways that they were modified and analyzed, is essential if they are to be used, shared, and re-used. This “information about data” is commonly referred to as “metadata,” though the term metadata often connotes formalized description and representation schemes. In distributed scientific collabora- tions, however, creating and collecting contextual informa- tion about digital artifacts is a significant challenge due to the high degree of variability in data collection methods, data types, and data uses. Contextual information about scientific artifacts, or “contextual data”, are often shared informally as well as formally in scientific collaborations [3]. In this paper, we focus on the challenge of capturing and collecting contextual information in dedicated scientific data repositories. This challenge is compounded by the various and amorphous conceptions of “context” itself. Paul Dourish provides some light on the topic in an analysis of differing conceptions of “context” in computing. He illustrates how discussions of “context” are better conceived as discussions of “practices” [4]. Contextual information about a scientific observation or experiment is, indeed, a description of scien- tific practices: for example, the data collection process, the equipment used, the researchers involved in the observation, and the exact location of an observation. These types of contextual data are often only minimally described or left out entirely from the presentation of research results in scholarly publications, which are often all that researchers have when finding and using data collected by someone else. Researchers apply their own field expertise to evaluate data collected by others for relevancy and identify any potential problems [5]. Data digital libraries and repositories provide access to data, but as long as researchers must rely on often incomplete published reports of the data collection processes as data quality verification, data are of very little use for future research, as they cannot be interpreted. When these contextual data are not available, the reusability and reproducibility of scientific results is at stake. As recently noted by Stodden [6], data reusability and reproducibility of results are crucial to modern scientific communication, especially as scientific inquiry progressively becomes more dependent on scientific computation. Besides reproducibility, the availability of data and tools also ensures that further research on the same or other data sources can be conducted. Cultural norms of data sharing in different scientific communities are intimately tied to the contexts of data production, namely the social practices, relationships, and material conditions in which data production takes place [7]. Because scientific practices change significantly from domain to domain (and even from project to project), providing researchers with reliable tools and techniques to describe their data collection practices and the context of their research can be a challenge [8], [9]. This challenge is even more marked in field based research that uses sensing technologies and Wireless Sensing Systems (WSS). With the addition of WSS, field research in areas such as environ- mental biology, seismology and urban sensing is becoming highly instrumented, computational, and collaborative [10]. The utility of data collected in situ with these systems, be it a natural reserve or an urban context, increases when coupled with contextual data that describe the setting in which the observations were taken: the equipment used to collect data, the researchers involved, and specific environmental conditions. Ensuring capture, description and preservation of these data is a fundamental task for scientific information management, as large volumes of sensor-collected data are linked to specific times and places and are thus irreplaceable. For these data, losing descriptive contextual information means losing the data altogether [11]. With these notions in mind, what tools can we provide scientists with to support collection of contextual data and documentation of the variegated artifacts that are produced in the scientific information lifecycle? In particular, can contextual data be collected in the field via handheld devices such as smart phones? These devices are now ubiquitous, contain many capabilities that might be useful for collecting contextual data, and can be equipped with both custom and commercial software applications. In this article, we discuss the use of microblogging, or short text annotations, as a mechanism to document the context and data collection practices of field-based research applications. We describe our design considerations of a handheld application and report on the results of interviews and a pilot study with researchers involved in in situ ecological monitoring and related sensing research conducted in the field in natural and urban contexts. I I . SC I EN T I FIC U S E S O F M ICROBLOGG ING Microblogging is a form of online communication by which users publish and broadcast content to the public or to a limited group of contacts. While blogging al- lows the publication of lengthy, multi-media, user-generated content, microblogging is limited to very brief, text-only messages. On the popular microblogging platform Twitter (http://twitter.com), microblog posts are commonly known as tweets. Tweets are similar to SMS messages exchanged on cell phones, being 140 characters in length, at most. The brief format of tweets makes microblogging a timely and dynamic means of online communication. Microblogging is used to exchange and broadcast different types of informa- tion. Scholars from many disciplines—social, political, and computer scientists, for example—are increasingly becom- ing interested in the profusion of user-generated data avail- able on microblogging sites. As more and more people share information about themselves via these social media, the emotional, political, cultural, and behavioral traits of entire communities begin to emerge. For example, researchers have recently drawn upon microblogging corpora to study news diffusion in geographic local networks [12], and to model public mood levels against socio-economic indicators [13]. But scientists are not only analyzing Twitter and similar microblogging platforms. They are also increasingly using them. Scientists use Twitter to network with other scientists, to support the organization of scientific events, and to publi- cize their work. A recent survey conducted among computer scientists revealed Twitter to be among the top three services for dissemination of scientific information [14]. In other related research, based on interviews and content analysis, it has been noted that Twitter has recently grown into a well- established vehicle of informal scientific citation [15]. Twit- ter has also been noted to be the current platform of choice to support the communication infrastructure of conferences: researchers use microblogging to produce aggregated real- time proceedings and to network with fellow attendees [16]. It is unclear, however, the degree to which the penetration of Twitter and other microblogging services in scientific practices extends beyond the functions of social networking and information dissemination. Scientists use microblogging to publicize their work, exchange scientific information, cite interesting scientific work, and become acquainted with other scientists in their community. As we note in the next section, scientists also potentially can use microblogging and similar content publication services as an integral component of their scientific research activities, specifically to capture and document the context of highly-mobile field-based envi- ronmental and urban research. Are microblogging services used by field researchers to capture contextual information very early in the scientific data lifecycle, enabling them to document and adjust their research methods and data collection practices as they interact with each other, the experiment location, the data collection equipment, and other technical and social constraints? I I I . WHY M ICROB LOGG ING I S CONV EN I ENT TO DOCUM ENT TH E CON TEX T O F FIE LD R E SEARCH DATA The work presented in this article is developed within the scope of the Center for Embedded Networked Sensing (CENS), a National Science Foundation Science and Tech- nology Center involved in theoretical and applied work in the field of wireless communication networks and sensor technologies. CENS is a multi-institution research center which is comprised of five member universities in Cali- fornia: University of California, Los Angeles; University of Southern California; University of California, Riverside; California Institute of Technology; and University of Cal- ifornia, Merced. CENS’ goals are to develop, construct and apply sensing technologies to address questions in the natural environment (habitat ecology, marine microbiology, environmental contaminant transport, seismology) as well as in social and urban contexts. The type of research conducted at CENS is mostly conducted by teams of five to ten people in field settings and it spans a wide spectrum of disciplines and applications related to and supporting sensor network research. In sensor network research, a deployment is a research activity in which sensors, sensor delivery platforms, or wire- less communication systems are taken out into the field to study phenomena of scientific interest. CENS deployments have taken place at numerous locations in California (at various national reserves, lakes, streams, and mountains) and around the world (including Bangladesh, Central and South America). CENS researchers engaged in sensor deployments normally work in small teams in specific locales using newly developed instrumentation and create heterogeneous data sources. As such, they require flexibility to adjust research plans on the fly. The use of wireless sensing systems adds complexity to both the research activities and the kinds of information that researchers produce, because such systems are difficult to deploy in unpredictable field settings and often produce unreliable measurements. The goal of our research, in the Statistics and Data Prac- tices Team at CENS, is to develop tools and applications that facilitate the collection and interpretation of data in scientific practices and field-based activities at CENS. In recent work, we have participated in the development of two digital data repositories: one for sensor-collected raw data, called SensorBase (http://sensorbase.org/) [17], and one for related contextual information, called CENS Deployment Center (http://censdc.cens.ucla.edu/) [18]. These two platforms are intended to function in parallel, as they represent different “views” of data relative to the same scientific lifecycle. SensorBase provides access to raw data and the Deployment Center provides enough contextual information to interpret them. More detailed information about the data hosted by these two repositories is shown in Table 1. Raw data collected, produced, and managed by scientists and engineers performing WSS-based field research are ex- tremely heterogeneous in nature. This is due both to the fact that sensor network research involves the interaction among researchers from a wide spectrum of domains with differ- ing scientific data practices (e.g., biologists, seismologists, electrical engineers, computer scientists) and to the fact that different research applications necessarily produce different kinds of data. Data handled by CENS field researchers differ not only in media types (text, images, audio, video, software) but also in the conceptual role that these data have within a broader data lifecycle [2]. For this reason, Sensorbase has been designed and constructed as a central server with a flex- ible, and highly customizable metadata schema. Moreover, to encourage scientists to publish their data, SensorBase employs a light-weight data ingestion mechanism by which users upload and share data in a way functionally similar to the way by which bloggers post and share personal blog posts. The contextual data hosted on the Deployment Center are less heterogeneous in content and format than raw data are. They mostly describe the details of the setting in which field research is performed, such as information about field practices, equipment, times, and locations. The contextual information that CENS researchers create for their own use in their day-to-day work, however, exist in multiple media formats and are most frequently conveyed using free text annotations or images associated with a time and location. Researchers within CENS rarely create documentation that is not directly tied to their own use of their data, and correspondingly, they rarely share data with users from outside of their immediate projects [19]. With these notions in mind, we seek to determine whether micro-blogging is a viable ingestion mechanism for contextual data in field- based research. In other words, while blogging represents a convenient metaphor to figuratively represent the act of publishing and sharing raw data, is microblogging a valid metaphor to represent the act of publishing and sharing con- textual data? In order to test the utility of microblogging as a mechanism for the ingestion and publication of contextual data we consider two crucial data challenges associated with most field-based research: interoperability and mobility. • Interoperability. A conceptual and technical discrep- ancy exists among available metadata standards used to collect and represent contextual data in sensor net- Table I S ID E -BY- S ID E OV ERV I EW O F TH E RAW DATA AND CONT EX TUA L DATA R E PO S I TOR I E S Hosted data SensorBase Raw and unprocessed data collected from sensors, semi- processed and analyzed data CENS Deployment Center Contextual data, descriptive information about field practices, equipment, times, and locations Data types Heterogeneous (ASCII tables, images, audio) Free text annotations, images Metadata Minimal, customizable; may vary by research field, applica- tion, and working group May vary depending on the field, but time and location are usually recorded Ingestion Blogging Micro-blogging? work research. Locally-specific metadata representa- tion formats for datasets and field notes often fail to inter-operate. In research areas new to computer- based instrumentation, few standards for description and annotation of resources such as sensor-collected ecological data are widely used. The challenge of interoperability could be addressed by the lightweight nature of microblogging as a data posting service: microblog posts are brief and text- only. This means that microblogging services are fairly easy to implement in existing data collection platforms; also, collected microblog information is easily fed into existing data digital libraries. This also means that there is no need to create domain- or discipline-specific data models to accommodate different types of contextual information (e.g. contextual data collected in seismo- logical projects and marine biology deployments). All contextual information embedded in microblogs can be collected and stored as text (and HTML links, in the form of text). Thus, microblogging could be an interoperable solution to document the context of field research practices. In turn, the availability of generic (i.e. domain-independent) contextual information in data digital libraries facilitates data sharing both within and across domains. • Mobility. Ecological field deployments using wireless sensing systems necessarily involve in-field data cre- ation, retrieval, and tracking. Understanding how high- ly variable field-based methods impact the resulting data products is essential to understanding and in- terpreting data on both short and long terms. Many field locations where WSS deployments take place do not have Internet or local area network connectivity. Thus, approaches to collecting information about data collection activities for WSS deployments cannot be solely web-based. Mobile applications and devices may enable field researchers to perform basic data collection and management operations when working in remote locations where Internet connectivity is lacking. The challenge of mobility could be addressed by the nature of microblog data: microblog posts natively carry metadata that is fundamental to contextual infor- mation, such as author and timestamp data—essential to reconstruct the link between the gathered contextual data and specific real-world situations. As discussed in the previous section, due to the unpredictable nature of mobile sensing research, losing, or failing to record, temporal information might make data collected in the field unusable. This is true, in most cases, not only for the collected sensor data but also for related contextual data. In a similar way, associating microblog posts with author information ensures data consistency and enables data reuse and exchange. Author and temporal metadata embedded in the gathered contextual informa- tion can be immediately published on the web, when researchers are in the field and a wireless Internet link exists, or can be stored locally on the device and later published on the web when Internet connectivity is lacking. IV. DO FIE LD R E SEARCH ER S U SE TW I T TER ? Having argued that microblogging presents features that make it a suitable mechanism to collect contextual data in field-based sensor applications, we performed an exploratory survey among field researchers to determine the current extent of adoption of Twitter and similar microblogging plat- forms, be it for research or social purposes. We conducted interviews with eight scholars of different ranks (research staff and graduate students) involved in field research of various kinds (ecology, biology, environmental science, and urban sensing). Interviews were conducted in person or via email in a semi-structured format. The questions asked throughout the interview are the following: 1) Have you ever used a micro-blogging service (e.g. Twitter)? If yes, what have you used micro-blogging services for? Do you use micro-blogging for research purposes? 2) Do you know of other researchers in your discipline who use micro-blogging for research purposes? If so, what do they use micro-blogging for? 3) Do you think that implementing a micro-blogging service on top of existing data collection tools/devices would assist you in your field work in any way? What specific information would micro-blogging facilitate to collect in the field? 4) Do you think that micro-blogging could enable ex- change of information (i.e., research-based conversa- tions) with fellow researchers during field activities? If so, in what ways would that be useful for you? When asked about their micro-blogging practices, nearly all interviewed researchers said that they either do not use Twitter (or any similar micro-blogging platform), or if they do, their use is limited solely to social interactions. Only one researcher actively employed Twitter both for social and research purposes. This use is specifically limited within the scope of Budburst, a citizen science mobile sensing project aimed at collecting data on phenology and climate change (http://budburst.org/). Project participants contribute to this project by performing multiple observations of the same plants, documenting “phenophases” such as their first leaf, the first flower, and the first fruit of trees, shrubs, flowers, and grasses. There are multiple ways to make and record budburst observations, including sms text, a smartphone application, and Twitter. On Twitter, users mark tweets about observations with a given hashtag (#budburst). The application scrapes the tweet corpus daily and a stream of observations becomes available to users and researchers on the project. The same researcher also indicated another research use of Twitter, which is not directly field-based, but that is related to the aforementioned project. In what they jokingly referred to as “opportunistic” participatory sensing, they continuously search the public Twitterverse for phenology-related keywords, such as “spring”, “bloom”, “blossoming”, etc. They log tweets containing these key terms and their geotag, if available. Analysis of this corpus allows them to correlate user-contributed Twitter events with life cycle events in plants. All the researchers that do not use Twitter also indicated that they do not know of any colleagues who do use it for research purposes. Some researchers were aware, however, of some field-based research applications that use aspects of blogging or micro-blogging as their data ingest mechanism. One researcher mentioned the existence of a Facebook application for beach contamination source tracking. In the realm of urban sensing, a researcher mentioned a project of a colleague who uses the distribution of tweets across cities to look at urban landscapes and urban density. Nearly all interviewed researchers indicated that the current most common and beneficial use of Twitter for research purposes has to do with scientific communication, dissemination of scientific results, and gaining visibility in one’s scientific community: [Student (Biology)] I know some researchers who seem to use Twitter for informing their “followers” of their goings-on, which often include what research/field cam- paigns they’re working on.. I’ve also seen a fair bit of micro-blogging of “popular” research, i.e. links to fun, kinda cool research... [Student (Ecology)] What I could picture for me per- sonally as a graduate student is maybe augmenting my personal research website, so I could see using Twitter to maybe update people on the status of my research, and using that application to do that. I guess it would be a way to gain a wider audience and feedback for my research, in real time. I see that as a potential application. Researchers indicated a number of ways by which mi- croblogging services could assist their field work practices. One researcher suggested the use of Twitter feeds for auto- matic notification of instrument failures. Device failure is a problem that spans across all mobile sensing applications. The use of a Twitter feed, in addition to email notifications, would allow researchers to instantaneously subscribe to multiple devices, re-broadcast (retweet) given failures to a broader/different research community, and publish notes and annotations concomitant with the failure messages, for public viewing. One respondent mentioned the potential of microblogging platforms to foster public awareness and interest in scientific research. For example, it was suggested that Twitter feeds could be useful to publish water quality data about particular beaches. This in turn, has the potential to serve the research community—other researchers might be interested in harvesting, storing and reusing those data— as well as the public—citizen scientists and beachgoers may find interest in the data and in the processes by which those data were collected. Some researchers pointed to an important shortcoming of Twitter: its inability to function in field locations in which Internet connectivity is not available. As discussed above, the mobile and unpredictable nature of most scientific field research implies that Internet connectivity may be lacking for extended periods of time. If Twitter had to be used as a note-taking tool for the collection of contextual data, how would it behave in the absence of Internet connection? The doubts expressed by interviewed researchers point to the importance to employ microblogging services with offline capabilities when performing field experiments. With regard to the last question of the interview, many researchers were unsure whether microblogging is a viable platform for exchange of research-based information during field activities, for two main reasons: the potential lack of connectivity in field settings and the public nature of Twitter. The connectivity issue was raised as a major cause for the inability to communicate while in the field: [Research staff (Ecology)] Again, there is the connec- tivity issue. It’s not clear how this would be better than ”. walkie-talkie, or just saying, “lets all meet here at I have been using my twitter account to post about the progress of projects, but these are just general posts, not field work specific. Other researchers were worried about the public nature of Twitter, and thus the issue of publishing raw, non-certified field data into the public: [Student (Biology)] I suppose micro-blogging could foster collaboration between researchers while in the field, but with the public nature of things like Twitter I don’t know that it would be appropriate for sharing data or results of field work prior to any QA/QC processes. Although Twitter does allow accounts to be private, i.e., to be accessible only by a selected group of contacts, researchers expressed the need to make openly available certain sections of their Twitter feeds, while restricting others. In sum, although all researchers in our study possess some familiarity with Twitter, very few actually employ microblogging services actively. Some of them use Twit- ter for promotion of their scientific work and to network with other scientists. Although most interviewed researchers consider feasible and convenient the use of Twitter to support field-based research, only one of them has personally experimented in this regard, collecting field data about phenophases and climate change. Two major shortcomings of Twitter were put forward: its inability to work in offline mode and its limited range of options on access privileges. Combining these findings with the fact that CENS re- searchers largely create documentation that is directly tied to their own use of their data [19] suggests that microblogging has little added value for field researchers in-and-of-itself as a research tool that exists in isolation from other research tools and the data themselves. In the next section, we present a mobile application that tries to address this problem by bringing the microblogging service closer to the data. V. SY ST EM D E S IGN AND D EVE LO PM EN T In light of interview results and ongoing participant ob- servation with field researchers, we outline the requirements and sketch the design of a microblogging-like system that would allow collection of data and field contextual metadata together. As we discussed, researchers engaged in sensor- based field work perform research in a very mobile manner, they work in small teams using ad-hoc methods, they produce heterogeneous data sources, and require enough flexibility to adjust research plans and data ingestion mech- anisms. In designing, deploying and testing a data collection tool for this community, we focus on enabling flexible and adaptive research. Our design and code base derived from another CENS project, the EcoPDA project1 . The EcoPDA application pro- vided a handheld system with which to conduct biodiversity surveys. Our application sought to develop a more general- purpose system which could be used in any type of field research. We also drew design ideas from other similar 1 http://www.teamnetwork.org/en/content/ecopda projects. The ButterflyNet project2 was another project to develop a handheld application for collecting field research data, but required specialized paper and pens to use. The Cybertracker project3 provides another handheld tool for performing field research, but again is designed to be used to perform biodiversity surveys, and as such is not as general purpose as we would like our application to be. Our development follows a usability engineering lifecycle, which organizes the design process around two phases: (i) requirements analysis and (ii) design, testing, and de- velopment [20]. In the first phase, requirements analysis, we developed a user profile based on our discussions with field researchers. We performed contextual analysis of the users’ main work tasks, set usability goals, analyzed the platform capabilities and constraints, and created general design principles. Field research in the ecological and envi- ronmental sciences takes on many forms depending on the research questions being asked. In recent sensor network deployments, we have observed that scientists and engineers involved in field work collect in their notebooks many di- verse kinds of contextual data such as information relative to the equipment used, participants of the project, annotations of various types, and a number of tasks performed during, before and after the field work [18]. Some of this information is very domain-specific. For example, researchers involved in the study of environmental sensing and image acquisition collect information that indicates the detailed models and characteristics of the imaging sensors installed and used. Researchers working in urban sensing field projects collect and store entirely different contextual data, such as social and demographic information relative to the urban environ- ment being studied. Although disparate kinds of contextual data are being collected, there are certain categories of field activities that occur with regularity across all domains and practices of field-based research. This allows us to focus our design and development efforts on specific categories of field activities, yet leaving the system sufficiently open to enable user appropriation, i.e., researchers may progressively use the provided microblogging functionality for uses that are outside the initially intended use of field-based note taking. Our design requirements and principles stem from our interviews as well as from ongoing and past participant observation of field research activities at CENS and can be summarized as follows: • Provide full metadata customization and flexibility: In the field, highly varied kinds of data are produced. We would like to give researchers full control over the metadata required in the documenting the context of these data. Some researchers might want to create pre-existing metadata schemes. Others might want to produce solely unstructured free-text annotations. 2 http://hci.stanford.edu/research/butterflynet/butterflynet/ 3 http://www.cybertracker.org/ • Specify data collection protocols: When researchers choose to specify their own collection procedures, they have to be able to fully customize the data collection interface to those procedures. • Collect repeatable data: Researchers often repeat data collection procedures, both to replicate previous results and to augment prior experiments. The system must allow them to re-use data collection protocols that they have already created and used. • Perform their field activity as fast with the application as without: Time spent in the field is precious. If our system noticeably slows researchers down, its useful- ness is greatly diminished. • Easily integrate the field data collected with the tool into their existing data collections: Researchers in most sciences are already facing challenges in organizing and using digital data resources, thus our system must integrate with existing data and data tools. • Provide both online and offline ingestion and access: Researchers must be able to both access and populate the system (i.e., produce microblogging annotations) from any location (their office, or the field) whether they are online or offline. • Allow both public and private publication of content: Some content, such as preliminary observations, sen- sitive material, and equipment information, is only intended for a close circle of researchers, directly involved in a field project. Other content can be safely made open and publicly available. The system must allow users to publish content in both public and private mode, and to quickly switch between these two modes, if needed. • Produce data annotations that “live with” the data: Packaging data and its contextual information increases the usefulness, and consequently the value, of the data itself. Thus, we would like to develop a microblogging service that not only produces annotations, but it also gives users the possibility to associate those annotations with specific datasets subsets of data, and data points. The second design phase—design/testing/development— involves a number of iterative steps, including: conceptual modeling, conceptual mockups, setting screen design stan- dards, prototyping, evaluation of the standards and prototyp- ing, interface design, and evaluation of the interface design by gathering user feedback. The focus of our development work thus far has centered around the development of a Twitter-like annotation platform that would integrate with existing data collection tools and instruments employed in the field. One such tool is an application which runs on a handheld device and allows field researchers to collect tabular data. The application, developed on Windows Mobile 6.1 operating system and currently tested on Samsung Omnia smart phones, features Figure 1. A screen capture of the mobile phone application for the collection of tabular data. a simple web interface by which users can “author” data collection tables prior to going out in the field, i.e., they have the option to structure a basic metadata schema a priori. Once in the field, these data collection tables are customiz- able, in that they can be changed and re-used, facilitating data repeatability. Figure 1 shows a screen capture of a data collection table on the mobile phone. The menu on the bottom right shows the options available to the user, which include standard options such as adding an entry (data point), and adding columns to the table. Following the list of requirements and principles outlined above, we developed a note taking service that operates within this data collection tool. The service gives users two additional options: to add/view notes and display the geo- tagged items, as shown in the menu on the bottom right of Figure 1. When using these functionalities, a user is presented with a note taking interface, shown in Figure 2. Importantly, since the annotation service can be invoked directly from within a specific data table, annotations can be made data-specific, i.e. directly associated with a given dataset or data table. The initial prototype only allows geo-tag function pulls the latitude and longitude of the user’s current location from the phone’s built in GPS receiver and links the coordinates to the data point or note that was tagged. The user can then filter the display to view the data points and notes that have been geo- tagged4 . Also, devices that have GPS capability may not be usable in field locations because of physical obstructions. In these cases, users can self-describe the location using the free-text note field. Although geographically less precise than GPS, these descriptions might provide some context when GPS data are entirely missing. • Annotation feed: the lower portion of the interface provides a list of recent annotations in reverse chrono- logical order, similar to the Twitter news feed. Not shown in the images are two other components of the note taking application which reflect our design consid- erations. First, the service does not depend on an Internet connection to function. It stores all annotations locally until they are pushed, at given time intervals, to a desired online database, or microblogging service. When no Internet is available, all stored annotations are stored and queued in the system and then pushed online as soon as a connection be- comes available. Second, we have only partly addressed the problem relative to access privileges. As discussed above, users should be able to decide whether to publish certain annotations publicly or with a restricted group of contacts. For the time being, we have addressed this problem in the following manner. All annotations produced are pushed by default to an online private microblogging database that is only accessible by CENS field researchers. However, our planned approach is that upon submitting an annotation, users will be asked whether they also want to push the annotation to a public microblogging service (e.g., a Twitter account), or to Sensorbase and/or the CENS Deployment Center. Using these mechanisms, field researchers can make annotations without worrying about the availability of a wireless Internet connection. They also can be certain that all their notes are eventually pushed to a private online database, and in addition will be able to choose which ones are pushed to an online microblogging platform for public viewing. And finally, because we noted that a number of interviewed researchers use Microsoft Excel formats for their day-to- day data collection, manipulation, and analysis, we allow users to export their data and notes in an Excel file, again enabling the data to “live with” the contextual notes. The Excel output allows users to integrate their data collected via our application with their existing data collected via other means. In the next section, we present a use case scenario of the 4 It has been noted that in many situations the GPS coordinates are of little meaning or use in and of themselves [21]. To address this problem, we are exploring ways to visually present the geo-tagged information, for example through a map interface. Figure 2. A screen capture of the note taking interface for the collection of contextual data. annotation at the level of data tables, but in subsequent development we plan to extend the annotation capability to specific data rows, columns, and points. For example, in the case of Figure 1, if the menu is invoked under row_id 3 and column Nitrate, the relative annotation will be stored specifically within the scope of that data table. This allows annotations to “live with” the data, i.e., full integration of annotation functionalities with existing data and services, by being stored in the same XML output file. The note taking interface we developed, shown in Figure 2, is not very different from typical microblogging content publishing services. It is composed of the following elements: • Date- and time-stamp: The service automatically pop- ulates date and time fields, which are stored alongside the text annotation. This can be altered if needed (e.g., if the researcher wants to make a note about a past event or set a reminder about a future event). • Text box: This box contains the content of the anno- tation. Unlike Twitter, the maximum allowed count is not limited to 140 characters. • Geo-tagging functionality: Users can geo-tag data po- ints and notes by checking the “Geo-tag this” box. The application together with the results of preliminary user pilot study. V I . P I LOT S TUDY Our first round of pilot users consisted of three scientists with extensive experience in performing environmental and ecological research in field settings. The pilot tests took place indoors in a laboratory setting, and focused on the usability and utility of both the data collection and note taking applications described in the previous section. The pilot test protocol consisted of five tasks aimed at testing the main functionalities of the system, and how easy the application was to learn and use. First, we had the users test the web interface that allows them to create data collection tables, and second, we had them test the application using these tables. This involved opening the tables, taking data, customizing the tables by creating new columns, taking notes, and finally exporting the data. In this stage, we did not help users in any way, to mimic a real-world environment as much as possible. We asked users to think aloud as they completed the tasks in order to gain a better understanding of their thought processes. The feedback from our pilot users highlighted some positive and negative aspects of our prototype system. Users liked the ability to create their own data tables, and the ability to customize the tables during the data collection process, by adding new columns. They also liked the mobile aspect of the application, in that the small size of a mobile phone will not be an encumbrance as they perform their research activities in varied field settings. The small size of the application had both positive and negative aspects, however. Both users reported that the small screen size of the phones might prove to be hard to see in some situations, specifically mentioning button size and text size as potential issues. We also identified individual pages and functions that were either hard to use (such as the data import function) or did not work as we had anticipated. This enabled us to see where the application needed to be streamlined or changed in order to provide smoother user experience. The other main motivation of the pilot test was to get feedback on the notetaking capabilities of the mobile data collection application. All three pilot users are not active Twitter users. One user said that they had previously utilized smartphones to take and post pictures during field research, but none of them currently uses Twitter or any other mi- croblogging service for field research in any major way. Pilot users were invited to utilize the note taking device. They noted that this application would be most useful for taking notes on the spot while in the field. One tester stated that this meant that they would not have to carry a notebook around, and it would allow them to attach the location information to their notes. All users agreed that the collection of notes as short text messages and their preservation and distribution via a database or website would be very useful. Two users also suggested that the note taking application is most useful in situations that involve collecting information about events. More specifically, sending notes out as microblogs is useful in providing notifications to other members of the research team or to the general public that a certain event has taken place, or that important thresholds in data collection have been achieved. All users also mentioned that attaching GPS or other location information to the annotations certainly increased their information utility. V I I . CONC LU S ION Throughout this article, we have stressed the importance of contextual information and data in understanding and using information resources in any setting, from single- investigator projects to distributed and collaborative projects. In particular, we focus on the challenges related to collecting contextual information while performing research in the field, especially when using wireless sensing systems in unpredictable and ever-changing field settings. We have suggested that using microblogging as a text annotation tool might allow the ingest and publication of contextual data from the field because microblogging offers a convenient platform to mimic some of the annotation functions of a notebook. Results of our interviews with field researchers suggests that microblogging is not widely used as a field research tool currently, but that potential exists for microblogging to be widely adopted as a de facto field annotation tool, at least for two reasons. First, microblogging is already a widely popular and used form of scientific communication and networking on the web. Researchers are familiar with microblogging tools, and the ubiquity of these tools across social settings and technical platforms ensures that they will be widely available for adoption and appropriation. Second, certain aspects of microblogging accommodate the highly mobile nature of field research, specifically, its broad range of uses and applications, and the heterogeneous nature of data produced. Yet, we identified certain shortcomings of Twitter and similar microblogging platforms: their inability to work in offline mode, their limited range of access privilege options, and their current isolation from other data collection and annotation tools. Based on our interview results and participant observation with a community of ecological, environmental, and urban sensing researchers involved in field work, we presented the design and development of a microblogging-inspired application for the collection of observational and contextual data from field research activities. We discussed how our application accommodates field research by addressing the aforementioned challenges and by integrating directly with the data and existing data collection tools. Finally, we ran a preliminary pilot test to evaluate the utility and usability of the tabular data and note taking applications. While the pilot test was very limited in scope and scale, it was useful to gather expert feedback from field scientists on key functionalities of our application, and shape ideas for the next steps. A fuller evaluation of the application will be conducted at a later date, in real-world settings. This study suggests that the use of microblogging services in existing handheld and other in-field data collection de- vices can prove an interoperable and mobile tool to produce and publish contextual data in the unpredictable, variable settings of highly-mobile field research, but, crucially, only if the microblogging tools are integrated within the larger set of field researchers’ technologies and practices. Collecting contextual data about scientific artifacts is a continual chal- lenge in digital library and repository creation and adoption. We envision that researchers using microblogging tools as part of their field research activities will engage in patterns of interactivity (e.g. sharing annotations, subscribing to each other annotation feeds, etc.) that are ultimately beneficial for the pursuit of collaborative field research, in that these annotations and collaborative feeds can serve as a source for contextual information about data, publications, field notes and images, technical reports, and any number of other dig- ital resource genres that are and will be collected and made available in digital libraries. We hope that widespread use of microblogging and related annotation tools in field research will enrich scientific data repositories with important con- textual information, thus enabling reuse and interpretation of data collected in field activities. R E FER ENC E S [1] C. L. Borgman, Scholarship in the digital age. Cambridge, MA: MIT Press, 2007. [2] A. Pepe, M. Mayernik, C. L. Borgman, and H. Van de Sompel, “From Artifacts to Aggregations: Modeling Scientific Life Cycles on the Semantic Web,” Journal of the American Society for Information Science and Technology, vol. 61, no. 3, pp. 567–582, 2010. [3] P. Edwards, M. Mayernik, A. Batcheller, C. Borgman, and G. Bowker, “Science friction: data, metadata, and collab- oration in the interdisciplinary sciences,” Social Studies of Science, Forthcoming. [4] P. Dourish, “What we talk about when we talk about context,” Personal and Ubiquitous Computing, vol. 8, pp. 19–30, 2004. [8] G. Chin and C. Lansing, “Capturing and supporting contexts for scientific data sharing via the biological sciences col- laboratory,” in Proceedings of the 2004 ACM conference on Computer Supported Cooperative Work, 2004, pp. 409–418. [9] J. C. Wallis, C. L. Borgman, M. S. Mayernik, and A. Pepe, “Moving archival practices upstream: An exploration of the life cycle of ecological sensing data in collaborative field research.” International Journal of Digital Curation, vol. 3, no. 1, 2008. [10] D. Cuff, M. Hansen, and J. Kang, “Urban sensing: out of the woods,” Commun. ACM, vol. 51, no. 3, pp. 24–33, 2008. [11] A. Pepe, C. L. Borgman, J. C. Wallis, and M. S. Mayernik, “Knitting a fabric of sensor data resources,” in Proceedings of ACM IEEE International Conference on Information Pro- cessing in Sensor Networks, 2007. [12] S. Yardi and D. Boyd, “Tweeting from the town square: Measuring geographic local networks,” in Proceedings of the International Conference on Weblogs and Social Media, Washington, DC, 2010. [13] J. Bollen, A. Pepe, and H. Mao, “Modeling public mood and emotion: Twitter sentiment and socio-economic phenomena,” in Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011. [14] J. Letierce, A. Passant, J. Breslin, and S. Decker, “Un- derstanding how twitter is used to widely spread scientific messages,” in Proceedings of the WebSci10: Extending the Frontiers of Society On-Line, March 2010. [15] J. Priem and K. Light Costello, “How and why scholars cite on twitter,” in Proceedings of the American Society for Information Science and Technology Meeting, Pittsburgh, PA, USA, 2010. [16] W. Reinhardt, M. Ebner, G. Beham, and C. Costa, “How people are using twitter during conferences,” in Proceedings of the 5th EduMedia conference, Salzburg, 2009, pp. 145– 156. [17] L. Chang, N. Yau, M. Hansen, and D. Estrin, “Sensorbase.org - a centralized repository to slog sensor network data,” in DCOSS Euro-American Workshop on Middleware for Sensor Networks Proceedings, 2006. [18] M. S. Mayernik, J. C. Wallis, C. L. Borgman, and A. Pepe, “Adding Context to Content: The CENS Deployment Cen- ter.” in Proceedings of ASIST 2007: Joining Research and Practice: Social Computing and Information Science, 2007. [5] A. Zimmerman, “Not by metadata alone: the use of diverse forms of knowledge to locate data for reuse,” Int. J. Digit. Libr., vol. 7, no. 1, pp. 5–16, 2007. [19] M. S. Mayernik, “Metadata realities for cyberinfrastructure: data authors as metadata creators.” Ph.D. dissertation, Uni- versity of California, Los Angeles, 2011. [6] V. Stodden, “Enabling Reproducible Research: Open Li- censing For Scientific Innovation,” International Journal of Communications Law and Policy, vol. 13, 2009. [20] D. J. Mayhew, “The usability engineering lifecycle,” in CHI ’99: CHI ’99 extended abstracts on Human factors in comput- ing systems. New York, NY, USA: ACM, 1999, pp. 147–148. [7] J. Vertesi and P. Dourish, “The value of data: considering the context of production in data economies,” in Proceedings of the ACM 2011 conference on Computer Supported Coopera- tive Work. New York, NY, USA: ACM, 2011, pp. 533–542. [21] A. Sorvari, J. Jalkanen, R. Jokela, A. Black, K. Koli, M. Moberg, and T. Keinonen, “Usability issues in utilizing context metadata in content management of mobile devices.” in Proceedings of NordiCHI ’04, 2004, pp. 357–363.
1210.2018
2
1210
2013-03-22T17:01:15
Community Structure Detection in Complex Networks with Partial Background Information
[ "cs.SI", "physics.soc-ph" ]
Constrained clustering has been well-studied in the unsupervised learning society. However, how to encode constraints into community structure detection, within complex networks, remains a challenging problem. In this paper, we propose a semi-supervised learning framework for community structure detection. This framework implicitly encodes the must-link and cannot-link constraints by modifying the adjacency matrix of network, which can also be regarded as de-noising the consensus matrix of community structures. Our proposed method gives consideration to both the topology and the functions (background information) of complex network, which enhances the interpretability of the results. The comparisons performed on both the synthetic benchmarks and the real-world networks show that the proposed framework can significantly improve the community detection performance with few constraints, which makes it an attractive methodology in the analysis of complex networks.
cs.SI
cs
Community Structure Detection in Complex Networks with Partial Background Information Zhong-Yuan Zhanga aSchool of Statistics, Central University of Finance and Economics, P.R.China Abstract Constrained clustering has been well-studied in the unsupervised learning society. However, how to encode constraints into community structure detec- tion, within complex networks, remains a challenging problem. In this paper, we propose a semi-supervised learning framework for community structure detection. This framework implicitly encodes the must-link and cannot-link constraints by modifying the adjacency matrix of network, which can also be regarded as de-noising the consensus matrix of community structures. Our proposed method gives consideration to both the topology and the functions (background information) of complex network, which enhances the inter- pretability of the results. The comparisons performed on both the synthetic benchmarks and the real-world networks show that the proposed framework can significantly improve the community detection performance with few con- straints, which makes it an attractive methodology in the analysis of complex networks. 1. Introduction Evidences have shown that there are often modules or community struc- tures in complex networks [1]. For example, a community could be a set of proteins that have similar functions in a protein-protein interaction (PPI) network, or it could be a group of fans that like visiting similar kind of mu- sic web pages, or a university club, etc. Though there is still no standard and clear definition of community structure, we may regard a community in complex networks as a set of nodes that have similar link-pattern, or in other words, these nodes have similar preference and connect to the other nodes in a similar way. The most common and widely studied community Preprint submitted to EPL September 10, 2018 is a subgraph that is densely interconnected but loosely connected with the rest of the graph. Meanwhile, there are also other types of communities. Dis- covering communities is very important for revealing the organization and the functions of the network, such as understanding how the units in some systems communicate with each other and work together, or learning how the new ideas or diseases spread in a group of persons [2], etc. How to detect community structures has thus become a hot topic, and many interesting models and algorithms have been developed and have achieved good results. But all of these methods are in essence a kind of unsupervised learning, meaning that they only make use of the network topology infor- mation. However, in many real scenarios, there is usually some background information that could also be used in detecting the communities. This in- formation can be treated as additional constraints, and how to combine the information with the network topology to guide the detecting process is an interesting problem that is worthy of working on. In this paper, we propose a semi-supervised framework to incorporate prior information into community structure detection. Our framework is flex- ible to integrate various known information. One can easily provide pairwise constraints on a few nodes in the network, specifying whether they must or cannot be in the same community structure, based on the background information and domain knowledge. For example, the nodes that have sim- ilar functions should be must-link, or the nodes that have different opinions should be cannot-link. The framework implicitly encodes the must-link and cannot-link constraints by modifying the adjacency matrix of the network, which can also be regarded as the de-noising process of the consensus matrix of the community structures, i.e., creating connections within communities and removing connections across communities. 2. Semi-supervised learning for community structure detection In this section, we formulate our semi-supervised framework for commu- nity structure detection. Firstly, we introduce the definition of adjacency matrix A[0] of an undirected and unweighted simple graph G with n nodes: A[0] ij =(cid:26) 1, 0, if i ∼ j if i = j or i ≁ j, where i ∼ j means there is an edge between node i and j, and i ≁ j means there is no edge between them. Here A[0] is n × n and symmetric. 2 Note that the diagonal elements of A[0] are all zeros, but these zeros are obviously different from the ones at the off-diagonal positions which mean there are no connections between the nodes. Hence we here set the diago- nal elements of A[0] to 1. The revised adjacency matrix is denoted by A[1]. Another variation of A[0] is its complementary matrix C [A] = 1 − A[0]. 2.1. Incorporating prior knowledge into adjacency matrix In many real applications, we often have some background information that can be used for community structure detection. Specifically, we consider the following two types of pairwise constraints: • Must-Link constraints CM L: (i, j) ∈ CM L means that the two nodes i and j must belong to the same community, • Cannot-Link constraints CCL: (i, j) ∈ CCL means that the two nodes i and j cannot belong to the same community. We incorporate the constraints CM L and CCL into the adjacency matrix A[1] to get a new matrix B as follows: Bij =  where α is a positive constant. α, 0, A[1] ij if (i, j) ∈ CM L if (i, j) ∈ CCL otherwise, (1) As one can see, if we set α to 1, and for all the pairs of nodes, we know whether they should belong to CM L or CCL, or in other words, we know very well the community structures in the graph, the adjacency matrix will reduce to the standard consensus matrix, whose (i, j)th element means whether node i and node j are in the same community, 1 means yes and 0 means no. Hence from the viewpoint of consensus matrix, incorporating prior knowledge can be regarded as the de-noising process. We have tried different α, i.e., α = 1 and α = 2, and the results of α = 2 always get better. We omit the comparisons here due to space limit. After incorporating background information into the adjacency matrix, we then apply nonnegative matrix factorization (NMF), spectral clustering and InfoMap, which are of the most common and widely-used models in unsupervised learning, for community structure detection. 3 2.2. Nonnegative matrix factorization (NMF, [3, 4, 5, 8]) NMF can be expressed as follows: given a nonnegative objective matrix X of size n × m, columns of which are samples and rows are features, we try to find two nonnegative matrices F of size n × k and G of size m × k such that: X ≈ F GT . This problem is often formulated as the following nonlinear programming: min F,G s.t. J(XkF GT ) F > 0, G > 0, (2) where J(XkF GT ) is the cost function that measures the dissimilarity between X and F GT , and > 0 means that F and G should not have negative entries. The most popular algorithm designed for NMF is multiplicative update rules. The objective matrix X for NMF can be selected as B. In [6], it showed that the diffusion-kernel-based similarity matrix SK 1 was the best choice for the objective matrix X among all the candidates, hence we also tested the performance of SK in this paper. The community structures of the network can be obtained from G: node i is of community k if Gik is the largest element in the ith row of G. 1) Standard NMF with least squares error: If J(XkF GT ) is selected as the least squares error: J(XkF GT ) = kX − F GT k2 F , the algorithm of multi- plicative update rules can be summarized in Algorithm 1. In this paper, the iteration number iter is set to 100. 1Definition of diffusion kernel K and the similarity matrix SK [6, 7]: K = lim n→∞ (1 + βL n )n = expm(βL), where L is the opposite Laplacian of A[0]: Lij =  and di is the degree of node i. 1 −di 0 if i ∼ j if i = j otherwise, We set β = 0.2 in this paper. Note that there is a MATLAB command "expm" for the exponential of a matrix. Kij . SKij = pKiiKjj 4 Algorithm 1 Nonnegative Matrix Factorization (Least Squares Error) Input: X, iter Output: F, G. 1: for t = 1 : iter do 2: Fik := Fik (XG)ik (F GT G)ik 3: Gik := Gik 4: end for (X T F )ik (GF T F )ik 2) Standard NMF with K-L divergence: KL divergence: J(XkF GT ) =Xi,j corresponding update rules of F and G are: (F GT )ij If J(XkF GT ) is selected as the − Xij + (F GT )ij], the Xij [Xij log Fik := Gjk := Fik Pj Gjk Xj Pi Fik Xi Gjk Xij (F G)ij Gjk; Xij (F G)ij Fik. 3) Symmetric NMF (SNMF): There is a variant of NMF for semi-supervised clustering, whose objective function can be formulated as: kX −GSGT k2 F . The update rules of G and S are [5]: Gik := Gik (XGS)ik (GSGT GS)ik Sik := Sik (GT XG)ik (GT GSGT G)ik ; . 4) Bayesian NMF [8]: It optimizes the NMF model under the Bayesian framework, and can get better results under some circumstances. 2.3. Spectral Clustering [9] Spectral clustering is very powerful in its simplicity and effectiveness, which can be summarized in Algorithm 2. Note that there are many varia- tions of the standard one, and the detailed analysis can be found in [10, 11]. 5 2.4. InfoMap [12] This model grew out of information theory, and tries to reveal the com- munities by optimizing a quality function about the minimum description length of random walks on the network. The model is among the best for community detection [13]. Algorithm 2 Spectral Clustering Input: B ∈ Rn×n Output: Community Label Y ∈ Rn×1 of the n nodes 1: L = D1/2BD1/2, where D is the diagonal matrix with the element Dii = Pj Bij . 2: Formimg the matrix X = [x1, x2, · · · , xk] ∈ Rn×k, where xi, i = 1, 2, · · · , k are the top k eigenvectors of L. 3: Normalizing X so that rows of X have the same L2 norm: Xij = ij)1/2. Xij/(Pj X 2 4: Clustering rows of X into k clusters by K-means. 5: Yi = j if the ith row is assigned to cluster j. 2.5. An illustrative example We close this section by an illustrative example as follows: we try to de- tect the community structures in a GN network with 128 nodes (For details, see Data Description, Zout = 10.). The network has 4 communities with 32 nodes each. The heatmap of the corresponding adjacency matrix A[1] is shown as the leftmost in Fig. 1. If we have prior knowledge about the net- work structure so that we can determine a percentage of pairs of nodes as must-link or cannot-link, we can incorporate them into A[1]. As one can see in Fig. 1, the adjacency matrix becomes more and more clear as the percentage of pairs constrained increases, and finally reduces to the standard consen- sus matrix of the community structures. This example demonstrates that background information is valuable to improve the accuracy of community structure detection. 6 Figure 1: An illustrative example to show the process of incorporating prior information into the adjacency matrix as de-noising the consensus matrix. 3. Experimental Results In this section, we empirically demonstrated the effectiveness of our pro- posed semi-supervised framework for community structure detection by ap- plying NMF, spectral clustering and InfoMap with the de-noised consensus matrices to several well-studied networks. 3.1. Data Description We used both synthetic and real-world networks to test the effectiveness of our methods. The details of these datasets are as follows: 1) GN [1] : Maybe the most widely used benchmarks are GN networks. The network has 128 nodes which are divided into four non-overlapping com- munities with 32 nodes each. The degree of each node is Zin+Zout = 16, in other words, each node averagely has exactly 16 edges which randomly connect Zin nodes in its own community and Zout nodes in other commu- nities. As one can see, with the increasing Zout, the community structures will become less clear and the problem more challenging. In this paper, we set Zout to 8. 2) LFR [14] : Indeed, in most of the real applications, the community struc- tures are more complicated than GN networks. The size of the network might be larger, or the numbers of the nodes in different communities might not be identical, or different nodes might have different positions, i.e., some are superstars or hubs and should have higher degrees while the others are leaves. The LFR benchmark networks are thus proposed to address these problems. In LFR networks, both the degree and the 7 community size distributions are power laws, with exponents γ and β, which is more practical. Each node has a fraction 1 − µ of its links with the nodes in its own community and a fraction µ with the other ones. Here µ is called the mixing parameter. We set the parameters of the LFR network as follows: the number of nodes was 1000, the average degree of the nodes was 20, the maximum degree was 50, the exponent of the degree distribution γ was 2 and that of the community size distribution β was 1, and the mixing parameter µ was 0.8. The communities were non-overlapping. 3) Karate [15]: this dataset contains the network of friendships between 34 members of a karate club at an American university. This club was by chance split into two smaller ones due to the divergence of opinions about the club fees. 4) Football [1]: this dataset contains the network of American football games (not soccer) between Division IA colleges during regular season Fall 2000. There are 115 nodes representing the football teams while an edge means there was a game between the teams connected by the edge. The teams were divided into 12 conferences, and all teams except few (mainly in two conferences) played against the ones in the same conference more frequently than those in other conferences. 3.2. Assess Standards In our experiments, the normalized mutual information (NMI, [16]) was used as the standard to evaluate the community structure detection perfor- mance. The value can be formulated as follows: NMI(M1, M2) = k Pi=1 k Pj=1 nij log nijn i n(2) n(1) j vuut k Pi=1 n(1) i log n(2) j log n(1) i n ! k Pj=1 , n(2) j n ! where M1 is the ground-truth cluster label and M2 is the computed cluster label, k is the community number, n is the number of nodes, nij is the number of nodes in the ground-truth cluster i that are assigned to the computed cluster j, n(1) is the number of nodes in the computed cluster j, log is the natural logarithm. is the number of nodes in the ground-truth cluster i and n(2) j i 8 Compared with simply counting the number of misclassified nodes, NMI is more informative, especially suitable for imbalanced datasets (i.e., the num- bers of the nodes in different communities are not identical). For example, in a four-sample toy data, the ground-truth cluster label could be 1, 1, 1, 2. The computed cluster labels of two different models were 1, 1, 1, 1 and 1, 1, 2, 2 respectively. In other words, the smaller cluster was masked and not de- tected by the first model, hence the second model should be better though it also had one sample mis-clustered. But the accuracy (number of misclassified nodes divided by the number of nodes in the graph) results of these two mod- els were all 75%, which was misleading. On the other hand, the NMI under 3 · 4 3 · 4 1 · 4 1 · 4 this case was 0 (the numerator of NMI was: 3 log + 1 · log = 0) and 34.56% respectively, which was relatively more reasonable and informative. In the case study, we also used the modularity function Q [17, 18] as the standard to determine the best community number k. The function can be defined as follows: Q =XCk "L(VCk , VCk) L(V, V ) −(cid:18)L(VCk , V ) L(V, V ) (cid:19)2# , where Ck is the kth community in the graph, L(V1, V2) = Pi∈V1,j∈V2,i6=j aij is the element of A[0]. aij, and The larger the values of NMI and Q, the better the graph partitioning results. Firstly, we compared the clustering performance of NMF-based models with different similarity measures including A[0], A[1], C [A] and SK. The results show that A[1] is a competitive one, though there is no single winner. Note that calculating the diffusion kernel is time consuming for large scale networks, hence we used A[1] for the NMF-based models in the following experiments. The details are omitted here due to space limit. 3.3. Results Analysis In this subsection, we systematically compared the results of NMI ob- tained by the models on the artificial datasets and the karate network with prior knowledge available. For an undirected network with n nodes, there are totally n(n − 1)/2 node pairs available. We randomly picked out some pairs of nodes, and determined whether they belonged to CM L or CCL: if the two nodes had the same community label, they were must-link, otherwise, 9 they were cannot-link. The results were averages of ten trails and given in Fig. 2 and Table 1. From these figure and table, one can observe that: i) The trends of all the models are generally identical and the values of the av- eraged NMI increase with the increasing percentage of pairs constrained; ii) for synthetic datasets: GN and LFR, the model of InfoMap and the spectral clustering are better than the NMF-based models, especially for the LFR datasets; iii) for the karate network, NMF with least squares error performs better; iv) our proposed framework is flexible and model independent, or in other words, it can be naturally combined with many models, such as NMF, spectral clustering, InfoMap, etc. In summary, our proposed semi-supervised framework does greatly en- hance the results of community structure detection by benefitting from the user provided background information. 3.4. A Case Study: College Football Network In this subsection, we used the college football network for a case study, and saw the partitioning results of NMF LSE given different percentages of pairs constrained. Actually, we also tried spectral clustering and got similar results. Details of spectral clustering are omitted here due to space limit. The teams were separated into 12 conferences, and most of them played against the ones in the same conference more frequently. However, the teams 37, 43, 81, 83, 91 (in conference IA Independents), 12, 25, 51, 60, 64, 70, 98 (in conference Sunbelt), 111, 29 and 59 played more frequently against the ones in other conferences. Table 2 lists the basic information about these teams, from which one can observe that three out of five teams in IA Independents never played against the ones in the same conference and the other two teams played only once. Firstly, we tried to determine the community number k. We compared the values of modularity Q at different k, and the function achieved its peak value at k = 11. By combining the results of Q values in Table 3 with the information in Table 2, we set the community number k = 11 and the teams in IA Independents would be assigned to the other eleven conferences based on the outputs of NMF. Hence there were 115 − 5 = 110 teams with ground-truth conference labels and totally 110 × (110 − 1)/2 = 5995 team pairs available. We randomly selected some pairs as constraints: if the two teams of the pair were in the same conference, they were must-link (ML), otherwise, they were cannot-link (CL). 10 1 0.8 0.6 0.4 0.2 I M N 1% 2% 3% 4% 5% 10% 20% 30% 40% 50% percentage of pairs constrained 1 0.8 0.6 0.4 0.2 I M N 0 1% NMF_LSE NMF_KL SNMF Spectral Bayesian NMF InfoMap 2% 3% 4% 5% 10% 20% 30% 40% 50% percentage of pairs constrained (a) GN, Zout = 8, α = 2. (b) LFR, µ = 0.8, α = 2. Figure 2: Averaged NMI of different models for different percentages of node pairs con- strained on GN and LFR datasets. The black horizontal line is the best NMI result that had ever got by NMF LSE, NMF KL, SNMF, Bayesian NMF, spectral clustering and In- foMap with no prior knowledge available. "LSE" means least squares error, "KL" means K-L divergence, "SNMF" means symmetric NMF. Table 1: Averaged NMI of different models given different percentages of node pairs con- strained on the karate dataset. "P" means percentage of node pairs constrained. Meanings of "LSE", "KL" and "SNMF" are identical with that in Fig. 2, and "SP" means spectral clustering. P P P Models P P P P P PP 1% 2% 3% 4% 5% 10% 20% NMF LSE NMF KL SNMF SP 99.84% 98.86% 99.67% 99.84% 99.84% 100% 100% 73.38% 59.53% 90.19% 73.44% 51.50% 90.19% 82.86% 54.06% 95.10% 85.18% 60.96% 96.73% 89.24% 53.74% 95.10% 89.14% 57.91% 100% 98.37% 56.57% 100% Figure 3 gives the resulting partitions of NMF corresponding to differ- ent percentages of pairs constrained. When given no prior knowledge con- strained, there were 5 abnormal teams mis-clustered: teams 29, 60, 64, 98, 111; But after randomly given 5 percent of pairs constrained, the results were significantly improved and only two abnormal teams were mis-clustered: teams 29 and 111. Finally, when given 20 percent, there was only one team mis-clustered: team 59. From these results, one can see that: 1) NMF is 11 really good enough in that only some abnormal teams are not correctly clus- tered; 2) our semi-supervised clustering framework does take the background information and domain knowledge into consideration, which makes the par- titioning results more explainable. Table 2: Basic information about the abnormal teams that played more frequently against the ones in the other conferences. "T" means the team id, "F" means the times that the team played against the other ones in the same conference or in the other conferences, "S" means the same conference, "O" means the other conferences. ❍ ❍ ❍ F T ❍ ❍ ❍ 37 43 81 83 91 12 25 51 S O 0 0 1 1 0 4 3 3 8 7 10 10 9 6 7 6 ❍ ❍ ❍ F T ❍ ❍ ❍ 60 64 70 98 111 29 59 S O 2 2 3 3 0 0 2 6 7 8 5 11 9 8 Table 3: Values of averaged Q functions of NMF LSE and spectral clustering. The range of the community number k that we have tried is 8 ∼ 12. The peak values were achieved at k = 11. Meaning of "LSE" is identical with that in Fig. 2. ❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤ Community Number Models 8 9 10 11 12 NMF LSE Spectral Clustering 0.5770 0.5831 0.5890 0.5934 0.5885 0.5932 0.5927 0.5942 0.5978 0.5951 3.5. How to give the prior knowledge: randomly or based-on-rule Finally, we ask an interesting question: how to select the prior information and incorporate them into the models? To the best of our knowledge, in practice, the most widely used method is to randomly select some pairs 12 (a) (b) (c) (d) Figure 3: Comparison of the results of NMF corresponding to different percentages of pairs constrained. (a): Real grouping in football dataset. There are 12 conferences of 8-12 teams (nodes) each. (b): Outputs of NMF without any prior knowledge. (c): Outputs of NMF corresponding to 5 percent of pairs constrained. (d): Outputs of NMF corresponding to 20 percent of pairs constrained. 13 1 0.8 0.6 0.4 0.2 I M N 0 1% NMF_LSE NMF_KL SNMF Spectral Bayesian NMF InfoMap 2% 3% 4% 5% 10% 20% 30% 40% 50% percentage of pairs constrained Figure 4: Averaged NMI of different models for different percentages of node pairs con- strained on GN datasets (Zout = 8). The prior knowledge are given based on rule. Meanings of the black horizontal line, "LSE", "KL" and "SNMF" are identical with that in Fig. 2. of samples or nodes and manually determine whether they are must-link or cannot-link based on the domain knowledge. But are there any better methods to select the pairs that can either reduce the workload or improve the clustering performance, or both? Indeed, for a large scale network, a very small percentage of pairs may still mean a huge workload. In this subsection, we attempted to introduce a new rule-based method to address this problem. Firstly, we computed the hamming distances between all pairs of nodes (rows of A[1]), and sorted the distances to find the largest and the smallest ones (this step can be finished by programming calculation, not manually). We selected the pairs that have the largest distances and the smallest distances simultaneously. For example, if we wanted to select P pairs of nodes, we selected P/2 pairs with the largest distances, and also selected P/2 pairs with the smallest distances. Then we manually decided whether the selected pairs were must-link or cannot-link and incorporated them into the clustering process. The results on GN datasets are shown in Fig. 4, from which one can observe that our preliminary results are not good enough compared with that of randomly based. Hence we leave the problem open and believe that it deserves further study. 4. Conclusions and Future work In this paper, we introduced a semi-supervised community structure de- tection framework for complex network analysis. The framework adopts a simple strategy to add the supervision of pairwise must-link and cannot-link constraints into the adjacency matrix, which can be regarded as de-noising of 14 the consensus matrix of community structures. The experiments on both the synthetic and real-world networks have demonstrated the effectiveness of the proposed framework. In summary, it can combine the network's functions (background information and domain knowledge) with its topology, mak- ing the community structure detection more effective and the results more practical. We would like to close this paper by raising two interesting problems. Firstly, as we have mentioned above, are there any better methods that can be used for selecting the constraints? A good attempt is the work in [19], which selected the constraints based on various similarity measures, not randomly. Secondly, the proposed framework is very flexible, and can be naturally combined with some other semi-supervised learning models. Researches on this kind of combination are our future working directions. 5. Acknowledgement This work is supported by National Natural Science Foundation of China under Grant No. 61203295. The author is very appreciated the reviewers' valuable comments. References [1] M. Girvan, M. E. J. Newman, Proceedings of the National Academy of Sciences 99 (12) (2002) 7821 -- 7826. [2] X. Wu, Z. Liu, Physica A 387 (2008) 623 -- 630. [3] D. D. Lee, H. S. Seung, Nature 401 (6755) (1999) 788 -- 791. [4] D. D. Lee, H. S. Seung, NIPS, 2000, pp. 556 -- 562. [5] Y. Chen, M. Rege, M. Dong, J. Hua, Seventh IEEE International Con- ference on, IEEE, 2007, pp. 103 -- 112. [6] R. Wang, S. Zhang, Y. Wang, X. Zhang, L. Chen, Neurocomputing 72 (2008) 134 -- 141. [7] R. I. Kondor, J. Lafferty, in: International Conference on Machine Learning (ICML), 2002, pp. 315 -- 322. 15 [8] I. Psorakis, S. Roberts, M. Ebden, B. Sheldon, Physical Review E 83 (6) (2011) 066114. [9] A. Ng, M. Jordan, Y. Weiss, Advances in neural information processing systems 2 (2002) 849 -- 856. [10] H. Shen, X. Cheng, Journal of Statistical Mechanics: Theory and Ex- periment 2010 (2010) P10020. [11] X. Ma, L. Gao, Journal of Statistical Mechanics: Theory and Experi- ment 2011 (2011) P05012. [12] M. Rosvall, C. Bergstrom, Proceedings of the National Academy of Sci- ences 105 (4) (2008) 1118 -- 1123. [13] A. Lancichinetti, S. Fortunato, Physical Review E 80 (5) (2009) 056117. [14] A. Lancichinetti, S. Fortunato, F. Radicchi, Phys. Rev. E 78 (2008) 046110. [15] W. W. Zachary, Journal of Anthropological Research 33 (1977) 452 -- 473. [16] A. Strehl, J. Ghosh, Journal of Machine Learning Research 3 (2002) 583 -- 617. [17] M. Newman, M. Girvan, Physical review E 69 (2) (2004) 026113. [18] M. Newman, Proceedings of the National Academy of Sciences 103 (23) (2006) 8577 -- 8582. [19] X. Ma, L. Gao, X. Yong, L. Fu, Physica A: Statistical Mechanics and its Applications 389 (1) (2010) 187 -- 197. 16
1601.05575
2
1601
2016-04-21T09:54:42
SibRank: Signed Bipartite Network Analysis for Neighbor-based Collaborative Ranking
[ "cs.SI" ]
Collaborative ranking is an emerging field of recommender systems that utilizes users' preference data rather than rating values. Unfortunately, neighbor-based collaborative ranking has gained little attention despite its more flexibility and justifiability. This paper proposes a novel framework, called SibRank that seeks to improve the state of the art neighbor-based collaborative ranking methods. SibRank represents users' preferences as a signed bipartite network, and finds similar users, through a novel personalized ranking algorithm in signed networks.
cs.SI
cs
SibRank: Signed Bipartite Network Analysis for Neighbor-based Collaborative Ranking Abstract Bita Shams a and Saman Haratizadeh a a University of Tehran, Faculty of New Science and Technology Amir Abad, North Kargar Street, Tehran, Iran14395-1374 Collaborative ranking is an emerging field of recommender systems that utilizes users' preference data rather than rating values. Unfortunately, neighbor-based collaborative ranking has gained little attention despite its more flexibility and justifiability. This paper proposes a novel framework, called SibRank that seeks to improve the state of the art neighbor-based collaborative ranking methods. SibRank represents users' preferences as a signed bipartite network, and finds similar users, through a novel personalized ranking algorithm in signed networks. Keywords: Recommender System, Collaborative Ranking, Signed Network, Similarity Measure, Preference Data, Personalized Ranking; 1 Introduction Recommendation systems exploit users' historical data in order to suggest a small set of relevant services among a large volume of irrelevant ones. Traditionally, these systems seek to predict user's interests through gathering and prediction of ratings given by him to services or products. In recent years a variation of recommender systems, called collaborative ranking, has emerged that focuses on ranking data instead of ratings [1,2] to find the best items to recommend. Rankings seem to be more informative and reliable source of information to reflect users' preferences and interests [2,3]: users' ratings commonly follow a baseline that is a function of time[4]. For instance, a user that assigns a rate of 4 to an average movie "A" now, might tend to assign 3 to that movie in the future. However, in both times, he probably would not prefer that average movie over an excellent movie "B". So, he persistently ranks "B" over "A" while the rates he gives to those movies may change over time. Furthermore, the goal of a recommender system is to find and recommend the most relevant items [3,5,6]. Therefore, it is more important to accurately predict the user's priorities rather than the absolute ratings he would give to items. For example, consider a case that a target user would rate the movies "A" and "B" with 4 and 5 respectively, that is r(A)=4 and r(B)=5. Suppose that some rate prediction algorithm, predicts ratings r(A)=2 and r(B)=3, while another algorithm predicts r(A)=5 and r(B)=4. Although, in rate based framework, the latter one is considered more accurate in the sense of rate prediction, it is clear that the former one would correctly rank "B" higher than "A" and will probably make a better recommendation. Recently, several researchers have approached recommendation from a ranking- oriented perspective. These approaches can be categorized into two groups: model-based collaborative ranking methods (MCR) and neighbor-based collaborative ranking methods (NCR). MCR techniques try to learn the latent factors of users and items while optimizing 1 a ranking criterion (e.g. Normalized Discounted Cumulative Gain (NDCG))[1,5,7] while NCR algorithms exploit the concept of users' similarity to infer a ranking over the user's uncollected items[2,6,8–11] Neighbor-based collaborative ranking has not been investigated as much as model- based ranking. The reason is possibly that it is not straightforward to calculate the similarity among users when each user's profile is a set of preferences [12] Most of the current NCR algorithm have exploited Kendall correlation that takes into account users' agreements and disagreements over pairwise comparisons [2,10,11]. However, Kendall measure, has originally been proposed to compare similarity between total orders (i.e. ranking over a set of distinct items)[12] Therefore, it is not directly applicable to recommender systems where each user has partially ranked a different subset of items. To resolve this issue, current NCR techniques calculate users' similarity based on their common comparisons and ignore the information available through the uncommon rankings. This approach suffers from some shortcomings: First, Kendall correlation does not take in to account the confidence or reliability of the source of information: the similarity calculated over a small set of common comparisons is not as reliable as one calculated over a large set of comparisons. Second, Kendall correlation between users with no common comparison is equal to zero, simply because this measure ignores all other available information in the data that can be used to discriminate between such users. These problem are more serious in in sparse datasets where users rarely have a common pairwise comparison. As illustrated in Fig.1a, in a sparse data set, Kendall correlation and its variants would be zero for more than 87% of pairs of users. Also, in average, more than 96% of the users among which the Kendall correlation is one, have only one common pairwise comparison (See Fig.1b). That clearly indicates that when one uses Kendall correlation for finding similar users, not only all users with no common comparison with the target user are ignored, but also the recommendation is highly affected by those users who have only one common pairwise comparison with the target user. Figure 1. Statistical properties of Kendall Correlation in a sample dataset of movielense100K containing 10 ratings for each user. a) Distribution of Kendall correlation of users b) Distribution of the number of common pairwise preferences among users whose Kendall Correlation is one This paper proposes a novel NCR framework, called SibRank, to resolve these issues. SibRank first construct a signed bipartite network, called SiBreNet, to represent users' preferences. Then, it exploits a novel similarity measure, called SRank, to calculate similarity among the target user and all other users in SiBreNet. The main contributions of this paper can be summarized as below: 2  To our knowledge, this is the first work that takes advantages of signed networks to capture the similarity among users' ranking. This paper represents ranking data as a signed bipartite graph to comprise different kinds of information about agreement and disagreement of users over their preferences.  We propose a novel similarity measure in signed networks that reflects a global view of agreements and disagreements between users.  We conducted set of experiments to assess the performance of SibRank. The results show some improvements compared to one of the best current algorithms called EigenRank. 2 Related works 2.1 Neighbor-based Collaborative Ranking The first neighbor-based collaborative ranking algorithm was proposed in [2]. The paper introduced a general framework, called EigenRank, which is now widely followed by other NCR techniques[8–10,13]. It finds similar users to the target user based on users' preferences. Based on those neighboring users, EigenRank infers the preference matrix for the target user, using which it infers a ranking over the unseen items, and recommends the top ones to him. This framework is commonly used in all neighbor-based collaborative ranking algorithms with slight modifications; the main difference often lies in the similarity measures used by NCR techniques for finding similar users. EigenRank uses the Kendall Correlation measure and calculates the similarities considering the concordant and discordant pairwise preferences in the users' preferences. EduRank[13] modifies the Kendall measure by also considering compatible preference. The compatible case occurs when one user neither agrees nor disagrees another user over a distinct comparison. For example, consider three users u, v, p that all have compared two items (a, b) and the results are (a>b), (a<b), (a=b) for u, v and p, respectively. u and v disagrees over this comparison, while, p's verdict is compatible with those of both a and b. These versions of Kendall measure do not considers the importance of each preference for finding similar users to the target user. VSRank[8] introduces another measure, called weighted Kendall, to cover this issue. However, this approach, like the previous ones, still does not consider the reliability for the calculated similarities and also can't determine the proximity between users with no common pairwise comparisons. Additionally, it has been designed to exploit the rating data, and, consequently is not applicable in ranking-oriented systems with no ratings available. In this paper, we propose a novel similarity measure that addresses the issues through personalized ranking in a signed network representing users' preferences. The proposed approach is applicable in all cases of preference data such as ratings, binary relevance feedbacks, and, pairwise preferences. Since, in our method, we model the data in the form of a graph, we will first present a brief review of the current available graph-based approaches for recommendation. 2.2 Graph-based recommendation Graph structure provides effective tools to model and analyze direct and indirect relations among users. This has resulted in a large number of researches in graph-based recommendation algorithms. These algorithms commonly focus on binary data (i.e. like, 3 dislike) and rarely pay attention to ratings. They use the graph structure to efficiently calculate some "closeness" value among users, items, or between users and items. Li and Chen formulated recommendation problem as calculating closeness of users and items in a bipartite graph. Anhui [14] investigated how to calculate similarity among users in a user- movie bipartite network. Another study [15] follows that approach in a tripartite graph containing users, items, and tags. The authors in [16] calculate closeness of all types of objects in a heterogeneous network. Xiang, et al. captured the long-term and short-term preferences of users in a tripartite graph of users, items, and sessions [17]. Yao, et al. have exploited a multi-layer graph to make context-aware recommendations [18] To our knowledge, none of these algorithms focuses on modeling ranking and preference data through signed networks, and, consequently, SibRank is the first algorithm in the family of NCR algorithms that exploits signed networks to represent the ranking data and to calculate a similarity among users' priorities. 2.3. Personalized ranking in signed networks Computing similarity of nodes to a particular node, termed as a personalized ranking of nodes, is one of the main challenging issues in social and information networks. Despite a large series of personalized ranking algorithms such as personalized PageRank or Katz similarity, few have focused on signed networks containing positive and negative relations. Ranking nodes in signed network have mainly been studied in the domain of trust/distrust relationships: Guha, et al.[19] extend the Katz similarity for signed networks through multiplication of signed adjacency network or considering one-step propagation of distrust. Additionally, a series of algorithms have been proposed through extending PageRank for signed networks. For example, EigenTrust [20] first removes the negative links from the network and then, ranks the nodes in the resulting network, so, a negative link between two nodes, is treated just like an absent link, while they represent totally different facts. PolarityRank [21] is another algorithm that classifies the nodes' labels through propagation of ranks from some predetermined representatives for both positive and negative groups. PageTrust [22] takes into account negative links through decreasing the number of random walkers at nodes with large negative links. Exponential ranking algorithm [23] is an extension of PageRank algorithms that modifies the transition probability matrix in the sense that the random walker follows positive links with higher probability than negative links. Similarly, some other ranking algorithms assume that nodes reaching from paths passing negative links should be ranked less than those reaching from paths passing positive links [24,25]. Essentially. these algorithms, first decompose the network to the negative and positive networks containing only negative and positive networks, respectively. Then, they define the ranking of each node based on the difference of its ranking in positive and negative networks. Another signed ranking algorithm, Troll-Trust [26], models the absolute value of nodes' reputation as a Bernoulli random variable that can be interpreted as how much one should trust a particular user. Most of the mentioned algorithms extend PageRank considering additive propagation of distrust which refers to the social belief that" I don't respect someone not respected by someone that I don't respect" [19]. Although this idea is somehow reasonable in terms of distrust propagation, it is untenable for calculating users' similarities in signed bipartite 4 preference networks. In this case, users who disagree the discordant preferences are probably as similar as those users who agree over concordant preferences. Therefore, we adopt a signed multiplicative propagation approach which follows another social belief, called social balance theory, that tells "enemies of my enemy and friends of my friend are friends, while, the enemies of my friend and friends of my enemy are enemies" [21]. 3 SibRank Framework SibRank is a novel NCR framework that seeks to improve the current state of the art algorithm through considering direct and indirect agreements and disagreements of users. It first maps the users' rankings to a Signed Bipartite preference Network, called SiBreNet). Then, it calculates the closeness of users to the target user, and, labels the most similar ones as neighbors. After that, it estimates the preference matrix of the target user based on his neighbors' verdicts, infers a total ranking for him and recommends the Top-N items. 3.1 Construction of SiBreNet SiBreNet represents users' priorities using two types of nodes (i.e. users and preference) and two types of relations: positive and negative relations. A user is connected to a preference node with a positive edge if he agrees with that preference and is connected to a preference with a negative edge, if he disagrees with that preference. There is no edge between a user and a particular preference if his opinion is unknown about that preference. Figure 2 illustrates a schematic example of SiBreNet; Jack is connected with a positive edge to the preference node {A>B} because he ranks A over B. On the other hand, Mike believes that B is better than A, and, so Mike and {A>B} are connected with a negative link. Figure 2: An example of SiBreNet in case of four users and three items. Red and green lines indicate negative and positive relations, receptively. 5 Definition 1 (SiBreNet): SiBreNet is a bipartite Graph (<V, E,W>) where V is the set of nodes and E is the set relations among nodes. V is composed of two subsets: user nodes U p. The pseudo-code of SiBreNet construction is shown in Algorithm.1. It initializes a bipartite graph including one node for each user (Line 1-3). Then, it makes an alphabetical order on and preference nodes P; =∪. Each edge (u,p) is labeled with a weight , that indicates the agreement (,=) or disagreement (,= ) of user u to preference items (Line 5) and creates the preference nodes (Line 6-8). For each pair of items , the order: if A comes before B, it will add the preference node {<}, otherwise, node {< } will be generated instead. Finally, for each pair of users and preferences (,), it 11-12). If he disagrees p, a negative link will be generated (Line 13-14) and if does not judge , or likes them equally, then no link will exist between them. checks whether u agrees with preference p, disagrees it, or has not judged the preference yet (Line 9-14). If u agrees with p, then a positive link will be added between u and p (Line algorithm creates one preference node with regards to the order of items in the alphabetical Algorithm 1: Pseudo code for SiBreNet construction Input Output Signed Bipartite Preference Network (G) Set of users U, Set of items I, Preference database (P) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 //Initializing user layer For each user uU Create a node u in user layer //Initializing preference layer S= generate a permutation of items for (i=1;i<length(s);i++) for(j=(i+1);j<=length(s);j++) create a preference node indicating (S(i)<S(j)) in preference layer for each user uU for each pP if u agrees p create a positive edge between u and p else if u disagrees p create a negative edge between u and p 3.2 SRank: personalized ranking in signed networks We present an algorithm called SRank that adopts signed multiplicative rank propagation [21] for similarity calculation in recommender systems. SRank exploits a personalized random walk in an undirected signed graph for calculating similarities among nodes, and is based on some ideas from social balance theory. Social balance theory refers to the fact 6 , that a random walker at node i will move to node j and is defined by Eq.1 Formally, for a given signed graph G=<V,E, W>, a random walker will surf the graph that for a person, friends of friends, and, enemies of enemies are friends, while, friends of enemies, and, enemies of friends are enemies [27,28]. The basic idea behind SRank is that a positive random walk from a source node "s" to a destination node "d" is a sign of similarity between "s" and "d" while existence of a negative walk from "s" reaching "d" is a clue for the dissimilarity between them. Definition 2: (Positive and negative random walk): A random walk =< ,,…,>, passing nodes ,,…, is called a positive random walk with length m if ∏ =. Also, a random walk Q =<,,…,> , passing nodes ,,…, is called a negative random walk with length n if ∏ , = according to the transition matrix T. An element , in matrix T indicates the probability ,= , ∑ , where , is the weight of edge between nodes i and j. In fact, the random walker at node i will move to one of its neighbors uniformly with probability of 1/ where is ,=,,,=1 0,. ,=,,,= 1 0,. Given these transition matrices, the positive SRank () and negative SRank(), can be =(+)+(1 ) =(+) Since SRank requires to distinguish positive and negative random walks, it decomposes the transition matrix to the positive and negative components that are obtained through Eq.2 and Eq.3, respectively. Positive and negative transition matrices indicate the probability that a random walker at node i will move to one of its positive and negative neighbors, respectively. According to these matrices, we can track positive and negative random walks reaching each node. obtained through Eq.4 and Eq.5, respectively: the degree of node "i". (4) (5) (1) (2) (3) where  is a damping factor usually set to 0.85, and q is the personalization vector obtained by Eq.6. 7 (6) where u is the query node. =1,= 0,. ()=()() ()() Where () and () are positive and negative SRank of node v respectively. Given the positive and negative SRank values of nodes, their overall SRank of node v is calculated according to Eq.7. Algorithm 2 depicts the pseudo-code of SRank algorithm. It first conducts an initialization process by constructing the adjacency matrix, the transition matrices, and the personalization vector (Line 1-3). Then, it initializes positive and negative SRank values (Line 4). Note that positive and negative SRank values represent probabilities of reaching nodes with random walks through positive or negative paths. Therefore, they should be normalized to their summation (Line 5-8). After this phase, the algorithm iterates the process of updating positive and negative SRank values until convergence (Line 10-13). Finally, it computes the overall rank of nodes from the target user's perspective (Line 14) Input Signed Bipartite preference Network <,>, target user u, and damping Algorithm 2: Pseudo code of SRank (7) factor  8 Initialize personalization vector q according to Eq.6 Initialize a M through Eq.1 Output Personalized ranking of nodes from the perspective of the target user 1 2 3 4 5 6 7 Compute T, , and T according to Eq.1, Eq.2, and Eq.3 Random initialization of SRank vectors () and ()) =() =() = + = + =(+)+(1 ) =(+) t=0; Repeat until Converge: t=t+1; compute SRank of nodes according to Eq.7 return SRank of nodes 8 9 10 11 12 13 14 15 3.2.2 Properties of SRank (8) Property.1: Positive and negative SRank values will converge. Proof. Using similar ideas from application of signed multiplicative rank propagation in nodes' classification[21], Eq.5 and Eq.6 can be rewritten as Eq.8 where q is the personalization vector, z is a (V1) vector of all zeroes, and  is the damping factor. Therefore, positive and negative SRank can be calculated through computing personalized PageRank of the graph with transition matrix of D and personalization vector that are defined through Eq.9 and Eq.10, respectively: +(1 ) = = = Personalized PageRank of the transformed graph will be in the form of and can eigenvector corresponding to the largest right eigenvalue of matrix (+(1 )) be easily decomposed into positive and negative SRank values. Note that D is a column stochastic matrix, since the sum of elements in each of its column is 1. Also we know that p1=1 and r1=1. Therefore, personalized PageRank algorithm will converge to the (10) (9) where 1 is a vector of all ones[29]. Therefore, Property.2: Positive and negative SRank of a signed network sums to personalized PageRank of its unsigned form. Proof. Considering summation of positive and negative SRank values: +=(+)+(1 )+(+) +=(+++)+(1 ) Since =+ we have So, (+) is equal to personalized PageRank of graph with transition matrix T, and, +=(+)+(1 ) positive and negative SRank can be considered as decomposition of the personalized PageRank to elements representing the positive and negative random walks. 3.2.3 Algorithm Explanation 9 SRank estimates the agreements and disagreements between the target user and other users using the comprehensive information provided by the graph structure. The importance of this global view for finding similar users in a graph can be illustrated through an example: In Figure 2, Jack is connected with a negative path of length 2 to Mike and with a positive path of length 4 to Joe while he has no path to Martin. This implies that Jack is more likely to be similar with Joe than Mike and Martin. That makes sense because Jack and Joe have a common neighbor, Mike, with whom they both disagree, while there exists no clue about similarity or dissimilarity between Jack and Martin. These facts are simply neglected by local approaches such as Kendall measure: using Kendall measure similarity of Jack to Mark, Joe and Martin will be -1, 0 and 0, respectively. Therefore, it seems more informative to see the agreements and disagreements among users' preferences from a global perspective. SRank models the direct and indirect agreements and disagreements using the concept of negative and positive random walks introduced in Definition 2. To make these concepts more clear, see the example shown in Figure 3. Suppose that we seek to calculate the overall agreement and disagreement between Kevin and Matt. They are connected to each other by positive or negative paths, passing through a subset of known preferences of Matt. These preferences can be decomposed into two sets: concordant preferences (i.e. A>c and B>C) and discordant ones (i.e.A>B). A Positive random walk from Kevin to Matt could be recursively defined as either  A positive random walk from Kevin to Matt passing from a concordant preferences  A negative random walk from Kevin to Matt passing from a discordant preferences Also, A Negative random walk from Kevin to Matt could be recursively defined as either:  A negative random walk from Kevin to Matt passing from a concordant preferences of Matt Or of Matt of Matt Or of Matt  A positive random walk from Kevin to Matt passing from a discordant preferences In this example, Kevin is connected to Matt through 3 positive paths and 5 negative ones. 10 Figure 3: Green edges indicates positive relations, while, red edges indicates negative relations. Solid and dash lines differentiate direct and indirect relationships among users. SRank extends this idea using a personalized random walk process that considers the length of walks; It keeps a positive and a negative SRank value for each node, that reflects the total agreement and disagreement of that node with the source node of the walk. A random walker starting from a source node, in each node "n", follows a random link with probability  and restart the walk from source node with probability 1. If he follows a positive link, the positive and negative SRank values of destination node are updated by positive and negative SRank values of the node "n", respectively. On the contrary, if he follows a negative link, the positive and negative SRank values of the destination are respectively updated using the negative and positive SRank values of node "n". In the case of a random restart, the random walker jumps back to the target node and the positive SRank of the target node is increased by 1. The stationary distribution of positive and negative SRank values are calculated through iteratively computing Eq.5 and Eq.6 (As depicted in Algorithm 2, Line 10-14). 3.2.4 Computational complexity According to Property.1, SRank can be computed at the computational complexity of computing personalized PageRank with 2V vertexes, and, 2E edges. Therefore, its computational complexity is equal to 2E for sparse networks. The number of edges is equal to the W where W is the number of preferences assigned by all users. As a result, SRank computes the similarity between the target users and all others users in O(W). Clearly W is at most MN2, so SRank's time complexity is in O(MN2) although W is usually much smaller than MN2. It is worth noting that Kendall correlation of two users is computed at computational complexity of O(N2) in a system containing M users and N items. So, calculation time 11 (11) (12) needed for finding the similarities between the target users and other users is in O(MN2) for the Kendall measure. 3.3 Ranking inference To infer a total ranking, SibRank first estimates the preference matrix of the target user based on his neighbors through Eq.11 , =∑ (), () ∑ () where , is the real preference of v on (i,j) that is defined as: () , =()= 1, 1, ′ 0, graph with adjacency matrix of . Exponential ranking calculates the ranking of item through PageRank calculation of a weighted graph with adjacency matrix of (i.e. (,)= , ∑ , Finally, SibRank recommends the items that have the highest ranks. It is worth ∈ rank propagation; for instance, if x is less favorable than y (i.e. , = 1) and y is less favorable than z(i.e. , = 1), then one can expect that x is much less favorable than z; The next step is to infer a total ranking by aggregating the elements of the estimated preference matrix. To do this, SibRank exploits exponential ranking of items in the signed noting that the ranking inference procedure follows the social respect theory and additive transition probability matrix) obtained by Eq.13 hence, x should be ranked lower than z. Therefore, signed multiplicative rank propagation is not a wise choice for ranking inference since it will mistakenly propagate a positive rank from z to x. (13) 3.3.1 Computational complexity of the ranking inference The ranking inference is composed of two steps: estimating preference matrix, and preference aggregation. Estimating preference matrix is computed at computational complexity of O(KN2) where k is the number of neighbors, and, N is the number of items. Additionally, computational complexity of preference aggregation is equal to number of non-zero elements in preference matrix, and, consequently is less than (N2). To summarize, computational complexity of ranking inference is O(KN2). It should be noted that to our knowledge, computational complexity of this phase is not less than O(KN2) for any of available algorithms (e.g. EigenRank[2], Cares[10], VSRank [8], etc.) 12 3.4. Algorithm summarization Algorithm.3 summarizes the overall framework of SibRank that consists of five steps: SiBreNet construction of preference data, calculating SRank of the target user u, finding the neighbors, ranking inference, and Top-k recommendation. Algorithm 3: Pseudo code of SibRank Framework Input Set of users U, Set of items I, Preference database (P), target user u, size of neighborhood k, length of recommendation list N = SRank(SiBreNet,u,) SiBreNet=SiBreNet-construction (P, U, I) Neighbors= the set of k users with highest similarity r= Infer ranking of users based on preference of Neighbors recomList= Top-N items in r return recomList Output Top-N recommendation list (recomList) 1 2 3 4 5 6 4 Experiments and Result We conducted all experiments on publicly available movie dataset, Movielens-100K,that is widely used in related works [3,6,8,11]: The dataset contains 943 users, 1,682 movies, and 100,000 ratings. Since general NCR techniques are designed for pairwise preference, we convert the rating information into a set of pairwise comparisons. To do so, we create a preference data <u,i,j> if the user u rated item i higher than item j. To evaluate the performance of SibRank, we follow a standard protocol in collaborative ranking literature [1,3,6,11,30]. We assess the performance of the algorithms under different sizes of user profiles, i.e. the number of user's verdicts. For each user, a fixed number (T) of ratings will be selected for training and his remaining ratings will be left for test. Generally, collaborative ranking techniques are evaluated with 10, 30, and, 50 ratings in the training set for each user (i.e. T=10, 30, 50). For each T, we make sure that each user has at least 10 items in his test set. The reason is that the algorithms are assessed based on their Top3, Top5, and, Top10 recommendations. For each value of T, we generate 5 variants of training sets via random sampling, and, report the average of the performance on their corresponding test sets. 4.1 Baseline algorithm We compared SibRank to EigenRank[2], the state of the art algorithm in the area of neighbor-based collaborative ranking. EigenRank calculates the users' similarity through Kendall correlation; estimates a preference matrix through linear combination of the neighbors preferences; and infers a total ranking from it using a random walk method on a graph constructed based on the preference matrix. Its computational complexity is O(++) for M users, N items, and neighborhood size of K. 13 4.2 Evaluation Metrics Following the evaluation protocol for collaborative ranking techniques, we compared the performance of SibRank and EigenRank based on their top-N recommendations: A recommendation algorithm is a good one if it suggests items that have the highest ratings in the test set. Normalized Cumulative Discounted Gain (NDCG), precision and recall are evaluation metrics that are widely used for assessing top-k recommendations. NDCG for the top-N recommendation for a user u can be obtained by: @= ∑ Where TopN is the length of recommendation list, is the rating given by user "" to the item in the recommendation list, and is the normalization factor to ensure that NDCG of the ideal recommendations to user "" is equal to 1. (14) Precision and recall assess the TopN recommendation based on the binary relevance of the recommended items. Relevant items are those items given higher rates than the average rating of the target user. P@TopN and R@TopN show the precision and recall of the TopN recommendation: @= @= where is the total number of relevant items, is the number of recommended items, and, is the number of relevant items in the recommendation list (15) (16) 14 Figure 4: Performance comparison of EigenRank and SibRank when the length of user profile is 10 4.3 Results We compared the performance of EigenRank and SibRank with different numbers of neighbors, from 10 neighbors to 100 neighbors. The results are depicted in Fig.4, Fig.5, and Fig.6. We analyzed the performance of SibRank and EigenRank from two perspectives: the length of users' profiles that is the number of users' preference in training data, and, the neighborhood size. As can be seen, the length of users' profiles has a great impact on the performance of both algorithms. For instance, for neighborhoods of size 100, increasing the length of the profiles from 10 (Fig.4) to 50 (Fig.6) causes a raise in NDCG@5 from 58% to 69% for EigenRank, and from 62% to 71% for SibRank. Clearly, strong profiles of users helps the algorithms to more accurately estimate the similarities between users. Results show that SibRank is more effective than EigenRank for all profile sizes. Figure 5: Performance comparison of EigenRank and SibRank when the length of user profile is 30 Our experimental results can be summarized as follows:  SibRank outperforms EigenRank in all evaluation conditions. To be more precise, SibRank exhibits the improvement of 2%- 5% in different sizes of neighborhoods and users' profiles.  SibRank significantly outperforms EigenRank using larger neighborhoods in sparse data sets (i.e. profile size of 10). For instance, in case of neighborhood size of 100, SibRank achieves N@10 of 65%, P@10 of 65%, and R@10 of 32%, while, performance of EigenRank does not exceed 62% for N@10, 61% for P@10, and, 31% for R@10 (See Fig.4). 15  SibRank significantly outperforms EigenRank using small neighborhoods when large user profiles (i.e. 50) are available. SibRank shows improvement of 3% in term of N@3, 6% in term of P@3, and 0.6% in term of R@3 in a dataset with profile size of 50 and neighborhood size of 10 (See Fig.6). Figure 6: Performance comparison of EigenRank and SibRank when the length of user profile is 50 5 Discussion As mentioned before, current neighbor-based collaborative ranking methods suffer from two major shortcomings: First, the similarity between all users with no common pairwise preference is equal to zero. Second, they do not consider the confidence of similarities. Here, we investigate how SRank and consequently, SibRank address these shortcomings and improve performance of neighbor-based collaborative ranking. Figure 7 illustrates the distribution of users' similarities for EigenRank and SibRank for different sizes of user profiles. For profile size of 10, EigenRank cannot find any similarity among more than 85% pairs of users who have no common comparison. On the other hand, SibRank can efficiently propagate users' similarities through SiBreNet, and, accordingly, less than 5% of users have similarity around zero. Although increasing the size of users' profiles declines the number of users with no common comparison, EigenRank still cannot calculate similarity for more than 20% pairs of users in a data set containing users with profile size of 50. 16 Figure 7. Comparison of EigenRank and SibRank in terms of distribution of user similarities among users for different sizes of users'profiles (T) Another problem associated with current similarity measures is that they neglect the reliability or confidence of similarity measures. Figure 8 shows the similarity between three random users and their 100 nearest neighbors. As illustrated in Fig.8, EigenRank finds a large number of users with equal similarity to the target user, without considering the confidence of the calculated similarity. In such a case, EigenRank has to randomly select a number of users from this set of equally similar ones. In addition to this flaw, EigenRank also prioritizes neighbors solely based on their similarities, without considering how sure it is about the calculated similarities. To make the concept clear, see Fig.1b and Figure.8. As depicted in Fig.8, EigenRank Typically finds more than 20 users with Kendall correlation of one to the target user. On the other hand, Fig.1b shows that more than 96% of users with Kendall Correlation of one, have only one common pairwise preference. It evidently shows that EigenRank makes recommendation to the target user based on the preferences of the users who agreed over one pairwise comparison, while intuitively, a user with a larger number of agreements would be a better candidate for being a neighbor. In 17 situations in which large user profiles are available, users have a higher number of pairwise comparisons, and so, for a target user, there are potentially many neighbors with more than one common comparisons. For example, in the data set containing user profiles of size of 50, each user has a small number (i.e. about 20) of users with agreement over one common pairwise comparison, and, a large number of users with higher number of agreements, but lower agreement ratio (e.g. Kendall correlation of 0.8 over 100 common pairwise comparison). However, EigenRank would prioritize the former group over the latter one, and if we are looking for small neighborhoods, only members of the former group will be considered by EigenRank as neighbors. Therefore, it could not efficiently recommend until the neighborhood size is big enough to have room for the members of second group as shown in Fig.6. That explains why SibRank significantly outperforms EigenRank when using small neighborhoods in denser data sets. It should be emphasized that good recommendation based on a smaller neighborhood sizes K, will reduce the running time in large data sets since the time complexity of both algorithms is O(++). Figure. 8. Comparison EigenRank and SibRank in terms of Similarity between three random target user and their kth-nearest neighbors in case of different size of users' profiles (T). If we have small profiles for users, the common pairwise comparison among users are rare. Therefore, there are a large number of users with zero Kendall correlation to the target user. So, increasing the neighborhood size necessitates EigenRank to expand the neighborhood to a random subset of those users with zero Kendall correlation (See Fig.8a 18 and Fig.8g). Consequently, for users with small profiles, it cannot efficiently increase its performance by considering larger neighborhoods, as can be seen in Fig.4. Generally, SibRank is more efficient in all conditions since it takes advantage of a graph structure to take into account the users' agreements and disagreements in addition to number and importance of pairwise comparisons in the similarity calculation of users. 6 Conclusion In this paper, we proposed a novel framework, called SibRank, for collaborative ranking to improve recommendations' accuracy. SibRank introduces a network representation of ranking-oriented recommender systems, called SiBreNet, and exploits that for calculating users' similarities. To calculate users' similarities, we presented SRank, a personalized ranking algorithm for signed networks. The main difference between SRank and local similarity measures like Kendall, is that SRank calculates indirect similarities too, by modeling the data in a graph structure and calculating similarities among its nodes, by analyzing the positive and negative paths with different lengths. It is also different from other personalized ranking measures [22–24,31] as it models the social balance theory, to take into account both agreements and disagreements among users when calculating the similarities. After finding similarities between a target user and other users, SibRank exploits a random- walk aggregation model to infer a total ranking for the target user based on his neighbors' preferences modeled by a preference matrix. Experimental results showed that SibRank achieves a better performance compared to EigenRank. There are several interesting directions for extending the current work, such as redesigning the network structure to make a better representation of users' preferences, using other network-oriented ranking and similarity measures for recommendations based on SiBreNet, and adjusting SibRank for the domain of rating-oriented recommendations. References [1] M. Weimer, A. Karatzoglou, Maximum Margin Matrix Factorization for Collaborative Ranking, Advances in Neural Information Processing Systems. (2007) 1–8. [2] N. Liu, Q. Yang, EigenRank : A Ranking-Oriented Approach to Collaborative Filtering, in: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 2008: pp. 83–90. [3] Y. Shi, M. Larson, A. Hanjalic, Unifying rating-oriented and ranking-oriented collaborative filtering for improved recommendation, Information Sciences. 229 (2013) 29–39. [4] Y. Koren, Collaborative Filtering with Temporal Dynamics, Communications of the ACM. 53 (2010) 89–97. 19 [5] Y. Shi, A. Karatzoglou, L. Baltrunas, Climf: learning to maximize reciprocal rank with collaborative less-is-more filtering, in: Proceedings of the Sixth ACM Conference on Recommender Systems. ACM, 2012: pp. 139–146. [6] M.N. Volkovs, R.S. Zemel, Collaborative Ranking With 17 Parameters, in: Advances in Neural Information Processing Systems, 2012: pp. 2294–2302. [7] [8] [9] S. Rendle, C. Freudenthaler, Z. Gantner, L. Schmidt-thieme, BPR : Bayesian Personalized Ranking from Implicit Feedback, in: Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, 2009: pp. 452–461. doi:10.1145/1772690.1772773. S. Wang, J. Sun, B.J. Gao, VSRank : A Novel Framework for Ranking-Based, ACM Transactions on Intelligent Systems and Technology (TIST). 5 (2014) 51. L. Meng, J. Li, H. Sun, WSRank: A Collaborative Ranking Approach for Web Service Selection, in: 2011 IEEE 11th International Conference on Computer and Information Technology, Ieee, 2011: pp. 103–108. doi:10.1109/CIT.2011.30. [10] C. Yang, B. Wei, J. Wu, Y. Zhang, L. Zhang, CARES: a ranking-oriented CADAL recommender system, in: Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries. ACM, 2009: pp. 203–212. [11] C. Fan, Z. Lin, Collaborative Ranking with Ranking-Based Neighborhood, Web Technologies and Applications. (2013) 770–781. [12] A. Ukkonen, Clustering algorithms for chains, The Journal of Machine Learning Research. 12 (2011) 1389–1423. [13] I. AvSegal, Z. Katzir, K. Gal, EduRank : A Collaborative Filtering Approach to Personalization in E-learning, in: Educational Data Mining 2014, 2014: pp. 68–75. [14] T. Zhou, J. Ren, M. Medo, Y. Zhang, Bipartite network projection and personal recommendation, Physical Review E 76,. 76 (2007) 6115–1:7. doi:10.1103/PhysRevE.76.046115. [15] Z.-K. Zhang, T. Zhou, Y.-C. Zhang, Personalized recommendation via integrated diffusion on user–item–tag tripartite graphs, Physica A: Statistical Mechanics and Its Applications. 389 (2010) 179–186. doi:10.1016/j.physa.2009.08.036. [16] S. Lee, S. Park, M. Kahng, S. Lee, PathRank : Ranking nodes on a heterogeneous graph for flexible hybrid recommender systems, Expert Systems with Applications. 40 (2013) 684–697. [17] L. Xiang, Q. Yuan, S. Zhao, L. Chen, X. Zhang, Q. Yang, et al., Temporal recommendation on graphs via long- and short-term preference fusion, in: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '10, ACM Press, 2010: pp. 723–731. 20 doi:10.1145/1835804.1835896. [18] W. Yao, J. He, G. Huang, J. Cao, Y. Zhang, Personalized Recommendation on Multi-Layer context graph, in: Web Information Systems Engineering–WISE 2013, 2013: pp. 135–148. [19] R. Guha, H. Road, S. Jose, H. Road, S. Jose, R. Drive, et al., Propagation of Trust and Distrust, in: Proceedings of the 13th International Conference on World Wide Web. ACM, 2004: pp. 403–412. [20] S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The Eigentrust algorithm for reputation management in P2P networks, in: 12th International Conference on World Wide Web (WWW ), 2003: p. 640. doi:10.1145/775240.775242. [21] F.L. Cruz, C.G. Vallejo, F. Enríquez, J.A. Troyano, PolarityRank: Finding an equilibrium between followers and contraries in a network, Information Processing and Management. 48 (2012) 271–282. doi:10.1016/j.ipm.2011.08.003. [22] C. de Kerchove, P. Van Dooren, The PageTrust algorithm: how to rank web pages when negative links are allowed, Proceedings of SIAM International Conference on Data Mining. (2008) 346–352. [23] V.A. Traag, Y.E. Nesterov, P. Van Dooren, Exponential ranking: Taking into account negative links, in: Lecture Notes in Computer Science, 2010: pp. 192–202. doi:10.1007/978-3-642-16567-2_14. [24] M. Shahriari, M. Jalili, Ranking Nodes in Signed Social Networks, Social Network Analysis and Mining. 4 (2014) 172. doi:10.1007/s13278-014-0172-x. [25] H.-N. Kim, M. Bloess, A. El Saddik, Folkommender: a group recommender system based on a graph-based ranking algorithm, Multimedia Systems. 19 (2012) 509– 525. doi:10.1007/s00530-012-0298-5. [26] Z. Wu, C.C. Aggarwal, J. Sun, The Troll-Trust Model for Ranking in Signed Networks, in: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining - WSDM '16, ACM Press, New York, New York, USA, 2016: pp. 447–456. doi:10.1145/2835776.2835816. [27] A. Javari, M. Jalili, Cluster-Based Collaborative Filtering for Sign Prediction in Social, ACM Transactions on Intelligent Systems and Technology. 5 (2014). [28] C. Hsieh, K. Chiang, I.S. Dhillon, Low Rank Modeling of Signed Networks, in: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012: pp. 507–515. doi:10.1145/2339530.2339612. [29] I.C.F. Ipsen, R.S. Wills, Mathematical Properties and Analysis of Google ' s PageRank, Bol. Soc. Esp. Mat. Apl. 34 (2006) 191–196. 21 [30] S. Balakrishnan, S. Chopra, Collaborative ranking, in: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining. ACM, 2012: pp. 143–152. [31] L. Page, S. Brin, R. Motwani, T. Winograd, The PageRank citation ranking: bringing order to the web., (1999) 1–17. 22
1702.06153
1
1702
2017-01-12T06:36:39
Community Detection with Colored Edges
[ "cs.SI", "physics.soc-ph" ]
In this paper, we prove a sharp limit on the community detection problem with colored edges. We assume two equal-sized communities and there are $m$ different types of edges. If two vertices are in the same community, the distribution of edges follows $p_i=\alpha_i\log{n}/n$ for $1\leq i \leq m$, otherwise the distribution of edges is $q_i=\beta_i\log{n}/n$ for $1\leq i \leq m$, where $\alpha_i$ and $\beta_i$ are positive constants and $n$ is the total number of vertices. Under these assumptions, a fundamental limit on community detection is characterized using the Hellinger distance between the two distributions. If $\sum_{i=1}^{m} {(\sqrt{\alpha_i} - \sqrt{\beta_i})}^2 >2$, then the community detection via maximum likelihood (ML) estimator is possible with high probability. If $\sum_{i=1}^m {(\sqrt{\alpha_i} - \sqrt{\beta_i})}^2 < 2$, the probability that the ML estimator fails to detect the communities does not go to zero.
cs.SI
cs
Community Detection with Colored Edges Narae Ryu Sae-Young Chung School of EE, KAIST, Daejeon, Korea School of EE, KAIST, Daejeon, Korea Email: [email protected] Email: [email protected] Abstract In this paper, we prove a sharp limit on the community detection problem with colored edges. We assume two equal-sized communities and there are m different types of edges. If two vertices are in the same community, the distribution of edges follows pi = αi log n/n for 1 ≤ i ≤ m, otherwise the distribution of edges is qi = βi log n/n for 1 ≤ i ≤ m, where αi and βi are positive constants and n is the total number of vertices. Under these assumptions, a fundamental limit on community detection is characterized using the Hellinger distance between the two distributions. If Pm > 2, then the community detection via maximum likelihood (ML) estimator is possible with high probability. If Pm < 2, the probability that the ML estimator fails to detect the communities does not go to zero. i=1 (√αi − √βi) i=1 (√αi − √βi) 2 2 I. INTRODUCTION In community detection, the community structure is detected from a given graph by observing the relations between the vertices. Recently, the community detection problem is getting popular in many research fields, such as biology, computer science, and sociology [3]. The limit on the community detection is proven in many cases. For instance, for the case of 2 communities and general k communities on the stochastic block model (SBM), the limit is known when the probability is of order of log n/n [4], [5]. Even when the parameters of SBM are unknown, the limit is proven in [6]. Also, there are works about recovering a hidden community. In [7], they provide nearly matching necessary and sufficient conditions for the recovery of densely subgraph when the distribution of edges follows Bernoulli and Gaussian. Our main theorems generalize the corresponding results in [4]. Also, [2] proved the same results as this paper. However, our proofs are based on Cramer's theorem and very simple. We consider a graph G = (V, E) where V is the set of n vertices and E is the set of edges that connects the vertices. Here, we focus on the case where the graph has two communities of equal size. Unlike most papers on SBM, we will deal with a more general version of SBM that contains colored edges. In other words, two vertices are connected with edge with color 1, 2, ..., m. From now on, an edge with color i is denoted by i-edge for simplicity. Therefore, the probability that two vertices within the same community are connected with an i-edge is pi and they are disconnected, i.e., no edge, with probability i=1 pi. In a similar way, two vertices in different communities are connected with an i-edge with probability qi and Furthermore, we assume that pi and qi are of order of log n/n. Hence, we set pi and qi as pi = αi log n/n and qi = βi log n/n where αi and βi are positive constants. The reason why we choose such a probability is to guarantee the connectivity 1 −Pm disconnected with probability 1 −Pm of the graph. According to [8], if Pi αi +Pi βi < 2, then there would be an isolated vertex with high probability. In this paper, we prove a fundamental limit on the SBM with colored edges. As the maximum likelihood (ML) detector is optimal in a sense of minimizing the probability of error, we first specify what the ML rule is in this model. In chapter 3, we provide the limit on the detection of community via two theorems. Theorem 1 proves the sufficient condition for the detection. Theorem 2 proves the necessary part. Therefore, by combining these two theorems, we can get the sharp limit on the community detection with colored edges. i=1 qi. II. MAXIMUM LIKELIHOOD ESTIMATOR ON SBM As mentioned before, we have 2 communities of size n/2 each. If all edges have the same color and p > q, then the ML rule is simply to find the community that has the minimum number of edges across two communities. However, if we have m different types of edges, the rule becomes slightly different. Suppose we fix a graph G and the number of j-edges inside the graph G is denoted by kj. Then, we need to find the communities A and B of equal size, which maximizes Pr(GA, B) among the 2n possible community assignments. To calculate Pr(GA, B), let's fix some communities A and B and define lj as the number of inner j-edges inside the communities A and B. Then, the number of j-edges across the communities is kj − lj, obviously. Therefore, Pr(GA, B) is, The material in this paper was presented in part at the IEEE International Symposium on Information Theory (ISIT) 2016. 1 pl2 Pr(GA, B) = pl1 = (cid:18) p1 m n2 4 −Pm m m i=1 li i=1 li i=1 qi i=1(ki−li) 2 )−Pm qk1−l1 1 qk2−l2 2 Xi=1 qi! 1 − ··· qkm−lm m 1 − 2 ··· plm q1(cid:19)l1(cid:18) p2 q2(cid:19)l2 2 ··· qkm = C(1 + o(1))(cid:18) p1 i=1 pi(cid:17)Pm pi!2(n/2 Xi=1 i=1 pi(cid:19)Pm qm(cid:19)lm(cid:18) 1 −Pm ···(cid:18) pm 1 −Pm pi!2(n/2 2 ) 1 − qi! m 1 − Xi=1 Xi=1 qm(cid:19)lm q1(cid:19)l1(cid:18) p2 q2(cid:19)l2 ···(cid:18) pm converges to 1 as n tends to ∞, and the remaining terms are fixed if the graph G . In other words, it maximizes n2 4 −Pm qk1 1 qk2 i=1 ki i=1 li m m , (a) i=1 qi 1−Pm where (a) holds since (cid:16) 1−Pm is given. Therefore, ML rule finds two communities that maximizes(cid:16) p1 the weighted sum of the number of inner edges, Pm i=1 li log pi qi . q1(cid:17)l1(cid:16) p2 q2(cid:17)l2 qm(cid:17)lm ···(cid:16) pm Using this result, we will get a sufficient and necessary condition of the event that ML estimator fails to detect the communities. For convenience, we define the following events for the true community assignment A and B.   F = {the maximum likelihood rule fails} FA = {Pm FB = {Pm i=1 Ei[v, A] log pi qi i=1 Ei[v, A] log pi qi <Pm >Pm i=1 Ei[v, B] log pi qi i=1 Ei[v, B] log pi qi ,∃v ∈ A} ,∃v ∈ B} where Ei[v, S] is the number of i-edges between the vertex v and the set S. First, let's show FA ∩ FB ⇒ F . Suppose FA and FB happen simultaneously. Then, there exist vertices vA and vB such that, vA ∈ A and vB ∈ B and m m Xi=1 Xi=1 Ei[vA, A] log Ei[vB, A] log pi qi pi qi < > Ei[vA, B] log Ei[vB, B] log pi qi pi qi . m m Xi=1 Xi=1 Let's fix such vA and vB. And we define a function li(S) as the number of inner edges of type i inside the set of nodes S. Also, we define a new community assignment, A = (A \ vA) ∪ vB and B = (B \ vB) ∪ vA. Then, we can compare the weighted sum of the number of inner edges of (A, B) and ( A, B): m Xi=1(cid:16)li( A) + li( B)(cid:17) log pi qi = + > m pi qi + ((li(A) + li(B)) log Xi=1 (Ei[vA, B] − Ei[vB, B]) log (Ei[vB, A] − Ei[vA, A]) log pi qi pi qi (li(A) + li(B)) log pi qi . m m Xi=1 Xi=1 Xi=1 m Therefore, ML estimator does not choose the original community assignment A and B, resulting in the event F . On the other hand, let's assume F happens. We define a function oi(S1, S2) as the number of edges of type i across the set of nodes S1 and S2. Then, we can get an upper bound on probability of F by the following lemma. Lemma 1. Suppose F happens. Then, there exist k and sets Aw ⊂ A and Bw ⊂ B with Aw = Bw = k for 0 ≤ k ≤ n such that 4 m Xi=1 [oi(Aw, B \ Bw) + oi(Bw, A \ Aw)] log pi qi ≥ m Xi=1 [oi(Aw, A \ Aw) + oi(Bw, B \ Bw)] log pi qi Proof: This lemma can be proved in a similar way as lemma 5 in [4]. Assume F happens. Then, there exist A and B such that m Xi=1(cid:16)li( A) + li( B)(cid:17) log pi qi ≥ m Xi=1 (li(A) + li(B)) log pi qi , where A ∩ A,B ∩ B ≥ n 4 , without loss of generality. Then, we can spilt the number of inner edges inside each community as follows. li(A) = li(A ∩ A) + li(A ∩ B) + oi(A ∩ A, A ∩ B) li(B) = li(B ∩ A) + li(B ∩ B) + oi(B ∩ A, B ∩ B) li( A) = li(A ∩ A) + li(B ∩ A) + oi(A ∩ A, B ∩ A) li( B) = li(A ∩ B) + li(B ∩ B) + oi(A ∩ B, B ∩ B) Therefore, we get m Xi=1(cid:16)oi(A ∩ A, B ∩ A) + oi(A ∩ B, B ∩ B)(cid:17) log Xi=1(cid:16)oi(A ∩ A, A ∩ B) + oi(B ∩ A, B ∩ B)(cid:17) log m pi qi ≥ Let Aw = A ∩ B and Bw = B ∩ A. Then, the above inequality can be rewritten as, [oi(Aw, B \ Bw) + oi(Bw, A \ Aw)] log pi qi ≥ [oi(Aw, A \ Aw) + oi(Bw, B \ Bw)] log pi qi . m Xi=1 m Xi=1 Now we define the probability P (k) n as, P (k) n = Pr m Xi=1 where k is size of Aw and Bw. [oi(Aw, B \ Bw) + oi(Bw, A \ Aw)] log pi qi ≥ m Xi=1 [oi(Aw, A \ Aw) + oi(Bw, B \ Bw)] log Finally by applying union bound, we get an upper bound on Pr(F ), Pr(F ) ≤ n/4 k (cid:19)2 Xk=1(cid:18)n/2 P (k) n III. LIMIT ON THE COMMUNITY DETECTION pi qi . pi qi! , In this section, we provide a fundamental limit of the community detection by proving two theorems. If pi = qi for all i, the ML rule fails in detecting the communities obviously. Therefore, we focus on the case where there exists at least one i such that pi 6= qi throughout the paper. A. Achievability Proof Theorem 1. If Pm Note that Pm 2 is related to the Hellinger distance between the two probability distributions p and q as > 2, then the maximum likelihood estimator detects the communities exactly with high i=1 (√αi − √βi) i=1 (√αi − √βi) probability. log n m 2 2 H 2(pkq) = n Xi=1 (√αi −pβi) n (cid:19) , + o(cid:18) log n given in [5]. i=1 (√pi − √qi)2 is the Hellinger distance [9]. This distance is the special case of the CH-divergence where H(pkq) =qPm+1 Before proving the theorem, we introduce some assumptions and definitions. For simplicity, we assume that A = {1, 2, . . . , n/2} and B = {n/2 + 1, . . . , n}. Also, we define independent random variables Wij for 1 ≤ i, j ≤ n/2 or n/2 < i, j ≤ n such that and Zij for 1 ≤ i ≤ n/2 and n/2 + 1 ≤ j ≤ n such that 0 qk w.p. pk Wij =(cid:26) log pk Zij =(cid:26) log pk w.p. 1 −Pm w.p. 1 −Pm pi qi ≥ [oi(Aw, B \ Bw) + oi(Bw, A \ Aw)] log using Wij and Zij, w.p. qk qk 0 n for k = 1, 2, . . . , m k=1 pk for k = 1, 2, . . . , m k=1 qk Proof of Theorem 1: We can rewrite P (k) P (k) n = Pr m Xi=1 = Pr  Xi∈Aw,j∈B\Bw = Pr Xi′=1  2 −k) 2k( n Zij + Xi∈A\Aw,j∈Bw (Zi′ − Wi′ ) ≥ 0  , [oi(Aw, A \ Aw) + oi(Bw, B \ Bw)] log m Xi=1 Wij + Xi∈Bw ,j∈B\Bw Zij ≥ Xi∈Aw ,j∈A\Aw Wij  pi qi! (1) where Wi′ and Zi′ are i.i.d. random variables that have the same distribution with Wij and Zij, respectively. And we can get an upper bound on (1) by proving Lemma 1. Lemma 2. 2k( n 2 −k) Xi′=1 Pr  for some constant C. (Zi′ − Wi′ ) ≥ 0  ≤ 2 exp"−2k(cid:16) n 2 − k(cid:17) log n n m Xi=1 2 (√αi −pβi) − C log2 n n2 − o(cid:18) log2 n n2 (cid:19)!# . Proof: By the proof of Cramer's theorem in [10], for i.i.d. sequence Xi and any closed set F ⊆ IR, Pr 1 n n Xi=1 Xi ∈ F! ≤ 2 exp(cid:18)−n inf x∈F I(x)(cid:19) , where I(a) = supθ∈IR(θa − log E[eθX]). The proof for this theorem is in the appendix. We need to evaluate the right-hand side of the following: 2k( n 2 −k) Xi′=1 Pr  (Zi′ − Wi′ ) ≥ 0  ≤ 2 exp(cid:18)−2k(cid:16) n 2 − k(cid:17) inf x≥0 I(x)(cid:19) . By direct computation, we can get the moment generating function of (Zi′ − Wi′ ), i.e., E [exp (θ (Zi′ − Wi′ ))] = exp"− log n n m Xi=1 (αi + βi − αθ i β1−θ i − βθ i α1−θ i ) + D(θ) log2 n n2 + o(cid:18) log2 n n2 (cid:19)# , where D(θ) is a function of θ, the exact form of D(θ) is in Appendix 5.2. Then, the right-hand side of (2) is, for any 2 ≤ j ≤ n/2, − inf = − inf θ∈IR x≥0(cid:20)sup x≥0" sup x≥0"0.5x + Xi=1 n m ≤ − inf log n = − (a) m log n n Xi=1 (√αi −pβi) (θx − log E [exp (θ(Zi′ − Wi′ ))])(cid:21) θ∈IR θx + (αi + βi − αθ log n n m i 2 i β1−θ i α1−θ Xi=1 (√αi −pβi) i − βθ ) − D(θ) n2 (cid:19)# log2 n n2 − o(cid:18) log2 n n2 + o(cid:18) log2 n n2 (cid:19) , log2 n − C + C 2 log2 n n2 − o(cid:18) log2 n n2 (cid:19)!# where (a) holds by taking θ = 0.5 instead of taking the supremum and D(θ) = C. Finally, by combining (2) and (3), we get 2k( n 2 −k) Xi′=1 Pr  (Zi′ − Wi′ ) ≥ 0  ≤ 2 exp"−2k(cid:16) n 2 − k(cid:17) log n n m Xi=1 2 (√αi −pβi) − C log2 n n2 − o(cid:18) log2 n n2 (cid:19)!# . (2) (3) Now, the following is similar with proof of theorem 2 in [4]. If we assume that Pm Pr(F ) ≤ P (k) n/4 n n n/4 n/4 n/4 n 2k exp"−2k(cid:16) n k (cid:19)2 Xk=1(cid:18)n/2 2 − k(cid:17) log n k (cid:19)2 Xk=1(cid:18)n/2 exp"2k(cid:16)log + 1(cid:17) − 2k(cid:16) n Xk=1 exp(cid:20)2k(cid:18)log n − log 2k + 1 −(cid:18) 1 Xk=1 2 − exp(cid:20)2k(cid:18)− log 2k + 1 + Xk=1 exp(cid:20)2k(cid:18)− log 2k + 1 + Xk=1 2 ǫ exp(cid:20)2k(cid:18)− log 2k + 1 + Xk=1 2k n 2k n 2k n n− k n/4 n/4 n/4 ≤ 2 (a) ≤ 2 (b) ≤ 2 ≤ 2 (c) ≤ 2 = 2 m Xi=1 2 (√αi −pβi) − C m k n Xi=1 2 − k(cid:17) log n (√αi −pβi) n(cid:19)(cid:18)(2 + ǫ) log n − C log n − ǫ(cid:18) 1 n(cid:19) log n +(cid:18) 1 2 − 2 − log n + o(1)(cid:19)(cid:21) log n − log n + o(1)(cid:19)(cid:21) , ǫ 4 k i=1 (√αi − √βi) 2 ≥ 2 + ǫ for ǫ > 0, n2 (cid:19)!# log2 n 2 log2 n n2 − o(cid:18) log2 n − C n − o(cid:18) log2 n n(cid:19)(cid:18)C n2 (cid:19)!# n2 − o(cid:18) log2 n n (cid:19)(cid:19)(cid:19)(cid:21) + o(cid:18) log2 n log2 n n k log2 n n (cid:19)(cid:19)(cid:19)(cid:21) where (a) holds by Stirling's formula, (cid:0)n For sufficiently large n and 1 ≤ k ≤ n k(cid:1) ≤ (ne/k)k, (b) holds by the assumption, and (c) holds since k ≤ n/4. 4 , we have: 2 3 1 2k log 2k − o(cid:18) 1 2k(cid:19) ≥ 1 n log n. In other words, log 2k − 2k n log n − o(1) ≥ 1 3 log 2k. By applying this inequality and n− k 2 ǫ ≤ n− 1 2 ǫ, n/4 2 ǫ Pr(F ) ≤ 2n− 1 exp(cid:20)2k(cid:18)1 − 3 log 2k(cid:1)(cid:3) = O(1), this proves Theorem 1. Xk=1 1 3 log 2k(cid:19)(cid:21) k=1 exp(cid:2)2k(cid:0)1 − 1 B. Converse Proof Since Pn/4 Theorem 2. If Pm communities does not go to zero. i=1 (√αi − √βi) 2 < 2, then the probability that the maximum likelihood estimator fails to detect the Proof of Theorem 2: We will prove this theorem via several lemmas. In this proof, we assume that there exists at least one i such that pi > qi. Even if there is no such i, we can prove the theorem in a similar manner. Lemma 3. For v ∈ H := {1, . . . , n/ log3 n} and M = maxk log pk/qk, if log log n Wvi ≥ Zvi − M log n n 2 n Xi=n/2+1 then, for sufficiently large n, Pr(F ) ≥ 1 3 . Pr  Xi= n log3 n +1  > n−1 log3 n log 10, Proof: This can be proved in a similar way as Lemma 3 in [4]. Therefore, we describe its steps briefly. We define the following events. i=1 Ei[v, H] log pi qi ∆ = {∀v ∈ H,Pm F (v) H = {v ∈ H satisfies Pm FH = {∪v∈H F (v) H } < M log n log log n} i=1 Ei[v, A \ H] log pi qi + M log n log log n ≤Pm i=1 Ei[v, B] log pi qi }   Then, the condition in the statement can be written as Pr(F (v) H ) > n−1 log3 n log 10. H ) > n−1 log3 n log 10, then Pr(FH ) ≥ 9 10 . Since Pr(FH ) = 1 − (1 − Pr(F (v) H )) n log3 n , we can First, we show if Pr(F (v) easily check that Pr(FH ) ≥ 9 10 . Also, we know that (∆ ∩ FH ) implies FA. Therefore, to evaluate a lower bound on Pr(FA), we should evaluate a lower bound on Pr(∆). Define a new event ∆v as ∆v = {Pm i=1 Ei[v, H] log pi qi < M log n n v−1 log3 n v) = Pr  Wiv + Pr(∆c Xi=1 Wvj ≥ Xj=v+1 n Pi αi(cid:17). Then the following inequality holds: Now, we define new i.i.d. random variables Xj ∼ Bern(cid:16) log n log log n  ≤ Pr  log log n  , Pr  Xj=v+1 Wvj ≥ Xi=1 Xj=1 Xj ≥ M log n Wiv + log n log3 n log3 n v−1 n n By the multiplicative Chernoff bound, M log n log log n}, then log log n  . Pr  By using the union bound, we get n log3 n Xj=1 Xj ≥ log n log log n  ≤(cid:18) 1 − Pr(∆) ≤ n log3 n Pr(∆c i ) − log n log log n log3 n ePi αi log log n(cid:19) . n n log3 n log n log3 n Xj ≥ Pr Xj=1 ≤  = exp" log log3 n − log log n = exp [−2 log n + o(log n)] . log log n  e log log nPi αi# (log n)3 log n log n Therefore, for sufficiently large n, Pr(∆) ≥ 9 (FA ∩ FB) implies F , we can conclude that if Pr(FA) ≥ 2 10 . This implies Pr(FA) ≥ 2 3 , since (∆ ∩ FH ) implies FA. Finally, since 3 , then Pr(F ) ≥ 1 3 . Lemma 4. For sufficiently large n and any positive constant M , n 2 Xj= n log3 n Pr  +1 (Z1(j+ n ≥ exp"− M log n log log n 2 ) − W1j) ≥ 2 m + o(cid:18) log n log log n(cid:19)  Xi=1(cid:16)√αi −pβi(cid:17)2! − o (log n)# . log n Proof: By the proof of Cramer's theorem in [10], for i.i.d. sequence Xi and any open set U ⊆ IR, Pr 1 n n Xi=1 Xi ∈ U! ≥ Pr 1 n Xi ∈ (a − ǫ, a + ǫ)! n Xi=1 nǫ2(cid:19) , where a and ǫ are constants satisfing (a − ǫ, a + ǫ) ⊂ U , η∗ is the constant that minimizes log E[eηXi ], σ2 is the variance of Xi and I(a) = supθ∈IR(θa − log E[eθX]). The proof for this theorem is in the appendix. E[eη∗X ] where p(x) is the distribution of Xi. Since η∗ is a constant and σ2 is Here, Xi is a random variable that follows eη∗ xp(x) ≥ e−n(I(a)−ǫη∗)(cid:18)1 − (4) σ2 of order of log n/n, if we take ǫ = log 3 n/n, enǫη∗ and the last term in (4) is negligible. 2 Let l = n log3 n for simplicity and take a = M log n l log log n + 1 2 3 n n . Then, we have, 2 − n Pr  n 2 Xj= n log3 n log log n(cid:17) + log l o(cid:16) log n log log n(cid:19) + o(cid:18) log n (Z1(j+ n 2 ) − W1j) ≥ +1 M log n log log n  ≥ e−l(I(a)−ǫη∗)(cid:18)1 − σ2 lǫ2(cid:19) . (5) Therefore, we need to evaluate I(a) to evaluate the right-hand side of (5). m log n I(a) = sup θ∈IR(cid:16)θa − log E[eθ(Z1(j+n/2)−W1j )](cid:17) i − βθ (αi + βi − αθ + o(cid:18) log n n (cid:19) , Xi=1 (√αi −pβi) i β1−θ θ∈IR θa + Xi=1 log n n n m 2 = sup (a) = i α1−θ i ) − o(cid:18) log n n (cid:19)! where (a) holds since the function in the supremum is concave and the derivative of the function becomes zero when θ = 0.5+ǫ for 0 ≤ ǫ < 1/ log log log n. Detailed explanation is in the Appendix. Lemma 5. For some constant K > 0, n log3 n Xi=1 Z1(j+ n 2 ) ≥ 1 log2 n βi log m Xi=1 αi βi − K Pr  C K 2 log2 n .  ≥ 1 − Proof: To prove this lemma, we will use Chebyshev's inequality. Since the variance of Z1(j+ n 2 ) is of order of log n/n, Z ≤ C log n/n for some C > 0. Then, we get, σ2 Z1(j+ n 2 ) ≥ 1 log2 n βi log m Xi=1 αi βi − K  Z1(j+ n 2 ) ≥ n log3 n(cid:18)E[Z1(1+ n 2 )] − log3 n n n log3 n n Xi=1 Xi=1 log3 n C Pr  = Pr  ≥ 1 − K 2 log2 n . K(cid:19)  Now, we assume that Pm 2 n i=1 (√αi − √βi) S =  Xi=1 log3 n ≤ 2 − ǫ for ǫ > 0. For simplicity, we define an event S such that Z1(j+ n 2 ) ≥ 1 log2 n βi log m Xi=1 . αi βi − K  Then, we have, Z1i − n n n 2 Pr Xi=n/2+1  ≥ Pr Xi=n/2+1  ≥ Pr Xj= n ≥ exp"− ≥ n−1+ ǫ (c) > n−1 log3 n log 10, 2 (cid:18)1 − 2 m log n log3 n +1 (b) (a) M log n log log n  log log n S M log n n 2 W1i ≥ n 2 +1 log3 n Xi= n Xi= n 2 ) − W1j ) ≥ m 1 +1 log3 n Z1i − (Z1(j+ n W1i ≥ M log n log log n −  Pr(S) Xi=1 Xi=1(cid:16)√αi −pβi(cid:17)2! − o (log n)# Pr(S) K 2 log2 n(cid:19) log2 n C βi log αi βi + K! Pr(S) (6) where (a) holds by Lemma 3, (b) holds by the assumption and Lemma 4, and (c) holds for sufficiently large n. Finally, by observing (6), we know that Pr(F ) ≥ 1 3 by Lemma 2. This proves Theorem 2. A. Cramer's Theorem IV. APPENDIX Cramer's theorem played a crucial role when we prove the main theorems of this paper. Therefore, in this section, we introduce how to prove this theorem [10]. The following theorem is a slightly modified version of Cramer's theorem, but this is essentially the same as the original one. Theorem (Cramer's Theorem). For i.i.d. sequence Xi and any closed set and open set F, U ⊆ IR, and Pr 1 n n Xi=1 Xi ∈ F! ≤ 2 exp(cid:18)−n inf x∈F I(x)(cid:19) , Pr 1 n n Xi=1 Xi ∈ U! ≥ Pr 1 n Xi ∈ (a − ǫ, a + ǫ)! n Xi=1 ≥ e−n(I(a)+ǫη∗)(cid:18)1 − σ2 nǫ2(cid:19) , where I(a) = supθ∈IR(θa − log E[eθX]). Proof: First, we will show (7). Let F be a non-empty closed set. We can notice that (7) trivially holds when inf x∈F I(x) = 0. Hence, we assume inf x∈F I(x) > 0 through the following proof. On the other hand, the following always holds for all x and θ ≥ 0, (7) (8) (9) Pr 1 n n Xi=1 Xi ≥ x! = Eh1 1 = e−nθx n Pn n i=1 Xi−x≥0i ≤ E"exp nθ 1 Yi=1 E(cid:2)eθXi(cid:3) = exp(cid:2)−n(cid:0)θx − log E(cid:2)eθX(cid:3)(cid:1)(cid:3) , Xi=1 Xi − x!!# n n where the inequality holds by Chebycheff's inequality. Now, we will show these two statements is true by proving Lemma 6. nPn (cid:26) If ¯x < ∞, for every x > ¯x, Pr(cid:0) 1 i=1 Xi ≥ x(cid:1) ≤ e−nI(x) nPn If ¯x > −∞, for every x < ¯x, Pr(cid:0) 1 i=1 Xi ≤ x(cid:1) ≤ e−nI(x) Lemma 6. Assume ¯x < ∞. Then, for x ≥ ¯x, I(x) = supθ≥0(cid:2)θx − log E(cid:2)eθX(cid:3)(cid:3) Proof: For all θ ∈ IR, we know that log E(cid:2)eθX(cid:3) ≥ E(cid:2)log eθX(cid:3) = θ¯x by Jensen's inequality. If ¯x = −∞, then log E(cid:2)eθX(cid:3) = ∞ for negative θ so that this lemma trivially holds. Therefore, let's assume ¯x is finite. Then, for x ≥ ¯x and θ < 0, This proves the lemma. θx − log E(cid:2)eθX(cid:3) ≤ θ¯x − log E(cid:2)eθX(cid:3) ≤ 0 By combining (9) and Lemma 6, we can prove the first statement. Also, the second statement can be proved in a similar manner. Now, since we are interested in the case of finite ¯x, we assume that ¯x is finite. Then, I(¯x) = supθ≥0(cid:2)θ¯x − log E(cid:2)eθ ¯x(cid:3)(cid:3) = 0 implies ¯x ∈ F c by the assumption. Let (x−, x+) be the union of all the open intervals (a, b) ∈ F c that contains ¯x. Since F is non-empty, either x− or x+ must be finite. If x− is finite, then x− ∈ F , resulting in inf x∈F I(x) ≤ I(x−). Likewise, inf x∈F I(x) ≤ I(x+) whenever x+ is finite. Finally, Pr 1 n n Xi=1 Xi ∈ F! ≤ Pr 1 n n n Xi=1 Xi ≤ x−! + Pr 1 Xi=1 ≤ e−nI(x−) + e−nI(x+) ≤ 2 exp(cid:18)−n inf Xi ≥ x+! I(x)(cid:19) x∈F n This proves the first statement of the theorem. To prove the second statement of the theorem, we need to show that for every ǫ > 0, Pr 1 n n Xi=1 Yi ∈ (−ǫ, ǫ)! ≥ exph−n(cid:16)− log Eheη∗Yi + ǫη∗(cid:17)i(cid:18)1 − σ2 nǫ2(cid:19) , where Yi = Xi − a. Since if we rewrite the above inequality using Xi, we get: Pr 1 n n Xi=1 Xi ∈ (a − ǫ, a + ǫ)! ≥ exph−n(cid:16)− log Eheη∗(X−a)i + ǫη∗(cid:17)i(cid:18)1 − = exph−n(cid:16)η∗a − log Eheη∗Xi + ǫη∗(cid:17)i(cid:18)1 − ≥ exp [−n (I(a) + ǫη∗)](cid:18)1 − nǫ2(cid:19) . σ2 Now, as log E(cid:2)eλX(cid:3) is a continuous and differentiable function, there exists a finite η such that σ2 nǫ2(cid:19) nǫ2(cid:19) σ2 log E(cid:2)eηX(cid:3) = inf λ∈IR log E(cid:2)eλX(cid:3) and d dλ log E(cid:2)eλX(cid:3)(cid:12)(cid:12)(cid:12)λ=η = 0. Using η, we define new random variables, Xi ∼ eηxp(x) E[eηX ] . Then, the expected value of X is, E[ X] = = 1 E [eηX ]Xχ xieηxip(xi) = 0. E [eηX ] 1 d dλ log E(cid:2)eλX(cid:3)(cid:12)(cid:12)(cid:12)λ=η nǫ2(cid:17). Xi ∈ (−ǫ, ǫ)(cid:17) ≥(cid:16)1 − σ2 Therefore, by the law of large numbers, Pr(cid:16) 1 Finally, using the above results, i=1 nPn Pr 1 n n Xi=1 Xi ∈ (−ǫ, ǫ)! = X P xi<nǫ p(x1)p(x2)··· p(xn) n Xi=1 exp η ≥ e−nǫη X P xi<nǫ = e−nǫη exp(cid:0)n log E(cid:2)eηX(cid:3)(cid:1) Pr 1 Xi=1 ≥ exp(cid:2)−n(cid:0)− log E(cid:2)eηX(cid:3) + ǫη(cid:1)(cid:3)(cid:18)1 − xi! p(x1)p(x2)··· p(xn) Xi ∈ (−ǫ, ǫ)! nǫ2(cid:19) . σ2 n n This proves the second statement of the theorem. B. Detailed Explanation for the proof of Lemma 3 First, we should calculate the moment generating function of (Z1(j+n/2) − W1j ). For simplicity, Pm denoted as p∗ and q∗ respectively. α∗ and β∗ are defined in a similar way. Then we get i=1 pi and Pm i=1 qi are Z1(j+n/2) − W1j = 0 log pi qi log qi pi log p1qi q1pi log p2qi q2pi ... log pmqi qmpi   k=1 pkqk + (1 − p∗)(1 − q∗) w.p. Pm w.p. (1 − p∗)qi w.p. pi(1 − q∗) w.p. piq1 w.p. piq2 for i 6= 1 for i 6= 2 w.p. piqm for i 6= m and E(cid:2)eθ(Z1(j+n/2)−W1j )(cid:3) = (cid:20) m Xi=1 where C(θ) = −α∗ − β∗ +Pm and D(θ) =Pm Define a function f : IR 7→ IR such that α∗ log n m n Xi=1(cid:18)1 − βjαi(cid:19)θ αiβj(cid:18) αjβi βi(cid:19)θ(cid:21) (cid:18) αi αi(cid:19)θ! +Xi6=j + β∗αi(cid:18) βi βi log n n (cid:19) βi log n n βi(cid:19)θ (cid:18) αi αiβj(cid:18) αjβi βjαi(cid:19)θ(cid:21) m m m n n n m + + n n + + αi log n β∗ log n β∗ log n β∗ log n α∗ log n α∗ log n αi(cid:19)θ n (cid:19)(cid:18) βi Xi=1(cid:20) αi log n = (cid:18) log n Xi=1 = 1 − + (cid:18) log n qi(cid:19)θ (1 − p∗)qi(cid:18) pi piqi + (1 − p∗)(1 − q∗)(cid:21) + Xi=1 pi(cid:19)θ qjpi(cid:19)θ pi(1 − q∗)(cid:18) qi piqj(cid:18) pjqi Xi=1 +Xi6=j n (cid:19)2 m αiβi +(cid:18)1 − n (cid:19) + (cid:19)(cid:18)1 − Xi=1 n (cid:19)2 (cid:18)1 − +(cid:18) log n Xi6=j αi(cid:19)θ (cid:18) βi − n (cid:19)2(cid:20) m Xi=1 α∗βi(cid:18) αi βi(cid:19)θ Xi=1 αiβi + α∗β∗ − n (cid:19)2 + D(θ)(cid:18) log n i=1(cid:20)αi(cid:16) βi βi(cid:17)θ(cid:21) αi(cid:17)θ + βi(cid:16) αi i=1(cid:18)α∗βi(cid:16) αi βi(cid:17)θ i=1 αiβi + α∗β∗ −Pm θ∈IR(cid:16)θa − log E[eθ(Z1(j+n/2)−W1j )](cid:17) θ∈IR θa − log 1 + C(θ) (√αi −pβi) f (θ) = θa − log 1 + C(θ) + D(θ)(cid:18) log n + o(cid:18) log n n (cid:19) , + β∗αi(cid:16) βi + D(θ)(cid:18) log n I(a) = sup = 1 + C(θ) Xi=1 = sup log n log n log n log n (a) = m , 2 n m n n n n (cid:19)2!! n (cid:19)2!. αi(cid:17)θ(cid:19) +Pi6=j αiβj(cid:16) αj βi βj αi(cid:17)θ . Then the derivative and the second derivative of f are given by f ′(θ) = a − C′(θ) log n 1 + C(θ) log n n (cid:17)2 n + D′(θ)(cid:16) log n n (cid:17)2 , n + D(θ)(cid:16) log n βi Also, log αi log βi αi log αj βi βjαi i=1(cid:20)αi(cid:16) βi βi(cid:21) βi(cid:17)θ αi(cid:17)θ + βi(cid:16) αi where C′(θ) =Pm i=1(cid:18)α∗βi(cid:16) αi αi(cid:17)θ(cid:19) log αi βjαi(cid:17)θ βi(cid:17)θ +Pi6=j αiβj(cid:16) αj βi − β∗αi(cid:16) βi and D′(θ) = −Pm f ′′(θ) = −(cid:20)1 + C(θ) log n n (cid:17)2(cid:21) −(cid:20)C′(θ) log n n (cid:17)2(cid:21)(cid:20)C′′(θ) log n n + D′′(θ)(cid:16) log n n + D(θ)(cid:16) log n n (cid:17)2(cid:21)2 (cid:20)1 + C(θ) log n n + D(θ)(cid:16) log n n (cid:17)2(cid:21)(cid:20)C′′(θ) + D′′(θ) log n n (cid:21) − log n n (cid:17)2(cid:21)2 (cid:20)1 + C(θ) log n n + D(θ)(cid:16) log n βi(cid:17)2(cid:21). βi(cid:17)θ(cid:16)log αi n + D(θ)(cid:16) log n αi(cid:17)θ(cid:16)log βi αi(cid:17)2 (cid:20)1 + C(θ) log n i=1(cid:20)αi(cid:16) βi where C′′(θ) =Pm + βi(cid:16) αi = − log n n n + D′(θ)(cid:16) log n n (cid:17)2(cid:21)2 n (cid:21)2 n (cid:20)C′(θ) + D′(θ) log n , We can notice that there exists δ such that C′′(θ) > δ > 0 for all θ ∈ IR. Therefore, there exists N1 such that for all Since a = M log n and C′(0.5) = 0, n > N1, f ′′(θ) < 0 for all θ ∈ IR. l o(cid:16) log n l log log n + 1 log log n(cid:17) + log 2 3 n n f ′(0.5) = M log n l log log n + 1 l o(cid:18) log n log log n(cid:19) + log 2 3 n n − Therefore, there exists N2 such that for all n > N2, f ′(0.5) > 0. For θ = 0.5 + 1/ log log log n, 1 + C(0.5) log n n (cid:17)2 D′(0.5)(cid:16) log n n (cid:17)2 . n + D(0.5)(cid:16) log n C′(θ) = = = (a) = = log log log n log log log n m 1 m αi(cid:19)0.5+ Xi=1(cid:20)αi(cid:18) βi Xi=1(cid:20)(cid:18) βi αi(cid:19) Xi=1(cid:20) exp(cid:18) 2(cid:20) Xi=1 log log log n 1 1 m m m 1 log log log n 1 1 αi log αi βi βi αi βi(cid:19)0.5+ + βi(cid:18) αi βi(cid:19) log log log n (cid:21)pαiβi log −(cid:18) αi βi(cid:19) − exp(cid:18)− +(cid:18) βi(cid:19)2 βi(cid:19)3 log log log n(cid:19)2(cid:18)log +(cid:18) log log log n log log log n αi βi log log αi αi 1 1 1 log log log n log 2(cid:20)(cid:18)log Xi=1 3 x3 + ···(cid:1). where (a) holds by ex − e−x = 2(cid:0)x + 1 Hence, f ′(0.5 + 1/ log log log n) is given by, 1 log log log n log αi βi(cid:21) log αi βi(cid:19)(cid:21)pαiβi log αi βi αi βi + ···(cid:21)pαiβi log βi(cid:19)4 αi + ···(cid:21)pαiβi, 1 1 log log log n(cid:19) = a − f ′(cid:18)0.5 + n log log log n and D′(cid:16)0.5 + Since a ≪ log n Fix n > max(N1, N2, N3). Then, f ′′(θ) < 0 for all θ ∈ IR, f ′(0.5) > 0 and f ′(0.5 + 1/ log log log n) < 0. By the Let θ∗ = 0.5 + ǫ where 0 ≤ ǫ ≤ 1/ log log log n. C′(cid:16)0.5 + log log log n(cid:17) log n log log log n(cid:17) log n 1 + C(cid:16)0.5 + n (cid:17)2 log log log n(cid:17)(cid:16) log n ≪ log n continuity of f ′(θ), we can conclude that f ′(θ∗) = 0 for 0.5 ≤ θ∗ ≤ 0.5 + 1/ log log log n. n (cid:17)2 log log log n(cid:17)(cid:16) log n n (cid:17)2 , log log log n(cid:17)(cid:16) log n n + D′(cid:16)0.5 + n + D(cid:16)0.5 + n log log log n for sufficiently large n, there exists N3 such that f ′(0.5 + 1/ log log log n) < 0 for all n > N3. 1 1 1 1 n (cid:19)2(cid:21) n log n + D(0.5 + ǫ)(cid:18) log n + D(0.5 + ǫ)(cid:18) log n n (cid:19)2(cid:21) n (cid:19)2(cid:21)2 + D(0.5 + ǫ)(cid:18) log n f (θ∗) = (0.5 + ǫ)a − log(cid:20)1 + C(0.5 + ǫ) (a) = (0.5 + ǫ)a −(cid:20)C(0.5 + ǫ) log n n m 1 n n + = log n log n log n = −C(0.5 + ǫ) 2(1 + ξ)2(cid:20)C(0.5 + ǫ) n (cid:19) + o(cid:18) log n βi(cid:19)ǫ Xi=1(cid:20)αi + βi −(cid:18)(cid:18) αi Xi=1 [αi + βi − 2pαiβi] + n (cid:19) , (√αi −pβi)2 + o(cid:18) log n Xi=1 where (a) holds by Taylor's theorem, log (1 + x) = x − 1 log n log n = = n n n m m Since n is arbitrary, (a) of the paper holds for sufficiently large n. 2(1+ξ)2 x2, ξ is between 0 and x. αi(cid:19)ǫ(cid:19)pαiβi(cid:21) + o(cid:18) log n n (cid:19) +(cid:18) βi αi(cid:19)ǫ(cid:19)pαiβi + o(cid:18) log n βi(cid:19)ǫ Xi=1(cid:18)2 −(cid:18) αi n (cid:19) −(cid:18) βi log n n m This work was supported in part by the CISS funded by the Ministry of Science, ICT & Future Planning as the Global Frontier Project. ACKNOWLEDGMENT REFERENCES [1] N. Ryu and S.-Y. Chung, "Community detection with colored edges," in Proc. of IEEE International Symposium of Information Theory (ISIT), 2016. [2] V. Jog and P. Loh, "Information-theoretic bounds for exact recovery in weighted stochastic block models using the Renyi divergence," arXiv:1509.06418 [cs.IT] 2015. [3] S. Fortunato, "Community detection in graphs," Physics Reports, vol. 486, no. 3-5, pp. 75-174, 2010. [4] E. Abbe, A. Bandeira and G. Hall, "Exact Recovery in the Stochastic Block Model," IEEE Trans. Inform. Theory, vol. 62, no. 1, pp. 471-487, 2016. [5] E. Abbe and C. Sandon, "Community Detection in General Stochastic Block models: Fundamental Limits and Efficient Algorithms for Recovery," 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 2015. [6] E. Abbe and C. Sandon, "Recovering communities in the general stochastic block model without knowing the parameters," arXiv:1506.03729 [math.PR] 2015. [7] B. Hajek, Y. Wu and J. Xu, "Information Limits for Recovering a Hidden Community," arXiv:1509.07859v1 [stat.ML] 2015. [8] P. Erdos and A. R´enyi. "On the evolution of random graphs," Publication of the Mathematical Institute of the Hungarian Academy of Sciences, pp. 17-61, 1960 [9] D. Kazakos,"Low-order approximations of Markov chains in a decision theoretic context (Corresp.)," IEEE Trans. Inform. Theory, vol. 26, no. 1, pp. 97-100, 1980. [10] A. Dembo and O. Zeitouni, Large deviations techniques and applications. Berlin: Springer, 2010.
1902.01970
1
1902
2019-02-05T23:19:48
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts
[ "cs.SI" ]
Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and performing malicious activities on social media. These accounts hereafter referred to as "Pathogenic Social Media (PSM)" accounts, are often controlled by terrorist supporters, water armies or fake news writers and hence can pose threats to social media and general public. Understanding and analyzing PSMs could help social media firms devise sophisticated and automated techniques that could be deployed to stop them from reaching their audience and consequently reduce their threat. In this paper, we leverage the well-known statistical technique "Hawkes Process" to quantify the influence of PSM accounts on the dissemination of malicious information on social media platforms. Our findings on a real-world ISIS-related dataset from Twitter indicate that PSMs are significantly different from regular users in making a message viral. Specifically, we observed that PSMs do not usually post URLs from mainstream news sources. Instead, their tweets usually receive large impact on audience, if contained URLs from Facebook and alternative news outlets. In contrary, tweets posted by regular users receive nearly equal impression regardless of the posted URLs and their sources. Our findings can further shed light on understanding and detecting PSM accounts.
cs.SI
cs
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts Hamidreza Alvari, Paulo Shakarian Arizona State University {halvari, shak}@asu.edu Tempe, USA 9 1 0 2 b e F 5 ] I S . s c [ 1 v 0 7 9 1 0 . 2 0 9 1 : v i X r a Abstract -- Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and performing malicious activities on social media. These accounts hereafter referred to as "Pathogenic Social Media (PSM)" accounts, are often controlled by terrorist supporters, water armies or fake news writers and hence can pose threats to social media and general public. Understanding and analyzing PSMs could help social media firms devise sophisticated and automated techniques that could be deployed to stop them from reaching their audience and consequently reduce their threat. In this paper, we leverage the well-known statistical technique "Hawkes Process" to quantify the influence of PSM accounts on the dissemination of malicious information on social media platforms. Our findings on a real- world ISIS-related dataset from Twitter indicate that PSMs are significantly different from regular users in making a message viral. Specifically, we observed that PSMs do not usually post URLs from mainstream news sources. Instead, their tweets usually receive large impact on audience, if contained URLs from Facebook and alternative news outlets. In contrary, tweets posted by regular users receive nearly equal impression regardless of the posted URLs and their sources. Our findings can further shed light on understanding and detecting PSM accounts. Index Terms -- Pathogenic Social Media Accounts, Malicious Activity, Misinformation, Hawkes Processes I. INTRODUCTION Online social media play major role in dissemination of information. However, recent years have witnessed evidence of spreading huge amount of harmful disinformation on social media and manipulating public opinion on the Web, attributed to accounts dedicated to spreading malicious information. These accounts are referred to "Pathogenic Social Media" (PSM) accounts and can pose threats to social media firms and general public. PSMs are usually controlled by terrorist supporters, water armies or fake news writers and they are owned by either real users or bots who seek to promote or degrade certain ideas by utilizing large online communities of supporters to reach their goals. Identifying PSM accounts could have immediate applications, including countering ter- rorism [1], [2], fake news detection [3], [4] and water armies detection [5], [6]. To better understand the behavior and impact of PSM accounts on the Web and normal users, and be able to counter their malicious activity, social media authorities need to deploy certain capabilities which could ultimately lead to reducing their threats. To make this happen, social media platforms are required to design sophisticated techniques that could automatically detect and suspend these accounts as quickly as possible, before they can reach their vast audience and spread malicious content. However, for the most part, the social media firms usually rely on reports they receive from their normal users or even their assigned teams to manually shut down these accounts. First of all, this mechanism is not always feasible due to the limited manpower and since not many real users are willing to put aside time and report the malicious activities. Also, it cannot be done in a timely manner since it takes time for these firms to review the reports and decide whether they are legit or not. On the other hand, the fact that these accounts simply return to social media using different accounts or even migrate to other social media, makes all these efforts almost useless. Therefore, the burden falls to automatic approaches that can identify these malicious actors on social media. Present work. In this work, to address the above mentioned challenges, we aim to understand PSM accounts by (1) an- alyzing their behavior in terms of their posted URLs, and (2) estimate their influence by conducting experiments on a real-world dataset from Twitter. We deploy a mathematical technique known as "Hawkes process" [7] to quantify the impact of PSMs on normal users and the greater Web, by looking at their posted URLs on Twitter. Hawkes processes are special forms of point processes and have shown promising results in many problems that require modeling complicated event sequences where historical events have impact on future ones, including financial analysis [8], seismic analysis [9] and social network modeling [10] to name a few. This study uses an ISIS-related dataset from Twitter [11]. The dataset contains an action log of users in the form of cascades of retweets. In this work, we consider URLs posted by two groups of users: (1) PSM accounts and (2) normal users. The URLs can belong to any platform including the major social media (e.g., facebook.com), mainstream news (e.g., nytimes.com) and alternative news outlets (e.g., rt.com). For each group of users, we fit a multi-dimensional Hawkes processes model wherein each process correspond to a platform referenced in at least one tweet. Furthermore, every process can influence all the others including itself, which allows estimating the strength of connections between each of the social media platforms and news sources, in terms of how likely an event (i.e., the posted URL) can cause subsequent events in each of the groups. In other words, in this study we are interested to investigate if a given URL u1 has influence on another URL u2 (i.e., u1 → u2) and thus can trigger subsequent events. Main Findings. This paper makes the following main observations: • Among all platforms studied here, URLs shared from facebook.com and alternative news media contributed the most to the dissemination of malicious information from PSM accounts. Simply put, they had the largest impact on making a message viral and causing the subsequent events. • Posts that were tweeted by the PSM accounts and con- tained URLs from facebook.com, demonstrated more in- fluence on the subsequent retweets containing URLs from youtube.com, in contrary to the other way around. This means that ultimately tweets with URLs from Facebook will high likely end up inducing more external impulse on YouTube than YouTube might have on Facebook. • URLs posted by the normal users have nearly the same impact on the subsequent events regardless of the social media or news outlet used. This basically means that normal users do not often prefer specific social media or news sources over the others. II. DATA ANALYSIS In this section, we first explain the dataset and provide the list of the main social media platforms and news sites used in this study. Finally, we present our data analysis to demonstrate the differences between PSM accounts and normal users. A. Dataset We collect a dataset of 2.8M ISIS related tweets/retweets in Arabic between February 22, 2016 and May 27, 2016. The dataset contains different fields including user ID, retweet ID, hashtags, content, posting time. The dataset also con- tains user profile information including name, number of followers/followees, description, location, etc. The tweets were collected using different ISIS-related hashtags such as #sta- teoftheislamiccaliphate. In this dataset, about 600K tweets have at least one URL (i.e., event) referencing one of the social media platforms or news outlets. There are about 1.4M of paired URLs which we denote by u1 → u2 and indicates a retweet (with the URL u2) of the original tweet (with the URL u1). In this study, we are interested in investigating the impact of the URL u1 on u2. Accordingly, the dataset contains 35K cascades (i.e., sequences of events) of different sizes and durations, some of which contain paired URLs in the afore- mentioned form. After pre-processing and removing duplicate users from cascades (those who retweet themselves multiple times), cascades sizes (i.e. number of associated postings) vary between 20 to 9,571 and take from 10 seconds to 95 days to finish. The log-log distribution of cascades vs. cascade size and the cumulative distribution of duration of cascades are depicted in Figure 1. The statistics of the dataset are presented in Table I. For labeling, we check through Twitter API to examine whether the users have been suspended (labeled as PSM) or they are Fig. 1. Cumulative distribution of duration of cascades (Top) Log-log distribution of cascades vs. cascade size. (Bottom) Fig. 2. Total number of inactive users in each cascade. still active (labeled as normal) [12]. According to Table I, 11% of the users in our dataset are PSMs and others are normal. We also depict the total number of PSM accounts that have been suspended by Twitter in each cascade, in Figure 2. Finally, to reiterate, we note that these accounts mostly get suspended manually by Twitter based on reports the platform receives from its own users1. 1https://blog.twitter.com/official/en us/a/2016/an-update-on-our-efforts-to- combat-violent-extremism.html TABLE I DESCRIPTION OF THE DATASET. Name # of Cascades # of Tweets/Retweets # of Users # of Single URLs # of Paired URLs Value 35K 2.8M PSM 64,484 104,948 200,892 Normal 536,609 536,046 1,123,434 101102103104105Cascades Size10-1100101102103104# of Cascades0123456789Duration of Cascade (s)1e60.00.51.01.52.02.53.03.5# of Cascades1e40.00.51.01.52.02.53.03.5Cascade1e401234567# of inactive users1e4 TABLE II SOCIAL MEDIA PLATFORM'S TOTAL NUMBER OF PAIRED URLS OF THE FORM u1 → u2 WITH AT LEAST ONE EVENT IN THE DATASET FOR THE PSM AND NORMAL USERS. Platform Twitter Facebook Instagram Google Youtube PSM 139,940 878 0 163 24,724 Normal 918,803 4,017 2,857 132 72,890 NEWS SOURCES' TOTAL PAIRED URLS (u1 → u2) WITH AT LEAST ONE EVENT IN THE DATASET FOR THE PSM AND NORMAL USERS. TABLE III News Source Mainstream Alternatives PSM Normal 0 286 35,187 124,449 B. Social Media Platforms and News Outlets Twitter deploys a URL shortener technique to leave more space for content and protect users from malicious sites2. To obtain the original URLs, we use a URL unshortening tool3 to obtain the original links contained in the tweets in our dataset. We consider a number of major and well-known social me- dia platforms including Twitter, Facebook, Instagram, Google and Youtube. About the dichotomy of mainstream and alter- native media, it is notable to mention that most criteria for determining whether a news source counts as either of them, are based on a number of factors including but not limited to the content and whether or not it is corporate owned4. However, a key difference between these two sources of media comes from the fact that all of mainstream media is profit- oriented, in contrast to the alternative media. We further note that for the most part, mainstream media is considered as a more credible source than alternative media, although the reputation has been recently tainted by the fake news. In this work, following the commonsense, we consider popular news outlets such as The New York Times, and The Wall Street Journal as mainstream and less popular ones as alternatives. In Table II, we summarize the total number of paired URLs (i.e, u1 → u2) in which the original URL (i.e., u1) corresponds to each social media platform with at least one event in our dataset. We also summarize in Table III, the total number of paired URLs whose original URL belongs to the mainstream and alternative news sources. In Table IV, we see the break down of number of paired URLs for the PSM and normal users. We further demonstrate in Table V some examples of the mainstream and alternative news URLs occurrence used in this work. C. Temporal Analysis Here, we present the differences between the PSM accounts in our dataset with their counterparts, normal users through 2https://help.twitter.com/en/using-twitter/url-shortener 3https://github.com/skevas/unshorten 4https://smallbusiness.chron.com/mainstream-vs-alternative-media- 21113.html Fig. 3. Number of paired URLs posted by the PSM and normal users in our dataset. Note that number of normal users in our dataset is higher than the PSM accounts. temporal analysis of their posted URLs. In Figure 3, we depict the daily occurrence of the paired URLs over the span of 43 days for both PSM and normal users. Recall from the previous section that our dataset has a larger number of normal users and higher number of the posted URLs compared to the PSM accounts. Therefore, it is reasonable to observe more activity from normal users than PSMs. For both groups of users, we observe a similar trend in occurrence of spikes and their durations. As it is seen, distinguishing between PSMs and normal users merely based on the occurrence of URLs and their patterns is not reliable. Therefore, we set out to conduct experiments using a more sophisticated statistical technique known as "Hawkes Process" in the next section. III. FRAMEWORK In the previous section, we presented our data analysis to demonstrate differences between PSM accounts and normal users in terms of URLs they usually post on Twitter. We now set out to assess their impact via a well-known mathematical technique called "Hawkes process". A. Hawkes Processes In many scenarios, one needs to deal with timestamped events such as the activity of users on a social network recorded in continuous time. An important task then is to estimate the influence of the nodes based on their timestamp patterns [13]. Point process is a principled framework for modeling such event data, where the dynamic of the point process can be captured by its conditional intensity function as follows: λ(t) = lim ∆t→0 ∆t = dt E(N (t + ∆t) − N (t)Ht) E(dN (t)Ht) (1) where E(dN (t)Ht) is the expectation of the number of events happend in the interval (t, t + dt] given the historical observations Ht and N (t) records the number of events before time t. Point process can be equivalently represented as a counting process N = {N (t)t ∈ [0, T ]} over the time interval [0, T ]. TOTAL NUMBER OF PAIRED URLS OF THE FORM u1 → u2 WITH AT LEAST ONE EVENT FOR PSM/NORMAL USERS AND FOR ALL PLATFORMS. TABLE IV → Twitter 109,354/766,617 Twitter → Facebook → Instagram → Google → Youtube → 14,004/56,545 Mainstream → Alternatives → 21,047/95,641 655/3,108 0/2,362 134/74 0/189 → Facebook → Instagram → Google → Youtube → Mainstream → Alternatives 17,557/84,923 598/3,843 11,992/59,889 229/2,461 120/382 90/688 4/41 0/11 0/0 132/312 0/1 145/767 3/9 0/25 0/1 23/211 0/1 45/318 2/1 0/2 0/0 22/32 0/0 59/64 87/281 0/161 12/53 6,799/7,529 0/13 3,862/9,199 0/1 0/2 0/0 13/48 0/1 26/122 127/576 0/294 17/4 3,731/8,213 0/81 10,003/18,338 The Hawkes process framework [7] has been used in many problems that require modeling complicated event sequences where historical events have impact on future ones. Exam- ples include but are not limited to financial analysis [8], seismic analysis [9] and social network modeling [10]. One- dimensional Hawkes process is a point process Nt with the following particular form of intensity function: (cid:90) t −∞ (cid:88) i:ti<t λ(t) = µ + a g(t − s)dNs = µ + a g(t − ti) (2) Fig. 4. Illustration of the Hawkes Process. Events induce impulse on other processes and cause child events. Background event in e0 induces impulse on responses on processes e1 and e2. (cid:81)n exp(cid:82) T n(cid:88) (cid:90) T where µ > 0 is the exogenous base intensity (i.e., background rate of events), ti are the time of events in the point process before time t, and g(t) is the decay kernel. In this paper, we use exponential kernel of the form g(t) = we−wt, but adapting to the other positive forms is straightforward. The second part of the above formulation captures the self-exciting nature of the point processes -- the occurrence of events in the past has a positive impact on the future ones. Given a sequence of events {ti}n i=1 observed in [0, T ] and generated from the above intensity function, the log-likelihood function can be obtained as follows [10]: L = log i=1 λ(ti) 0 λ(t)dt = log λ(ti) − i=1 0 λ(t)dt (3) In this paper, we focus on multi-dimensional Hawkes pro- cesses which is defined by a U-dimensional point process t , u = 1, . . . , U. In other words, we have U Hawkes N u processes coupled with each other -- each Hawkes process correspond to one of the platforms and the influence between them is modeled using the mutually-exciting property of the multi-dimensional Hawkes processes. We formally define the following formulation to model the influence of different events on each other: EXAMPLES OF MAINSTREAM AND ALTERNATIVE NEWS. TABLE V Mainstream https://www.nytimes.com https://www.reuters.com https://www.wsj.com https://www.nbcnews.com https://www.ft.com Alternatives https://www.rt.com https://www.arabi21.com https://www.7adramout.net https://www.addiyar.com https://zamnpress.com (cid:88) i:ti<t λu(t) = µu + auuig(t − ti) (4) where µu ≥ 0 is the base intensity for the u-th Hawkes process. The coefficient auui ≥ 0 captures the mutually- exciting property between the u-th and ui-th processes. Larger value of auui shows that events in the ui-th dimension are more likely to trigger an event in u-th dimension in future. More intuitively, an event on one point process can cause an impulse response on other processes, which increases the probability of an event occurring above the processes' background rates. We reiterate that in this study each URL is attributed to an event, i.e., if the URL u1 triggers the URL u2 (i.e., u1 → u2), then au2u1 ≥ 0 In Figure 4, we depict a multivariate example of three different streams of events, e0, e1 and e2. As illustrated, e0 is caused by the background rate λ(t)0 and has an influence on itself and e1. On the other hand, e1 is caused by λ(t)1 and has an influence on e2. Simply put, a background event in e0 induces impulse on responses on processes e1 and e2. Accordingly, the caused child event in e1 leads to another child event in e2. We consider an infectivity matrix A = [auui] ∈ RU×U which collects the self-triggering coefficients between Hawkes processes, and U = 7 is the number of processes (i.e., platforms) in our work. Each entry in this matrix indicates the strength of influence each platform has on other platforms. Our ultimate goal in this paper is to estimate the infectivity matrix as it reflects the estimated influence of each platform on others. Next, we will provide the methodology that we follow to estimate the influence of the URLs on each other. B. Methodology We aim to assess the influence of the PSM accounts in our dataset via their posted URLs. We consider the URLs posted by two groups of users: (1) PSM accounts and (2) normal users. For both groups, we fit a Hawkes model with K = 7 point processes each for the seven categories of social media and news outlets discussed earlier. In each of the Hawkes models, every process is able to influence all the others including itself, which allows us to estimate the strength of connections between each of the seven categories for both groups of users, in terms of how likely an event (i.e., the posted URL) can cause subsequent events in each of the groups. We use the ADM4 algorithm presented by [10] and follow the methodology presented by [14] for fitting the Haweks processes for both PSM and normal users. ADM4 [10] is an efficient optimization that estimates the parameters A and µ by maximizing the regularized log-likelihood L(A, µ): min A≥0,µ≥0 −L(A, µ) + λ1A∗ + λ2A1 (5) where L(A, µ) can be obtained by substituting λu(t) from Equation 4 into Equation 3. Also, A∗ is the nuclear norm of matrix A, and is defined as the sum of its singular value. We consider two different sets of URLs posted by the PSM accounts and normal users by selecting URLs that have at least one event in Twitter (i.e., posted by a user). For each group, we construct a matrix W ∈ NT×U with U = 7, whose entries are sequences of events (i.e., posted URLs) observed during a time period T . We note that each sequence of events is of the form S = {(ti, ui)}ni i=1 where ni is the number of the events occurring at the ui-th dimension (i.e., URLs posted containing one of the 7 platforms). IV. EXPERIMENTAL RESULTS Here, we conduct experiments to gauge the effectiveness of Hawkes process for moderling influence of PSMs. A. Settings In this work, we adopt the ADM4 algorithm [10] which implements parametric inference for Hawkes processes with an exponential kernel and a mix of Lasso and nuclear regu- larization. We initialize infectivity matrix A, base intensities µ and decays β ∈ R randomly. We further set the number of nodes U = 7 to reflect the 7 platforms used in this study. Level of penalization is set to C = 1000, and the ratio of Lasso-Nuclear regularization mixing parameter is set to 0.5. Finally, maximum number of iterations for solving the optimization is set to 50 and the tolerance of solving algorithm is set to 1e − 5. B. Results We estimate infectivity matrix for both PSM and normal users by fitting the Hawkes model described earlier. In our study, this matrix characterizes the strength of the connections between the platforms and news sources. More specifically, each weight value represents the connection strength from one platform to another. In other words, each entry in this matrix can be interpreted as the expected number of subsequent events that will occur on the second group after each event on the first [14]. In Figure 5, we depict the estimated weights for all paired URLs for both PSM and normal users. Looking at the weights in both of the plots, we realize that greater weights belong to processes that have impact on Twitter, i.e. "→ T witter". This implies that both of the groups in our Twitter dataset often post URLs that ultimately have greater impact on Twitter. Overall, we observe the followings: • URLs referencing all platforms and posted by the PSMs and regular users, mostly trigger URLs that contain the Twitter domain. • Among all platforms studied here, URLs shared from facebook.com and alternative news media contributed the most to the dissemination of malicious information from PSM accounts. In other words, they had largest impact on making a message viral and causing the subsequent events. • Posts that were tweeted by the PSM accounts and con- tained URLs from facebook.com, demonstrated more influence on the subsequent retweets containing URLs from youtube.com, in contrary to the other way around. This means that ultimately tweets with URLs from face- book will likely end up inducing external impulse on youtube.com. In contrast, URLs posted by the normal users have nearly the same impact on the subsequent events regardless of the social media or news outlet used. The above mentioned observations demonstrate the effec- tiveness of leveraging Hawkes process to quantify the impact of URLs posted by PSMs and regular users on the dissemi- nation of content on Twitter. The observations we make here show that PSM accounts and regular users behave differently in terms of the URLs they post on Twitter, in that they have different tastes while disseminating URL links. Accordingly their impact on the subsequent events significantly differ from each other. V. RELATED WORK The explosive growth of the Web has raised numerous challenges and attracted several researchers with different background [11], [15] -- [29]. Below, we will review some of the closest research directions to our research. Point Process. When dealing with timestamped events in continuous time such as the activity of users on social media, point process could be leveraged for modeling such events. Point processes have been extensively used to model activities in networks [30]. Hawkes process is a special form of point processes which models complicated event sequences with historical events influencing future ones. Hawkes processes have been applied to a variety of problems including financial analysis [8], seismic analysis [9] and social network model- ing [10], community detection [31], and causal inference [32]. Social Spam/Bot Detection. Social bot is a computer program that automatically generate content and interacts with real of a cascade. In contrast, we are focused on a set of users who might or might not be initiators. Other similar works on finding most influential spreaders of information such as [43] also exist [41], [42] and outbreak prediction such as in the literature. For example, the work of [44] performed classification to detect users who adopt popular items. Extremism Detection. Several studies have focused on under- standing extremism in social networks [2], [22], [28], [45] -- [48]. The work of [2], uses Twitter and proposes an approach to predict new extremists, determine if the newly created account belongs to a suspended extremist, and predict the ego-network of the suspended extremist upon creating her new account. Authors in [22], [45] performed iterative vertex clustering and classification to identify Islamic Jihadists on Twitter. Detection of Internet Water Armies. The term "Internet water armies" refers to a special group of online users who get paid for posting comments for some hidden purposes such as influencing other users towards social events or business markets. Therefore, they are also called "hidden paid posters". The works of [5], [6], [25] use user behavioral and domain- specific attributes and designed approaches to detect Internet water armies. VI. CONCLUSION AND FUTURE WORK In this study, we presented an analysis on a real-world ISIS- related dataset from Twitter to demonstrate how Pathogenic Social Media (PSM) and normal users usually post on Twit- ter in terms of the URLs they post. More specifically, we leveraged a statistical technique known as Hawkes Process for modeling the influence of PSM accounts on dissemination of malicious content on the Web. In this work, we used URLs posted by two groups of users, PSMs and normal users, on major social media and mainstream and alternative news outlets. Overall, our findings indicate that the URLs posted by the PSM accounts have the largest impact if contained either facebook.com or alternative news media. In contrast, their counterparts, i.e., normal users, often post URLs that have nearly the same impact on the Web, no matter what social media or news outlet they use. There are potential avenues for future work. First, we would like to extend the study by proposing a prediction mechanism for distinguishing PSMs from normal users, based on their different impact on the greater Web. Another research direction would also be learning causal inference for Hawkes process and investigating the relation between the two concepts, while considering the problem of identification of PSM accounts. ACKNOWLEDGMENT This work was supported through DoD Minerva program. REFERENCES [1] M. Khader, Combating Violent Extremism and Radicalization in the IGI Digital Era, ser. Advances in Religious and Cultural Studies. Global, 2016. [2] J. Klausen, C. Marks, and T. Zaman, "Finding online extremists in social networks," CoRR, vol. abs/1610.06242, 2016. Fig. 5. Estimated weights for all paired URLs for (top) PSMs, and (bottom) normal users. Among all URLs, those from facebook.com and alternative news media had the largest impact on dissemination of malicious messages. people on social media, trying to emulate and possibly alter their behavior [15]. Recently, DARPA organized a Twitter bot challenge to detect "influence bots" [33], where supervised and semi-supervised approaches were proposed using different features. The work of [34] for example, use similarity to cluster accounts and uncover groups of malicious users. The work of [35] presents a supervised framework for bot detection which uses more than thousands features. In a different at- tempt, the work of [36] studied the problem of spam detection in Wikipedia using different spammers behavioral features. For a comprehensive survey on the ongoing efforts to fight social bots, we direct the reader to [15]. Fake News Identification. Fake news detection has recently attracted a growing interest of general public and researchers, as the spread of misinformation on social media and the Web increases on a daily basis. A growing body of work has been devoted to addressing the impact of bots in manipulating po- litical discussion and spreading fake news, including the 2016 U.S. presidential election [19], [37], [38] and the 2017 French election [39]. For example, [38] analyzes tweets following recent U.S. presidential election and found evidences that bots played key roles in spreading fake news. Identifying Instigators. Given a snapshot of the diffusion process at a given time, these works aim to detect the source of the diffusion. For instance, [40] designed an approach for information source detection and in particular initiator [27] H. Alvari, A. Hajibagheri, G. Sukthankar, and K. Lakkaraju, "Identifying community structures in dynamic networks," Social Network Analysis and Mining, vol. 6, no. 1, p. 77, 2016. [28] E. Ferrara, W.-Q. Wang, O. Varol, A. Flammini, and A. Galstyan, "Pre- dicting online extremism, content adopters, and interaction reciprocity," in International conference on social informatics. Springer, 2016, pp. 22 -- 39. [29] H. Alvari, S. Hashemi, and A. Hamzeh, "Detecting overlapping com- munities in social networks by game theory and structural equivalence concept," in International Conference on Artificial Intelligence and Computational Intelligence. Springer, 2011, pp. 620 -- 630. [30] S. Xiao, M. Farajtabar, X. Ye, J. Yan, L. Song, and H. Zha, "Wasserstein learning of deep generative point process models," in Advances in Neural Information Processing Systems, 2017, pp. 3247 -- 3257. [31] L. Tran, M. Farajtabar, L. Song, and H. Zha, "Netcodec: Community detection from individual activities," in Proceedings of the 2015 SIAM International Conference on Data Mining. SIAM, 2015, pp. 91 -- 99. [32] H. Xu, M. Farajtabar, and H. Zha, "Learning granger causality for hawkes processes," in International Conference on Machine Learning, 2016, pp. 1717 -- 1726. [33] V. S. Subrahmanian, A. Azaria, S. Durst, V. Kagan, A. Galstyan, K. Lerman, L. Zhu, E. Ferrara, A. Flammini, and F. Menczer, "The darpa twitter bot challenge," 2016. [34] Q. Cao, X. Yang, J. Yu, and C. Palow, "Uncovering large groups of active malicious accounts in online social networks," in CCS, 2014. [35] O. Varol, E. Ferrara, C. A. Davis, F. Menczer, and A. Flammini, "Online interactions: Detection, estimation, and characterization," human-bot ICWSM, 2017. [36] T. Green and F. Spezzano, "Spam users identification in wikipedia via editing behavior," ICWSM, 2017. [37] A. Bessi and E. Ferrara, "Social bots distort the 2016 us presidential election online discussion," First Monday, vol. 21, no. 11, 2016. [38] C. Shao, G. L. Ciampaglia, O. Varol, A. Flammini, and F. Menczer, "The spread of fake news by social bots," arXiv preprint arXiv:1707.07592, 2017. [39] E. Ferrara, "Disinformation and social bot operations in the run up to the 2017 french presidential election," 2017. [40] K. Zhu and L. Ying, "Information source detection in the sir model: A sample-path-based approach," IEEE/ACM Trans. Netw., vol. 24, no. 1, 2016. [41] S. Pei, L. Muchnik, J. S. A. Jr., Z. Zheng, and H. A. Makse, "Searching for superspreaders of information in real-world social media." CoRR, 2014. [42] H. C.-Y. Fu, Yu-Hsiang and C.-T. Sun, "Identifying super-spreader nodes in complex networks," Mathematical Problems in Engineering, 2015. [43] P. Cui, S. Jin, L. Yu, F. Wang, W. Zhu, and S. Yang, "Cascading outbreak prediction in networks: A data-driven approach," in KDD, 2013. [44] T. Konishi, T. Iwata, K. Hayashi, and K.-I. Kawarabayashi, "Identifying key observers to find popular information in advance," in IJCAI, 2016. [45] M. Benigni and K. M. Carley, "From tweets to intelligence: Understand- ing the islamic jihad supporting community on twitter," in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation. Springer, 2016, pp. 346 -- 355. [46] J. R. Scanlon and M. S. Gerber, "Automatic detection of cyber- recruitment by violent extremists," Security Informatics, vol. 3, no. 1, p. 5, 2014. [47] -- -- , "Forecasting violent extremist cyber recruitment," IEEE Transac- tions on Information Forensics and Security, vol. 10, no. 11, pp. 2461 -- 2470, 2015. [48] B. W. Hung, A. P. Jayasumana, and V. W. Bandara, "Detecting rad- icalization trajectories using graph pattern matching algorithms," in Intelligence and Security Informatics (ISI), 2016 IEEE Conference on. IEEE, 2016, pp. 313 -- 315. [3] A. Gupta, P. Kumaraguru, C. Castillo, and P. Meier, TweetCred: Real- Time Credibility Assessment of Content on Twitter. Springer Interna- tional Publishing, 2014. [4] A. Gupta, H. Lamba, and P. Kumaraguru, "$1.00 per rt #bostonmarathon #prayforboston: Analyzing fake content on twitter," in 2013 APWG eCrime Researchers Summit, 2013. [5] C. Chen, K. Wu, S. Venkatesh, and X. Zhang, "Battling the internet water army: Detection of hidden paid posters," CoRR, vol. abs/1111.4297, 2011. [6] C. Chen, K. Wu, S. Venkatesh, and R. K. Bharadwaj, "The best answers? think twice: online detection of commercial campaigns in the CQA forums," in ASONAM, 2013. [7] A. G. Hawkes, "Spectra of some self-exciting and mutually exciting point processes," Biometrika, vol. 58, no. 1, pp. 83 -- 90, 1971. [8] E. Bacry, T. Jaisson, and J.-F. Muzy, "Estimation of slowly decreasing hawkes kernels: application to high-frequency order book dynamics," Quantitative Finance, vol. 16, no. 8, pp. 1179 -- 1201, 2016. [9] D. J. Daley and D. Vere-Jones, An introduction to the theory of point processes: volume II: general theory and structure. Springer Science & Business Media, 2007. [10] K. Zhou, H. Zha, and L. Song, "Learning social infectivity in sparse low- rank networks using multi-dimensional hawkes processes," in Artificial Intelligence and Statistics, 2013, pp. 641 -- 649. [11] H. Alvari, E. Shaabani, and P. Shakarian, "Early identification of pathogenic social media accounts," in 2018 IEEE International Con- ference on Intelligence and Security Informatics (ISI). IEEE, 2018, pp. 169 -- 174. [12] K. Thomas, C. Grier, D. Song, and V. Paxson, "Suspended accounts in retrospect: an analysis of twitter spam," in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011, pp. 243 -- 258. [13] M. Gomez-Rodriguez, J. Leskovec, and B. Scholkopf, "Modeling infor- mation propagation with survival theory," in International Conference on Machine Learning, 2013, pp. 666 -- 674. [14] S. Zannettou, T. Caulfield, E. De Cristofaro, N. Kourtelris, I. Leontiadis, M. Sirivianos, G. Stringhini, and J. Blackburn, "The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources," in Proceedings of the 2017 Internet Measurement Conference. ACM, 2017, pp. 405 -- 417. [15] E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, "The rise of social bots," Communications of the ACM, vol. 59, no. 7, pp. 96 -- 104, 2016. [16] G. Beigi, R. Guo, A. Nou, Y. Zhang, and H. Liu, "Protecting user privacy: An approach for untraceable web browsing history and unam- biguous user profiles," in Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining. ACM, 2019, pp. 213 -- 221. [17] H. Alvari, P. Shakarian, and J. K. Snyder, "A non-parametric learning approach to identify online human trafficking," in Intelligence and Security Informatics (ISI), 2016 IEEE Conference on. IEEE, 2016, pp. 133 -- 138. [18] G. Beigi, J. Tang, S. Wang, and H. Liu, "Exploiting emotional infor- mation for trust/distrust prediction," in Proceedings of the 2016 SIAM international conference on data mining. SIAM, 2016, pp. 81 -- 89. [19] P. N. Howard, "Bots and automation over twitter during the us election," 2016. [20] G. Beigi, M. Jalili, H. Alvari, and G. Sukthankar, "Leveraging commu- nity detection for accurate trust prediction," 2014. [21] G. Beigi and H. Liu, "Privacy in social media: Identification, mitigation and applications," arXiv preprint arXiv:1808.02191, 2018. [22] M. C. Benigni, K. Joseph, and K. M. Carley, "Online extremism and the communities that sustain it: Detecting the isis supporting community on twitter," PloS one, 2017. [23] G. Beigi, K. Shu, Y. Zhang, and H. Liu, "Securing social media user data: An adversarial approach," in Proceedings of the 29th on Hypertext and Social Media. ACM, 2018, pp. 165 -- 173. [24] H. Alvari, P. Shakarian, and J. K. Snyder, "Semi-supervised learning for detecting human trafficking," Security Informatics, vol. 6, no. 1, p. 1, 2017. [25] K. Wang, Y. Xiao, and Z. Xiao, "Detection of internet water army in social network," 2014. [26] G. Beigi and H. Liu, "Similar but different: Exploiting users' congruity for recommendation systems," in International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction. Springer, 2018.
1501.07860
1
1501
2015-01-30T17:45:39
Popularity and Quality in Social News Aggregators: A Study of Reddit and Hacker News
[ "cs.SI", "physics.soc-ph" ]
In this paper we seek to understand the relationship between the online popularity of an article and its intrinsic quality. Prior experimental work suggests that the relationship between quality and popularity can be very distorted due to factors like social influence bias and inequality in visibility. We conduct a study of popularity on two different social news aggregators, Reddit and Hacker News. We define quality as the relative number of votes an article would have received if each article was shown, in a bias-free way, to an equal number of users. We propose a simple poisson regression method to estimate this quality metric from time-series voting data. We validate our methods on data from Reddit and Hacker News, as well the experimental data from prior work. This method works well even though the collected data is subject to common social media biases. Using these estimates, we find that popularity on Reddit and Hacker News is a stronger reflection of intrinsic quality than expected.
cs.SI
cs
Popularity and Quality in Social News Aggregators: A Study of Reddit and Hacker News Greg Stoddard Northwestern University 5 1 0 2 n a J 0 3 ] I S . s c [ 1 v 0 6 8 7 0 . 1 0 5 1 : v i X r a Abstract In this paper we seek to understand the relationship between the online popularity of an article and its intrinsic quality. Prior experimental work suggests that the relationship be- tween quality and popularity can be very distorted due to fac- tors like social influence bias and inequality in visibility. We conduct a study of popularity on two different social news aggregators, Reddit and Hacker News. We define quality as the relative number of votes an article would have received if each article was shown, in a bias-free way, to an equal number of users. We propose a simple poisson regression method to estimate this quality metric from time-series voting data. We validate our methods on data from Reddit and Hacker News, as well the experimental data from prior work. This method works well even though the collected data is subject to com- mon social media biases. Using these estimates, we find that popularity on Reddit and Hacker News is a stronger reflection of intrinsic quality than expected. 1 Introduction One of the many narratives surrounding the growth of so- cial media is that our systems for liking, retweeting, vot- ing, and sharing are giving rise to a digital democracy of content. As the narrative goes, virality enabled “Gangnam Style” to dominate international audiences, helped the Ice Bucket challenge raise millions of dollars for ALS research, and we now interpret trending topics on Twitter as a signal of societal importance (Gillespie 2011). There’s a consider- able amount of academic work that interrogates this narra- tive by delving deeply into understanding the properties of virality. For example, scholars have studied the propagation and correction of rumors(Friggeri et al. 2014), the role of in- fluential users in spreading information (Bakshy et al. 2012), or whether information actually diffuses in a viral way at all (Goel, Watts, and Goldstein 2012). Although many papers hint at it, there are few papers that directly address a basic question: do these systems promote the best content? Does this “digital democracy” actually work? As a thought experiment, imagine polling a large pop- ulation of people and asking them to rate every music video uploaded to Youtube in 2012. Would “Gangnam Style”, the most watched video on Youtube, still come out on top? Evidence from the MusicLab experiment of Salganik, Dodds, and Watts (2006; 2008) suggests that it might not. In this experiment, the authors set up a website where users could listen to and download songs from unknown artists. When visiting the site, participants were randomly assigned to a “world” and presented a list of songs that were ranked by the number of downloads the song had in that world. This design let the authors observe the evolution of popularity of the same song across different worlds. They also included one world in which songs were ranked randomly. The num- ber of song downloads in this control world served as a mea- sure of intrinsic song quality. They found that the popularity of a song could vary wildly across worlds; songs with the largest share of downloads in one world went relatively ignored in another one. Higher quality songs were more popular on average, but there was a large variance in popularity for all but the best and worst songs. This variance was caused by a rich-get-richer effect. Songs with more downloads were ranked higher in the list and were more likely to be sampled by future listeners. Fur- thermore, participants were able to see the number of current downloads each song had, and were more likely to sample songs with a higher number of downloads. In the presence of such effects, the authors conclude, popularity is a noisy and distorted measure of quality. Present Work What do these results imply about the relationship be- tween intrinsic quality and popularity on real world socio- technical systems? Facebook, Twitter, etc all have a rich-get- richer phenomenon because posts with more likes, retweets, and views are more visible, on average, than their less popu- lar counterparts. Does this imply that there’s a distorted rela- tionship between quality and popularity on these platforms? Unfortunately we do not have the ability to run randomized experiments on these platforms, so the main challenge of an- swering this question is developing a metric of quality that can be estimated from observational popularity data. In this paper we argue that social news aggregators pro- vide a good setting to study the relationship between pop- ularity and article quality. We conduct our study on two aggregators, Reddit and Hacker News. Reddit is a popu- lar site where users submit links to content from around the web, and other users vote and comment on those links. Hacker News is an aggregator dedicated to programming and technology-related issues but is otherwise similar in structure. Reddit received approximately 450 million page views in December 2014, while Hacker News received ap- proximately 3.25 million. These aggregators have several properties that facilitate disentangling observed popularity from inherent quality. The first property is the rich-get-richer effect is easier to measure on Reddit and Hacker News because content vis- ibility is easier to quantify. The interface of each site is a simple, non-personalized list of links1, so the observed ar- ticle ranking is (approximately) the same for all users. Due to the similarities in UI, estimating visibility on Reddit or Hacker News is very similar to estimating position bias in search results and search ad rankings. We exploit this simi- larity in our techniques. Reddit and Hacker News also admit a clean definition of “quality”. Each site orders articles by a function of upvotes (or upvotes minus downvotes in Reddit’s case) and age. For convenience, we’ll use the term score to mean number of up- votes in the case of Hacker News, or the difference between upvotes and downvotes for Reddit. Holding all else equal, Reddit and Hacker News implicitly consider articles with a greater score to be better than articles with a lower score. We will then define quality as the score an article would receive if all articles were shown to the same number of users, and in the absence of confounds like social signals. The MusicLab experiment accomplished this by randomizing the ordering of songs and not displaying the number of downloads that each song has. The reality of voting is nowhere close to this process, so we must instead estimate this hypothetical qual- ity measure from data. Lastly, recent empirical work shows that popularity on Reddit exhibits signs of a distorted relationship between quality and popularity. Gilbert (2013) studies popularity of images on Reddit and finds that over half of popular image submissions are actually reposts of previous submissions. The same picture may receive no upvotes on it’s first submis- sion but its second or third submission may gain thousand of upvotes. 1.1 Our Contributions The main contribution of this paper is a method for estimat- ing article quality on Reddit and Hacker News. The key to our analysis is the use of time-series observations of voting behavior for each article. Observing the same article at dif- ferent points in it’s life allows us to examine the influence of different factors on voting data. We begin by showing a small example of a factor that causes a distortion between quality and popular. We identify a set of articles on Hacker News that had identical voting patterns in the first 30 minutes of their lifetimes, and find that articles in this set that (randomly) began on the front page of Hacker News eventually became more than twice as popular than articles that began on lower pages. We then develop a simple poisson regression model for learning parameters from observed data, with the goal of us- ing those parameters to estimate the score an article would have received if the voting were conducted in a bias-free 1Reddit is actually lightly personalized, see section 3 for more details. manner. Our base model only includes factors for article and position effects but we expand this model to also include factors for the time decay of article quality and for potential social influence effects. Since we lack the ability to evalu- ate against ground truth data from Reddit or Hacker News, we evaluate this model on data from the MusicLab experi- ment. We find this method is effective at recovering ground truth quality parameters, and further show that it has good explanatory power for Reddit and Hacker News data. Using these estimates, we examine the relationship be- tween article quality and popularity. We first verify the ex- istence of a large position bias on Reddit and Hacker News. We then find a surprisingly strong relationship between qual- ity and popularity, indicating that the most popular articles on Reddit and Hacker News are likely the best articles in the system. Lastly we expand Gilbert’s study of reposting behavior on Reddit and show that reposters actually helps Reddit aggre- gate content that is popular on the rest of the web. Specif- ically, we show that the number of submissions of an arti- cle is positively correlated with its external popularity, and these increased number of postings raise the probability that at least one becomes popular. 2 Related Work This work is mostly closely related to the literature on pre- dicting popularity, although we emphasize the goal is differ- ent. The goal of the prediction literature is to predict popu- larity within real systems, which are subject to the biases that we listed in the introduction, whereas our goal is to “predict” popularity in a hypothetical bias-free world. One implication of (Salganik, Dodds, and Watts 2006) is that predicting pop- ularity is inherently difficult because cultural markets tend to construct preferences rather than reveal them. However prediction literature shows popularity can be predicted ac- curately if we observe a small amount of early popularity. (Szabo and Huberman 2010) show that Youtube views can be predicted accurately using a log-linear extrapolation of early popularity. Recent work has improved the accuracy of this method (Pinto, Almeida, and Gonc¸alves 2013) but still only uses features related to early popularity. Both (Cheng et al. 2014) and (Bakshy et al. 2011) find that content features are weak features in comparison to structural features, such as the networks of original posters and the timing of early shares and retweets. Some scholars (Bandari, Asur, and Hu- berman 2012) have proposed and tested prediction methods that only use content features, but (Arapakis, Cambazoglu, and Lalmas 2014) finds that predicting news popularity at cold-start with only content-features provides little accuracy over a trivial baseline. This is not to say that content-only prediction is impossible but the MusicLab experiment and related experiment provide a solid theoretical grounding for why content-only prediction should be difficult. Several scholars have used data from the MusicLab exper- iment to study the roles of article qualities and social influ- ence in popularity. Krumme et al. (2012) uses the MusicLab data to show that social influence affects a user’s choice of what songs to listen to but not their probability of down- loading a song after listening to it. Abeliuk et al. (2014) use the model of Krumme et al. to estimate article quality from the MusicLab data and design a ranking algorithm to maximize the number of downloads. Similarly (Lerman and Hogg 2014) (2014) design a news aggregator experiment on Mechanical Turk to test the efficacy of different ranking al- gorithms, and find that ordering by popularity was best at focusing user attention on high quality articles. In follow- up work, Hogg and Lerman (2014) use the same experiment to test the effect of social influence. In doing so, they use a model to estimate article quality which is similar to the one we employ (see section 5). Although there aren’t many studies on Reddit (see below), social news aggregators have been studied in recent years. Lampe and Resnick (2004) analyze the comment moder- ation system on Slashdot and show that many comments never receive a fair judgment because of “rich-get-richer” style effects. Lerman et al (2009; 2010) studied popularity on Digg, and demonstrated that popularity prediction accu- racy could be improved by tailoring a model to the algorithm and interface that Digg used. Hodas and Lerman (2014) use an explicit model of user attention and visibility to explain differences in information diffusion between Digg and Twit- ter. Finally there’s a nascent literature that uses Reddit as a data source. While our approach is agnostic to article fea- tures, other scholars have used qualitative and quantitative to study popularity and preferences on Reddit. Lakkaraju, McAuley, and Leskovec (2013) decompose article popular- ity into separate effects: the quality of the content itself and the appeal of the title of the content. They show that textual features of the title play a large role in determining popular- ity. Leavitt and Clark (2014) study the behavior of a subred- dit dedicated to Hurricane Sandy news and qualitatively an- alyze preferences of that community, and the resulting pop- ularity of different types of stories within that subreddit. 3 Data Reddit Reddit is composed of many different sub-communities called “subreddits”. For example “r/news”2 is the subreddit for discussing news and current events. Links must be sub- mitted to a subreddit. Any logged-in user may either upvote or downvote any link on Reddit. When a user visits the front page of Reddit (reddit.com), they are shown articles from a combination of different subreddits that they are subscribed to. New users and users without accounts are shown articles from a combination of the “default” subreddits. Although the main ranking is personalized for each user, articles are ranked the same for all users when they visit a particular sub- reddit (i.e. reddit.com/r/news). Within a subreddit, articles are ranked in decreasing order of their “hot score”, which is defined by: log(ui − di) − 1 750 agei Where ui, di is the number of upvotes and downvotes re- ceived by article i and agei is the number of minutes be- 2by convention, “r/” is prefixed to the name of a subreddit when referring to it tween the current time and the time the article was sub- mitted3. There’s additional logic to handle the case where di ≥ ui but most of our observations have ui > di. The al- gorithm for ranking articles on the front page is more com- plex and we omit these details because this work only studies dynamics within particular subreddits. Hacker News The design of Hacker News is a bit simpler than Reddit’s in a few ways. First, Hacker News allows peo- ple to upvote stories but not to downvote them. Second, there are only two different article rankings: the “new” ranking which is a chronological list of articles, and the “top rank- ing”. In the “top ranking”, articles are ranked according to the following “top score” (a term we use for the sake of con- venience): (ui − 1).8 (agei + 2)1.8 · penaltiesi Where ui is the number of upvotes for article i and agei is the time (in hours) elapsed between submission and the cur- rent time. penaltiesi is a factor related to certain features of the article, such as whether it is “light weight” or “contro- versial”. The details of penalties are not made public but in most cases the penalty factors have little impact. To appear in the top-ranking of Hacker News, an article’s score must exceed some minimum threshold. The number of articles in the top ranking can vary because of the threshold. Data Collection We collect data at 10 minute intervals over a two week pe- riod from 5/26/14 to 6/6/14 for each site. For Hacker News, we collect all articles in the top ranking and new ranking and record the number of upvotes, comments, and position of each article (as well as static metadata like title, author, etc). We can compute the number of votes an article received by comparing the number of votes in subsequent time peri- i ), ods. For our purposes, each observation is a tuple (t, i, j, vt meaning that article i at time t was observed in position j, and received vt i upvotes in the time period t to t + 1. For Reddit, we collect the top 500 articles of the hot rank- ings for a number of different default subreddits, and record the number of upvotes, downvotes, position, and score (dif- ference of upvotes and downvotes) for each article. Each ob- i), meaning that article i at servation is a tuple (t, i, j, ut time t was observed in position j and received ut i upvotes i downvotes in the time period t to t + 1. The values and dt we use for ut i are actually not the raw values collected from Reddit; due to an anti-spam practice on Reddit called “vote fuzzing”, we had to transform the data extensively. We describe this transformation in the appendix. i and dt i, dt 4 A Simple Example In this section we demonstrate a concrete example of why observed popularity may only be a distorted measure of ar- ticle quality. We show that the initial position of an article within Hacker News’ top-ranking has a large influence on its eventual popularity. Furthermore we show initial positioning is partially determined by random factors. 3750 is the number of minutes in 12 1/2 hours. way. Specifically, we want to estimate the score an article would have received if it were exposed to same number of randomly-chosen users, and in the absence of any social sig- nals like the current score of the article or the number of comments. While this definition of quality is clearly not the only definition of quality, nor is it suitable for every type of article on Reddit or Hacker News (see section A.1 in the ap- pendix for a discussion of this issue), we feel its a reasonable definition. 5.1 Estimation The primary issue for estimating these parameters we don’t observe the number of users who viewed an article but de- cided not to vote on it. If we observe that an article only received 5 votes, we don’t know if 5 or 500 users viewed that article. Even if we knew the number of users who vis- ited a page (presumably these sites do), we still couldn’t be sure because articles at the top of the page may receive many more views than articles at the bottom. Fortunately this is a common problem encountered in es- timating the click-through-rates of search results and search ads (Dupret and Piwowarski 2008),(Chen and Yan 2012), (Craswell et al. 2008). One model used in this literature is the examination hypothesis, proposed by (Richardson, Dominowska, and Ragno 2007), which models the probabil- ity of a user clicking on article i in slot j as a two-step pro- cess. With probability pj a user examines the article in po- sition j, independent of the article in position j. If the users examines position j, they click on that article with probabil- ity qi. Then the p and p parameters are estimate from search log data, typically via maximum likelihood estimation. Direct application of this model isn’t possible because the granularity of our data is votes cast over a 10 minute inter- val, rather than voting data at the individual level. Instead of estimating the probability that a single user votes on an arti- cle, we estimate the rate at which an articles receives votes. Recent work (Chen and Yan 2012) shows that the binomial model in the examination hypothesis can be replaced with a poisson model. As it turns out, their formulation is exactly equivalent to the following standard poisson regression with fixed effects for article quality and position bias: i ∼ Poisson(exp(pt vt i + qi)) i is the number of votes received by article i at Where vt time t and pt i is the position it appeared in. The fitted qi pa- rameters are then used to estimate the quality of each article (described in more detail in section 7 ). While the approach in (Chen and Yan 2012) yields an efficient closed-form so- lution for the MLE, the poisson regression gives us the flexi- bility to add other factors. We choose the poisson regression approach for this reason. 5.2 Time Decay and Score Effects The above model accounts for the primary effects of position bias and article quality but there are other factors that affect voting. The first is that article quality may decay over time, perhaps because the news is less relevant or a large fraction of users may have seen the article on earlier visits. We add Figure 1: The effect of initial placement on the final score of articles on Hacker News. Articles only appear in the top-ranking of Hacker News when their score exceeds some minimum threshold. We de- fine initial position as the position of an article when it first enters the top-ranking. We certainly have some measure- ment errors for initial positions because we scrape at 10- minute intervals, so it’s possible that an article enters at some position j but we first see it at position j(cid:48). However the me- dian movement in position between time intervals in only 2 ranks, so we feel this measurement error has an insignif- icant effect. The initial position of an article is partially a function of the quality of an article. To mitigate endogeneity issues, we first select a subset of articles that are essentially the same, according to their top-score, when they enter the top-ranking of Hacker News. Specifically, we only consider articles that enter the top-ranking with exactly 3 upvotes and within 30 minutes of submission to Hacker News. Since these articles have roughly the same top-score, the variation in initial position is determined by the scores and ages of the other articles in the ranking. Hacker News breaks its ranking into different pages by every 30 positions. Figure 1 shows a box plot of the final score of articles, where articles are grouped by the initial page that they appear on. The median score of articles that initially appear on the first page is 35 versus 5 and 4 for the second and third page. The mean scores are 57, 20, and 4. After adding controls for time and day of submission and running a linear regression, we find that articles that initially appear on the front page receive 57 more upvotes on average. The reason for this difference is fairly simple. A small fraction of Hacker News users look at the second page, so stories that start there never have a chance to gain many votes. This is just one example of a dynamic that could po- tentially distort the relationship between quality and popu- larity. 5 Model In this section we present and evaluate our method for esti- mating article quality. As discussed in the introduction, our measure of intrinsic article quality is the score an article would have received if voting were conducted in a bias-free an age term to account for such effects. aget i is the time dif- ference (in hours) between the time of observation and the submission time of article i. Both Reddit and Hacker News display the current score of each article, which gives a signal about the article. Prior work (Hogg and Lerman 2014), (Muchnik, Aral, and Taylor 2013),(Krumme et al. 2012), (Salganik, Dodds, and Watts 2006) shows these signals can have significant effects on user viewing and voting behavior. We add a term for score effects but first apply a log transformation to scores to ac- count for the large disparities in scores on Reddit and Hacker News. Let St i be the score of article i at time t. The full model is: i )}) i ∼ Poisson(exp{pt vt In summary, the full model estimates an article quality effect qi for each article, a position bias effect pj for each position, a time decay effect βage, and a score effect βscore. We use the StatsModels python module4 to implement the poisson regression, with the L-BFGS method to optimize the likelihood function (Nocedal 1980). i + qi + βage · aget i + βscore · log(St 6 Evaluation Unfortunately we lack the ability to evaluate our estimates against ground truth from Reddit or Hacker News. Instead we validate the model in two different ways. First we ap- ply this model to data from the MusicLab experiments (Sal- ganik, Dodds, and Watts 2006) and compare against the ground truth estimates from that experiment. We find that the poisson regression recovers accurate estimates of the ground truth quality data. Second we show the poisson model has good explanatory power for the Reddit and Hacker News data, even when evaluated on out-of-sample data during cross-validation. 6.1 MusicLab Participants in the MusicLab experiment (Salganik, Dodds, and Watts 2006) were shown a list of unknown songs that they could listen to and download. When participants en- tered the website, they were assigned to 1 of 9 different worlds. In the first 8 worlds, songs were ordered by the number of downloads the song received within that world (the download count was also displayed to users). In the 9th world, songs were shown in a random order to each user and the current download count was not displayed. We use this data to assess the accuracy of the poisson re- gression method. We use data from the first 8 worlds, the ones which were ranked by popularity and subject to social influence, to estimate the number of downloads of each song in the random world. We fit the following model: i ∼ Poisson(exp{qi + pt,w dt,w i + βsocial · Dt,w i }) i Where dt,w is an indicator variable for whether the tth user in world w downloaded song i, pt,w i was the position that song i appeared in for that user, and Dt,w is the number of downloads of song i in world w when user t visited. We i 4http://statsmodels.sourceforge.net then use the fitted parameters to predict the expected down- loads of each song in the randomly-ordered world: T(cid:88) t=1 D9 i = exp{qi + pt,9 i } The score term is removed because current downloads were not displayed in the random world. These predicted values are compared against the actual number of downloads, D9 i , in figure 2a. Although the predicted number of downloads underestimates the true downloads, it predicts the data very well up to that scalar factor. If we were to scale the download counts, the data would tightly fit the y = x line. 6.2 Reddit and Hacker News We now test how well this model predicts the time-series data from Reddit and Hacker News. For each site, the pre- dicted number of votes for each observation is the condi- tional mean of the poisson distribution, i.e., i + βage · aget i + βscore · log(St i )} i = exp{qi + pt vt For Reddit this only predicts the number of votes on an article, not the increase in score. We can directly estimate an article’s probability of getting an upvote conditional on the article receiving any vote by the fraction of upvotes to total votes. The unconditional rate of upvoting is the rate of voting times the conditional upvote probability, and the predicted growth in score is just the upvote rate minus the downvote rate. Let rup be the observed ratio of upvotes to i total vote for article i and rdown be the ratio of downvotes. The predicted growth in score for article i at time t is: i st i = vt i · (rup i − rdown i ) We evaluate the accuracy of predictions using the coeffi- cient of determination (R2 value), mean absolute error, and mean squared error. In addition to reporting the accuracy on the in-sample data, we run a 5-fold cross-validation and re- port prediction accuracy on the out-of-sample data points. 6.3 Results The results are shown in table 1. The model performs well for both in-sample and out-of-sample prediction, capturing between 50% and 80% of the variance in the voting data. To visualize the prediction, we plot observed scores versus predicted scores for out-of-sample data points from r/pics in figure 2b. Each data point represents the estimated and observed value for the difference in upvotes and downvotes that article received in a 10 minute interval. While the fit is reasonably good, the data is over-dispersed. The poisson model assumes that conditional variance is equal to the con- ditional but this doesn’t hold in our data (technically, this is not readable from the plot because we show the score, which is the difference of two poisson variables, but we ver- ified this using the prediction of the pure number of votes as well). While this assumption on the variance isn’t necessary for valid estimate of the maximum likelihood parameters, it suggests that the poisson model can be improved upon. The predictions in table 1 were made using the full pois- son model, i.e. the one that includes terms for time-decay (a) Estimated versus ground truth parame- ters from the MusicLab experiment. Each (x,y) data point represents the actual num- ber of downloads of a song in the ran- dom world versus the predicted number of downloads. (b) Observed versus predicted score values for r/pics (c) Estimated position bias of top 90 positions for Hacker News and select subreddits. Position biases have been normalized such that p1 = 1. r/pics* r/videos r/todayilearned r/news* r/worldnews Hacker News In Sample Predictions Out of Sample Predictions R2 0.76 0.79 0.71 0.56 0.57 0.69 MAE MSE 1.09 7.30 9.62 1.15 22.66 1.75 3.63 1.11 9.10 1.27 0.70 1.82 R2 0.62 (0.01) 0.65 (0.03) 0.61 (0.03) 0.57 (0.01) 0.52 (0.01) 0.65 (0.01) MAE 1.14 (0.01) 1.22 (0.01) 1.85 (0.02) 1.14 (0.01) 1.32 (0.01) 0.74 (0.01) Figure 2 MSE 8.51 (0.40) 13.64 (2.59) 32.24 (3.74) 3.87 (0.18) 10.65 (1.17) 2.08 (0.11) Table 1: Accuracy metrics for the full Poisson model. In sample value are trained on and predicted for the same dataset. Out-of-sample are trained on a train set and pre- dicted for a test over 5 fold cross-validation. and score effects. Table 2 shows the average cross-validated R2 values for the base poisson model, the model with just a time-decay factor, and the full model. In most cases, gains in accuracy are driven primarily by the addition of the time- decay factor but the score effects do help. We use the full model to estimate article quality except for r/news and r/pics. The values for position bias in the full poisson model be- haved oddly in those two cases; the resulting estimates im- plied that positions 200 to 300 received more views than the top 50 positions. It seems that the position bias for those top 50 positions were “pushed” into the score parameter. Although the full model was marginally more accurate, we chose to drop the score term for those two datasets because of this unintuitive behavior. 7 Analysis We first use these estimates to quantify position bias on Red- dit and Hacker News. Figure 2c shows the relative view rates for the top 90 positions. We only show data for two subred- dits but the trends hold on each subreddit studied. The rela- tive view rate for position j by is computed by exponentiat- ing the fitted pj parameter from the poisson regression and r/pics∗ r/news∗ r/worldnews r/todayilearned r/videos Hacker News Base Base + Time 0.56 0.53 0.51 0.61 0.63 0.51 0.58 0.55 0.51 0.59 0.58 0.63 Full 0.62 0.59 0.52 0.61 0.65 0.65 Table 2: Average R2 values over cross-fold validation for the three models. The starred subreddits indicate that the full model is not used for quality estimation because of bad fitted values for position effects. scaling so the maximum view rate in a subreddit is equal to 1. The curve for each subreddit begins at position 5 be- cause we discard observations from the top 5 positions of each subreddit (see the appendix for the reasoning behind this). Each dataset shows an exponential decline in view rate but Hacker News has a particularly sharp drop at its page break (position 30 to 31), whereas the subreddits display a smoother decline. The general shape of position bias is con- sistent with estimates from other platforms (Krumme et al. 2012),(Lerman and Hogg 2014). 7.1 Quality and Popularity We now measure the relationship between estimated qual- ity and popularity on Reddit and Hacker News. An article’s quality is defined as the the expected score article i would re- ceive if all articles in that subreddit were shown to the same number of users. For convenience, we also scale qualities such that the maximum quality article in a given subreddit is equal to 1. Given the fitted qi parameters from the poisson model, the estimated quality for a Hacker News article is: Qi = eqi maxj eqj For Reddit, estimated quality is: eqi · (rup Qi = maxj eqj · (rup i − rdown ) j − rdown j i ) is the observed fraction of upvotes to total votes where rup i by article i (rdown i defined similarly). Figures 3a,3b, and 3c show a few examples of the rela- tionship between quality and score. Hacker News, shown in figure 3a has the highest correlation between score and quality, while r/news, shown in figure 3b, has one of the weakest relationships. Figure 3c shows the relationship for all subreddits. In order to compress everything into one plot, we use the quantile of article quality (an article with a quantile of .75 has a higher quality than 75% of other ar- ticles in the same subreddit). Second, we log-transform the scores of each article, and then scale by the maximum log- transformed score within the subreddit. The relationship between quality and popularity is con- sistent with expectations from the MusicLab experiments. Popularity is generally increasing with quality but articles of similar quality can have large differences in popularity. However we find that there are few instances of a mediocre quality article becoming one of the most popular articles in a subreddit, and few instances of high quality articles ending up with low scores. In general, the relationship between pop- ularity and quality is stronger on Reddit and Hacker News than the MusicLab experiment. The first column of table 3 lists the spearman correlation coefficients between quality and popularity. Hacker News has the strongest relationship with a correlation of .8 and r/worldnews has the weakest with a correlation of .54. (cid:80) t exp{pt We had initially expected the quality-popularity relation- ship to be weaker on Hacker News than Reddit because of the lack of the downvote. Our theory was that a low qual- ity article that made it to the front page of Hacker News would remain for a long time and get popular because there was no ability to downvote it off. This theory is partially true; the second column in table 3 shows the relationship between quality and total views. We estimate total views by i}, i.e. the sum of position biases for the positions that article i appeared in during its lifetime. The relationship between total views on Hacker News is much weaker than on Reddit, indicating that lower quality articles are being seen comparatively more often on Hacker News. However this did not translate to a weakened quality-popularity rela- tionship as we had expected. 7.2 Discussion There is one important caveat to these results. Many arti- cles submitted to Reddit and Hacker News fail to gain any votes and quickly disappear. For example, there were 5000 articles submitted to Hacker News over the period of obser- vation but only 1500 of them even made it to the top ranking. These ignored articles did not generate enough observations Hacker News r/todayilearned r/videos r/worldnews r/news r/pics MusicLab Score Views .80 .75 .63 .54 .59 .63 .57 0.49 0.81 0.70 0.70 0.75 0.77 0.35 Table 3: Spearman correlation between estimated quality and observed score, and quality and estimated views. to be included in our dataset. So when we state that the re- lationship between quality and popularity is fairly strong, we must interpret that as only being among a set of arti- cles that received at least a reasonable amount of attention. In the Reddit dataset, the median article received 38 votes (upvotes plus downvotes), while the median Hacker News article received 21 votes, with a minimum of 3 votes in each case. Its likely there are a number of high quality articles that were discarded from this study because they didn’t generate enough observations. Developing methods to handle these cases is an interesting direction for future work. With this caveat in mind, these results imply that relative popularity is a good indicator of relative quality among arti- cles that received a reasonable amount of attention. We now return to the thought experiment proposed in the introduc- tion: If we asked a large number of people to vote on every music video on Youtube, how would “Gangnam Style” fare in that election? Based off of this work, we expect that it would rank higher than most other highly-watched videos. However its completely possible, and perhaps even likely, that a relatively unknown video would claim the top spot. 8 Reposts As discussed in the last section, many articles on Reddit or Hacker News go almost completely ignored. A recent esti- mate shows that over half of links on Reddit receive at most 1 upvote (Olson 2015). The work of Gilbert (2013) shows that it isn’t because this content is necessarily bad; Gilbert finds that over half of popular images on Reddit were sub- mitted and ignored a few times before they became popular. It seems problematic for Reddit’s role as an aggregator of the most interesting content on the web. One subtle point of (Gilbert 2013) is that those images eventually became popular, even if it took a few reposts. Al- though Reddit’s voting mechanism failed to popularize some good content, the reposting behavior of Redditors corrected this failure. In this section we briefly explore the role of re- posts in popularizing good content on Reddit. We find evi- dence that the number of reposts of an article is positively correlated with it’s quality. Unfortunately we cannot use the methods from previous sections to estimate quality be- cause the scope of our time-series data is too limited to cap- ture much reposting behavior. Instead we limit ourselves to Youtube videos submitted to Reddit and use Youtube views as a proxy for quality. (a) Observed popularity versus estimated qual- ity for Hacker News. X-axis is truncated for vi- sualization purposes but only a few data points were omitted. (b) Observed popularity versus estimated qual- ity for r/news (c) Popularity versus quality for all subred- dits. Scores are first log-transformed and then scaled by the maximum score in the subreddit. Qualities are measured by quantile. Figure 3: A sample of popularity versus estimated quality plots for Hacker News and Reddit. We study all videos that were uploaded to Youtube and submitted to r/videos in 2012. We’re left with a set of 61,110 unique videos after removing videos we were unable to re- trieve metadata for. These videos were submitted a total of 91,841 times to Reddit; 11,297 of these videos were sub- mitted multiple times, generating a total of 42,028 reposts to Reddit. Figure 4a shows a scatter plot of number of posts to Reddit versus Youtube views for each video. There’s a strong positive relationship between views and submissions, suggesting that users submit popular Youtube videos more frequently. Videos with more than 1 million views were sub- mitted twice as often to Reddit; the mean and median num- ber of submissions for all videos are 1.5 and 1 while the mean and median for videos with more than one million views are 3.6 and 2. These reposts are actually responsible for surfacing many Youtube videos that would have gone unnoticed on Reddit otherwise. Figure 4b shows a bar chart of popular posts on r/videos, where popular is defined as being in the top 10% of posts in 2012 as measured by score 5. We further di- vide videos by whether they have more or less than 1 mil- lion Youtube views. Videos are grouped by the number of posts until it became popular on Reddit. Videos in the first bucket were popular on their first submission, videos in the second bucket were popular on their second, etc. This plot demonstrates that only 59% of videos with more 1 million views become popular on their first submission, while 76% of videos with less than 1 million views became popular on their first submission. This difference is likely caused by the fact that more popular videos were submitted more times; we suspect that if videos with less than 1 million views were submitted as often, then these plots would be more equal. This conclusion, that reposts help popularize many videos, is similar to the conclusion of (Gilbert 2013) but our anal- ysis further shows that reposts are particularly instrumental in popularizing videos that are externally popular.6 5This equates to having a score of 23 or greater. 6We cannot rule out the possibility that number of submissions to Reddit is causing a rise in Youtube views but this seems unlikely 9 Conclusion and Future Work This paper tries to understand the relationship between in- trinsic article quality and popularity in social news aggrega- tors. The heart of the problem is estimating parameters from data that allow us to reason counter-factually about the pop- ularity of an article if the voting process were not subject to the large biases that exist in reality. We found that the most popular content on Reddit and Hacker News were, for the most part, higher quality articles than less popular content, which is surprising given the number of confounds on Red- dit and Hacker News. To the best of our knowledge, this is a novel problem within the field of popularity studies. The poisson regression model presented in this paper is an initial approach to quality estimation, and can be improved in many ways. The most immediate is expanding the model to include a richer set of temporal features and social influ- ence related features, such as commenting data. Although the role of social networks is relatively minimized on social news aggregators, we suspect that we could improve predic- tion accuracy on voting data from an article’s early lifetime by incorporating such features. There are a number of limitations to this study, and we outline some of the more technical limitations in section A.1 of the appendix. The main limitation is that our method can- not estimate the quality of a large set of articles because they do not remain in the rankings of Reddit or Hacker News long enough to generate many observations. This highlights the interesting property that early voting has a huge influ- ence on eventual popularity. If an article receives a number of early downvotes, it effectively denies the community the chance to vote on that article. Quantifying the influence of early voters on popularity and its implications is an interest- ing direction for future research. 10 Acknowledgments Thanks to Georgios Zervas and Brian Keegan for many help- ful conversations throughout the course of this work. Thanks given the relative size of Reddit versus Youtube in 2012. (a) Relationship between Youtube views and submis- sions to r/videos in 2012 (b) Videos are grouped by the submission number of their highest scoring submission Figure 4 to participants of the Berkman Center Peer Production read- ing group for their insights on reposting behavior on Reddit. Thanks to Randal Olson for providing data for all Youtube videos submitted to Reddit. All error, typos, and objection- able content are our own. References [Abeliuk et al. 2014] Abeliuk, A.; Berbeglia, G.; Cebrian, M.; and Van Hentenryck, P. 2014. Measuring and optimiz- ing cultural markets. arXiv preprint arXiv:1408.1542. [Arapakis, Cambazoglu, and Lalmas 2014] Arapakis, I.; Cambazoglu, B. B.; and Lalmas, M. 2014. On the feasi- bility of predicting news popularity at cold start. Social Informatics 290–299. [Bakshy et al. 2011] Bakshy, E.; Hofman, J. M.; Mason, W. A.; and Watts, D. J. 2011. Everyone’s an influencer: quantifying influence on twitter. In Proceedings of the fourth ACM international conference on Web search and data min- ing, 65–74. ACM. [Bakshy et al. 2012] Bakshy, E.; Rosenn, I.; Marlow, C.; and Adamic, L. 2012. The role of social networks in infor- mation diffusion. In Proceedings of the 21st international conference on World Wide Web, 519–528. ACM. [Bandari, Asur, and Huberman 2012] Bandari, R.; Asur, S.; and Huberman, B. A. 2012. The pulse of news in social media: Forecasting popularity. In ICWSM. [Chen and Yan 2012] Chen, Y., and Yan, T. W. 2012. Position-normalized click prediction in search advertising. In Proceedings of the 18th ACM SIGKDD international con- ference on Knowledge discovery and data mining, 795–803. ACM. [Cheng et al. 2014] Cheng, J.; Adamic, L.; Dow, P. A.; Kleinberg, J. M.; and Leskovec, J. 2014. Can cascades be predicted? In Proceedings of the 23rd international con- ference on World wide web, 925–936. International World Wide Web Conferences Steering Committee. [Craswell et al. 2008] Craswell, N.; Zoeter, O.; Taylor, M.; and Ramsey, B. 2008. An experimental comparison of click the 31st annual position-bias models. In Proceedings of the 2008 Interna- tional Conference on Web Search and Data Mining, 87–94. ACM. [Dupret and Piwowarski 2008] Dupret, G. E., and Pi- wowarski, B. 2008. A user browsing model to predict In Pro- search engine click data from past observations. ceedings of international ACM SIGIR conference on Research and development in information retrieval, 331–338. ACM. [Friggeri et al. 2014] Friggeri, A.; Adamic, L. A.; Eckles, D.; and Cheng, J. 2014. Rumor cascades. [Gilbert 2013] Gilbert, E. 2013. Widespread underprovision on reddit. In Proceedings of the 2013 conference on Com- puter supported cooperative work, 803–808. ACM. [Gillespie 2011] Gillespie, T. 2011. Our misplaced faith in twitter trends. Salon. [Goel, Watts, and Goldstein 2012] Goel, S.; Watts, D. J.; and Goldstein, D. G. 2012. The structure of online diffusion networks. In Proceedings of the 13th ACM conference on electronic commerce, 623–638. ACM. [Hodas and Lerman 2014] Hodas, N. O., and Lerman, K. 2014. The simple rules of social contagion. Scientific re- ports 4. [Hogg and Lerman 2009] Hogg, T., and Lerman, K. 2009. Stochastic models of user-contributory web sites. ICWSM. [Hogg and Lerman 2014] Hogg, T., and Lerman, K. 2014. Effects of social influence in peer online recommendation. arXiv preprint arXiv:1410.6744. [Krumme et al. 2012] Krumme, C.; Cebrian, M.; Pickard, G.; and Pentland, S. 2012. Quantifying social influence in an online cultural market. PloS one 7(5):e33785. [Lakkaraju, McAuley, and Leskovec 2013] Lakkaraju, H.; McAuley, J. J.; and Leskovec, J. 2013. What’s in a name? understanding the interplay between titles, content, and communities in social media. In ICWSM. [Lampe and Resnick 2004] Lampe, C., and Resnick, P. 2004. Slash (dot) and burn: distributed moderation in a large on- line conversation space. In Proceedings of the SIGCHI con- ference on Human factors in computing systems, 543–550. ACM. [Leavitt and Clark 2014] Leavitt, A., and Clark, J. A. 2014. Upvoting hurricane sandy: event-based news production processes on a social news site. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems, 1495–1504. ACM. [Lerman and Hogg 2010] Lerman, K., and Hogg, T. 2010. Using a model of social dynamics to predict popularity of news. In Proceedings of the 19th international conference on World wide web, 621–630. ACM. [Lerman and Hogg 2014] Lerman, K., and Hogg, T. 2014. Leveraging position bias to improve peer recommendation. PloS one 9(6):e98914. [Muchnik, Aral, and Taylor 2013] Muchnik, L.; Aral, S.; and Taylor, S. J. 2013. Social influence bias: A randomized experiment. Science 341(6146):647–651. [Nocedal 1980] Nocedal, J. 1980. Updating quasi-newton matrices with limited storage. Mathematics of computation 35(151):773–782. [Olson 2015] Olson, R. 2015. Over half of all reddit posts go completely ignored. [Pedregosa et al. 2011] Pedregosa, F.; Varoquaux, G.; Gram- fort, A.; Michel, V.; Thirion, B.; Grisel, O.; Blondel, M.; Prettenhofer, P.; Weiss, R.; Dubourg, V.; Vanderplas, J.; Pas- sos, A.; Cournapeau, D.; Brucher, M.; Perrot, M.; and Duch- esnay, E. 2011. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research 12:2825–2830. [Pinto, Almeida, and Gonc¸alves 2013] Pinto, H.; Almeida, J. M.; and Gonc¸alves, M. A. 2013. Using early view patterns to predict the popularity of youtube videos. In Proceedings of the sixth ACM international conference on Web search and data mining, 365–374. ACM. [Richardson, Dominowska, and Ragno 2007] Richardson, M.; Dominowska, E.; and Ragno, R. 2007. Predicting clicks: estimating the click-through rate for new ads. In Proceedings of the 16th international conference on World Wide Web, 521–530. ACM. [Salganik and Watts 2008] Salganik, M. J., and Watts, D. J. 2008. Leading the herd astray: An experimental study of self-fulfilling prophecies in an artificial cultural market. So- cial Psychology Quarterly 71(4):338–355. [Salganik, Dodds, and Watts 2006] Salganik, M. J.; Dodds, P. S.; and Watts, D. J. 2006. Experimental study of in- equality and unpredictability in an artificial cultural market. science 311(5762):854–856. [Szabo and Huberman 2010] Szabo, G., and Huberman, B. A. 2010. Predicting the popularity of online content. Communications of the ACM 53(8):80–88. A Limitations A.1 Model Limitations One assumption of the model is that the quality of an article is fixed quantity. This assumption is clearly not appropri- ate when the comments on an article fundamentally alter its quality. For example, users of r/AskReddit post discussion questions like “What’s the coolest thing I can buy for under $25?” The quality of such a thread is then highly dependent on the number of comments and quality of the comments themselves on that thread. While it may be possible to con- struct a structured model to capture such effects, the model we present in this paper will not do that. We purposely ex- clude discussion-dedicated subreddits and any post that does not redirect to an article external to Reddit or Hacker News but our data may contain some articles which are primarily just discussion threads. Another way in which this assumption may be problem- atic is that an article may be exposed to different populations of users throughout its lifetime. For example, an article in position 50 in r/news is likely only seen by users who are visiting r/news. However if that post were to reach position 1 in r/news, then it may appear on the front page for all of Reddit, resulting a different population of users voting on it. Our current model implicitly assumes that the population of voters in each case is same. We limit this issue by dis- carding observations of articles when they are likely to have appeared on the front page of Reddit but we do not presume to have eliminated this issue entirely. Finally our model assumes that the position parameters are fixed over time. Obviously there are more people view- ing Reddit or Hacker News on Monday mornings than Sat- urday nights but our model doesn’t take this into account. We attempted to add in such effects but we found that it increased over-fitting without yielding a noticeable gain in model accuracy. Instead then we limit our data to observa- tions of Reddit and Hacker News on weekdays between 6 am and 8 pm EST. We leave it as future work to improve the model to account for such time effects. B Data Issues As with any study, the raw data we collect is noisy and error prone. We address some data integrity concerns below. B.1 Data Granularity One concern is that articles may actually move positions within that time interval, so although our data says that an article appears in slot j, it may actually appear in slot j(cid:48) for a large portion of time. While this problem is unavoidable given the nature of data, we find that the change in the rank- ing of an article between times t and t + 1 is typically quite small. In 50% of our Reddit observations, the position of an article was only a single position away from their previous position, and in 83% of observations were within 5 slots of their previous positions. On Hacker News, over 90% of ob- servations had moved less than 3 slots. B.2 Observation Inclusion Criteria 1. Data must have been observed between 6am and 8pm EST on a weekday. 2. For Reddit, we limit observations to only include posi- tions in a certain range of [pmin, pmax]. pmin is defined to be 5 for all subreddits, except for r/pics where pmin is 15. We do this to avoid observations of an article that also appeared on or near the front page of Reddit. We define pmax to be median of the distribution of article’s initial positions within a subreddit. 3. We discard observations of articles when they are older than 12 hours. Since our model accounts for time decay, this is primarily to reduce the size of the dataset. After 12 hours, over 95% of articles have received over 90% of votes that they will ever receive. 4. After removing data according to the above criteria, we finally discard any article that we don’t have at least 5 observations for. As a final note, collecting voting data at frequent intervals is now considerably more difficult because Reddit has since changed their API. The ratio of upvotes to total votes isn’t available when retrieving information in batch, only when retrieving the information for a single article. So instead of retrieving information about 1000 articles 1 API call, it now requires 1000 API calls. Collecting that information at reg- ular intervals is impossible to do while respecting their rate limits. B.3 Vote Fuzzing In the past Reddit used a practice known as “vote fuzzing” as a measure to combat spam and manipulation. Reddit dis- played the upvotes, downvotes, and score (difference be- tween upvotes and downvotes) but the upvotes and down- votes would each be “fuzzed” by the amount. This keeps the score accurate but changes the ratio of upvotes to to- tal votes and other metrics. As of June 18, 2014 this process was stopped 7. Reddit no longer displays the individual num- ber of upvotes and downvotes, and instead displays the score and the ratio of upvotes to total votes for each article. They claim the ratio and score are fairly accurate. Our data was primarily collected in the periods before the change but we were able to use this change to retroac- tively “de-fuzz” the observed upvotes and downvotes. Since Reddit is now displaying the true score, strue and true ratio τ true, one can easily recover the true number of upvotes and downvotes. We cannot recompute the true values for our time-series data because we can only query retrieve the strue and τ true for articles as they stand right now, not as they were at some time back in May. Instead, we use this information to “re- verse engineer” the vote fuzzing method. We take advantage of the fact that articles on Reddit receive very little activity after a few days of being posted. Thus the state of an arti- cle in our collected data after 48 hours is very close to the state of the article as it would a few months later. In August 2014, we retrieved the current strue, τ true for these articles and used those values to calculate utrue and dtrue. We used this data to train a random forest regres- sor8 to predict on the following to predict utrue using uobs, sobs, robs as features, where (uobs, sobs, robs) are the observed upvotes, score, and upvote ratio at the time we scraped the data. This method is quite accurate (average r2 = .96 with 10 fold cross validation). We then use this regressor to generate the “true” ups and down for all data we collected. We emphasize that while this is not the “true” data, this method is far more accurate than using the “fuzzed” votes Reddit displayed prior to this change. Vote fuzzing appears to have inflated the number of votes ob- served at the upper tail of the distribution. This observa- tion is consistent with anecdotal evidence from Reddit users, moderators, and administrators. 7http://www.reddit.com/28hjga 8We used the implementation from the scikit-learn Python mod- ule (Pedregosa et al. 2011).
1212.6810
1
1212
2012-12-31T02:40:49
Web Analytics for Security Informatics
[ "cs.SI", "physics.soc-ph" ]
An enormous volume of security-relevant information is present on the Web, for instance in the content produced each day by millions of bloggers worldwide, but discovering and making sense of these data is very challenging. This paper considers the problem of exploring and analyzing the Web to realize three fundamental objectives: 1.) security relevant information discovery; 2.) target situational awareness, typically by making (near) real-time inferences concerning events and activities from available observations; and 3.) predictive analysis, to include providing early warning for crises and forming predictions regarding likely outcomes of emerging issues and contemplated interventions. The proposed approach involves collecting and integrating three types of Web data, textual, relational, and temporal, to perform assessments and generate insights that would be difficult or impossible to obtain using standard methods. We demonstrate the efficacy of the framework by summarizing a number of successful real-world deployments of the methodology.
cs.SI
cs
Web Analytics for Security Informatics Kristin Glass New Mexico Institute of Mining and Technology Socorro, NM USA [email protected] Abstract—An enormous volume of security-relevant information is present on the Web, for instance in the content produced each day by millions of bloggers worldwide, but discovering and mak- ing sense of these data is very challenging. This paper considers the problem of exploring and analyzing the Web to realize three fundamental objectives: 1.) security-relevant information discov- ery; 2.) target situational awareness, typically by making (near) real-time inferences concerning events and activities from avail- able observations; and 3.) predictive analysis, to include providing early warning for crises and forming predictions regarding likely outcomes of emerging issues and contemplated interventions. The proposed approach involves collecting and integrating three types of Web data – textual, relational, and temporal – to perform as- sessments and generate insights that would be difficult or impos- sible to obtain using standard methods. We demonstrate the effi- cacy of the framework by summarizing a number of successful real-world deployments of the methodology. Keywords—-Web analysis, security informatics, network analysis, text analysis, supervised/unsupervised learning, predictive analysis. I. INTRODUCTION There is increasing recognition that Web data, such as webpage content, dialog threads between forum participants, and rela- tionships in social networking sites, are important sources of information for intelligence and security applications [e.g. 1-5]. For instance, vast volumes of security-relevant information are generated each day by bloggers and other content producers worldwide, thereby providing an essentially real-time view of the opinions, activities, and trends of individuals and groups across the globe. These data may, for instance, allow early de- tection of emerging issues and trends in populations of interest, which could be of considerable value [e.g. 6]. For example, contentious situations are much easier to resolve if discovered in their early stages, while nascent positive sentiments and ac- tivities can often be leveraged and amplified. Of course, these security-relevant data are buried in the massive output of mil- lions of online content generators, so that discovering and in- terpreting this information rapidly enough to be useful is very difficult. Recognizing both the opportunities and challenges associ- ated with analyzing Web data for security applications, several researchers have studied this problem in recent years [1-11]. One interesting theme is the assessment and characterization of the ways in which the Web is used by jihadists, criminals, ex- tremists, and others of interest to security professionals [e.g. 2,3,7-9]; indeed, a key motivation for Web-based security in- formatics is the active online presence of these individuals and groups. Other researchers have focused on the problem of iden- Richard Colbaugh Sandia National Laboratories Albuquerque, NM USA [email protected] tifying, extracting, and understanding security-relevant infor- mation at Web-scale, and have developed collection and analy- sis tools which hold considerable promise [1,4,5,10,11]. Not surprisingly, other application domains face similar challenges when attempting to make sense of Web data. As one example, the burgeoning field of Web-based business informatics is re- ceiving substantial attention from both researchers [12-14] and practitioners [15,16]. Despite much progress by security informatics researchers and analysts, important open problems remain. For instance, although a defining feature of Web data is the simultaneous presence of textual, relational, and temporal information, little has been done to develop methods for systematically integrat- ing and exploiting these complementary data classes. Addition- ally, many of the techniques currently available are not well- suited for Web-scale analysis, which may involve tens or hun- dreds of millions of entities and relationships. Another concern is the fact that analytic tools intended to answer security-related questions, say related to deceptive behavior, are often borrowed from domains with quite different operational characteristics (e.g., in which intentional deception is uncommon). Perhaps most importantly, the rich temporal information present online offers the potential to perform predictive analysis, for example permitting emerging threats to be anticipated and mitigated proactively [17]; however, little has been done to rigorously investigate this exciting possibility. This paper addresses the general problem of Web-based se- curity informatics, and the specific challenges noted above, by proposing a computational framework for exploring and ana- lyzing the Web to realize three fundamental objectives: 1.) dis- covery of security-relevant data and information (e.g., uncover- ing forums devoted to extremist ideologies or detecting grow- ing unrest in populations of interest); 2.) target situational awareness, typically by making near real-time inferences about phenomena of interest based on indirectly-related observables; and 3.) predictive analysis, to include giving early warning for conflicts and crises and forming predictions concerning likely outcomes of emerging issues and contemplated interventions. The proposed approach collects and integrates three types of Web data – textual, relational, and temporal – to perform as- sessments, generate insights, and provide decision support that would be difficult or impossible using standard analytics. We demonstrate the efficacy of the analysis methodology through a series of real-world examples, including studies involving de- tection of cyber incidents in near real-time, estimation of public opinion in contentious situations, discovery of emerging topics and trends, and early warning analysis for mobilization and protest events. Figure 1. Schematic of basic Web analytics process. II. WEB ANALYTICS FRAMEWORK A simple schematic of the proposed Web analytics framework is shown in Figure 1. This system is designed to overcome the challenges associated with extracting actionable intelligence from massive, networked, dynamic, and noisy Web data. The analysis framework consists of three main capabilities: 1.) data collection/preprocessing, 2.) computational analysis, and 3.) user interaction. In this section we briefly summarize each of the process elements and the way they work together, and high- light a few of the interesting aspects of the framework. Addi- tional details regarding the system architecture and the data collection process can be found in [18,19], and further discus- sion of the computational analysis and user interaction compo- nents are given later in this paper. The overall process flow is fairly typical. The data collec- tion system, called CACTUS [18], first “crawls” the Web, har- vesting textual data (e.g. the content of webpages), relational data (e.g. the way individuals are linked within a social net- working site), and temporal data (e.g. the timestamps of posts to a blog). These data are then preprocessed to enable subse- quent automated and manual analysis. The collection and pre- processing steps include both “standard” and “advanced” fea- tures. Standard capabilities available in CACTUS include: 1.) efficient and effective (e.g. threaded, throttled) crawling of web pages, blogs, and forums, based on both site-list seeding and (boolean) key word queries; 2.) fast indexing of collected data to support querying, analyst “drill-down”, and advanced com- putational analysis; and 3.) standard wrapping and parsing tools to allow extraction of content, metadata, relational data, and temporal information. CACTUS also provides three advanced features: 1.) it can collect and process information from several specific, security-relevant social media sites (e.g. YouTube, Twitter); 2.) collected data is encoded and archived as time series of semantic graphs (i.e., graphs with a rich set of ver- tex/edge types and attributes [20]); and 3.) data collection is guided by our predictability assessment framework [21,22], thereby substantially increasing the relevance and usefulness of the harvested data. Once data have been collected and encoded as time series of semantic graphs, computational analysis can begin. The ana- lytic process integrates and analyzes textual, relational, and temporal data within a scalable, mathematically-rigorous, and empirically-grounded framework. As shown in Figure 1, the computational analysis phase has three main objectives: 1.) discovery of data/information sources, 2.) situational aware- ness, and 3.) predictive analysis. In the subsequent sections of the paper we define each of these objectives more precisely, describe the analytic approaches we’ve developed to accom- plish them, present a sampling of tools and methods which illustrate some of the ways the approaches have been imple- mented, and discuss case studies in which the analytic tools have been deployed in real-world settings. A key function of the proposed analytic framework is to enable productive and convenient analyst interaction. Thus, for instance, the CACTUS data collection and preprocessing sys- tem possesses an automated crawl summarization capability which presents to the user an intuitively accessible synopsis and characterization of a given Web crawl. Example capabili- ties include: 1.) organizing and displaying the results of a com- pleted crawl according to various Web-graph layouts, 2.) sum- marizing the link structures and the geographic and lexical pro- files of individual sites, related communities of sites, and the entire collection of crawled and collected sites, and 3.) support for analyst-directed exploration and drill-down investigations. Indeed, a central feature of both the data collection and compu- tational analysis elements is the presence of numerous “hooks” that facilitate analyst-driven, iterative discovery and investiga- tion. We conclude this section by offering a sample of some key security informatics questions that we believe Web analytics can impact in important ways and which will serve as motiva- tion for much of our development.  Given an initial set of useful data sources in a particular domain (e.g. extremist blogs), what are additional data sources which are also relevant to the domain?  Do there exist unknown but compelling new proliferation threats in a specified weapons domain (e.g. technologies, people)? Are there developing but presently unrecognized issues which are likely to become contentious?  What is the sentiment of a given population concerning a particular topic? What is the associated trend?  Who are the influential individuals and groups in a given domain? What are authoritative sources of information?  Are the objectives of a given organization or institute what is claimed? What would be useful indicators that these ob- jectives are changing?  Who are the collaborators of a given individual or group? What are the plans and intentions of this collaboration?  What are emerging topics and trends that will become im- portant in the near term? In the longer term?  How is a given threat situation likely to evolve? What would be the associated consequences? What are the likely effects of various intervention options?  How can we move from a reactive to a proactive posture with respect to a given adversary or threat? III. DISCOVERY This section begins by defining the classes of discovery ques- tions of interest, then summarizes the proposed approach to conducting Web-based discovery, and finally briefly describes an implementation of one useful discovery tool: dynamic se- mantic graph analysis via tensor decomposition. A. Proposed Approach Motivated by the kinds of questions faced by intelligence and security analysts, we are primarily interested in two classes of discovery problems: 1.) “seeded” discovery – roughly, given an initial set of examples of things of interest (e.g. events, enti- ties), find more of these things, and 2.) “unknown-unknowns” discovery – uncover classes of activities and entities that pose a plausible threat and which analysts aren’t even aware exist. For Web-based seeded discovery, it is assumed that the ex- amples of things of interest are Web objects, for instance web- pages, blog posts, forum threads, or trends of various kinds. In what follows, we focus on applications for which the seeds are websites (e.g. blogs, forums); other possibilities are considered in [18-20]. In this case, the exemplar websites can serve as seeds from which to launch Web crawls, and the discovery problem can be formulated as one of collecting large numbers of websites and assessing the extent to which each of the new sites is “similar” to the initial seeds [18-20]. While there are numerous ways to measure the similarity of a pair of websites, we have found three simple techniques to be effective in secu- rity informatics applications. First, one can measure similarity with respect to content. One useful approach is to begin by representing the content of each website (or subset of the site’s pages) as a “bag-of-words” feature vector xV, where the entries of x are the frequencies with which the words in the vocabulary set V appear in the pages(s) (perhaps normalized in some way). Then one can em- ploy a range of standard metrics, such as cosine similarity or Jaccard similarity [19], or more Web-specific measures [e.g. 23], to quantify the similarity of candidate site to the seed sites. Newly discovered sites which exceed some desired similarity threshold are then returned to the analyst for additional study. The second method we use to identify websites which are “like” the seeds is to focus on (hyperlink) topological similar- ity. Again there are several metrics which can be adopted to quantify the similarity of a pair of websites, such as set similar- ity of the out-link or in-link neighborhoods of the two sites [19]. Alternatively, we have found that partitioning the web- graph obtained via crawling into graph communities (densely interconnected groups of websites which are only loosely con- nected to other groups [24]), enables effective evaluation of site similarity: similar sites often belong to identical, or closely related, communities [19]. Once topological similarity has been quantified, new sites which are “similar enough” to the seeds are returned to the analyst for further investigation. Finally, we have found it useful to combine textual and re- lational information when measuring the similarity of a pair of websites. For instance, assuming that the content and local hy- perlink topology of the two websites are modeled as semantic graphs, these graph models can be transformed into tensor models (see the discussion of the case study later in the section for a description of this transformation procedure). Once the content and topological data for each website have been en- coded as tensors, their similarity can be quantified via the Fro- benius tensor norm [e.g. 25]. Alternatively, the tensor models for the seeds, and for randomly selected sites, can be used to train machine learning algorithms [e.g. 26] that classify new websites as either ‘similar to’ or ‘different from’ the seeds. It is worth noting that the three techniques summarized above, al- though simple, have been successfully implemented for seeded discovery of new extremist websites [18,19]. The second class of discovery tasks of interest in this paper are “unknown-unknowns” problems: uncover activities, events, groups, trends, and so on which are both relevant to security analysts and presently unknown to them. It is natural to formu- late such discovery problems in terms of anomaly detection. In particular, we have obtained good results by posing these ques- tions as structured anomaly detection, that is, anomaly detec- tion which leverages an understanding of the properties and characteristics of the Web [20]. As a simple but illustrative real-world example, consider the task of discovering a scien- tific or technological innovation which could pose a plausible threat. Because there exists a large quantity of information on the Web which has little or no scientific validity, it is necessary to develop methods capable of discovering anomalous (i.e., new) and technically-correct information. One approach to addressing this challenge is to search for scientific concepts on the Web which are treated as interesting and legitimate by one authoritative organization but not by other such organizations. The rationale for this simple scheme is that such behavior may reveal a technically sound idea which is not generally acknowl- edged, perhaps because it is new or it represents a threat and is thus treated as sensitive information. We have successfully applied this basic anomaly detection methodology to weapons development and proliferation problems [20]. It seems clear that in order to consistently return good an- swers to unknown-unknowns questions, it is necessary to com- bine computational methods with manual analysis in an inter- active, iterative process. We have found the automated crawl summarization capability in CACTUS often provides a conven- ient starting point for this process, as it displays security- relevant information obtained during the crawl in an intuitively accessible format [18]. Additionally, adopting a semantic graph formalism as the underlying data model tends to increase the efficiency and effectiveness of the user interaction, for instance by supporting informative data visualizations and enabling intuitive drill-down analysis [19,20]. B. Case Study: Tensor Analysis In this subsection we illustrate, through a case study, an ef- fective and efficient method for discovering and characterizing security-relevant events in large data sets associate with net- work dynamics. The proposed approach models the data as a three-way tensor, that is, a three-dimensional array in which each “slice” of the tensor represents network activity during a particular time interval [25]; see Figure 2 for a depiction of the basic structure. Significant events are then uncovering by ex- amining low-rank approximations to this tensor using a proce- dure analogous to familiar singular value decomposition analy- VP VP VP VP time time time time AS AS AS AS VP VP VP time time time . . . . . . . . . sis of matrices [26]. The specific network dynamics discovery problem we study here involves the detection and localization of large Internet disruptions using data which can be collected from the Web. However, it should be clear that the proposed analytic process is applicable to a wide range of network dy- namics discovery tasks. It is worth noting that tensor models employed in this case study can be productively viewed as al- ternative representations of semantic graphs [e.g. 20]. AS AS AS Figure 2. Cartoon of tensor decomposition. The original BGP update tensor is factored into a sum of rank-one tensors, each of which is an outer product of three vectors: an AS profile, an update stream vector, and a VP profile. The most dominant few rank-one tensors typically correspond to “large” events. There is substantial motivation to develop a method for dis- covering large Internet disruptions and locating the “source” of each disruption, that is, identifying the network elements whose perturbation is the “root cause” of the event. But detecting and locating large, disruptive Internet events is a challenging dis- covery problem for at least three reasons. First, the Internet is a complex dynamical system which is very large (e.g., consisting of over 25,000 autonomous systems (AS) and millions of hosts) and about which there is significant uncertainty (e.g., because many operational characteristics are considered pro- prietary). Second, data sets associated with Internet behavior are massive, noisy, and give only an incomplete picture of events of interest. Finally, the events themselves are difficult to understand and characterize, for example because of their im- mense number, wide heterogeneity, significant area of impact, and evolving nature. We present in [27] a new approach to detecting and locat- ing large Internet events which addresses these challenges. The proposed methodology consists of three steps: data collec- tion, event detection, and logical localization. Data collection involves acquiring Border Gateway Protocol (BGP) route up- date data by crawling the RIPE website [28] and assembling these data into an analytically-tractable format. Note that RIPE maintains BGP peering sessions with several Internet routers and logs the updates they receive, so that these data provide views of Internet activity from numerous vantage points (VP). Event detection is accomplished via tensor decomposition- based analysis of BGP time series. We model the Internet as a graph at the AS level, GAS = (VAS, EAS), where each vertex v  VAS is an AS (collection of connected routing prefixes that pre- sents a common routing policy to the Internet) and an edge e = (v, v)EAS reflects the fact that routing policy allows traffic to be sent directly from v to v. The dynamics of GAS are governed by BGP, the protocol by which neighboring routers keep each other apprised of changes in prefix reachability. BP update data is used to assemble an update tensor X by first specifying a sampling period t (e.g., t=30s), an obser- vation interval T·t (e.g., T=2880, which with t=30s gives an interval of 1 day), and a set VP = {v1, …, vo} of VP. The BGP update streams harvested from RIPE are processed to identify 1.) the set of prefixes Q = {q1, …, qp} for which at least one update is observed at some vVP during T·t; and 2.) the set of associated AS A = {a1, …, am} (i.e., the domains for the qQ). The update tensor X can then be assembled by defining tensor element xijk to be the number of updates associated with prefixes in AS ai observed during sampling period j by VP vk. v x2 v… The VP “slices” of X are therefore matrices Xv=[x1 v]T mT, where xi vT is the update stream involving AS xm ai seen at VP v during the observation interval. Discovering large Internet disruptions involves identifying, for each event, its time of occurrence, affected AS, and ob- serving VP. This discovery is performed by expressing the update tensor X as a sum of rank-one tensors via PARAFAC decomposition [25] and then approximating X by retaining only the first few terms in the rank-one tensor series. The ap- proximation, denoted Xapprox, is a low rank tensor which ac- counts for most of the variation in the update streams and thus retains any large events. Consequently, examining Xapprox en- ables large events to be distinguished from the background “noise” associated with normal Internet rerouting activity. Moreover, because Xapprox is expressed in terms of bases for the vector spaces of AS profiles, update streams, and VP pro- files, the components of Xapprox allow direct identification of the AS, times, and VP that “participate” in the detected (large) events (see Figure 2). Consider an Internet disruption r discovered through ten- sor-based analysis and the set of AS-VP pairs (ASr, VPr) asso- ciated with this event. In order to locate the network compo- nents causing the disruption, we interpret these AS-VP pairs as sets of “end-points” associated with the event and conduct a kind of graph-based “tomographic analysis” [27]. More spe- cifically, for a detected event r, we 1.) label the sets (ASr, VPr) on the AS graph GAS; 2.) for each vVAS, compute the be- tweenness [29] of v with respect to the sets ASr and VPr (i.e., the betweenness based on all pairs of vertices (ASr, VPr)); and 3.) arrange the AS in decreasing order of vertex betweenness. The list of AS generated by this procedure forms the (ordered) set of candidate event-causing AS. This case study illustrates one approach to security-relevant discovery of network dynamics events and offers a principled, automated method for detecting and locating large Internet disruptions. The tensor and graph analysis algorithms are effi- cient enough to permit implementation at Internet scale in near real-time. Useful insights are generated throughout the analytic process, allowing enhanced utility and flexibility. Additional details regarding algorithm development, implementation, and testing are given in [27]. It is worth mentioning that the pro- posed tensor-based discovery technique has been successfully applied to several real world events, including the Internet im- pact of the series of Taiwan earthquakes that occurred in De- cember 2006. IV. SITUATIONAL AWARENESS In this section we first define the class of situational awareness (SA) questions of interest, then summarize the proposed Web- based approach to obtaining SA, and finally briefly illustrate our methodology with a case study involving the estimation of public sentiment via analysis of social media content. A. Proposed Approach Many security informatics questions are, at their core, SA problems. For instance, we often wish to know a population’s sentiment concerning a situation or how an adversary is fram- ing an issue, as such information helps us to interpret and ex- trapolate the actions and behaviors of individuals and groups [30]. It is also of interest to identify influential members of a group and authoritative sources of information in a domain, and to recognize collaborating individuals and groups. Addition- ally, as clandestine behavior is a central concern, it is useful to have capabilities for detecting and defeating deception in its various forms. A common theme in all of these SA problems is the need to make accurate assessments in situations with lim- ited opportunities for observation. Consequently, forming in- ferences from observables which are incomplete and only indi- rectly-related to the phenomenon of interest is a key challenge. For Web-based analysis it is assumed the observables from which SA inferences are to be made are Web objects, and fur- thermore that these objects possess textual, relational, and/or temporal features. Indeed, a distinguishing aspect of the pro- posed SA “toolkit” is that it includes methods for analyzing each of these data classes individually and also for integrating and exploiting them in combination. As an example of a technique for leveraging information present in a single type of data, consider the problem of auto- matically detecting framing rhetoric in the vast volume of Web content generated each day. In [31] we present a simple and effective solution to this problem which consists of three steps: 1.) use the CACTUS system [18] to continually monitor a (po- tentially large) region of the Web of interest (e.g., a collections of blogs and forums, either specified in advance or discovered as in Section III); 2.) represent the collected content using a bag-of-words model; 3.) identify framing rhetoric (e.g., call-to- action frames) using a naïve Bayes classifier trained on a cor- pus of exemplar ‘framing’ and ‘non-framing’ documents. It is shown in [31] that good classification accuracy (>90) can be obtained in this way, in part because the producers of framing content in a given domain typically adopt a distinctive and rec- ognizable lexicon in their rhetoric. Analyzing relational data alone can also yield useful results. We demonstrate in [31] that analyzing hyperlink topology is an effective way to identify the ideology of a given website. More specifically, assume that the SA task of interest is to label web- sites as belonging to one of two ideological positions, say lib- eral or conservative in U.S. politics, perhaps so that these sets of pages can be monitored to maintain awareness of the current interests of each camp. Suppose that two sets of exemplar web- sites are assembled, one for each ideological position, and de- note these sets A and B (constructing such sets is typically straightforward to accomplish). Then a simple technique for determining the ideological position of a new website N is to collect together the websites which hyperlink to N and deter- mine whether these sites hyperlink predominantly to the sites in A or to those in B; N is then classified accordingly. This ap- proach is found to accurately distinguish liberal and conserva- tive political sites [31] and is currently being tested in other domains. Combining content and topology can permit more sophisti- cated analysis. It is demonstrated in [31] through examination of the Enron email corpus [32] that deceptive users can be re- liably identified using a naïve Bayes classifier which takes as inputs both content and topology features. In particular, we find that certain patterns of behavior (e.g., suppression of first- person pronouns in message content, use of ‘bcc’ for certain addressees) are indicators of deceptive communication [31]. Introducing temporal information allows additional prob- lem domains to be addressed. As a simple example, analyzing time series of documents, for instance blog posts or discussion threads, can reveal trends with important security implications [e.g. 6,17,20,31,33]. Interestingly, we have found that combin- ing topological and temporal data associated with email com- munication makes it possible to accurately identify collaborat- ing groups of individuals [31]. The underlying observation is simple: a strong indicator that an exchange of communications reflects a genuine collaboration, rather than say a more formal organization-sanctioned affiliation, is a tendency for collabora- tors to communicate in “bursts” of messages followed by peri- ods of quiet. This pattern can be efficiently recognized by con- sidering time series of who-emails-whom relationships. Integrating and analyzing all three data types – textual, rela- tional, and temporal – enables even more to be done. For ex- ample, consider the task of determining whether a given scien- tific organization is conducting weapons-related research, per- haps in addition to its legitimate work. It is demonstrated in [20] that one useful approach to this problem is to combine and analyze data on the content of the organization’s publications, the co-authorship patterns reflected in these publications, and the way in which publication content and authorship evolves over time. The efficacy of this approach is illustrated in [20] through a study of the Institute of Applied Microbiology in Obolensk, Russia. This assessment indicates that the institute was engaged in bioweapons research during the period 1980- 1992, a finding which matches reports by institute defectors (see, e.g., [20,34] for additional details). Another application which is amenable to analysis that em- ploys all three data types is the identification of influential us- ers in a particular social media domain. In order to make pro- gress it is, of course, necessary to specify what it means for a user to be “influential”; here we adopt the definition that influ- entials are much more likely than typical users to have their content “go viral”, that is, be widely repeated and referenced. Moreover, we require that a putative attribute of influential users have predictive power, so that users which possess this attribute are significantly more likely to produce viral content than are typical users. Recently it has been shown that predic- tive indicators of influence for bloggers include past influence and blog-graph position [6,35], which implies that determining if a given blogger is influential requires data on blog content, blog graph topology, and the temporal order of posts. B. Case Study: Sentiment Analysis In this case study we consider a central problems in Web- based situational awareness: deciding whether a given social media document expresses positive or negative opinion toward a particular topic. The informal nature of social media content poses a challenge for language-based sentiment analysis. While learning-based methods can provide good performance in set- tings like this [36], obtaining the required labeled data, such as a collection of “exemplar” blog posts of known sentiment po- larity, is an expensive and time-consuming undertaking. We present in [33] two new methods for inferring sentiment orientation in social media which address these challenges. In each method, documents are represented as bag-of-words fea- ture vectors xV, where the entries of x are the frequencies with which the words in the vocabulary V appear in the docu- ment. The goal is to learn a vector cV such that the classi- fier orient  sign(cTx) accurately estimates the sentiment orien- tation of document x, returning 1 (1) for documents express- ing positive (negative) sentiment about the topic of interest. Each of the algorithms derived in [33] models the problem data as a bipartite graph Gb of documents/words; the adjacency ma- trix A for graph Gb is  A X0 T 0 X       (1) where the matrix XnV is constructed by stacking the docu- ment vectors as rows, and each ‘0’ is a matrix of zeros. The first algorithm adopts a semi-supervised approach to sentiment classification, combining knowledge of the sentiment polarity for a few documents and a small lexicon of words with information present in a corpus of unlabeled documents (such unlabeled data are readily obtained online). Assume the initial problem data consists of a corpus of n documents, of which nl  n are labeled, and a modest lexicon Vl of sentiment-laden words, and suppose this label information is encoded as vectors dnl and wVl, respectively. Let destn be the vector of estimated sentiment orientations for the documents in the cor- T cT]T  pus, and define the “augmented” classifier caug  [dest nV which estimates the polarity of both documents and words (note that the term caug is introduced for notational con- venience and only the vector c is employed for classification). We wish to learn an augmented classifier caug with the fol- lowing three properties: 1.) if a document is labeled, then the corresponding entry of dest should be close to this 1 label; 2.) if a word appears in the sentiment lexicon, then the correspond- ing entry of c should be close to this 1 sentiment polarity; and 3.) if there is an edge Xij of Gb that connects a document i and a word j and Xij possesses significant weight, then the estimated polarities of i and j should be similar. These objectives can be encoded as a minimization problem: aug T aug Lc  1 V n l l c min   c 1i 1i   aug where L  D  A is the graph Laplacian matrix for Gb, with D the diagonal degree matrix for A (i.e., Dii  j Aij), and 1, 2 (2) )d - i w-  2 ) i (d est,i 2 (c i 2 are nonnegative constants. Minimizing (2) enforces the three properties we seek for caug, with the second and third terms penalizing “errors” in the first two properties. To see that the first term enforces the third property, observe that this expres- sion is a sum of components of the form Xij(dest,i  cj)2. It is shown in [33] that the caug (and thus c) which minimizes (2) can be efficiently computed by solving a sparse set of linear alge- braic equations (e.g., via the Conjugate Gradient method). Con- sequently, the semi-supervised approach is implementable with large-scale problems. The second algorithm proposed in [33] is a novel transfer learning method which permits knowledge present in data that has been previously labeled in a related domain to be trans- ferred to a new domain. Assume the initial problem data con- sists of a corpus of n = nT  nS documents, where nT is the (small) number of labeled documents available for the target domain of interest and nS  nT is the number of labeled docu- ments from some related source domain. In addition, suppose that a modest lexicon Vl of sentiment-laden words is known. Let this label data be encoded as vectors dTnT, dSnS, and wV, respectively. Denote by dT,estnT, dS,estnS, and cVl the vectors of estimated sentiment orientations for the target and source documents and the words, and define the T cT]T  nV. T dT,est augmented classifier as caug  [dS,est We wish to learn an augmented classifier caug with the fol- lowing properties: 1.) if a source document is labeled, then the corresponding entry of dS,est should be close to this 1 label; 2.) if a target document is labeled, then the corresponding entry of dT,est should be close to this 1 label, and the information en- coded in dT should be emphasized relative to that in the labels dS,; 3.) if a word appears in the sentiment lexicon, then the cor- responding entry of c should be close to this 1 sentiment po- larity; and 4.) if there is an edge Xij of Gb that connects a docu- ment i and a word j and Xij possesses significant weight, then the estimated polarities of i and j should be similar. The four objectives listed above may be realized by solving the follow- ing minimization problem: T aug Lc aug   1 d S, est dk - S S 2   2 d estT, dk - TT 2 c min c aug   3 2 w- c (3) where 1, 2, 3, kS, and kT are constants and all other terms are as defined above. Analogously to the semi-supervised case, minimizing (3) enforces the properties we seek for caug. The caug (and thus c) that minimizes (3) can be efficiently computed by solving a sparse set of linear equations. In [33] the utility of the two proposed learning algorithms is demonstrated by showing they outperform several standard methods for the task of sentiment estimation in two commonly- used test corpora: a set of online movie reviews and a collec- tion of consumer product reviews. Additionally, we illustrate the potential of the methods for security informatics applica- tions through a case study in which sentiment analysis of Ara- bic, Indonesian, and Danish language blogs is used to estimate regional public opinion regarding the recent revolution in Egypt. V. PREDICTIVE ANALYSIS Prediction problems, and in particular predictions about social systems, are a central concern in security informatics. In this section we consider predictive analysis of two classes of social processes: group dynamics on networks and adversarial coevo- lution. We begin by offering an approach to prediction which overcomes key deficiencies of standard methods, then briefly review several results obtained by using this approach in Web- based applications, and finally summarize a study involving the prediction of “viral” information diffusion events. A. Proposed Approach Vast resources are devoted to the task of predicting the out- comes of social dynamics, but the quality of such predictions is often quite poor. We show in [21,22] that a fundamental diffi- culty with standard prediction methods is that they do not rig- orously assess problem predictability. As a result, these meth- ods frequently fail to identify measurables that possess predic- tive power, and are therefore unsuccessful because they base their forecasts upon data which are not in fact predictive. We have recently developed a predictive analysis method- ology which addresses this deficiency. Given a question of interest, the proposed analytic procedure begins by determining whether the associated phenomenon is predictable and identify- ing those measurables (if any) that have predictive power. With these issues resolved it then becomes fairly straightforward to pursue prediction questions, for instance involving early warn- ing analysis or the forecasting of likely outcomes. In Web im- plementations, the goal is usually to form predictions about “real-world” events based upon measures of online activity. As a first class of systems of interest, consider social proc- esses in which individuals pay attention to the behavior of oth- ers, for instance to obtain benefits of coordinated action or infer otherwise inaccessible information. One of our most interesting findings in this setting is that those system features commonly believed to be predictive are actually not, while other features, related to a system’s early dynamics, enable useful prediction. More precisely, it is demonstrated in [21] that the social influ- ences at work in collective dynamics processes act to reduce the predictive power of the “intrinsic” attributes of the process (e.g., option quality in social choice situations) and to increase the extent to which outcomes can be predicted based upon very early process dynamics [17,20-22]. For example, it is shown in [21,17,6] that in social diffusion (e.g., of information, behavior, or disease), predictability depends crucially upon the topology of the underlying social network, and in particular on this net- work’s community [24] and core-periphery [37] structures (see Figure 3 and [21,17,6]). We have applied these findings to a broad range of predic- tion problems. For instance, the papers [21,22] investigate sev- eral cultural markets, including those for music and movies. In each market it is found that no measure of a product’s intrinsic quality possesses much predictive power. However, the manner in which very early “buzz” about a product diffuses relative to the community and core/periphery structures of the relevant online networks is strongly predictive of the ultimate success (e.g., market share, revenue) of a given product. Figure 3. Early diffusion within a network’s core and dis- persed across its communities are predictive. The cartoon at top illustrates the basic idea for the core: diffusion initiated with a set of (red) “seeds” is much more likely to propagate widely if these seeds reside within the core (left) rather than at the periphery (right). Cartoon at bottom depicts the basic idea for communities: diffusion initiated with a set of (red) seeds is much more likely to propagate widely if these seeds are dispersed across multiple communities (left) rather than concentrated within one community (right). We have obtained similar results in investigations of more security-relevant questions. The emergence and growth of so- cial and political movements, such as the Swedish Social De- mocratic Party and East German revolution, are examined in [21,17], and it is shown that accurate predictive analysis can be performed by focusing on measures of social network dynam- ics (as opposed to, say, intrinsics like demographics or move- ment appeal). Analogous conclusions hold for the dynamics of technology adoption [20,31] and global epidemics [21,17]. This approach also reveals that reliable early warning for real- world mobilization and protest events can be obtained by moni- toring diffusion of social media discussions, especially the way discussions propagate over online graph communities [17]. A second class of social dynamics of substantial importance in security informatics are those that define adversarial coevo- lution, for example in cyber security, terrorism, border security, counterintelligence, and counterproliferation. There is great interest to develop proactive approaches to competing in these “arms races”, in which future adversary strategies are antici- pated and these insights are incorporated into defense designs. We have recently initiated research in this area, with a focus on cyber security. Perhaps our most interesting finding to date is a mathematically rigorous demonstration that previous attacker actions and defender responses can indeed generate predictive information about future attacker behavior, but only in certain circumstances (see [38] for an example in which such dynam- ics fails to produce exploitable predictive structures). As an illustrative example of what can be done in settings in which coevolution leads to predictability, consider the prob- lem of protecting computer networks against intrusions and other attacks. In [39] we leverage the coevolutionary relation- ship between attackers and defenders to derive two new meth- ods for proactive network defense. The first method is a bipar- tite graph-based transfer learning algorithm that enables infor- mation concerning previous attacks to be “transferred” for ap- plication against novel attacks, thereby substantially increasing the rate with which defense systems can successfully respond to new attacks. The second approach involves exploiting basic threat information (e.g., from cyber security analysts) to gener- ate “synthetic” attack data for use in training defense systems, resulting in network defenses that are effective against both current and (near) future attacks. B. Case Study: Emerging Topics Analysis Discovering and characterizing emerging topics and trends through analysis of Web data is of great interest in both secu- rity-related and non-security domains. Recently the paper [40] proposed that monitoring social media to spot emerging memes – distinctive phrases which act as “tracers” for discrete cultural units – can enable early discovery of new topics and trends, and presented an effective, scalable algorithm for detecting memes. However, a challenge with this method is the fact that the vast majority of online memes attract very little attention, and in most applications we are interested in those memes, and the underlying topics, that reach a nontrivial fraction of a popula- tion of interest. Practical emerging topic discovery therefore requires the ability to identify those memes which will go on to attract substantial attention, and to do so early in the meme lifecycle, as this capability would enable the early detection of significant emerging topics and trends. In [6] we present a new predictive methodology which ex- ploits information about online network topology and dynamics to accurately forecast which memes will propagate widely, appearing in hundreds or thousands of blog posts and/or news items, and which will not. The particular network features used by the prediction algorithm are those identified as likely to be predictive of meme success by our recently developed predict- ability analysis procedure [21]. Interestingly, the metrics nomi- nated by this theoretical analysis turn out to be fairly subtle measures of the network dynamics associated with early meme diffusion. Meme prediction is accomplished with a machine learning algorithm that, based upon very early network dynam- ics, is able to accurately distinguish memes which will ulti- mately diffuse widely from those that will not. Here we briefly indicate the efficacy of the algorithm proposed in [6] through a case study involving detection and analysis of memes associ- ated with an emerging cyber threat. On 27 December 2008 Israel initiated an air strike against the Gaza Strip, triggering outrage in significant portions of the Muslim world. At the time, national security analysts and offi- cials expressed interest in discovering and characterizing social media discussions which called for retaliations against Israel, particularly those involving “influential” individuals and groups. To enable a preliminary investigation along these lines, we wrote a Perl program implementing the meme detection algo- rithm presented in [40] and employed this program to identify memes associated with ‘Israel’ and ‘attack’ in a broad range of languages, including Arabic, English, Farsi, French, German, Indonesian, and Turkish. This data identification and collection effort returned a large number of memes, a few of which were classified by our prediction algorithm as being likely to attract significant attention. Intriguingly, most of the memes predicted to “go viral” involved cyber attacks on Israel, for instance ex- horting Muslim hackers to attack Israeli government and com- mercial web sites. Example memes detected and analyzed in this way include ‘harrased [sic] by Denmark’ and ‘2485 (web)sites’ (the latter meme is a reference to a much repeated claim by one hacker group that it had defaced 2485 Israeli websites). A focused manual examination of the URLs which mention these (and other) memes produced some interesting findings. For example, this analysis led to the discovery of Arabic and Indonesian websites which contain downloadable hacking tools and detailed instructions on the use of these tools. Additionally, we discovered blog posts calling for particular classes of cyber attacks; attacks belonging to these classes were subsequently reported to have taken place by various news agencies. ACKNOWLEDGEMENTS This work was supported by the U.S. Department of Defense, the U.S. Department of Homeland Security, and the Laboratory Directed Research and Development Program at Sandia Na- tional Laboratories. We gratefully acknowledge many helpful discussions on aspects of this work with Max Planck of the New Mexico Institute of Mining and Technology, Darryl Ack- ley of the State of New Mexico, and Jim Gosler, Curtis John- son, and Zach Benz of Sandia National Laboratories. REFERENCES [1] Chen, H., E. Reid, J. Sinai, A. Silke, and B. Ganor (Eds.), Terrorism Informatics, Springer, Berlin, 2008. [2] US Committee on Homeland Security and Government Affairs, Violent Extremism, the Internet, and the Homegrown Terrorism Threat, 2008. [3] Bergin, A., S. Osman, C. Ungerer, and N. Yasin, “Countering Internet Radicalization in Southeast Asia”, ASPI Special Report, March 2009. [4] Chen, H., C. Yang, M. Chau, and S. Li (Editors), Intelligence and Security Informatics, Lecture Notes in Computer Science, Springer, Berlin, 2009. [5] Proc. 2010 IEEE International Conference on Intelligence and Security Informatics, Vancouver, BC, Canada, May 2010. [6] Colbaugh, R. and K. Glass, “Detecting emerging topics and trends via predictive analysis of ‘meme’ dynamics”, Proc. 2011 AAAI Spring Symposium Series, Palo Alto, CA, March 2011. [7] Technical Analysis Group, “Examining the cyber capabilities of Islamic terrorist groups”, Institute for Security Technology Studies, Dartmouth College, 2004. [8] Chen, H., W. Chung, J. Qin, E. Reid, M. Sageman, and G. Weimann, “Uncovering the Dark Web: A case study of jihad on the Web”, J. American Society for Information Science and Technology, Vol. 59, pp. 1347-1359, 2008. [9] Friedland, J. and K. Rogerson, “Literature review: How political and social movements form on the Internet and how they change over time”, Institute for Homeland Security Solutions Report, November 2009. [10] Yang, C. and T. Ng, “Analyzing content development and visualizing social interactions in Web forums”, Proc. 2008 IEEE International Conference on Intelligence and Security Informatics, Taipei, Taiwan, June 2008. [11] Al-Zaidy, R., B. Fung, and A. Youssef, “Towards discovering criminal communities from textual data”, Proc. ACM SAC’11, Taiwan, March 2011. [12] Glance, N., M. Hurst, K. Nigam, M. Siegler, R. Stockton, and T. Tomokiyo, “Deriving marketing intelligence from online discussion”, Proc. 11th ACM International Conference on Knowledge Discovery and Data Mining, Chicago, August 2005. [13] Melville, P., V. Sindhwani, and R. Lawrence, “Social media analytics: Channeling the blogosphere for the power of insight”, Proc. Workshop on Information in marketing Networks, New York, September 2009. [14] Kaplan, A. and M. Haenlein, “Users of the world, unite! The challenges and opportunities of social media”, Business Horizons, Vol. 53, pp. 59-68, 2010. [15] http://www.nielsen.com, accessed January 2010. [16] http://www.buzzlogic.com, accessed January 2010. [17] Colbaugh, R. and K. Glass, “Early warning analysis for social diffusion events”, Proc. 2010 IEEE International Conference on Intelligence and Security Informatics, Vancouver, BC Canada, May 2010. [18] Ackley, D., M. Plank, L. Johnson, and K. Glass, “CACTUS: A Web crawling and indexing tool”, ICASA Technical Report, New Mexico Institute of Mining and Technology, June 2009. [19] Ackley, D., M. Plank, and K. Glass, “JNetDiscovery: A scalable Java toolset for discovery problems”, ICASA Technical Report, New Mexico Institute of Mining and Technology, June 2009. [20] Colbaugh, R., K. Glass, and J. Gosler, “Some intelligence analysis problems and their graph formulations”, Journal of Intelligence Community Research and Development, Paper 315, Permanently available on Intelink, June 2010. [21] Colbaugh, R. and K. Glass, “Predictive analysis for social processes I: Multi-scale hybrid system modeling, and II: Predictability and warning analysis”, Proc. 2009 IEEE Multi- Conference on Systems and Control, Saint Petersburg, Russia, July 2009. [22] Colbaugh, R., K. Glass, and P. Ormerod, “Predictability of ‘unpredictable’ cultural markets”, Proc. 105th Annual Meeting of the American Sociological Association, Atlanta, GA, August 2010. [23] Becker, H., M. Naaman, and L. Gravano, “Learning similarity metrics for event identification in social media”, Proc. ACM International Conference on Web Search and Data Mining, New York, February 2010. [24] Newman, M., “Modularity and community structure in networks”, Proc. National Academy of Sciences USA, Vol. 103, pp. 8577-8582, 2006. [25] Kolda, T. and B. Bader, ”Tensor decompositions and their applications”, SIAM Review, Vol. 51, pp. 455-500, 2009. [26] Hastie, T., R. Tibshirani, and J. Friedman, The Elements of Statistical Learning, Second Edition, Springer, New York, 2009. [27] Glass, K., R. Colbaugh, and M. Planck, “Automatically identifying the sources of large Internet events”, Proc. 2010 IEEE International Conference on Intelligence and Security Informatics, Vancouver, BC Canada, May 2010. [28] “RIPE”, http://data.ris.ripe.net/, accessed January 2011. [29] Jungnickel, D., Graphs, Networks, and Algorithms, Third Ed. Springer, Berlin, 2008. [30] Benford, R. and D. Snow, “Framing processes and social movements: An overview and assessment”, Annual Reviews of Sociology, Vol. 26, pp. 611-639, 2000. [31] Colbaugh, R., D. Engi, K. Glass, R. Laviolette, and J. Spomer, “Transnational Islamic activism and radicalization: Patterns, trends, and predictions”, Sandia National Laboratories Report SAND2009-0325, August 2010. [32] http://www.cs.cmu.edu/~enron/, accessed January 2009. [33] Glass, K. and R. Colbaugh, “Estimating the sentiment of social media content for security informatics applications”, Proc. 2011 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2011. [34] http://www.nature.com/news/2004/040602/full/news040531- 1.html, accessed January 2011. [35] Bakshy, E., J. Hofman, W. Mason, and D. Watts, “Everyone’s an influencer: Quantifying influence on Twitter”, Proc. WSDM ’11, Hong Kong, China, February 2011. [36] Pang, B. and L. Lee, “Opinion mining and sentiment analysis”, Foundations and Trends in Information Retrieval, Vol. 2 , pp. 1- 135, 2008. [37] Carmi, S., S. Havlin, S. Kirkpatrick, Y. Shavitt, and E. Shir, “A model of Internet topology using the k-shell decomposition”, Proc. National Academy of Sciences USA, Vol. 104, pp. 11150- 11154, 2007. [38] Sato, Y., E. Akiyama, and J. Farmer, “Chaos in learning a simple two-person game”, Proc. National Academy of Sciences USA, Vol. 99, pp. 4748-4751, 2002. [39] Colbaugh, R. and K. Glass, “Proactive defense for evolving cyber threats”, Proc. 2011 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2011. [40] Leskovec, J., L. Backstrom, and J. Kleinberg, “Meme-tracking and the dynamics of the news cycle”, Proc. 15th ACM International Conference on Knowledge Discovery and Data Mining, Paris, France, June 2009.
1112.4708
1
1112
2011-12-16T16:55:48
Transformation Networks: How Innovation and the Availability of Technology can Increase Economic Performance
[ "cs.SI" ]
A transformation network describes how one set of resources can be transformed into another via technological processes. Transformation networks in economics are useful because they can highlight areas for future innovations, both in terms of new products, new production techniques, or better efficiency. They also make it easy to detect areas where an economy might be fragile. In this paper, we use computational simulations to investigate how the density of a transformation network affects the economic performance, as measured by the gross domestic product (GDP), of an artificial economy. Our results show that on average, the GDP of our economy increases as the density of the transformation network increases. We also find that while the average performance increases, the maximum possible performance decreases and the minimum possible performance increases.
cs.SI
cs
Transformation Networks: How Innovation and the Availability of Technology can Increase Economic Performance Christopher D. Hollander and Ivan Garibay Abstract A transformation network describes how one set of resources can be trans- formed into another via technological processes. Transformation networks in eco- nomics are useful because they can highlight areas for future innovations, both in terms of new products, new production techniques, or better efficiency. They also make it easy to detect areas where an economy might be fragile. In this paper, we use computational simulations to investigate how the density of a transformation net- work affects the economic performance, as measured by the gross domestic product (GDP), of an artificial economy. Our results show that on average, the GDP of our economy increases as the density of the transformation network increases. We also find that while the average performance increases, the maximum possible perfor- mance decreases and the minimum possible performance increases. 1 Introduction Networks have become an increasingly important topic in the study of economic systems [15, 8]. A network is a collection of objects, called nodes, that are joined together by one or more connections, called edges [12] (Figure 1). In economic networks, the nodes represent economic entities, such as firms or households, and the edges represent economic relationships, such as trade, ownership, or credit-debit relationships. Economic networks are typically studied through either the analysis of existing socioeconomic data or in silico through simulation. However, because it can be difficult to get the required data, simulation is being relied upon more and more to make theoretical advancements. Christopher D. Hollander University of Central Florida, e-mail: [email protected] Ivan Garibay University of Central Florida, e-mail: [email protected] 1 2 Christopher D. Hollander and Ivan Garibay Fig. 1 A sample undirected network of 7 nodes and 8 edges. One particular type of simulation that is often used to study network behavior is computational agent-based simulation. Computational agent-based simulations of economic networks are built on top of computational agent-based models. In economics, computational agent-based models differ from the more general "agent- based models" in that the computational agents used are non-representative and exist as small, often autonomous and intelligent, computer programs that interact with each other in a virtual environment [4, 10, 16]. The agents used in computational agent-based simulations are typically hetero- geneous, each with its own preferences and rules of behavior. This heterogeneity provides a natural way for agents to determine how they must respond in an arbi- trary environment, thus making it straightforward to determine the aggregate be- havior of an economic system in non-homogeneous conditions. The agents are also decentralized, in that sense that no one agent controls all the others, and exist in an environment that represents either an explicit space or a set of relationships. In- teractions between agents are limited to their local area, either by distance or the existence of a relationship. Often times, the agents possess a degree of intelligence and autonomy [17], but current efforts are far behind the state of the art in computer science (e.g. [14, 20]). Computational agent-based simulations can involve tens to hundreds of agents. Systems with multiple interacting agents are referred to as multi-agent systems (MAS). Multi-agent systems are typically studied at both the micro and macro level. At the micro level, the concern is on the rules that govern the behavior of each in- dividual agent. At the macro level, concern is on the patterns and regularities of behavior that "emerge" in the agent population as a result of the agents obeying the micro level rules [1, 2, 3, 5, 6, 7]1. When used to simulate economic networks, computational agent-based simula- tions focus on the relationships and interaction patterns of an agent population that is driven by an agent-based model. Each node in the network is represented by an agent, and each edge represents a type of interaction between two agents. Multiple economic networks can exist on top of a single population of agents. The edges in the networks are created by the actions of the agents, and at the same time also help regulate the behavior of the agents. Many of the networks studied in the existing research have traditionally been static, but there is an increase in the investigation of dynamic networks as the domain becomes better defined and better understood. 1 For a more in depth explanation of agent-based modeling and multi-agent systems, see [6, 20]. v0v1v2v6v3v4v5 Title Suppressed Due to Excessive Length 3 The current research on economic networks tends to focus on the more obvious economic relationships, such as ownership, labor markets, diffusion, organizational modeling, R&D collaborations, trade networks or supply chain networks [8]. How- ever, these are not the only networks that exist in economic systems. In this paper, we define the concept of a transformation network and use it to study how innova- tion can increase economic performance and lead to periods of economic growth. A transformation network describes how one set of resources can be transformed into another, such as how a saw can be used to transform trees into lumber and pa- per, or how amino acids are transformed into proteins under biological processes. In a transformation network, the nodes represent resource sets and a directed edge connects two resource sets if one can be directly transformed into the other. These networks can be static or dynamic. In dynamic transformation networks, the pro- cess of adding new nodes or edges to the system over time can be interpreted as invention, innovation, adaptation, or evolution. Figure 2 represents a simple static transformation network describing how chocolate chip cookies are produced from a basic set of resources and a set of technologies. Of particular interest in figure 2 is that multiple resource sets can be used to produce the same intermediate resources, dry mix and butter mix, under the same or different transformation processes. When applied to economies, transformation networks describe how natural and man-made resources can be turned into products through technological processes. They can be used to help identify potential areas for innovation, which exist when- ever two unconnected nodes can be connected through a new or existing technology. In this way, transformation networks can be helpful to entrepreneurs and corpora- tions seeking to expand their operations to new, but related, areas. In addition, anal- ysis of transformation networks can help identify where the system may be fragile; e.g. if multiple outputs are the product of a single input, the removal of that input could cause catastrophic failure [18]. The knowledge gained from applying transfor- mation networks to economies also has the potential to help in economic theorizing, particularly with regard to developing new models and explanations of economic growth. In this paper, we use a computational agent-based simulation to investigate the relationship between transformation networks and the economic performance of a simple artificial economy. In particular, we seek to answer the question, "do transfor- mation networks with more edges yield better economic performance as measured by GDP?" The notion behind this question is that the density of a transformation network is related to the previous amount of innovation that has occurred in the network, and the current amount of technology available in the economy. We begin by introducing the concept of a transformation network. We then outline the experi- ments covered in this paper and briefly discuss the simulation model used to conduct those experiments. Finally, we describe our experimental results and place them in an applied context. 4 Christopher D. Hollander and Ivan Garibay Fig. 2 A simplified resource transformation network for two chocolate chip cookie recipes that vary by the components used to create the dry and butter mixes. 2 Transformation Networks Transformation networks describe how sets of resources can be transformed from one to another. A transformation network (figure 2) is a simple directed graph G = (V,E), composed of a node set V , an edge set E = {(v0,v1) : v0,v1 ∈ V}, and an associated a transformation function T (u) = v where T : V → V . Each node rep- resents a combination of resources available to the system. An edge connects two nodes v0 and v1 if and only if v1 can be obtained by a single transformation action on v0, i.e. T (v0) = v1. Edges may have a weight associated with them that represents an aggregate measure of the system, such as the number of entities in the system capable of transforming v0 into v1, or the average cost of performing the associated transformation. The total number of nodes in the system depends on the number of resources. In particular, for R resources the number of total nodes is equal to 2R and each node represents an element of the power set of R. Transformation networks are similar to production chains, supply chain networks and metabolic networks in that they model the flow of resources through a system. In particular, they describe how resources can be transformed as they are processed by the associated system. When applied to economics, weighted edges can represent the cost of a transformation, and transformation networks can be used to identify cheaper methods of production by calculating the minimum flow over the network. Missing edges can be used to identify potential innovations. The existence of cycles suggests that part of the system may not depend on sustained input for continued operation. As a first step towards investigating the applications of transformation networks to economics, and to motivate future research in this area, this paper focuses on Butter, White Sugar, Eggs, VanillaButter MixbeatFlour, Cocoa, Baking Soda, SaltDry MixcombineButter Mix, Dry MixCookie DoughstirCookie Dough, Chocolate Chips, NutsChocolate Chip Cookie DoughmixChocolate Chip Cookie Dough, Spoon, Cookie Sheet, OvenChocolate Chip CookiesbakeButter, Brown Sugar, White SugarSugar MixcreamSugar Mix, Eggs, VanillamixFlour, Baking Soda, Baking Powder, Saltcombine Title Suppressed Due to Excessive Length 5 the relationship between the density of a transformation network and the economic performance of a simple artificial economy, as measured by the Gross Domestic Product (GDP). We hypothesize that as the density of the economy's transformation network increases, the GDP will also increase. The basis for this hypothesis centers around the notion that as the edge density of the transformation network increases, there are more direct ways to produce one resource from another. This yields more overall options for production, thereby increasing the diversity of the system. The level of diversity in an economy is important because it has been shown to have a positive effect on economic performance [13, 19]. In addition, it has been shown that the longer a production or supply chain is the more fragile it is to disruption [18]. Thus, if a transformation network is dense due to the diversity of transforma- tion rules, it is much more likely to be composed of shorter chains lengths, thereby increasing the robustness of the system. This increase in robustness should be fol- lowed by an associated increase in the GDP as compare to sparse transformation networks. 3 Experimental Setup We use a computational agent-based simulation developed with MASON [11] to investigate the relationship between the density of the transformation network and GDP of a simple artificial economy. The economy that we consider consists of a fixed population of immortal agents, A, and a fixed set of resources, R, in an environment, E. Each agent has a single transformation rule, t ∈ T , that represents technological knowledge and a variable amount of wealth, wa : a ∈ A, that it can use to buy a resource needed as input for its transformation rule. The exact transformation rule an agent possesses is determined randomly at the start of the simulation. Each resource is represented as a b-bit binary string R ∈ {0,1}b and has a price pr : r ∈ R. For this particular experiment, the pricing model has been simplified so that the price of each resource is fixed and identical. Trade between agents occurs at each timestep, τ, when one agent, the buyer, buys resources from another agent, the seller, according to an economic strategy, S . In our current artificial economy the trade network of the agent population is completely connected and the trade activity of agents is driven by a baseline strategy. Under this strategy an agent will only attempt buy resources if it does not already have the resources required by its transformation rule, for example an agent with the rule T (01) = 11 will only buy the resource 01 if it does not currently have any. Furthermore, a buyer will only attempt to buy from the seller if that agent is selling the required resources for a price pr < wi. Under this strategy, potential sellers are randomly selected from the entire population at the start of each turn. In addition, each resource is priced at the same fixed value and there are no costs associated with any agent behavior outside of trade. 6 Christopher D. Hollander and Ivan Garibay Each time one agent successfully trades with another, the value of the GDP increases by the value of the transaction. In this manner, the GDP maintains its macroeconomic definition as a measure of the final value of goods and services pro- duced within the system, GDP = C + G + I + NX − IM with G = 0,I = 0,NX = 0,IM = 0, where C is the consumer spending, G is the government spending, I is investment, NX is the net exports, and IM is the net imports [9]. Because agents are immortal and there are no imports and no exports, the artificial economy that we consider is a closed system. For the particular experiment studied in this paper, we focus on how the GDP of the system responds to changes in the network density, ρ, under various uniform distributions on the set of transformation rules, T . We also account for scaling phe- nomenon that might occur given the total number of agents, A. We expect that GDP will increase monotonically as both A and ρ increase. To obtain statistically significant measurements we run each experimental con- figuration for 20 replications and 1,000 time steps. This is sufficient because both the underlying trade network and the transformation network are static. An experimen- tal configuration consists of a single choice from the distribution of transformation rules and a constant number of nodes. We consider only uniform distributions of the transformation rules over four resources, 00, 01, 10, and 11 with the additional constraint that T (v) (cid:54)= v (there are no self-loops ). This yields a total of 12 trans- formation rules to be considered and 4095 unique combinations of a directed graph structure over the four resources. Because the network is directed, its density is com- puted as ρ = V(V−1). For each distribution choice, we vary the number of agents over the set {25,50} for a total of 8190 data points. Each data point represents the mean GDP value under the associated experimental configuration after disregarding the first 10 time steps in order to allow the simulation to settle. In addition to this primary experiment, another test was done on the undirected combinations of the rule set using agent counts of {25,50,75,100}. This experiment was conducted in order to verify scaling over population size. The undirected experiment was also re- peated with a set of 5 nodes in the transformation network to verify the consistency of the results. E We only consider small numbers of nodes for this experiment because we wanted to examine all possible edge configurations of the transformation network, and the number of edge configurations grows combinatorially. With 4 nodes, there can be up to 4095 simple directed graphs. With 5 nodes, the number of possible graphs exceeds 1 million2. This makes the combinatorial investigation of large graphs with hundreds or thousands of nodes computationally prohibitive. 2 The number of possible graphs on n nodes is given by summing all combinations of simple graphs with k edges, where k ∈ [1,n(n− 1)]. In other words, the total number of possible directed graphs on n nodes is given by ∑n(n−1) (cid:0)n(n−1) (cid:1) k=1 k Title Suppressed Due to Excessive Length 4 Results 7 Our experiment yields two important results. First, as the density of the transformation network, ρ, increases so too does the average of the average GDP of the underlying artificial economy (figure 5a). Fur- thermore, the increase in GDP is monotonic and appears to scale linearly with the number of agents in the population. This scaling occurs in both our primary exper- iment and our secondary experiments on undirected resource transformation net- works, but it is most likely a result of our specific underlying economic model. Second, we find that as the density of the transformation network increases, the maximum GDP value of each configuration group (all graphs with 1 edge, all graphs with 2 edges, etc.) decreases monotonically. At the same time, the minimum GDP value of each configuration group increases. This behavior is illustrated in figure 5b. Of particular interest is how there appears to be a phase transition in the minimum GDP value when ρ > 0.66. On our four node network, this occurs when there are 9 out of 12 edges. When this occurs, the transformation network is guaranteed to have at least three cycles on its four nodes. These results imply that, as one would expect, the specific edge structure of the network can play a significant part in the economic performance of a system. Networks without any cycles tend to yield pos- itive economic performance only until all resources have reached their final state, while networks with cycles can reuse resources. This result also suggests that there should be a difference in economic performance if the underlying transformation network is scale-free or small world, but that analysis is outside the scope of this current paper. Figure 4 shows an integrated picture of economic performance using the data from all 4095 subgraphs. When the number of edges is low, many configurations are unable to maintain economic performance due to a lack of cycle formation. This results in an average GDP of 0. However, as the edge count increases, particularly once it crosses from 6 edges to 7 edges, the number of graphs with cycles also in- creases and brings with it the ability for resources to be reused and recycled. This supports the idea that the reason for the increase in the average of average GDP is due to the ability of graphs with a higher density to form cycles, and may ex- plain why the minimum GDP of the configuration sets jumps from 0 and begins to increase once a graph has more than 8 edges (figure 5b). 5 Discussion In this paper, we demonstrated that in a closed economic system with homogeneous fixed pricing and completely connected trade networks the density of the underly- ing resource transformation network has a significant effect on the economic per- formance of the associated economy. As the density of the resource transformation network increases so too does the average GDP of the economy (figure 5a). How- ever, an increase in the density of the transformation network also yields a slight 8 Christopher D. Hollander and Ivan Garibay (a) (b) Fig. 3 (a) The average of the average GDP of two populations plotted against the density of the transformation network. Both populations use the same transformation network. The outline around each line represents data corresponding to the 95% confidence interval. (b) Minimum and maximum GDP values between a population of 25 agents and 50 agents for varying density values. decrease in the maximum potential GDP while at the same time produces a sub- stantial increase in the minimum potential GPD (figure 5b). Because the edges of the transformation network can be interpreted as technology, our results indicate as economies develop more technology, they can expect an increase in economic performance. For economies with relatively small transformation networks, our findings sug- gest that it may be better to explicitly attempt to structure the network into its opti- mal configuration by restricting the ability to use specific technologies or create new edges through innovation and invention. However, such policy controls are not prac- tical for large transformation networks because the number of subgraphs quickly becomes unmanageable and impractical to explore. In this case, when an economy is built on a large transformation network, it is better to foster innovation and tech- nological adoption so as to maximize the expected economic performance through an increase in the average GDP, while at the same time increasing the minimum economic performance. For transformation networks with a very large number of nodes, it may be phys- ically or economically impossible to ever arrive at a state of complete connectivity. In this circumstance, our results suggest that as long as innovation can be main- tained the economy should, on average, continue to improve its performance. This continued improvement in performance over time can be interpreted as economic growth. However, it is not enough for an economy just to have resources, it must also have the capability and knowledge to use them. To illustrate this point, figure 5 presents 0.20.40.60.81.00100200300400500Density vs Average GDPNetwork DensityAverage GDPllllllllllllllllllllllll50 Firms25 Firms0.20.40.60.81.00100200300400500Density vs GDPNetwork DensityGDPllllllllllllllllllllllll50 Firms (Max)50 Firms (Min)25 Firms (Max)25 Firms (Min) Title Suppressed Due to Excessive Length 9 Fig. 4 Average GDP values for all edge configurations, by group, tested under a population of 50 firms. Each circle represents the average GDP over 20 replications of a specific experimental configuration. The line present in each plot is a regression line representing the average GDP value over all configurations in the specific edge group. llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll010203040506001002003004002 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll05010015020001002003004003 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll010020030040050001002003004004 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll020040060080001002003004005 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll020040060080001002003004006 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll020040060080001002003004007 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll010020030040050001002003004008 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll05010015020001002003004009 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0102030405060010020030040010 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDPllllllllllll24681012010020030040011 Edge Configurations on 50 FirmsExperiment ConfigurationAvg GDP 10 Christopher D. Hollander and Ivan Garibay two randomly chosen transformation networks from our data set. Both transfor- mation networks use the same resources, but their edge configurations differ. This differences in edge configuration represents a difference in the available technology of the economy, and makes a significant difference in the realized performance. As a real world example, it is not enough to simply have a diamond mine in your country, you should also be able to turn the rough diamonds into jewelry. Likewise, not ev- erybody should use the same technological processes. A healthy economy requires diversity. (a) (b) Fig. 5 (a) Graph configuration 651, composed of 4 nodes and 4 edges. This configuration yields an average GDP of 174.69 with 50 firms. (b) Graph configuration 3452, composed of 4 nodes and 8 edges. This configuration yields an average GDP of 355.89 with 50 firms. In both figures, the edge weights represent the average number of agents in the population with the associated transformation rule. For instance, in subfigure (a) 12.65 agents can transform resource 00 into resource 10. These weight values are determined by the distribution of transformation rules. 6 Future Work This paper has shown that looking at the transformation network of an economy may be a worthwhile way to gain insight into economic performance. In the future we plan to expand on this topic by adding incremental complexities to our model and comparing our results to real-world transformation networks where they can be identified and analyzed. Our next step is to examine the impact of transformation network density on GDP in larger, non-complete complex trade networks, such as scale-free, small world, and random topologies. We will then account for variable and heterogeneous decentral- 001012.650113.301112.1511.9000016.90115.956.75106.606.556.055.355.85 Title Suppressed Due to Excessive Length 11 ized pricing mechanisms. We hypothesize that the underlying trade network will have a larger impact on the economic performance of a system than the pricing, especially given the importance that cycles seem to play in a close system. Additionally, we need to investigate what happens if the system is not closed due to an external input of basic resources or an output of energy in the form of costs. Results from such investigations may have a significant impact on the understanding of cycles in a transformation network. We also need to look at economies with multiple transformation networks that may or may not be connected. One of the more interesting results that we obtained also warrants further explo- ration. As shown figure 5b, there appears to be a phase transition on the minimum GDP once the network obtains a sufficient density. This raises questions about the generality and calculation of this finding that should be explored in future work. Finally, we plan to examine the properties of large transformation networks that evolve over time (dynamic networks instead of static networks). Because evolution can lead changes in the network structure by creating and destroy edges and altering path lengths, we expect that the more productive societies will have evolved a larger density in their underlying transformation networks. 7 Conclusion Continued innovation and the amount of available technology are significant factors in economic growth. With the world in economic crisis, new perspectives on economics are needed. Transformation networks provide one new way to look at economies by examining how the system's underlying economic resources are transformed from one form into another. This is a general approach that can be used on any economic sector or within any industry, and more generally to any system in which one thing is changed into another by some entity. We have shown that these networks are not just an abstract idea. Their structure can have real impacts on economic performance. In particular, an increase in the density of a transformation network appears to cause an increase in both the average GDP of the associated economy and an increase in the minimum GDP. This increase in density can be associated with innovation in the economy. As firms discover new ways to use the resources they have available, and invent new ways to turn one resource into another, new edges are added to the underlying network. Our results suggest that in economies that are small and simple, the transfor- mation networks can be fully explored and optimal network configurations identi- fied. However, when economies become even moderately large in the number of resources they rely upon, such explorations are impractical and innovation must be relied upon to increase growth. This paper presents the first of many steps towards understanding and leveraging transformation networks; but even within the relatively simple approach that we 12 Christopher D. Hollander and Ivan Garibay have taken it has been shown that these networks can provide key insights with regard to explanations of economic performance and potential areas of innovation. References 1. Arthur, W.B., Tesfatsion, L., Judd, K.: Out-of-Equilibrium economics and Agent-Based mod- eling. pp. 1551 -- 1564. Elsevier (2006) 2. Axtel, R.L.: Multi-Agent systems macro: A prospectus. In: D. Colander (ed.) Post-Walrasian Macroeconomics: Beyond the Dynamic Stochastic General Equilibrium Model. Cambridge (2006) 3. Chen, S., Yang, Y., Yu, W.: A bibliometric study of Agent-Based modeling literature on the SSCI database. In: S. Chen, T. Terano, R. Yamamoto (eds.) Agent-Based Approaches in Economic and Social Complex Systems VI, vol. 8, pp. 189 -- 198. Springer Japan, Tokyo (2011) 4. Colander, D., Howitt, P., Kirman, A., Leijonhufvud, A., Mehrling, P.: Beyond DSGE models: Toward an empirically based macroeconomics. American Economic Review 98(2), 236 -- 240 (2008) 5. Cristelli, M., Pietronero, L., Zaccaria, A.: Critical overview of Agent-Based models for eco- nomics. arXiv:1101.1847v1 (2011) 6. Epstein, J.M., Tesfatsion, L., Judd, K.: Remarks on the foundations of Agent-Based generative social science. pp. 1585 -- 1604. Elsevier (2006) 7. Gatti, D.D., Gaffeo, E., Gallegati, M.: Complex agent-based macroeconomics: a manifesto for a new paradigm. Journal of Economic Interaction and Coordination 5(2), 111 -- 135 (2010) 8. Knig, M.D., Stefano, B.: From graph theory to models of economic networks. a tutorial. In: A.K. Naimzada, S. Stefani, A. Torriero (eds.) Networks, Topology and Dynamics, vol. 613, pp. 23 -- 63. Springer Berlin Heidelberg, Berlin, Heidelberg 9. Krugman, P., Wells, R.: Economics, 1st edn. Worth Publishers (2005) 10. LeBaron, B., Tesfatsion, L.: Modeling macroeconomies as Open-Ended dynamic systems of interacting agents. American Economic Review 98(2), 246 -- 250 (2008). DOI 10.1257/aer.98. 2.246 11. Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K., Balan, G.: MASON: a multiagent simula- tion environment. SIMULATION 81(7), 517 -- 527 (2005). DOI 10.1177/0037549705058073 12. Newman, M.: Networks: An Introduction, 1 edn. Oxford University Press, USA (2010) 13. Page, S.E.: Diversity and Complexity, 1 edn. Princeton University Press (2010) 14. Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3 edn. Prentice Hall 15. Schweitzer, F., Fagiolo, G., Sornette, D., Vega-Redondo, F., Vespignani, A., White, D.R.: Economic networks: The new challenges. Science 325(5939), 422 -- 425 (2009). DOI 10.1126/science.1173644 16. Tesfatsion, L.: Agent-Based computational economics: A constructive approach to economic theory. In: L. Tesfatsion, K.L. Judd (eds.) Handbook of Computational Economics: Agent- Based Computational Economics, vol. Volume 2, pp. 831 -- 880. Elsevier (2006) 17. Tesfatsion, L.S.: Agent-Based computational economics: Modeling economies as complex adaptive systems. Information Sciences 149, 263 -- 269 (2008) 18. Thadakamalla, H., Raghavan, U., Kumara, S., Albert, A.: Survivability of Multiagent-Based supply networks: A topological perspective. IEEE Intelligent Systems 19, 24 -- 31 (2004). DOI 10.1109/MIS.2004.49 19. Weitzman, M.L.: Recombinant growth. Quarterly Journal of Economics 113(2), 331 -- 360 20. Wooldridge, M.: An Introduction to MultiAgent Systems, 2nd edition edn. John Wiley & Sons (2009) (1998) (2009)
1612.09435
2
1612
2017-11-11T07:08:03
Community-based Outlier Detection for Edge-attributed Graphs
[ "cs.SI" ]
The study of networks has emerged in diverse disciplines as a means of analyzing complex relationship data. Beyond graph analysis tasks like graph query processing, link analysis, influence propagation, there has recently been some work in the area of outlier detection for information network data. Although various kinds of outliers have been studied for graph data, there is not much work on anomaly detection from edge-attributed graphs. In this paper, we introduce a method that detects novel outlier graph nodes by taking into account the node data and edge data simultaneously to detect anomalies. We model the problem as a community detection task, where outliers form a separate community. We propose a method that uses a probabilistic graph model (Hidden Markov Random Field) for joint modeling of nodes and edges in the network to compute Holistic Community Outliers (HCOutliers). Thus, our model presents a natural setting for heterogeneous graphs that have multiple edges/relationships between two nodes. EM (Expectation Maximization) is used to learn model parameters, and infer hidden community labels. Experimental results on synthetic datasets and the DBLP dataset show the effectiveness of our approach for finding novel outliers from networks.
cs.SI
cs
Community-based Outlier Detection for Edge-attributed Graphs Supriya Pandhre Indian Institute of Technology, Hyderabad Hyderabad, India [email protected] Manish Gupta Microsoft Hyderabad, India [email protected] Vineeth N Balasubramanian Indian Institute of Technology, Hyderabad Hyderabad, India [email protected] 7 1 0 2 v o N 1 1 ] I S . s c [ 2 v 5 3 4 9 0 . 2 1 6 1 : v i X r a Abstract-The study of networks has emerged in diverse disci- plines as a means of analyzing complex relationship data. Beyond graph analysis tasks like graph query processing, link analysis, influence propagation, there has recently been some work in the area of outlier detection for information network data. Although various kinds of outliers have been studied for graph data, there is not much work on anomaly detection from edge-attributed graphs. In this paper, we introduce a method that detects novel outlier graph nodes by taking into account the node data and edge data simultaneously to detect anomalies. We model the problem as a community detection task, where outliers form a separate community. We propose a method that uses a probabilistic graph model (Hidden Markov Random Field) for joint modeling of nodes and edges in the network to compute Holistic Community Outliers (HCOutliers). Thus, our model presents a natural setting for heterogeneous graphs that have multiple edges/relationships between two nodes. EM (Expectation Maximization) is used to learn model parameters, and infer hidden community labels. Experimental results on synthetic datasets and the DBLP dataset show the effectiveness of our approach for finding novel outliers from networks. I. INTRODUCTION Outlier (or anomaly) detection is a very broad field which has been studied in the context of a large number of research areas like statistics, data mining, sensor networks, environ- mental science, distributed systems, spatio-temporal mining, etc. Many algorithms have been proposed for outlier detection in high-dimensional data, uncertain data, stream data and time series data. By its inherent nature, network data provides very different challenges that need to be addressed in a special way. Network data is gigantic, contains nodes of different types, rich nodes with associated attribute data, noisy attribute data, noisy link data, and is dynamically evolving in multiple ways. Outlier detection on networks for various applications can be useful for: (1) identification of interesting entities or sub- graphs, (2) data de-noising (both with respect to the network nodes and edges), (3) understanding the anomalous temporal behavior of entities, and (4) identification of new trends or sus- picious activities in both static and dynamic scenarios. Some examples of network outliers include users who spread rumors on Twitter, unusual but successful associations of persons with various organizations in an organizational network, sensor with anomalous readings in a sensor network, anomalous traffic between two components in a distributed network, snapshot with broken correlation between network properties across time, etc. Given a static graph, one can find node, edge or subgraph outliers. For dynamic graphs, the outliers could be time stamps where the properties of the snapshot are significantly different from the properties of other snapshots. In the dynamic scenario, one can also identify a node (or an edge, or a subgraph) which shows anomalous behavior across time as an outlier. Popular outlier detection methods for static graphs include the Minimum Description Length (MDL) method [10], frequent subgraph mining, egonet analysis [5], and community analysis [12], [14]. Popular methods for outlier detection for dynamic graphs include graph similarity based methods [20], temporal spectral analysis [19], temporal structural connectiv- ity analysis [3], and temporal community analysis [15], [16]. While most work in the past on network outlier detection has focused on graphs with node data and links, there is very little work in the area of edge-attributed graphs. In some cases, node data and linkage could be normal even when edge data is abnormal, in the context of nodes on which the edge is incident. With the rich variety of interactions in various complex graphs across a variety of domains, it is critical to incorporate such edge attributes in finding novel outliers. If we could assign a latent community to every node and every edge, a HCOutlier node is one which is linked to many nodes of another community, or has incident edges belonging to another community. The following real-world examples demonstrate the impor- tance of HCOutliers. Organizational Graph Example: A graph of people working in a company is called an organization graph. Edges represent frequent communication. Role of a person can be considered as the community label. Usually a chemist in a company would communicate frequently with other chemists. But a suspicious HCOutlier node would not just communicate frequently with members of other roles, but also the community of the communications would be different from the one expected for its role. Such a person could be an activist planning a malicious activity with other folks in the company, or a star performer working on a secret collaborative project. Co-authorship Graph Example: A co-authorship graph con- tains authors as nodes. Two authors are connected if they have published a paper together. On such graphs, research areas can be considered as latent communities. Most authors collaborate with other authors, and publish papers in the same research area. An HCOutlier would be an author who: (1) collaborates frequently with authors from other research areas, and (2) collaborates with other authors of same or different community on papers which belong to other research areas. Such authors perform inter-disciplinary research and are vital in cross-pollination of concepts across research areas. Co-actorship Graph Example: A co-actorship graph contains actors as nodes. Two actors are connected if they have worked in a movie together. On such graphs, movie genres can be considered as latent communities. Most actors collaborate with other actors, and work in movies in the same genre. An HCOutlier would be an actor who: (1) collaborates frequently with actors from other genres, and (2) collaborates with other actors of same or different genre in movies which belong to other genres. HCOutlier actors are ones who have built a reputation for being multi-faceted actors with an eclectic range of movies. Limitations of Past Approaches: In the past, various ap- proaches have been proposed by looking only at node data and ignoring network structure. Clearly, HCOutliers cannot be detected using such a global approach because HCOutlier nodes belong to popular communities. There has been work on finding community outliers for both homogeneous [12] and heterogeneous graphs [14] by considering node data and link structure but ignoring edge data. Clearly, such an approach can identify some HCOutliers who are linked to nodes with a different community label. But they cannot identify a HCOut- lier who could be connected to nodes of the same community label but has incident edges with a different community label. Brief Overview of the Proposed Approach: We propose a probabilistic model for detection of Holistic Community Out- liers. We model the problem as a community detection task where the outliers are modeled as a separate community. A Hidden Markov Random Field (HMRF) is used to perform joint community analysis for both nodes and edges considering node data, edge data and the linkage structure. Thus, the HMRF contains both nodes and edges from the graph as vertices, referred to as a node-vertex and an edge-vertex respectively. Community labels for outliers are sampled from a uniform distribution while normal vertices could be sampled from Gaussian or a multinomial distribution. EM is used for the inference, and to compute the hidden community label Z for every vertex. We make the following contributions in this paper: • We look at the community outlier detection problem from a holistic perspective by incorporating node data, edge data, and the linkage structure. Based on such a view, we propose the problem of detecting novel HCOutliers. • We model the problem as a community analysis task over a HMRF and provide inference using an EM algorithm. • Using several experiments on synthetic datasets and a DBLP dataset, we show the effectiveness of the proposed approach in identifying HCOutliers. Section II gives a brief summary of related work. We de- scribe our HMRF model in detail in Section III and present the inference in Section IV. We discuss hyper-parameter settings and initialization details in Section V. We provide details of experiments on synthetic datasets and the DBLP dataset in Section VI and conclude in Section VII. II. RELATED WORK Outlier detection has a long history and [2], [11], [18] provide extensive overviews of popular methods; [6], [13] focus on network outlier detection methods. Our work is most related to two main sub-areas of network outlier detec- tion: community-based outlier detection and analysis of edge- attributed graphs, each of which is discussed below. A. Community-based Graph Outlier Detection Community-based outlier detection methods perform com- munity analysis on graphs. Nodes that do not belong to any community are labeled as outliers. Community-based outlier detection has been studied both for static networks and dynamic networks. The notion of community outliers has been studied for static bipartite graphs using random walks in [23], for static homogeneous networks using probabilistic models in [12], and for static heterogeneous graphs using non-negative matrix factorization in [14]. [22] summarizes different anomaly detection methods in dynamic graphs such as decomposition based methods [4], [24], distance based methods [1]. Community based outlier detection method, for dynamic graphs, is proposed for a two-snapshots setting in [16] and for a series of snapshots in [15]. B. Analysis of Edge-attributed Graphs Edge content indicates the type of relationship between the two nodes. However very little work exists on analysis of edge-attributed graphs. Qi et al. [21] proposed a edge-induced matrix factorization based method for finding communities in social graph using edge content. [8] proposed a method that considers edge data of User-Likes-Pages Facebook graph for temporal analysis to find the page-like pattern. [9] proposed a method for mining coherent sub-graphs in multi-layer edges by exploiting edge content. [17] proposed a method for finding top-K interesting subgraphs matching a query template where interestingness is defined using edge weights. We propose a community-based outlier detection method for edge-attributed graphs which jointly exploits edge content along with node data and the linkage structure. III. ANOMALY DETECTION USING NODE DATA, EDGE DATA, AND LINKAGE In this section, we develop the HMRF model which we use to perform joint community analysis for both nodes and edges considering node data, edge data and the linkage structure. Consider an undirected graph G = {V, E}, where V is the set of vertices and E is the set of edges. Node and Edge Data: Let S be the set of observed data. has p attributes, Si1, Si2, ··· , Sip. • Let Si represent the observed data of node vi ∈ V which • Let Sij represent the observed data of edge eij ∈ E, i.e., edge data between nodes vi and vj, and there are q number of attributes, Sij1, Sij2, ··· , Sijq. are incident on the node in G. {vjWvivj > 0, i (cid:54)= j, Zj (cid:54)= 0}∪ {exyWviexy > 0, x = i or y = i, Zxy (cid:54)= 0} φ Ni = Zi (cid:54)= 0 Zi = 0 (1) HMRF Model: The HMRF contains a vertex representing each node and each edge from G. We refer to the HMRF representing nodes and edges as node-vertices vertices and edge-vertices to refer to node-vertices in the HMRF, and the index ij to refer to edge-vertices in the HMRF. We use the index b to refer to all the vertices in the HMRF. Thus b ∈ B = {1, 2,··· , i,··· ,V , (1, 2), (1, 3),··· , (1,V ), (2, 3),··· , (V − 1,V )}. Note that ij ∈ B if i < j. Thus, B = V + E. respectively. We use the index i node data Si, and Xij generates edge data Sij. • Let X = {Xb} be a set of random variables. Xi generates • Let Z = {Zb} be the set of hidden random variables. Zi indicates the community assignment of vi. Suppose there are K communities, then Zi ∈ {0, 1, 2,··· , K}. If Zi = 0, then vi is an outlier. If Zi = k, then vi belongs to the community k. Similarly, Zij denotes the community assignment for edge eij. is set to the weight of the edge eij ∈ E and represent edge strength. Wvi,vj ,eij are weights for a triangle clique consisting of vi, vj and eij. Thus, W = 4E (3 faces of the triangle formed by two node-vertices and an edge- vertex, and the whole triangle itself). • Let W denote the weights in the HMRF. Wvi,vj Wvi,eij can be set in multiple ways. We set it to the inverse of number of neighbors of vi in G. Thus, for a co-authorship graph, this weight can be set to the inverse of the number of co-authors of author vi in the graph. For a Twitter users graph, this weight can be set to the inverse of the number of other users that the user vi is connected to. In a directed network sense, the weight can also be set to the ratio of the number of tweets from user vi to user vj to number of total tweets from user vi. Wvi,vj ,eij should reflect some property of the triangle clique which cannot be captured using individual edges. For a co- authorship network, this could be set to ratio of number of papers where authors vi and vj are co-authors to the total number of papers on which either vi or vj are authors. Similarly, for a Twitter user network, this weight can be set to the ratio of tweets exchanged between users vi and vj to the total tweets posted by either vi or vj. Zb's are influenced by their neighbors, i.e., if two nodes are linked, it is likely that both belong to the same community. This does not hold for the outliers. Let Ni denote the set of neighbors of node vi. If Zi = 0, then vi is an outlier, and so the neighborhood set is empty. Also, each node-vertex is connected to the edge-vertex corresponding to the edges which Similarly, we also define neighbors for edge-vertices, Nij, as follows. Note that for an edge-vertex, the neighbors are only the node-vertices on which the edge-vertex is incident except for the case when these node-vertices are outliers. (cid:26){vizi (cid:54)= 0} ∪ {vjzj (cid:54)= 0} φ Nij = Zij (cid:54)= 0 Zij = 0 (2) Data Likelihood: Let Θ = {θ1, θ2, .., θK} be the set of param- eters describing the normal communities. Thus, likelihood for node/edge data can be written as follows. P (Xb = SbZb = k) = P (Xb = Sbθk) (3) We assume the outliers follow uniform distribution as we do not know beforehand which elements(node-vertex or edge- vertex) are anomalous or what they look like. P (Xb = SbZb = k) = ρ0 (4) where ρ0 is a constant. Figures 1 and 2 illustrate a sample graph and its cor- responding HMRF model. The graph has two communities, blue and red. The node v5 has connection with the member of blue community as if it is part of blue community but its node attributes are similar to red community. Hence, in the HMRF model, it is not connected to any other node, indicating v5 as an outlier. The edge between v4 and v6 indicate the cross-community collaboration and thus detected as interesting nodes. A. Cliques and Potentials in HMRF As the community label assignment follows an HMRF, exp(−U (Z)) where U (Z) is the we can define P (Z) = 1 H1 potential function, defined as sum over all possible cliques. We consider two kinds of clique potentials: pairwise (vi to vj, vi to eij) and triangular (between vi, vj and eij). Then, the potential function can be written as follows. B. Probability of Generating the Data Given the community label of a vertex (Zi or Zij) in the HMRF, the corresponding data (Xi or Xij) can be modeled as data generated from a distribution with parameters specific to the community. Community labels can be obtained using either Gaussian mixture model on the data if it is continuous, or as multinomial if the data is textual. Continuous Data: If the data is numeric and 1-dimensional, we need to learn the mean (µk), and standard deviation (σk) for each community k represented using a Gaussian. Given the parameters and the community label, the log likelihood can be written as follows. ln P (Xi = SiZi = k) = − (Si − µk)2 2σ2 k − ln σk − ln √ 2π (6) In case of multi-dimensional data with p dimensions, the log likelihood can be written as follows. ln P (Xi = SiZi = k) = − (Si − µk)T Σ−1 k (Si − µk) 2 − ln(cid:112)(2π)p − ln Σk 2 Discrete Data: If the node (or edge) data can be represented as a document, we assume that the attributes (or words) are independent of each other, given the community label. (7) (8) (9) Fig. 1: Original Graph G=(V,E) Fig. 2: HMRF model of G indicating anomalous node v4, v5 and v6 U (Z) = −λ1 Wvivj δ(Zi − Zj) Wvivj >0, Zi(cid:54)=0, Zj(cid:54)=0 (cid:88) (cid:88) (cid:88) Zi(cid:54)=0, Zij(cid:54)=0 Wvieij >0, −λ2 −λ2 Wvieij δ(Zi − Zij) P (Xi = Siθk) = P (Xic = Sicθk) Wvj eij δ(Zj − Zij) (5) P (Xij = Sijθk) = P (Xijc = Sijcθk) p(cid:89) q(cid:89) c=1 c=1 Wvj eij >0, Zj(cid:54)=0, Zij(cid:54)=0 (cid:88) Wvivj eij ψ(Zi, Zj, Zij) −λ3 Wvivj eij >0, Zi(cid:54)=0, Zj(cid:54)=0, Zij(cid:54)=0 imply that where λ1, λ2, λ3 are constants, Wvivj > 0, Wvieij > 0, Wvj eij > 0, Wvivj eij > 0, there are links connecting vi-vj, vi-eij, vj-eij and Zi, Zj, Zij are non- zero. The δ function is defined as δ(x) = 1 if x = 0 and δ(x) = 0 otherwise. Also, ψ(Zi, Zj, Zij) = 1 if δ(Zi − Zj) + δ(Zi − Zij) + δ(Zj − Zij) ≤ 1, and 0 otherwise. Note that we define ψ this way to capture the intuition that the clique potential should fire if at least two of the members in the clique share the same community label. Overall, the potential function suggests that, if members of the clique are normal objects, they are more likely to be in the same community when there exists a link connecting them in G, and the probability becomes higher if their link (weight) is stronger. T(cid:88) For text data, given a vocabulary of T words, let dbl be the number of times the word l appears in data related to vertex b. Then the parameters θk = {βk1,··· , βkT} denote the probability of a particular word belonging to community k. Given the parameters, the data likelihood of an object belonging to the kth community can be computed as follows. ln P (Xic = SicZi = k) = dil ln βkl (10) l=1 where βkl is the probability of the word with index l belonging to community k. IV. INFERRING Z AND ESTIMATING Θ The model parameters Θ and the set of hidden labels Z are unknown as described in Section III. In this section, we describe methods to infer the hidden labels and also estimate the model parameters. A. Inferring Hidden Labels Assuming the model parameters Θ are known, we find the configuration Z that will maximize the posterior distribution as follows. Z = arg max Z P (X = SZ)P (Z) (11) To find such a configuration, we use the Iterated Conditional Modes (ICM) algorithm [7]. It is a greedy algorithm which guarantees convergence to a local optima by sequentially updating one Zb at a time assuming other Z's (i.e., ZB−b) as constant. At each step, the algorithm updates Zb given Xb = Sb and the other labels such that the posterior P (ZbXb = Sb, ZB−b) is maximized. If Zb (cid:54)= 0, applying Bayes rule, P (ZbXb = Sb, ZB−b) ∝ P (Xb = SbZ)P (Z) (12) In Eq. 12, P (Z) can be computed using Eq. 5. But rather than considering potential for the entire graph, Eq. 12 needs potentials defined over only those cliques in which Zb is involved. Thus, we can write the following equation for node- vertices: P (ZiXi = Si, ZB−{i}) ∝ P (Xi = SiZ)× exp(λ1 Wvivj δ(Zi − Zj) (cid:88) (cid:88) (cid:88) vj∈Ni exy∈Ni vj∈Ni, exy∈Ni + λ2 + λ3 Wviexy δ(Zi − Zxy) Wvivj exy ψ(Zi, Zj, Zxy)) (13) Also, the corresponding equation for the edge-vertices can be written as follows. P (ZijXij = Sij, ZB−{(i,j)}) ∝ P (Xij = SijZ)× exp(λ2 Wvi(cid:48) eij δ(Zi(cid:48) − Zij) (cid:88) vi(cid:48)∈Nij + λ3Wvivj eij ψ(Zi, Zj, Zij)) (14) Taking log of the posterior probability, we can transform the maximizing posterior problem to minimizing the conditional posterior energy function defined as shown in Eqs. 15 and 16 for node-vertices and edge-vertices respectively. Ui(k) = − ln P (Xi = SiZi = k) − λ1 Wvivj δ(k − Zj) (cid:88) vj∈Ni − λ2 − λ3 (cid:88) (cid:88) exy∈Ni vj∈Ni, exy∈Ni Wviexy δ(k − Zxy) Wvivj exy ψ(k, Zj, Zxy) (σ(t+1) k )2 = Uij(k) = − ln P (Xij = SijZij = k) (cid:88) vi(cid:48)∈Nij − λ2 Wvi(cid:48) eij δ(Zi(cid:48) − k) − λ3Wvivj eij ψ(Zi, Zj, k) (16) If Zb = 0, the vertex has no neighbors, and thus P (ZbXb = Sb, ZB−{b}) ∝ P (Xb = SbZb = 0)P (Zb = 0) (17) Hence, Ub(0) = − ln(ρ0π0) = a0 (18) Finally, the label Zb for vertex b in HMRF is set to k ∈ {0, 1,··· , K} such that Ub(k) is minimized. The pre- defined hyper-parameters, λ1, λ2, λ3, represent the importance of the respective components of the graph structure. a0 is the outlierness threshold. Algorithm 1 first randomly initializes the labels for all vertices. At each step, labels are updated sequentially by minimizing Ub(k). Algorithm 1 Inferring Hidden Labels Input: Node/Edge data S, weights W , set of model param- eters θ, number of clusters K, hyper-parameters (λ1, λ2, λ3), threshold a0, initial assignment of labels Z (1) Output: Updated assignment of labels Z 1: Randomly set Z (0) 2: t ← 1 3: while Z (t) is not close enough to Z (t−1) do 4: 5: 6: t ← t + 1 for b = 1; b ≤ B; i + + do b = k which minimizes Ub(k) using Update Z (t) Eqs. 15, 16 and 18 7: return Z (t) B. Estimating Parameters In this subsection, we discuss a method for estimating unknown θ from the data. θ describes the model that generates node data and edge data. Hence we seek to maximize the data likelihood P (X = Sθ) to obtain θ. However, since both the hidden labels and the parameters are unknown and they are inter-dependent, we use expectation-maximization (EM) algorithm (as shown in Algorithm 2) to solve the problem. We direct the reader to [12] for details. The algorithm starts with an initial estimate of hidden labels Z (1). Given the current configuration of hidden labels, we can estimate model parameters as follows. For univariate numeric data, µ(t+1) and σ(t+1) k µ(t+1) k k (cid:80)B are estimated as follows: (cid:80)B b=1 P (Zb = kXb = Sb, Θ(t))Sb (cid:80)B b=1 P (Zb = kXb = Sb, Θ(t)) (cid:80)B b=1 P (Zb = kXb = Sb, Θ(t))(Sb − µk)2 b=1 P (Zb = kXb = Sb, Θ(t)) = (19) (20) (15) For text data, given a vocabulary of T words, let dbl be the number of times the word l appears in data related to vertex b. Then, given the current configuration of hidden labels, we can estimate parameters of the multinomial distribution βkl for k ∈ {1,··· , K} and l ∈ {1,··· , T} as follows: (cid:80)B (cid:80)T (cid:80)B b=1 P (Zb = kXb = Sb, Θ(t))dbl b=1 P (Zb = kXb = Sb, Θ(t))dbl l=1 (21) β(t+1) kl = Given the updated parameters, the new configuration of hidden labels can be estimated using Algorithm 1 where P (Zb = k∗Xb = Sb, Θ(t)) = 1 if k∗ = arg mink Ub(k), and 0 otherwise. In summary, the Holistic Community Outlier detection algorithm shown in Algorithm 2 works as follows. It begins with some initial label assignment of the vertices in the HMRF. In the M-step, the model parameters are estimated using the EM algorithm to maximize the data likelihood, based on the current label assignment. In the E-step, Algorithm 1 is run to re-assign the labels to the objects by minimizing U (k) for each HMRF vertex sequentially. The E-step and M-step are repeated until convergence is achieved, and the outliers are the nodes that have 0 as the final estimated labels. b Algorithm 2 Holistic Community Outlier Detection Input: Node/Edge data S, weights W , set of model param- eters θ, number of clusters K, hyper-parameters (λ1, λ2, λ3), threshold a0, initial assignment of labels Z (1) Output: Set of Holistic Community Outliers 1: Randomly set Z (0) 2: t ← 1 3: while Z(t) is not close enough to Z(t−1) do 4: M-step: Given Z (t), update parameters Θ(t+1) accord- ing to Eqs. 19, 20 or 21. 5: Z (t+1) using Algorithm 1. E-step: Given Θ(t+1), update the hidden labels as t ← t + 1 6: 7: return the indices of outliers: {i : Z (t) b = 0, b ∈ B} V. DISCUSSIONS In this section, we discuss how to set the hyperparameters and how to initialize the hidden labels. Setting Hyperparameters: The HCOutlier detection algorithm has the following hyperparameters: threshold a0, clique im- portance variables, λ1, λ2, λ3 and number of communities K. λ1, λ2, λ3 indicate the importance of link between two nodes, the importance of link between edge-vertex and a node- vertex, and the importance of the triangle between the edge- vertex and the node-vertices of which the edge is incident respectively. If λs are set to low values, the algorithm will consider only node information for finding the outliers. If their values are set too high, all connected nodes will have the same label, so an upper bound can be set for λ1 + λ2 + λ3, such that a value above this bound will result into empty communities. High λ1 will give more importance to the linkage in the graph. High λ2 will give high importance to consistency between the node data and edge data in the graph. High λ3 will give high importance to consistency between the edge data and both the incident nodes in the graph. The threshold a0 can be replaced by another parameter (per- centage of outliers r) as follows. In Algorithm 1, first calculate Zi = arg mink Ui(k)(k (cid:54)= 0) for each i ∈ {1,··· ,V } and then sort Ui( Zi) in non-descending order. Finally, select top r percentage as outliers. K represents the number of normal communities. For small value of K, algorithm will find the global outliers, and for large value of K many local outliers will be detected because of many communities. An appropriate K can be set using a variety of methods like Akaike Information Criterion (AIC), Bayesian Information Criterion (BIC), Minimum Description Length (MDL), etc. Initialization of labels: Instead of initializing Z randomly, we initialize Z values by clustering the nodes without considering outliers. To overcome local optima issues, we run the algo- rithm multiple times with different initialization, and choose the one with the largest data likelihood value. VI. EXPERIMENTS Evaluation of outlier detection algorithms is difficult in general due to lack of ground truth. Hence, we perform experiments on multiple synthetic datasets. We evaluate outlier detection accuracy of the proposed algorithm based on outliers injected in synthetic datasets. We evaluate the results on real datasets using case studies. We perform comprehensive analysis of objects to justify the top few outliers returned by the proposed algorithm. The code and the data sets are publicly available1. All experiments are performed on a machine with Intel core i3-2330M processor running at 2.20GHz and 4GB RAM. We compare our algorithm with Community Outlier Detec- tion Algorithm (CODA) [12]. CODA is also an algorithm for community-based outlier detection which performs commu- nity detection using node data and linkage; but ignores edge- data completely. A. Synthetic Datasets synthetically We three generate graphs: Graph A (V =1000), Graph B (V =10000) and Graph C (V =100000). The node data is generated using 5 different Gaussian distributions and similar procedure is followed to generate edge data as well. Then for each of these graphs, different percentage of outliers are injected by randomly changing the data associated with 1%, 5% and 10% of the nodes. We generate a variety of synthetic datasets by varying the number of nodes in the graph, percentage of outliers injected in the graph and percentage of outliers to be extracted by the algorithm. Table I shows the synthetic dataset results for the baseline (CODA) as well as the proposed algorithm 1https://github.com/supriya-pandhre/HCODA Fig. 3: Sensitivity of λ3 Fig. 4: Sensitivity of λ1 (Graph A) (HCODA). We set the number of clusters (K) to 5 for these experiments (based on the generation process). We measure the performance of the two algorithms from two perspectives: firstly, accuracy of extraction of the injected outliers (OD Acc.) and secondly, how well it assigns the community label to all the nodes of the graph (CA Acc.). Note that each cell of the table corresponds to average over five runs of the algorithm. As the table shows, the proposed algorithm (HCODA) is 6.2% more accurate than the baseline on average in terms of outlier detection accuracy. Similarly, HCODA is 2.2% better than CODA on average. The performance is consistent across various graph sizes as well as across different degrees of outlierness in the graph. Hyperparameter Sensitivity: To understand the impact of var- ious hyperparameters (λ's), we performed a few experiments. The results are shown in Figures 3, 4 and 5. Figure 3 shows the sensitivity of the outlier detection accuracy with respect to variation of λ3. We plot the curves for Graph A and B for the case of 10% injected outliers and 10% outliers to be extracted. Recall that λ3 is the weight for the triangular clique. As can be seen from the figure, higher values of λ3 are preferable but in general any value greater than 0.5 is reasonable. Figures 4 and 5 show the sensitivity of the outlier detection accuracy with respect to variation of λ1 for both the proposed algorithm (HCODA) and the baseline (CODA). Figures 4 is the plot for Graph A while Figures 5 is the one for Graph B. Both the plots are for the case of 10% injected outliers and 1% outliers to be extracted. Recall that λ1 is the weight for the linkage in the original graph. As can be seen from the figure, lower values of λ1 are preferable both in the case of CODA as well as HCODA. We noticed that the algorithm is not significantly sensitive to the parameter λ2 and hence we do not show the corresponding plot. Fig. 5: Sensitivity of λ1 (Graph B) B. Four Area Dataset DBLP (http://dblp.uni-trier.de/) contains information about computer science journals and proceedings. Four Area is a sub- set of DBLP for the four areas of data mining (DM), databases (DB), information retrieval (IR) and machine learning (ML). It consists of papers from 20 conferences (five per area): KDD, PAKDD, ICDM, PKDD, SDM, ICDE, VLDB, SIGMOD, PODS, EDBT, SIGIR, WWW, ECIR, WSDM, IJCAI, AAAI, ICML, ECML, CVPR, CIKM. Thus, we consider the authors who have published papers in these conferences, and work with the co-authorship network (edge weight = co-authorship frequency). The edge data consisted of a vector of size four representing the count of papers co-authored in a particular research area. The graph contains a total of 42844 author nodes. Each author is associated with a vector of size 20 containing the count of papers published by an author in the twenty conferences. There is an edge between two authors if they co- authored a paper together and the count of such co-authored papers is the weight Wvivj between two nodes. The graph contains 118618 co-authorship edges. The weight of the link between the author-vertex and the co- authorship-edge-vertex in the HMRF (i.e., Wvieij ) is set to 0.740.760.780.80.820.8400.20.40.60.81Outlier Detection Accuracyλ3Sensitivity of λ3Graph AGraph B0.740.760.780.80.820.8400.20.40.60.81Outlier Detection Accuracyλ3Sensitivity of λ3Graph AGraph B0.40.50.60.70.80.910123Outlier Detection Accuracyλ1Sensitivity of λ1HCODACODA0.40.50.60.70.80.910123Outlier Detection Accuracyλ1Sensitivity of λ1HCODACODA0.740.760.780.80.820.8400.20.40.60.81Outlier Detection Accuracyλ3Sensitivity of λ3Graph AGraph B0.40.50.60.70.80.910123Outlier Detection Accuracyλ1Sensitivity of λ1HCODACODA0.40.50.60.70.80.910123Outlier Detection Accuracyλ1Sensitivity of λ1HCODACODA TABLE I: Synthetic Dataset Results on Graphs A, B and C (K=5; OD Acc.=Outlier Detection Accuracy, CA Acc.=Community Assignment Accuracy; CODA is Baseline, HCODA is the proposed algorithm) V % injected % extracted 1000 1000 1000 1000 1000 1000 10000 10000 10000 10000 10000 10000 100000 100000 100000 100000 100000 100000 1 5 5 10 10 10 1 5 5 10 10 10 1 5 5 10 10 10 1 1 5 1 5 10 1 1 5 1 5 10 1 1 5 1 5 10 CODA [12] OD Acc. 1.000 1.000 0.760 1.000 0.960 0.760 0.690 0.970 0.746 1.000 0.958 0.795 0.722 0.995 0.751 0.997 0.946 0.784 HCODA Acc. 1.000 1.000 0.800 1.000 0.980 0.840 0.730 1.000 0.780 1.000 1.580 0.814 0.735 0.996 0.789 0.999 0.974 0.808 OD CODA [12] CA Acc. 0.714 0.725 0.739 0.683 0.720 0.729 0.770 0.740 0.758 0.705 0.741 0.759 0.773 0.747 0.764 0.698 0.733 0.750 HCODA CA Acc. 0.713 0.735 0.756 0.699 0.738 0.762 0.784 0.755 0.777 0.718 0.757 0.777 0.787 0.762 0.783 0.714 0.751 0.770 of runtime Average HCODA (ms) 898.6 930 899 917.2 913 926 9846.6 10259 10478.8 10026.8 9840.4 9626.8 120587 113171.5 113749.2 104812.4 103004 100314 the inverse of the number of co-authors of author vi in the graph. Wvi,vj ,eij is set to ratio of number of papers where authors vi and vj are co-authors to the total number of papers on which either vi or vj are authors. We set the number of communities to K=4 (i.e., four normal communities and an outlier community). Also, we set the percentage of outlier parameter r as 1%. The average execution time of the lgorithm is 30.32 seconds. anomalies. We modeled the problem as a community detection task using a Hidden Random Markov Model, where outliers form a separate community. We used ICM and EM to infer the hidden community labels and model parameters iteratively. Experimental results show that the proposed algorithm con- sistently outperforms the baseline CODA method on synthetic data, and also identifies meaningful community outliers from the Four Area network data. it Case Studies: Result of algorithm show that is able to identify interesting nodes(authors) and edges(co-authorship). We validate the result produced by algorithm by manually visiting the authors' homepages. For example, work by Sameer K. Antani is mainly in Clinical data standards and electronic medical records, but he published a paper with authors work- ing in information retrieval i.e. node data of Sameer K. Antani is different from the fellow co-authors but the relationship is similar to what two authors from information retrieval should have and hence the algorithm has identified this node as interesting one. Similarly, Ivo Krka mainly focuses on software engineering and system modeling, however, he has published a paper on data mining and hence identified by the algorithm. The proposed algorithm also identified authors based on the edge information. We discuss a few cases now. Anindya Datta usually publishes in information systems, and Debra E. VanderMeer usually publishes work related to design science research, but their co-authored work is published on data management and very large databases topics. Sabyasachi Saha has co-authored papers with Sandip Sen on topics related to artificial intelligence and he has also published work on information and knowledge management with Pang-Ning Tan. The algorithm was able to identify him because of his work in multiple research areas. VII. CONCLUSION In this paper, we introduced a method (HCODA) that detects novel Holistic Community Outlier graph nodes by taking into account the node data and edge data simultaneously to detect REFERENCES [1] James Abello, Tina Eliassi-Rad, and Nishchal Devanur. Detecting novel In ICDM 2010, The 10th discrepancies in communication networks. IEEE International Conference on Data Mining, Sydney, Australia, 14- 17 December 2010, pages 8–17, 2010. [2] Charu C. Aggarwal. Outlier Analysis. Springer, 2013. [3] Charu C. Aggarwal, Yuchen Zhao, and Philip S. Yu. Outlier Detection in Graph Streams. In Proc. of the 27th Intl. Conf. on Data Engineering (ICDE), pages 399–409. IEEE Computer Society, 2011. [4] Leman Akoglu and Christos Faloutsos. Event detection in time series of mobile communication graphs. In Army Science Conference, pages 77–79, 2010. [5] Leman Akoglu, Mary McGlohon, and Christos Faloutsos. Oddball: In Pacific-Asia Conference Spotting Anomalies in Weighted Graphs. on Knowledge Discovery and Data Mining, pages 410–421. Springer, 2010. [6] Leman Akoglu, Hanghang Tong, and Danai Koutra. Graph based Anomaly Detection and Description: A Survey. Data Mining and Knowledge Discovery, 29(3):626–688, 2015. [7] Julian Besag. On the Statistical Analysis of Dirty Pictures. Journal of the Royal Statistical Society. Series B (Methodological), pages 259–302, 1986. [8] Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and Christos Faloutsos. Copycatch: Stopping Group Attacks by Spotting In Proceedings of the 22nd Lockstep Behavior in Social Networks. international conference on World Wide Web, pages 119–130. ACM, 2013. [9] Brigitte Boden, Stephan Gunnemann, Holger Hoffmann, and Thomas Seidl. Mining Coherent Subgraphs in Multi-layer Graphs with Edge the 18th ACM SIGKDD international Labels. conference on Knowledge discovery and data mining, pages 1258–1266. ACM, 2012. In Proceedings of [10] Deepayan Chakrabarti. Autopart: Parameter-free Graph Partitioning and Outlier Detection. In European Conference on Principles of Data Mining and Knowledge Discovery, pages 112–124. Springer, 2004. [11] Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection: A Survey. ACM computing surveys (CSUR), 41(3):15, 2009. [12] Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Sun, and Jiawei Han. On Community Outliers and their Efficient Detection in Information In Proceedings of the 16th ACM SIGKDD international Networks. conference on Knowledge discovery and data mining, pages 813–822. ACM, 2010. [13] Manish Gupta, Jing Gao, Charu Aggarwal, and Jiawei Han. Outlier Detection for Temporal Data. Synthesis Lectures on Data Mining and Knowledge Discovery, 5(1):1–129, 2014. [14] Manish Gupta, Jing Gao, and Jiawei Han. Community Distribution In Joint Outlier Detection in Heterogeneous Information Networks. European Conference on Machine Learning and Knowledge Discovery in Databases, pages 557–573. Springer, 2013. [15] Manish Gupta, Jing Gao, Yizhou Sun, and Jiawei Han. Community Trend Outlier Detection using Soft Temporal Pattern Mining. In Proc. of the European Conf. on Machine Learning and Knowledge Discovery in Databases (ECML PKDD), pages 692–708, 2012. [16] Manish Gupta, Jing Gao, Yizhou Sun, and Jiawei Han. Integrating Community Matching and Outlier Detection for Mining Evolutionary Community Outliers. In Proc. of the 18th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD), pages 859–867, 2012. [17] Manish Gupta, Jing Gao, Xifeng Yan, Hasan Cam, and Jiawei Han. Top-k interesting subgraph discovery in information networks. In 2014 IEEE 30th International Conference on Data Engineering, pages 820– 831. IEEE, 2014. [18] Victoria J Hodge and Jim Austin. A Survey of Outlier Detection Methodologies. Artificial intelligence review, 22(2):85–126, 2004. [19] Tsuyoshi Id´e and Hisashi Kashima. Eigenspace-based Anomaly Detec- In Proc. of the 10th ACM SIGKDD Intl. tion in Computer Systems. Conf. on Knowledge Discovery and Data Mining (KDD), pages 440– 449, 2004. [20] Brandon Pincombe. Anomaly Detection in Time Series of Graphs using ARMA Processes. ASOR Bulletin, 24(4):2–10, 2005. [21] Guo-Jun Qi, Charu C Aggarwal, and Thomas Huang. Community Detection with Edge Content in Social Media Networks. In 2012 IEEE 28th International Conference on Data Engineering, pages 534–545. IEEE, 2012. [22] Stephen Ranshous, Shitian Shen, Danai Koutra, Steven Harenberg, Christos Faloutsos, and Nagiza F. Samatova. Anomaly detection in dynamic detworks: A survey. WIREs Comp Stat, 7(3):223–247, 2015. [23] Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, and Christos Falout- sos. Neighborhood Formation and Anomaly Detection in Bipartite In Fifth IEEE International Conference on Data Mining Graphs. (ICDM'05), pages 418–425. IEEE, 2005. [24] Jimeng Sun, Dacheng Tao, and Christos Faloutsos. Beyond streams and graphs: dynamic tensor analysis. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 374–383. ACM, 2006.